MCQOPTIONS
Saved Bookmarks
This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Another name for the AAA key (Authentication, Authorization and Accounting Key) is |
| A. | pre-shared key |
| B. | pairwise transient key |
| C. | master session key |
| D. | key conformation key |
| Answer» D. key conformation key | |
| 2. |
There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol. |
| A. | RADUIS |
| B. | EAPOL |
| C. | TKIP |
| D. | KSN |
| Answer» C. TKIP | |
| 3. |
The specification of a protocol, along with the chosen key length (if variable) is known as |
| A. | cipher suite |
| B. | system suite |
| C. | key set |
| D. | service set |
| Answer» B. system suite | |
| 4. |
EAP stands for |
| A. | Extended Application Protocol |
| B. | Extensible Authentication Protocol |
| C. | Embedded Application Protocol |
| D. | Embedded Authentication Protocol |
| Answer» C. Embedded Application Protocol | |
| 5. |
The final form of the 802.11i standard is referred to as |
| A. | Wi-Fi Protected Access |
| B. | Robust Security Network |
| C. | Wired Equivalency Privacy |
| D. | None of the mentioned |
| Answer» C. Wired Equivalency Privacy | |
| 6. |
What was the security algorithm defined for the IEEE 802.11? |
| A. | WEP |
| B. | RSN |
| C. | WPA |
| D. | SSL |
| Answer» B. RSN | |