

MCQOPTIONS
Saved Bookmarks
This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Another name for the AAA key (Authentication, Authorization and Accounting Key) is |
A. | pre-shared key |
B. | pairwise transient key |
C. | master session key |
D. | key conformation key |
Answer» D. key conformation key | |
2. |
There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol. |
A. | RADUIS |
B. | EAPOL |
C. | TKIP |
D. | KSN |
Answer» C. TKIP | |
3. |
The specification of a protocol, along with the chosen key length (if variable) is known as |
A. | cipher suite |
B. | system suite |
C. | key set |
D. | service set |
Answer» B. system suite | |
4. |
EAP stands for |
A. | Extended Application Protocol |
B. | Extensible Authentication Protocol |
C. | Embedded Application Protocol |
D. | Embedded Authentication Protocol |
Answer» C. Embedded Application Protocol | |
5. |
The final form of the 802.11i standard is referred to as |
A. | Wi-Fi Protected Access |
B. | Robust Security Network |
C. | Wired Equivalency Privacy |
D. | None of the mentioned |
Answer» C. Wired Equivalency Privacy | |
6. |
What was the security algorithm defined for the IEEE 802.11? |
A. | WEP |
B. | RSN |
C. | WPA |
D. | SSL |
Answer» B. RSN | |