MCQOPTIONS
Saved Bookmarks
This section includes 7 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Broadcast address is given by |
| A. | 0.0.0.0 |
| B. | 127.x.x.x |
| C. | 255.255.255.255 |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
The secure authentication connection is referred to as |
| A. | chisel |
| B. | tunnel |
| C. | zeroing |
| D. | handshaking |
| Answer» C. zeroing | |
| 3. |
In which port forwarding technique does the client act on the server s behalf? |
| A. | Remote Forwarding |
| B. | Local Forwarding |
| C. | Stable Forwarding |
| D. | None of the mentioned |
| Answer» B. Local Forwarding | |
| 4. |
Which Hashing algorithm is used to derive the PTK for PMK? |
| A. | SHA-1 |
| B. | SHA-2 |
| C. | SHA-3 |
| D. | MD-5 |
| Answer» B. SHA-2 | |
| 5. |
In the IEEE 802.11i PRF, a nonce is generated by the following expression:nonce = PRF (Random Number, InitCounter , MAC || Time, Len) |
| A. | nWhat is the value of the Len (desirable number of pseudorandom bits)? |
| B. | 64 |
| C. | 128 |
| D. | 256 |
| E. | 512 |
| Answer» D. 256 | |
| 6. |
There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol. |
| A. | RADUIS |
| B. | EAPOL |
| C. | TKIP |
| D. | KSN |
| Answer» C. TKIP | |
| 7. |
__________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs. |
| A. | Station, Distribution |
| B. | Distribution, Station |
| C. | Extended, Basic |
| D. | Basic, Extended |
| Answer» B. Distribution, Station | |