Explore topic-wise MCQs in Network Security.

This section includes 7 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Broadcast address is given by

A. 0.0.0.0
B. 127.x.x.x
C. 255.255.255.255
D. None of the mentioned
Answer» D. None of the mentioned
2.

The secure authentication connection is referred to as

A. chisel
B. tunnel
C. zeroing
D. handshaking
Answer» C. zeroing
3.

In which port forwarding technique does the client act on the server s behalf?

A. Remote Forwarding
B. Local Forwarding
C. Stable Forwarding
D. None of the mentioned
Answer» B. Local Forwarding
4.

Which Hashing algorithm is used to derive the PTK for PMK?

A. SHA-1
B. SHA-2
C. SHA-3
D. MD-5
Answer» B. SHA-2
5.

In the IEEE 802.11i PRF, a nonce is generated by the following expression:nonce = PRF (Random Number, InitCounter , MAC || Time, Len)

A. nWhat is the value of the Len (desirable number of pseudorandom bits)?
B. 64
C. 128
D. 256
E. 512
Answer» D. 256
6.

There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.

A. RADUIS
B. EAPOL
C. TKIP
D. KSN
Answer» C. TKIP
7.

__________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.

A. Station, Distribution
B. Distribution, Station
C. Extended, Basic
D. Basic, Extended
Answer» B. Distribution, Station