Question
a.
Physical Layer
b.
Logic Link Control Layer
c.
Medium Access Layer
d.
None of the mentioned
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Frequency band definition and Wireless signal encoding are functions of which layer?
Similar Questions
Discover Related MCQs
Q. The correct order of the of the MAC header is-
View solution
Q. CRC is a component of the MAC trailer.
View solution
Q. Reliable data delivery and Wireless access control protocols are functions of which layer?
View solution
Q. Which layer keeps track of the frames that have been transmitted and received?
View solution
Q. The smallest building block of a wireless LAN is –
View solution
Q. In an IBSS system all communications are done via access points (APs).
View solution
Q. __________ consists of two or more basic service sets interconnected by a distribution system.
View solution
Q. IEEE 802.11 defines ___________ services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.
View solution
Q. ___________ services are used to control IEEE 302.11 LAN access and confidentiality.
View solution
Q. __________ services are used to control IEEE 302.11 LAN delivery of MDSUs between stations.
View solution
Q. _________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.
View solution
Q. The _________ service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
View solution
Q. When a station moves only within the direct communication range of the communication stations of a single BSS, it is referred to as –
View solution
Q. A station movement from one BSS in one ESS to a BSS within another ESS falls under –
View solution
Q. “Enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another.” This can be referred to as-
View solution
Q. What was the security algorithm defined for the IEEE 802.11?
View solution
Q. The final form of the 802.11i standard is referred to as –
View solution
Q. What is the size of the Temporal Key for the case of TKIP?
View solution
Q. What is a valid size of the Group Temporal Key (GTK) in WEP?
View solution
Q. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!