adplus-dvertising
frame-decoration

Question

__________ services are used to control IEEE 302.11 LAN delivery of MDSUs between stations.

a.

5

b.

6

c.

3

d.

2

Answer: (b).6

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. __________ services are used to control IEEE 302.11 LAN delivery of MDSUs between stations.

Similar Questions

Discover Related MCQs

Q. _________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.

Q. The _________ service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

Q. When a station moves only within the direct communication range of the communication stations of a single BSS, it is referred to as –

Q. A station movement from one BSS in one ESS to a BSS within another ESS falls under –

Q. “Enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another.” This can be referred to as-

Q. What was the security algorithm defined for the IEEE 802.11?

Q. The final form of the 802.11i standard is referred to as –

Q. What is the size of the Temporal Key for the case of TKIP?

Q. What is a valid size of the Group Temporal Key (GTK) in WEP?

Q. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?

Q. What is the size of the Message Integrity Code Key?

Q. Which one of these is not a Traffic control key?

Q. The MPDU exchange for distributing pairwise keys is known as __________

Q. GTK is encrypted using:

Q. Message Integrity Code (MIC) is generated by an algorithm called

Q. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.

Q. CCMP uses which block cipher mode of operation?

Q. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.

Q. HMAC SHA-1 produces a hash of length-

Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression –

nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)

What is the value of the ‘Len’ (desirable number of pseudorandom bits)?