Question
a.
extension
b.
differentiation
c.
integration
d.
distribution
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The _________ service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
Similar Questions
Discover Related MCQs
Q. When a station moves only within the direct communication range of the communication stations of a single BSS, it is referred to as –
View solution
Q. A station movement from one BSS in one ESS to a BSS within another ESS falls under –
View solution
Q. “Enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another.” This can be referred to as-
View solution
Q. What was the security algorithm defined for the IEEE 802.11?
View solution
Q. The final form of the 802.11i standard is referred to as –
View solution
Q. What is the size of the Temporal Key for the case of TKIP?
View solution
Q. What is a valid size of the Group Temporal Key (GTK) in WEP?
View solution
Q. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?
View solution
Q. What is the size of the Message Integrity Code Key?
View solution
Q. Which one of these is not a Traffic control key?
View solution
Q. The MPDU exchange for distributing pairwise keys is known as __________
View solution
Q. GTK is encrypted using:
View solution
Q. Message Integrity Code (MIC) is generated by an algorithm called
View solution
Q. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
View solution
Q. CCMP uses which block cipher mode of operation?
View solution
Q. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.
View solution
Q. HMAC SHA-1 produces a hash of length-
View solution
Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression –
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
View solution
Q. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the Key ‘K’ in the above expression?
View solution
Q. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Java Programming
Level up your coding skills with our Java Programming MCQs. From object-oriented...