Question
a.
SHA-1
b.
SHA-2
c.
SHA-3
d.
MD-5
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which Hashing algorithm is used to derive the PTK for PMK?
Similar Questions
Discover Related MCQs
Q. Convert the following binary notation to hexadecimal notation –
10000000 00001011 00000011 00011111
View solution
Q. Generate the CRC codeword for the data word 1101011011 using generator 10011. Also write both in the polynomial form.
View solution
Q. __________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.
View solution
Q. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.
View solution
Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression:
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
View solution
Q. The secure authentication connection is referred to as
View solution
Q. Broadcast address is given by
View solution
Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.
View solution
Q. In the SSL record protocol operation pad_1 is :
View solution
Q. An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.
View solution
Q. SSID stands for
View solution
Q. Loopback address is given by:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!