Question
a.
chisel
b.
tunnel
c.
zeroing
d.
handshaking
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The secure authentication connection is referred to as
Similar Questions
Discover Related MCQs
Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression:
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
View solution
Q. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.
View solution
Q. __________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.
View solution
Q. Generate the CRC codeword for the data word 1101011011 using generator 10011. Also write both in the polynomial form.
View solution
Q. Convert the following binary notation to hexadecimal notation –
10000000 00001011 00000011 00011111
View solution
Q. Which Hashing algorithm is used to derive the PTK for PMK?
View solution
Q. The pairwise transient key (PTK) consists of ______________ keys.
View solution
Q. The pairwise transient key (PTK) is derived from –
View solution
Q. The Pairwise master key (PMK) can be derived from either PSK or MSK.
View solution
Q. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.
View solution
Q. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input –
View solution
Q. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?
View solution
Q. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the Key ‘K’ in the above expression?
View solution
Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression –
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?
View solution
Q. HMAC SHA-1 produces a hash of length-
View solution
Q. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.
View solution
Q. CCMP uses which block cipher mode of operation?
View solution
Q. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.
View solution
Q. Message Integrity Code (MIC) is generated by an algorithm called
View solution
Q. GTK is encrypted using:
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!