Wireless Network Security MCQs

Wireless Network Security MCQs

 1. Wi-Fi stands for 
A. Wireless Fidelity. 
B. Wireless LAN. 
C. Wireless FLAN. 
D. None of the mentioned. 
Answer= Wireless Fidelity

2. Wired networks are far more susceptible to eavesdropping and jamming than wireless networks.. 
A. TRUE. 
B. FALSE. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer= FALSE

3. A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network. Which type of Wireless network threat would you classify this under?. 
A. Malicious Threat. 
B. Network Injection. 
C. Denial Of Service. 
D. Accidental Association. 
Answer= Accidental Association

4. When there is a lack of a central point of control. Which type of Wireless network threat would you classify this under?. 
A. Man in the middle attack. 
B. Identity Theft. 
C. Ad Hoc Networks. 
D. Non-Traditional Networks. 
Answer= Ad Hoc Networks

5. When fraud access points are created to access information such as passwords. Which type of Wireless network threat would you classify this under?. 
A. Identity Theft. 
B. Network Injection. 
C. Man in the middle attack. 
D. Malicious Association. 
Answer= Malicious Association

6. When bogus reconfiguration commands are used to affect routers and switches to degrade network performance. Which type of Wireless network threat would you classify this under?. 
A. Network Injection. 
B. Malicious Association. 
C. Man in the middle attack. 
D. Denial Of Service. 
Answer= Network Injection

7. When communication is unknowingly going through an adversary/intermediate. Which type of Wireless network threat would you classify this under?. 
A. Malicious Association. 
B. Man in the middle attack. 
C. Network Injection. 
D. Accidental Association. 
Answer= Man in the middle attack

8. When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges. Which type of Wireless network threat would you classify this under?. 
A. Identity Theft.. 
B. Man in the middle attack. 
C. Network Injection. 
D. Accidental Association. 
Answer= Identity Theft.

9. SSID stands for  
A. Secure Service Identifier. 
B. Secure Set Independent Device. 
C. Secure Set Identifier. 
D. Service Set Independent Device. 
Answer= Secure Set Identifier

10. Which of these is not a valid Signal-Hiding Techni for Wireless networks?. 
A. reducing the signal strength to the lowest level such that it still provides requisite coverage. 
B. using directional antennas and signal shielding technis. 
C. installing the wireless access point away from exteriors of the building. 
D. none of the mentioned. 
Answer= none of the mentioned

11. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category?. 
A. Barrier security. 
B. Traffic security. 
C. Device security. 
D. All of the above. 
Answer= All of the above

12. Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc. Which Mobile Device security category of implementation does this fall under?. 
A. Barrier security. 
B. Traffic security. 
C. Device security. 
D. None of the mentioned. 
Answer= Device security

13. VPN stands for  
A. Visual Performance Node. 
B. Virtual Private Network. 
C. Virtual Post Node. 
D. Virtual Post Network. 
Answer= Virtual Private Network

14. Another name for the Wireless Ethernet 802.11a is 
A. Wi-Fi. 
B. Wi-Fi4. 
C. Wi-Fi5. 
D. Wi-Fi6. 
Answer= Wi-Fi5

15. WPA stands for  
A. Wired Protected Access. 
B. Wireless Protected Access. 
C. Wireless Personal Access. 
D. Wired Personal Access. 
Answer= Wireless Protected Access

16. Which layer in the IEEE 802.11 protocol stack has the function of flow control and error control?. 
A. Physical Layer. 
B. Logic Link Control Layer. 
C. Medium Access Layer. 
D. None of the mentioned. 
Answer= Logic Link Control Layer

17. With respect to IEEE 802.11 Wireless LAN, MSDU stands for 
A. MAC service data unit.. 
B. Main server data user. 
C. Multiframe service datagram usage. 
D. MAC server device usage. 
Answer= MAC service data unit.

18. Frency band definition and Wireless signal encoding are functions of which layer?. 
A. Physical Layer. 
B. Logic Link Control Layer. 
C. Medium Access Layer. 
D. None of the mentioned. 
Answer= Physical Layer

19. The correct order of the of the MAC header is 
A. MAC Control, Destination MAC Address, Source MAC Address. 
B. Destination MAC Address, Source MAC Address, MAC Control. 
C. Source MAC Address, Destination MAC Address, MAC Control. 
D. none of the mentioned. 
Answer= MAC Control, Destination MAC Address, Source MAC Address

20. CRC is a component of the MAC trailer.. 
A. TRUE. 
B. FALSE. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer= TRUE

21. Reliable data delivery and Wireless access control protocols are functions of which layer?. 
A. Physical Layer. 
B. Logic Link Control Layer. 
C. Medium Access Layer. 
D. None of the mentioned. 
Answer= Medium Access Layer

22. Which layer keeps track of the frames that have been transmitted and received?. 
A. Physical Layer. 
B. Logic Link Control Layer. 
C. Medium Access Layer. 
D. None of the mentioned. 
Answer= Logic Link Control Layer

23. The smallest building block of a wireless LAN is  
A. Unit server set. 
B. Unit service set. 
C. Basic server set. 
D. Basic service set. 
Answer= Basic service set

24. In an IBSS system all communications are done via access points (APs).. 
A. TRUE. 
B. FALSE. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer= FALSE

25. __________ consists of two or more basic service sets interconnected by a distribution system.. 
A. Extended Service Set. 
B. Permuted Service Set. 
C. Complex Service Set. 
D. Multiplex Service Set. 
Answer= Extended Service Set

26. IEEE 802.11 defines ___________ services that need to be provided by the wireless LAN to achieve functionality equivalent to that which is inherent to wired LANs.. 
A. 4. 
B. 7. 
C. 5. 
D. 9. 
Answer= 9

27. ___________ services are used to control IEEE 302.11 LAN access and confidentiality.. 
A. 4. 
B. 5. 
C. 2. 
D. 3. 
Answer= 3

28. __________ services are used to control IEEE 302.11 LAN delivery of MDSUs between stations.. 
A. 5. 
B. 6. 
C. 3. 
D. 2. 
Answer= 6

29. _________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.. 
A. Station, Distribution. 
B. Distribution, Station. 
C. Extended, Basic. 
D. Basic, Extended. 
Answer= Station, Distribution

30. The _________ service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.. 
A. extension. 
B. differentiation. 
C. integration. 
D. distribution. 
Answer= integration

31. When a station moves only within the direct communication range of the communication stations of a single BSS, it is referred to as  
A. No transition. 
B. BSS transition. 
C. ESS transition. 
D. All of the mentioned. 
Answer= No transition

32. A station movement from one BSS in one ESS to a BSS within another ESS falls under  
A. No transition. 
B. BSS transition. 
C. ESS transition. 
D. All of the mentioned. 
Answer= ESS transition

33. Enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another. This can be referred to as 
A. Association. 
B. Reassociation. 
C. Disassociation. 
D. All of the mentioned. 
Answer= Association

34. What was the security algorithm defined for the IEEE 802.11?. 
A. WEP. 
B. RSN. 
C. WPA. 
D. SSL. 
Answer= WEP

35. The final form of the 802.11i standard is referred to as  
A. Wi-Fi Protected Access. 
B. Robust Security Network. 
C. Wired Equivalency Privacy. 
D. None of the mentioned. 
Answer= Robust Security Network

36. EAP stands for  
A. Extended Application Protocol. 
B. Extensible Authentication Protocol. 
C. Embedded Application Protocol. 
D. Embedded Authentication Protocol. 
Answer= Extensible Authentication Protocol

37. TKIP is an access control protocol.. 
A. TRUE. 
B.  False. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer=  False

38. In which phase of operation does the STA and AS prove their identities to each other?. 
A. Discovery. 
B. Authentication. 
C. Key generation and distribution. 
D. Protected data transfer. 
Answer= Authentication

39. The specification of a protocol, along with the chosen key length (if variable) is known as  
A. cipher suite. 
B. system suite. 
C. key set. 
D. service set. 
Answer= cipher suite

40. Which the 3rd phase of operation in the IEEE 802.11i Protocol?. 
A. Protected Data Transfer. 
B. Discovery. 
C. Authentication. 
D. Key Management. 
Answer= Key Management

41. Which phase uses the Extensible Authentication Protocol?. 
A. Discovery. 
B. Authentication. 
C. Key Management. 
D. Protected Data Transfer. 
Answer= Authentication

42. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the ___________ protocol.. 
A. RADUIS. 
B. EAPOL. 
C. TKIP. 
D. KSN. 
Answer= EAPOL

43. Another name for the AAA key (Authentication, Authorization and Accounting Key) is  
A. pre-shared key. 
B. pairwise transient key. 
C. master session key. 
D. key conformation key. 
Answer= master session key

44. What is the size of the Temporal Key for the case of TKIP?. 
A. 64 bits. 
B. 128 bits. 
C. 256 bits. 
D. 512 bits. 
Answer= 256 bits

45. What is a valid size of the Group Temporal Key (GTK) in WEP?. 
A. 40 bits. 
B. 128 bits. 
C. 512 bits. 
D. 80 bits. 
Answer= 40 bits

46. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?. 
A. EAPOL KCK. 
B. EAPOL KEK. 
C. TK. 
D. All of the mentioned. 
Answer= EAPOL KEK

47. What is the size of the Message Integrity Code Key?. 
A. 64 bits. 
B. 128 bits. 
C. 256 bits. 
D. 512 bits. 
Answer= 64 bits

48. Which one of these is not a Traffic control key?. 
A. GTK. 
B. TK. 
C. MIC Key. 
D. WEP Key. 
Answer= MIC Key

49. The MPDU exchange for distributing pairwise keys is known as __________. 
A. 2-way handshake. 
B. 4-way handshake. 
C. 5 way handshake. 
D. 3 way handshake. 
Answer= 4-way handshake

50. GTK is encrypted using:. 
A. Either RC4 or AES. 
B. DES. 
C. Rabin. 
D. ECC. 
Answer= Either RC4 or AES

51. Message Integrity Code (MIC) is generated by an algorithm called. 
A. Susan. 
B. Michael. 
C. Barbara. 
D. Rijndael. 
Answer= Michael

52. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.. 
A. TRUE. 
B. FALSE. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer= FALSE

53. CCMP uses which block cipher mode of operation?. 
A. OFB. 
B. CFB. 
C. CTR. 
D. CBC. 
Answer= CTR

54. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.. 
A. 48, replay. 
B. 64, replay. 
C. 48, transient. 
D. 64, transient. 
Answer= 48, replay

55. HMAC SHA-1 produces a hash of length 
A. 180 bits. 
B. 240 bits. 
C. 160 bits. 
D. 40 bits. 
Answer= 160 bits

56. What is 'Len' (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?. 
A. 256. 
B. 384. 
C. 568. 
D. 298. 
Answer= 384

57. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input  
A. the parameter B. 
B. a byte with value FF (11111111). 
C. the parameter A. 
D. counter value i. 
Answer= a byte with value FF (11111111)

58. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.. 
A. pre-shared key. 
B. pairwise transient key. 
C. master session key. 
D. key conformation key. 
Answer= pre-shared key

59. The Pairwise master key (PMK) can be derived from either PSK or MSK.. 
A. TRUE. 
B. FALSE. 
C. Nothing can be said. 
D. None of the mentioned. 
Answer= TRUE

60. The pairwise transient key (PTK) is derived from  
A. Key Confirmation Key (KCK). 
B. Temporal Key (TK). 
C. Pairwise master Key (PMK). 
D. Pre-Shared Key (PSK). 
Answer= Pairwise master Key (PMK)

61. The pairwise transient key (PTK) consists of ______________ keys.. 
A. 3. 
B. 4. 
C. 5. 
D. 2. 
Answer= 3

62. Which Hashing algorithm is used to derive the PTK for PMK?. 
A. SHA-1. 
B. SHA-2. 
C. SHA-3. 
D. MD-5. 
Answer= SHA-1

Previous Post Next Post