The Full Wiki

More info on IEEE 802.11i-2004

IEEE 802.11i-2004: Quiz

Advertisements
  

Question 1: This method works with any RSNA network, whether WPA or ________, TKIP or CCMP (AES).
Password strengthWi-Fi Protected AccessExtensible Authentication ProtocolIEEE 802.11i-2004

Question 2: The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP ________, and STA MAC address.
Data Link LayerEthernetMAC addressToken ring

Question 3: The amendment was later incorporated into the published ________ standard.
IEEE 802.11a-1999IEEE 802.11Token ringIEEE 802.11g-2003

Question 4: The authentication process leaves two considerations: the ________ (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived.
Wireless access pointIEEE 802.11Wi-FiWireless LAN

Question 5: ________ (WPA) had previously been introduced by the Wi-Fi Alliance as an intermediate solution to WEP insecurities.
IEEE 802.11i-2004Wi-Fi Protected AccessPassword strengthExtensible Authentication Protocol

Question 6: The product is then put through a ________.
MD5HMACCryptographic hash functionSHA hash functions

Question 7: 802.11i supersedes the previous security specification, ________ (WEP), which was shown to have severe security weaknesses.
IEEE 802.11i-2004Wired Equivalent PrivacyRC4Related-key attack

Question 8: IEEE 802.11i-2004 or 802.11i is an amendment to the original ________.
IEEE 802.11g-2003Token ringIEEE 802.11IEEE 802.11a-1999

Question 9: 802.11i makes use of the ________ (AES) block cipher, whereas WEP and WPA use the RC4 stream cipher.
Advanced Encryption Standard3-WayIntegral cryptanalysisData Encryption Standard

Question 10: All the above messages are sent as ________-Key frames.
RADIUSWi-Fi Protected AccessExtensible Authentication ProtocolProtected Extensible Authentication Protocol







Advertisements









Got something to say? Make a comment.
Your name
Your email address
Message