Operating System Security Levels

DashingOphicleide avatar
DashingOphicleide
·
·
Download

Start Quiz

Study Flashcards

29 Questions

What is the primary benefit of using a wired LAN in terms of data reception?

It limits reception of data to stations connected to the LAN

How are security levels assigned to subjects in a secure operating system?

Based on the user's password/ID and terminal access

What happens when the Trojan horse program attempts to store the sensitive character string in a public file?

The attempt is denied due to the security policy

What is the primary weakness of the WEP algorithm?

It is not secure for wireless communication

What is the primary purpose of the 802.11i task group?

To address the WLAN security issues

What is the relationship between the security levels 'sensitive' and 'public'?

Sensitive is higher than public

What is the primary purpose of the authentication phase between the STA and AS?

To prove their identities to each other

What happens to non-authentication traffic between the STA and AS during the authentication phase?

It is blocked by the AP

Where does secure data transfer occur?

Between the STA and the AP

What is the purpose of the connection termination phase?

To turn down the secure connection and restore the original state

What is the first exchange in the discovery phase?

Network and security capability discovery

What is the role of the AP in the authentication transaction?

To forward traffic between the STA and AS

What is the purpose of the Wi-Fi Alliance's WPA standard?

To accelerate the introduction of strong security into WLANs

What is the final form of the 802.11i standard referred to as?

Robust Security Network (RSN)

What is the purpose of the authentication function in the 802.11i RSN security specification?

To provide mutual authentication and generate temporary keys

What is the purpose of the access control function in the 802.11i RSN security specification?

To enforce the use of the authentication function and facilitate key exchange

What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?

To encrypt data and ensure it has not been altered

What is the first phase of operation in an IEEE 802.11i RSN?

Discovery

What is the primary purpose of the key management phase in IEEE 802.11i?

To generate and distribute cryptographic keys to STAs

What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?

The PMK is derived from the MSK by truncation (if necessary)

What is the purpose of the pairwise transient key (PTK)?

To be used for communication between an STA and AP after they have been mutually authenticated

What is the primary advantage of TKIP over older wireless LAN security approaches?

Software changes are sufficient for implementation

What is the alternative to the master session key (MSK) in IEEE 802.11i?

Pre-shared key (PSK)

What algorithm is used to generate the MIC in TKIP?

Michael

What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?

Temporal Key Integrity Protocol (TKIP) and Counter Mode-CBC MAC Protocol (CCMP)

What is the purpose of the authentication phase in IEEE 802.11i?

To generate the master session key (MSK)

What is the primary difference between TKIP and CCMP?

CCMP requires hardware upgrades, while TKIP requires software changes

What service does CCMP provide, in addition to message integrity?

Data confidentiality

Which of the following is not a method for securing a WLAN?

WEB

Learn about the security features of an operating system, including assigning security levels to subjects at logon based on criteria like terminal access and user identification. Understand how security levels like sensitive and public are ordered and applied.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

MA
59 questions

MA

FavoredDivisionism avatar
FavoredDivisionism
Operating System Security
18 questions
Use Quizgecko on...
Browser
Browser