Operating System Security Levels

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary benefit of using a wired LAN in terms of data reception?

  • It provides a higher speed of data transmission
  • It limits reception of data to stations connected to the LAN (correct)
  • It allows for more devices to be connected
  • It is more cost-effective

How are security levels assigned to subjects in a secure operating system?

  • Based on the user's role in the organization
  • Based on the user's password/ID and terminal access (correct)
  • Based on the type of data being accessed
  • Based on the type of computer being used

What happens when the Trojan horse program attempts to store the sensitive character string in a public file?

  • The attempt is denied due to the security policy (correct)
  • The attempt is denied due to the access control list
  • The program is terminated by the operating system
  • The attempt is allowed by the reference monitor

What is the primary weakness of the WEP algorithm?

<p>It is not secure for wireless communication (A)</p> Signup and view all the answers

What is the primary purpose of the 802.11i task group?

<p>To address the WLAN security issues (C)</p> Signup and view all the answers

What is the relationship between the security levels 'sensitive' and 'public'?

<p>Sensitive is higher than public (B)</p> Signup and view all the answers

What is the primary purpose of the authentication phase between the STA and AS?

<p>To prove their identities to each other (A)</p> Signup and view all the answers

What happens to non-authentication traffic between the STA and AS during the authentication phase?

<p>It is blocked by the AP (A)</p> Signup and view all the answers

Where does secure data transfer occur?

<p>Between the STA and the AP (C)</p> Signup and view all the answers

What is the purpose of the connection termination phase?

<p>To turn down the secure connection and restore the original state (D)</p> Signup and view all the answers

What is the first exchange in the discovery phase?

<p>Network and security capability discovery (A)</p> Signup and view all the answers

What is the role of the AP in the authentication transaction?

<p>To forward traffic between the STA and AS (C)</p> Signup and view all the answers

What is the purpose of the Wi-Fi Alliance's WPA standard?

<p>To accelerate the introduction of strong security into WLANs (A)</p> Signup and view all the answers

What is the final form of the 802.11i standard referred to as?

<p>Robust Security Network (RSN) (B)</p> Signup and view all the answers

What is the purpose of the authentication function in the 802.11i RSN security specification?

<p>To provide mutual authentication and generate temporary keys (B)</p> Signup and view all the answers

What is the purpose of the access control function in the 802.11i RSN security specification?

<p>To enforce the use of the authentication function and facilitate key exchange (C)</p> Signup and view all the answers

What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?

<p>To encrypt data and ensure it has not been altered (A)</p> Signup and view all the answers

What is the first phase of operation in an IEEE 802.11i RSN?

<p>Discovery (B)</p> Signup and view all the answers

What is the primary purpose of the key management phase in IEEE 802.11i?

<p>To generate and distribute cryptographic keys to STAs (B)</p> Signup and view all the answers

What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?

<p>The PMK is derived from the MSK by truncation (if necessary) (D)</p> Signup and view all the answers

What is the purpose of the pairwise transient key (PTK)?

<p>To be used for communication between an STA and AP after they have been mutually authenticated (B)</p> Signup and view all the answers

What is the primary advantage of TKIP over older wireless LAN security approaches?

<p>Software changes are sufficient for implementation (D)</p> Signup and view all the answers

What is the alternative to the master session key (MSK) in IEEE 802.11i?

<p>Pre-shared key (PSK) (B)</p> Signup and view all the answers

What algorithm is used to generate the MIC in TKIP?

<p>Michael (A)</p> Signup and view all the answers

What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?

<p>Temporal Key Integrity Protocol (TKIP) and Counter Mode-CBC MAC Protocol (CCMP) (D)</p> Signup and view all the answers

What is the purpose of the authentication phase in IEEE 802.11i?

<p>To generate the master session key (MSK) (B)</p> Signup and view all the answers

What is the primary difference between TKIP and CCMP?

<p>CCMP requires hardware upgrades, while TKIP requires software changes (B)</p> Signup and view all the answers

What service does CCMP provide, in addition to message integrity?

<p>Data confidentiality (D)</p> Signup and view all the answers

Which of the following is not a method for securing a WLAN?

<p>WEB (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Operating System Security Chapter
6 questions

Operating System Security Chapter

PrestigiousRutherfordium avatar
PrestigiousRutherfordium
Operating System Security
24 questions
Operating System Security
20 questions
Use Quizgecko on...
Browser
Browser