Operating System Security Levels
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary benefit of using a wired LAN in terms of data reception?

  • It provides a higher speed of data transmission
  • It limits reception of data to stations connected to the LAN (correct)
  • It allows for more devices to be connected
  • It is more cost-effective
  • How are security levels assigned to subjects in a secure operating system?

  • Based on the user's role in the organization
  • Based on the user's password/ID and terminal access (correct)
  • Based on the type of data being accessed
  • Based on the type of computer being used
  • What happens when the Trojan horse program attempts to store the sensitive character string in a public file?

  • The attempt is denied due to the security policy (correct)
  • The attempt is denied due to the access control list
  • The program is terminated by the operating system
  • The attempt is allowed by the reference monitor
  • What is the primary weakness of the WEP algorithm?

    <p>It is not secure for wireless communication</p> Signup and view all the answers

    What is the primary purpose of the 802.11i task group?

    <p>To address the WLAN security issues</p> Signup and view all the answers

    What is the relationship between the security levels 'sensitive' and 'public'?

    <p>Sensitive is higher than public</p> Signup and view all the answers

    What is the primary purpose of the authentication phase between the STA and AS?

    <p>To prove their identities to each other</p> Signup and view all the answers

    What happens to non-authentication traffic between the STA and AS during the authentication phase?

    <p>It is blocked by the AP</p> Signup and view all the answers

    Where does secure data transfer occur?

    <p>Between the STA and the AP</p> Signup and view all the answers

    What is the purpose of the connection termination phase?

    <p>To turn down the secure connection and restore the original state</p> Signup and view all the answers

    What is the first exchange in the discovery phase?

    <p>Network and security capability discovery</p> Signup and view all the answers

    What is the role of the AP in the authentication transaction?

    <p>To forward traffic between the STA and AS</p> Signup and view all the answers

    What is the purpose of the Wi-Fi Alliance's WPA standard?

    <p>To accelerate the introduction of strong security into WLANs</p> Signup and view all the answers

    What is the final form of the 802.11i standard referred to as?

    <p>Robust Security Network (RSN)</p> Signup and view all the answers

    What is the purpose of the authentication function in the 802.11i RSN security specification?

    <p>To provide mutual authentication and generate temporary keys</p> Signup and view all the answers

    What is the purpose of the access control function in the 802.11i RSN security specification?

    <p>To enforce the use of the authentication function and facilitate key exchange</p> Signup and view all the answers

    What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?

    <p>To encrypt data and ensure it has not been altered</p> Signup and view all the answers

    What is the first phase of operation in an IEEE 802.11i RSN?

    <p>Discovery</p> Signup and view all the answers

    What is the primary purpose of the key management phase in IEEE 802.11i?

    <p>To generate and distribute cryptographic keys to STAs</p> Signup and view all the answers

    What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?

    <p>The PMK is derived from the MSK by truncation (if necessary)</p> Signup and view all the answers

    What is the purpose of the pairwise transient key (PTK)?

    <p>To be used for communication between an STA and AP after they have been mutually authenticated</p> Signup and view all the answers

    What is the primary advantage of TKIP over older wireless LAN security approaches?

    <p>Software changes are sufficient for implementation</p> Signup and view all the answers

    What is the alternative to the master session key (MSK) in IEEE 802.11i?

    <p>Pre-shared key (PSK)</p> Signup and view all the answers

    What algorithm is used to generate the MIC in TKIP?

    <p>Michael</p> Signup and view all the answers

    What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?

    <p>Temporal Key Integrity Protocol (TKIP) and Counter Mode-CBC MAC Protocol (CCMP)</p> Signup and view all the answers

    What is the purpose of the authentication phase in IEEE 802.11i?

    <p>To generate the master session key (MSK)</p> Signup and view all the answers

    What is the primary difference between TKIP and CCMP?

    <p>CCMP requires hardware upgrades, while TKIP requires software changes</p> Signup and view all the answers

    What service does CCMP provide, in addition to message integrity?

    <p>Data confidentiality</p> Signup and view all the answers

    Which of the following is not a method for securing a WLAN?

    <p>WEB</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser