29 Questions
What is the primary benefit of using a wired LAN in terms of data reception?
It limits reception of data to stations connected to the LAN
How are security levels assigned to subjects in a secure operating system?
Based on the user's password/ID and terminal access
What happens when the Trojan horse program attempts to store the sensitive character string in a public file?
The attempt is denied due to the security policy
What is the primary weakness of the WEP algorithm?
It is not secure for wireless communication
What is the primary purpose of the 802.11i task group?
To address the WLAN security issues
What is the relationship between the security levels 'sensitive' and 'public'?
Sensitive is higher than public
What is the primary purpose of the authentication phase between the STA and AS?
To prove their identities to each other
What happens to non-authentication traffic between the STA and AS during the authentication phase?
It is blocked by the AP
Where does secure data transfer occur?
Between the STA and the AP
What is the purpose of the connection termination phase?
To turn down the secure connection and restore the original state
What is the first exchange in the discovery phase?
Network and security capability discovery
What is the role of the AP in the authentication transaction?
To forward traffic between the STA and AS
What is the purpose of the Wi-Fi Alliance's WPA standard?
To accelerate the introduction of strong security into WLANs
What is the final form of the 802.11i standard referred to as?
Robust Security Network (RSN)
What is the purpose of the authentication function in the 802.11i RSN security specification?
To provide mutual authentication and generate temporary keys
What is the purpose of the access control function in the 802.11i RSN security specification?
To enforce the use of the authentication function and facilitate key exchange
What is the purpose of the privacy with message integrity function in the 802.11i RSN security specification?
To encrypt data and ensure it has not been altered
What is the first phase of operation in an IEEE 802.11i RSN?
Discovery
What is the primary purpose of the key management phase in IEEE 802.11i?
To generate and distribute cryptographic keys to STAs
What is the relationship between the master session key (MSK) and the pairwise master key (PMK)?
The PMK is derived from the MSK by truncation (if necessary)
What is the purpose of the pairwise transient key (PTK)?
To be used for communication between an STA and AP after they have been mutually authenticated
What is the primary advantage of TKIP over older wireless LAN security approaches?
Software changes are sufficient for implementation
What is the alternative to the master session key (MSK) in IEEE 802.11i?
Pre-shared key (PSK)
What algorithm is used to generate the MIC in TKIP?
Michael
What are the two schemes defined in IEEE 802.11i for protecting data transmitted in 802.11 MPDUs?
Temporal Key Integrity Protocol (TKIP) and Counter Mode-CBC MAC Protocol (CCMP)
What is the purpose of the authentication phase in IEEE 802.11i?
To generate the master session key (MSK)
What is the primary difference between TKIP and CCMP?
CCMP requires hardware upgrades, while TKIP requires software changes
What service does CCMP provide, in addition to message integrity?
Data confidentiality
Which of the following is not a method for securing a WLAN?
WEB
Learn about the security features of an operating system, including assigning security levels to subjects at logon based on criteria like terminal access and user identification. Understand how security levels like sensitive and public are ordered and applied.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free