SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
shared key
WLAN
faraday cage
message integrity check
2. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
shared key
WPA
TKIP
access point
3. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
WPA
bluesnarfing
open
IV
4. WEP stands for...
wired equivalent privacy
rogue
wireless transport layer security
WAP 2.0
5. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
shared key
WAP 2.0
WAP
6. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
WEP
bluebugging
802.1x
7. SSID stands for...
TEMPEST
wireless security threats
TKIP
service set Identifier
8. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
WAP
SSID broadcast
open
802.1x
9. WTLS stands for...
802.11g
wireless transport layer security
wi-fi protected access
WEP
10. TKIP stands for...
service set Identifier
temporal key integrity protocol
WAP 1.x
802.1x
11. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
faraday cage
rogue
wardriving
802.11n
12. An 802.11 wireless authentication method where client only communicate directly with the access point
WEP
shared key
WPA2
SSID broadcast
13. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
bluejacking
WPA
shared key
802.11a
14. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
open
bluejacking
bluesnarfing
15. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
WEP
wireless application protocol
IV
16. An enclosure made out of a specific type of copper wire to block radio waves
bluebugging
SSID broadcast
faraday cage
shared key
17. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
shared key
wireless security threats
SSID
18. An access point that has been installed without authorization usually for malicious intent
rogue
service set Identifier
WLAN
IV
19. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
message integrity check
wireless security threats
bluesnarfing
20. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
TKIP
open
access point
WPA2
21. WAP stands for...
wireless security threats
shared key
802.1x
wireless application protocol
22. A ____ consists of a wireless client and access point
WLAN
open
wireless transport layer security
WAP 2.0
23. MIC stands for...
faraday cage
SSID broadcast
message integrity check
802.11
24. A device that connects different wireless stations
access point
wi-fi protected access
faraday cage
wardriving
25. Theft of data by connecting to bluetooth device
WAP
802.11n
802.11g
bluesnarfing
26. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
open
bluejacking
wardriving
wireless security threats
27. WPA stands for...
TEMPEST
802.11
wi-fi protected access
service set Identifier
28. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
open
WAP
802.11
wireless security threats
29. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
wireless transport layer security
SSID broadcast
WAP 1.x
open
30. Using Bluetooth to establish a serial connection and take control of the device
temporal key integrity protocol
WAP
WAP
bluebugging
31. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
access point
WAP
bluejacking
32. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WPA
rogue
WEP
WAP 1.x
33. Replacement for WAP 1.x which corrects security issues
802.11n
WAP 2.0
bluebugging
wireless transport layer security
34. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP 1.x
802.1x
TKIP
WAP
35. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
wireless security threats
bluesnarfing
access point
802.1x
36. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
shared key
faraday cage
wireless security threats
WAP
37. Sending unsolicited messages to a bluetooth device
wireless transport layer security
temporal key integrity protocol
wireless security threats
bluejacking