SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
wireless security threats
802.11n
IV
802.11g
2. TKIP stands for...
WAP
WAP
temporal key integrity protocol
WAP 2.0
3. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
service set Identifier
wardriving
rogue
WAP
4. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
802.11
temporal key integrity protocol
SSID broadcast
5. WAP stands for...
bluebugging
WEP
802.11a
wireless application protocol
6. SSID stands for...
rogue
open
service set Identifier
TKIP
7. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
802.11a
wardriving
TEMPEST
802.1x
8. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
bluebugging
SSID
802.11
faraday cage
9. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
bluebugging
SSID broadcast
802.11n
SSID
10. WEP stands for...
wired equivalent privacy
802.1x
wireless transport layer security
TEMPEST
11. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
TEMPEST
WAP
access point
open
12. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
WLAN
bluesnarfing
TKIP
shared key
13. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11
802.11a
802.11n
bluejacking
14. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
TKIP
wireless security threats
wireless application protocol
802.11g
15. Theft of data by connecting to bluetooth device
WAP
SSID
WLAN
bluesnarfing
16. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
access point
rogue
TEMPEST
17. WPA stands for...
WPA2
open
wi-fi protected access
wireless application protocol
18. MIC stands for...
message integrity check
WAP
wi-fi protected access
SSID
19. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
WAP 1.x
802.11a
WPA
20. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
WAP 2.0
WEP
rogue
21. Replacement for WAP 1.x which corrects security issues
WLAN
TKIP
WAP 2.0
message integrity check
22. Using Bluetooth to establish a serial connection and take control of the device
shared key
temporal key integrity protocol
WAP 1.x
bluebugging
23. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
rogue
802.11g
wireless security threats
shared key
24. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WAP 1.x
bluejacking
WPA
rogue
25. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP
SSID
802.11n
open
26. Sending unsolicited messages to a bluetooth device
bluejacking
WAP 1.x
WPA
WLAN
27. An access point that has been installed without authorization usually for malicious intent
WAP
rogue
wireless security threats
WEP
28. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
WPA2
802.11a
802.11n
shared key
29. A ____ consists of a wireless client and access point
bluesnarfing
shared key
WPA2
WLAN
30. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WAP 2.0
802.11n
WAP 1.x
802.11
31. A device that connects different wireless stations
802.1x
open
access point
faraday cage
32. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
TEMPEST
WPA
wireless security threats
33. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
WLAN
faraday cage
wardriving
wireless security threats
34. WTLS stands for...
wireless transport layer security
rogue
WLAN
WAP
35. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wardriving
802.11g
wireless security threats
TKIP
36. An 802.11 wireless authentication method where client only communicate directly with the access point
wi-fi protected access
message integrity check
shared key
TEMPEST
37. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
WLAN
WAP 1.x
802.11g