SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
wireless application protocol
WAP
temporal key integrity protocol
802.11a
2. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wardriving
bluebugging
bluejacking
wi-fi protected access
3. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
SSID broadcast
wireless transport layer security
access point
TKIP
4. WEP stands for...
SSID broadcast
bluebugging
WLAN
wired equivalent privacy
5. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
WAP 1.x
wireless application protocol
TEMPEST
SSID
6. An access point that has been installed without authorization usually for malicious intent
WAP
rogue
service set Identifier
temporal key integrity protocol
7. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID
WAP 2.0
802.11g
SSID broadcast
8. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wi-fi protected access
faraday cage
wireless security threats
SSID
9. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
bluesnarfing
open
802.11g
WPA
10. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
shared key
wi-fi protected access
IV
shared key
11. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WAP
wi-fi protected access
WPA
faraday cage
12. An enclosure made out of a specific type of copper wire to block radio waves
open
wireless transport layer security
faraday cage
open
13. Theft of data by connecting to bluetooth device
bluesnarfing
WAP
WLAN
open
14. TKIP stands for...
open
temporal key integrity protocol
wired equivalent privacy
wireless transport layer security
15. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
WPA
WAP 2.0
shared key
16. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
open
wi-fi protected access
WAP
17. An 802.11 wireless authentication method where client only communicate directly with the access point
SSID broadcast
wi-fi protected access
802.11g
shared key
18. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
IV
open
access point
wireless application protocol
19. A ____ consists of a wireless client and access point
shared key
WLAN
802.11g
open
20. A device that connects different wireless stations
access point
wireless application protocol
faraday cage
rogue
21. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
wireless transport layer security
rogue
802.11g
wi-fi protected access
22. Distinguishes different wireless networks from each other - used by an access point to route traffic
wireless application protocol
WAP
SSID
WAP
23. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
802.11a
wardriving
WAP
bluebugging
24. WAP stands for...
wireless application protocol
shared key
WAP
WAP 1.x
25. WPA stands for...
open
wi-fi protected access
access point
open
26. Replacement for WAP 1.x which corrects security issues
wireless transport layer security
wired equivalent privacy
WAP 2.0
WLAN
27. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
open
SSID
802.11n
WAP 1.x
28. MIC stands for...
bluesnarfing
wireless security threats
message integrity check
IV
29. Using Bluetooth to establish a serial connection and take control of the device
802.11g
802.11
wireless transport layer security
bluebugging
30. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
wireless transport layer security
WPA
bluesnarfing
open
31. SSID stands for...
rogue
service set Identifier
TEMPEST
wireless application protocol
32. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
open
WAP
bluesnarfing
33. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
bluesnarfing
shared key
WEP
WLAN
34. Sending unsolicited messages to a bluetooth device
service set Identifier
802.11g
wireless transport layer security
bluejacking
35. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
bluebugging
SSID broadcast
WPA2
open
36. WTLS stands for...
SSID
WAP
wireless transport layer security
shared key
37. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11n
802.11
wardriving
shared key