SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA stands for...
SSID
WPA2
service set Identifier
wi-fi protected access
2. WAP stands for...
WPA
wireless application protocol
IV
802.11n
3. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
wireless transport layer security
WPA
802.11g
SSID
4. Replacement for WAP 1.x which corrects security issues
TKIP
802.11g
WAP 2.0
bluesnarfing
5. TKIP stands for...
temporal key integrity protocol
WAP 2.0
wi-fi protected access
open
6. SSID stands for...
SSID
WPA2
service set Identifier
wireless application protocol
7. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
wardriving
message integrity check
WAP 1.x
802.11n
8. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
WPA
SSID broadcast
wireless application protocol
access point
9. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
802.1x
wireless security threats
802.11n
shared key
10. An 802.11 wireless authentication method where client only communicate directly with the access point
WEP
WPA2
802.11n
shared key
11. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WAP 2.0
wireless application protocol
wi-fi protected access
wireless security threats
12. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
802.1x
IV
WAP 1.x
wireless security threats
13. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
WAP
WAP 2.0
wardriving
wi-fi protected access
14. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
wireless security threats
802.11a
shared key
WEP
15. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
WLAN
wireless transport layer security
message integrity check
802.1x
16. Theft of data by connecting to bluetooth device
bluesnarfing
802.11
WAP
wireless application protocol
17. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
shared key
IV
TKIP
wireless security threats
18. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
WAP
wardriving
open
TEMPEST
19. An enclosure made out of a specific type of copper wire to block radio waves
802.11g
faraday cage
shared key
bluebugging
20. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
faraday cage
WAP
802.11g
802.11n
21. A device that connects different wireless stations
WPA2
access point
WLAN
shared key
22. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WLAN
802.1x
WPA
802.11g
23. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
shared key
wi-fi protected access
IV
24. MIC stands for...
WAP
message integrity check
SSID broadcast
temporal key integrity protocol
25. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
shared key
TEMPEST
WPA
wireless security threats
26. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
rogue
WAP
WAP 1.x
WAP
27. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
shared key
WAP
wireless security threats
open
28. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11a
bluesnarfing
bluebugging
WPA
29. A ____ consists of a wireless client and access point
wired equivalent privacy
SSID
TKIP
WLAN
30. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WAP
service set Identifier
WPA2
bluejacking
31. Sending unsolicited messages to a bluetooth device
bluejacking
WAP
TKIP
rogue
32. An access point that has been installed without authorization usually for malicious intent
bluebugging
rogue
802.11g
802.11n
33. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
faraday cage
bluebugging
open
wireless security threats
34. WTLS stands for...
WEP
wireless transport layer security
WAP 2.0
rogue
35. Distinguishes different wireless networks from each other - used by an access point to route traffic
wireless transport layer security
rogue
SSID
WAP
36. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
WAP 1.x
wired equivalent privacy
SSID
37. WEP stands for...
faraday cage
wardriving
bluejacking
wired equivalent privacy