Test your basic knowledge |

Comptia Security +: Wireless Security

Instructions:
  • Answer 37 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA stands for...






2. WAP stands for...






3. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band






4. Replacement for WAP 1.x which corrects security issues






5. TKIP stands for...






6. SSID stands for...






7. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band






8. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)






9. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks






10. An 802.11 wireless authentication method where client only communicate directly with the access point






11. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security






12. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis






13. Detecting and using unsecured wi-fi by driving around with a laptop and antenna






14. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns






15. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address






16. Theft of data by connecting to bluetooth device






17. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets






18. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key






19. An enclosure made out of a specific type of copper wire to block radio waves






20. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers






21. A device that connects different wireless stations






22. A wireless security protocol that uses the temporal key integrity protocol (TKIP)






23. Using Bluetooth to establish a serial connection and take control of the device






24. MIC stands for...






25. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)






26. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP






27. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)






28. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band






29. A ____ consists of a wireless client and access point






30. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits






31. Sending unsolicited messages to a bluetooth device






32. An access point that has been installed without authorization usually for malicious intent






33. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing






34. WTLS stands for...






35. Distinguishes different wireless networks from each other - used by an access point to route traffic






36. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band






37. WEP stands for...