SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA stands for...
wireless transport layer security
wi-fi protected access
802.11n
open
2. MIC stands for...
message integrity check
wireless application protocol
wireless transport layer security
temporal key integrity protocol
3. SSID stands for...
service set Identifier
wi-fi protected access
wardriving
shared key
4. WTLS stands for...
802.11a
SSID broadcast
wireless transport layer security
shared key
5. WEP stands for...
wired equivalent privacy
wi-fi protected access
open
bluesnarfing
6. TKIP stands for...
open
shared key
temporal key integrity protocol
wardriving
7. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
open
wardriving
bluesnarfing
8. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11
802.11g
IV
temporal key integrity protocol
9. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
802.11g
802.11
WLAN
10. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
wi-fi protected access
WAP 2.0
bluebugging
11. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
802.1x
message integrity check
open
shared key
12. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
message integrity check
TEMPEST
wi-fi protected access
bluesnarfing
13. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
access point
WAP
WEP
message integrity check
14. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
bluebugging
temporal key integrity protocol
IV
WAP
15. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
rogue
WEP
802.1x
TKIP
16. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
WAP 1.x
wireless transport layer security
wireless application protocol
wardriving
17. An access point that has been installed without authorization usually for malicious intent
WLAN
rogue
service set Identifier
faraday cage
18. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
WAP
open
wardriving
wired equivalent privacy
19. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
TKIP
SSID
IV
wired equivalent privacy
20. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
WEP
802.11a
WAP
21. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
service set Identifier
bluesnarfing
shared key
WAP 1.x
22. Theft of data by connecting to bluetooth device
WLAN
faraday cage
wardriving
bluesnarfing
23. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
bluejacking
WAP 1.x
IV
WEP
24. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
WAP
open
bluejacking
25. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wireless application protocol
shared key
IV
wireless security threats
26. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
802.11a
wired equivalent privacy
SSID broadcast
shared key
27. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
wi-fi protected access
bluebugging
802.11a
WPA
28. Replacement for WAP 1.x which corrects security issues
bluesnarfing
WEP
WAP 2.0
IV
29. A device that connects different wireless stations
WAP 2.0
bluesnarfing
access point
TEMPEST
30. Sending unsolicited messages to a bluetooth device
WAP 2.0
bluejacking
wi-fi protected access
SSID broadcast
31. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP
SSID
wardriving
WLAN
32. A ____ consists of a wireless client and access point
access point
WLAN
SSID broadcast
802.11g
33. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11g
WPA2
faraday cage
TEMPEST
34. An 802.11 wireless authentication method where client only communicate directly with the access point
bluesnarfing
shared key
802.1x
bluejacking
35. Using Bluetooth to establish a serial connection and take control of the device
WLAN
shared key
wireless security threats
bluebugging
36. WAP stands for...
WAP
bluesnarfing
wired equivalent privacy
wireless application protocol
37. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
SSID
SSID broadcast
access point