SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WEP stands for...
WAP 2.0
WPA2
WEP
wired equivalent privacy
2. TKIP stands for...
temporal key integrity protocol
access point
open
shared key
3. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
wireless transport layer security
shared key
WEP
wireless security threats
4. An enclosure made out of a specific type of copper wire to block radio waves
open
faraday cage
shared key
wardriving
5. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
TEMPEST
message integrity check
wardriving
shared key
6. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
SSID
802.11a
WPA2
WAP 1.x
7. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
rogue
wireless application protocol
802.1x
SSID
8. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
WPA2
IV
TKIP
9. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
rogue
WAP
SSID broadcast
wireless transport layer security
10. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
SSID
WAP
WPA2
wireless application protocol
11. Distinguishes different wireless networks from each other - used by an access point to route traffic
802.1x
wardriving
SSID
bluesnarfing
12. An access point that has been installed without authorization usually for malicious intent
rogue
wireless application protocol
TEMPEST
802.11g
13. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
wired equivalent privacy
IV
TEMPEST
open
14. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
wireless security threats
shared key
IV
rogue
15. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
WAP
message integrity check
802.11n
16. WPA stands for...
shared key
WAP 1.x
wi-fi protected access
temporal key integrity protocol
17. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
IV
access point
WEP
18. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wireless security threats
WAP 2.0
open
faraday cage
19. WTLS stands for...
temporal key integrity protocol
bluebugging
wireless transport layer security
open
20. WAP stands for...
802.11n
WAP
wi-fi protected access
wireless application protocol
21. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
wireless security threats
TEMPEST
wireless application protocol
22. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
message integrity check
bluebugging
service set Identifier
23. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
WAP 1.x
open
SSID
bluebugging
24. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
802.11
open
rogue
25. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
WAP
WLAN
802.11
802.11g
26. Theft of data by connecting to bluetooth device
802.1x
bluesnarfing
open
SSID
27. Sending unsolicited messages to a bluetooth device
SSID
bluejacking
bluesnarfing
802.1x
28. MIC stands for...
802.11a
bluesnarfing
WAP
message integrity check
29. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
TKIP
bluejacking
wi-fi protected access
WPA
30. Replacement for WAP 1.x which corrects security issues
WAP 2.0
wardriving
wireless application protocol
SSID
31. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
802.11n
SSID broadcast
WAP
32. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WEP
rogue
wireless security threats
WAP 1.x
33. A ____ consists of a wireless client and access point
wi-fi protected access
wireless transport layer security
WLAN
wardriving
34. A device that connects different wireless stations
wi-fi protected access
bluebugging
TEMPEST
access point
35. SSID stands for...
rogue
service set Identifier
TEMPEST
wireless security threats
36. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
SSID
access point
faraday cage
37. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
open
SSID
shared key
IV