SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TKIP stands for...
temporal key integrity protocol
TKIP
wireless transport layer security
service set Identifier
2. Distinguishes different wireless networks from each other - used by an access point to route traffic
WEP
SSID
802.11n
TKIP
3. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.1x
TKIP
802.11
rogue
4. Sending unsolicited messages to a bluetooth device
open
WPA
bluejacking
802.11g
5. WTLS stands for...
IV
SSID
shared key
wireless transport layer security
6. WEP stands for...
rogue
wired equivalent privacy
bluebugging
bluesnarfing
7. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
temporal key integrity protocol
wireless application protocol
802.1x
WPA
8. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
SSID broadcast
wireless security threats
shared key
802.11a
9. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11n
shared key
WPA2
open
10. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
wired equivalent privacy
IV
802.11
WAP
11. Replacement for WAP 1.x which corrects security issues
TKIP
WAP
WAP 2.0
shared key
12. MIC stands for...
WEP
TKIP
WAP 1.x
message integrity check
13. A ____ consists of a wireless client and access point
temporal key integrity protocol
service set Identifier
WLAN
SSID
14. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
bluesnarfing
802.11
open
WPA
15. WAP stands for...
WAP
WAP
wireless application protocol
TEMPEST
16. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
open
SSID broadcast
WAP
message integrity check
17. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
service set Identifier
wardriving
WAP
WLAN
18. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
temporal key integrity protocol
WAP
WAP 2.0
802.11
19. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
shared key
wireless application protocol
WPA2
20. Theft of data by connecting to bluetooth device
bluesnarfing
WAP
wireless transport layer security
WAP
21. An 802.11 wireless authentication method where client only communicate directly with the access point
temporal key integrity protocol
shared key
802.11g
wi-fi protected access
22. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
WAP
802.11n
access point
message integrity check
23. Using Bluetooth to establish a serial connection and take control of the device
IV
SSID broadcast
faraday cage
bluebugging
24. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
bluesnarfing
message integrity check
shared key
temporal key integrity protocol
25. An access point that has been installed without authorization usually for malicious intent
WAP
IV
WAP 2.0
rogue
26. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
bluejacking
WAP
access point
open
27. SSID stands for...
wireless security threats
802.11a
open
service set Identifier
28. A device that connects different wireless stations
802.11a
rogue
access point
shared key
29. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
802.11g
SSID broadcast
WAP
service set Identifier
30. An enclosure made out of a specific type of copper wire to block radio waves
TKIP
WAP 1.x
faraday cage
access point
31. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
bluebugging
wireless transport layer security
802.1x
32. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
WPA2
service set Identifier
TKIP
message integrity check
33. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
802.11n
WAP 1.x
802.1x
service set Identifier
34. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
wardriving
802.1x
WPA
open
35. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
WEP
WAP 1.x
TEMPEST
802.11g
36. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
shared key
TEMPEST
wireless security threats
WAP
37. WPA stands for...
802.11n
wi-fi protected access
access point
WPA