SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
802.1x
wi-fi protected access
shared key
2. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
faraday cage
802.11g
WAP
WPA
3. WAP stands for...
wireless application protocol
802.11n
temporal key integrity protocol
service set Identifier
4. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
WPA2
WAP
SSID broadcast
temporal key integrity protocol
5. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WAP
wireless security threats
shared key
wired equivalent privacy
6. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
TEMPEST
TKIP
802.11
WAP 1.x
7. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
faraday cage
TKIP
802.11n
TEMPEST
8. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
shared key
WAP
WEP
open
9. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
802.11a
TEMPEST
802.11
10. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WPA2
TEMPEST
open
WEP
11. Replacement for WAP 1.x which corrects security issues
wireless application protocol
open
WAP 2.0
TKIP
12. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WEP
WAP
WPA2
faraday cage
13. TKIP stands for...
open
TKIP
SSID broadcast
temporal key integrity protocol
14. MIC stands for...
message integrity check
WAP 1.x
bluesnarfing
bluejacking
15. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
TKIP
wireless security threats
shared key
802.11a
16. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
WLAN
wireless security threats
bluejacking
17. Theft of data by connecting to bluetooth device
WEP
SSID broadcast
bluesnarfing
SSID
18. Using Bluetooth to establish a serial connection and take control of the device
WAP
bluebugging
open
wardriving
19. WEP stands for...
wardriving
wired equivalent privacy
wi-fi protected access
SSID
20. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
wireless security threats
wi-fi protected access
wired equivalent privacy
802.11
21. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
faraday cage
wardriving
shared key
service set Identifier
22. Distinguishes different wireless networks from each other - used by an access point to route traffic
open
wireless security threats
SSID
WPA2
23. SSID stands for...
temporal key integrity protocol
802.11a
802.11
service set Identifier
24. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
wardriving
WEP
wireless security threats
25. An access point that has been installed without authorization usually for malicious intent
rogue
wi-fi protected access
open
WAP 1.x
26. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
open
wired equivalent privacy
802.11a
27. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
wardriving
wireless transport layer security
802.11n
28. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
802.1x
WPA2
802.11a
TKIP
29. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
WLAN
bluebugging
shared key
WPA
30. A ____ consists of a wireless client and access point
wardriving
SSID
WLAN
WAP 2.0
31. A device that connects different wireless stations
WPA
wardriving
rogue
access point
32. Sending unsolicited messages to a bluetooth device
bluejacking
temporal key integrity protocol
access point
open
33. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
message integrity check
faraday cage
service set Identifier
34. WTLS stands for...
wireless transport layer security
bluebugging
TEMPEST
wireless security threats
35. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
bluejacking
802.11n
WAP 1.x
shared key
36. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
wireless security threats
WAP
802.11g
37. WPA stands for...
rogue
802.11g
WAP
wi-fi protected access