SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An access point that has been installed without authorization usually for malicious intent
rogue
TKIP
wi-fi protected access
WAP
2. An enclosure made out of a specific type of copper wire to block radio waves
access point
rogue
WAP
faraday cage
3. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
SSID broadcast
open
shared key
4. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
802.11
faraday cage
802.11g
5. An 802.11 wireless authentication method where client only communicate directly with the access point
TEMPEST
open
faraday cage
shared key
6. Theft of data by connecting to bluetooth device
service set Identifier
bluesnarfing
802.11a
WEP
7. MIC stands for...
SSID broadcast
open
faraday cage
message integrity check
8. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
WPA
802.1x
IV
rogue
9. Distinguishes different wireless networks from each other - used by an access point to route traffic
802.11
service set Identifier
SSID
bluejacking
10. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
open
shared key
802.11a
wi-fi protected access
11. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
open
WLAN
802.11g
TEMPEST
12. A ____ consists of a wireless client and access point
WEP
IV
WLAN
faraday cage
13. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
faraday cage
service set Identifier
WPA
802.11g
14. WPA stands for...
faraday cage
shared key
open
wi-fi protected access
15. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
service set Identifier
shared key
wireless security threats
802.11g
16. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WAP 1.x
WAP
WAP 2.0
wireless security threats
17. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
WPA2
802.11a
open
bluejacking
18. WTLS stands for...
access point
WLAN
wireless transport layer security
SSID
19. TKIP stands for...
temporal key integrity protocol
bluesnarfing
faraday cage
802.1x
20. Sending unsolicited messages to a bluetooth device
802.11n
WPA2
shared key
bluejacking
21. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WLAN
access point
WPA
bluebugging
22. WEP stands for...
open
wireless security threats
rogue
wired equivalent privacy
23. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
SSID broadcast
WPA2
IV
24. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
shared key
WAP
WAP 1.x
TEMPEST
25. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wardriving
WAP 2.0
bluesnarfing
802.11a
26. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
802.11g
802.11
temporal key integrity protocol
WAP
27. A device that connects different wireless stations
TEMPEST
access point
WPA
WAP
28. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
message integrity check
IV
SSID broadcast
open
29. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
IV
802.11
bluebugging
wireless application protocol
30. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
message integrity check
IV
SSID
WPA2
31. Replacement for WAP 1.x which corrects security issues
802.1x
WAP 2.0
IV
shared key
32. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
WAP
WLAN
802.11n
bluebugging
33. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
shared key
wireless security threats
wireless transport layer security
WEP
34. WAP stands for...
WEP
wireless application protocol
open
wireless transport layer security
35. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
802.11
802.11n
SSID broadcast
36. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
TKIP
wireless security threats
shared key
802.1x
37. SSID stands for...
wireless transport layer security
WAP 1.x
wired equivalent privacy
service set Identifier