SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
faraday cage
open
message integrity check
802.11
2. WTLS stands for...
WPA
rogue
WAP
wireless transport layer security
3. A device that connects different wireless stations
rogue
TEMPEST
802.11n
access point
4. An enclosure made out of a specific type of copper wire to block radio waves
access point
wireless transport layer security
bluebugging
faraday cage
5. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wardriving
IV
WAP 1.x
wired equivalent privacy
6. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WAP
service set Identifier
WLAN
WEP
7. MIC stands for...
TKIP
wireless transport layer security
message integrity check
SSID broadcast
8. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
802.11n
SSID broadcast
wireless security threats
9. An access point that has been installed without authorization usually for malicious intent
rogue
wireless application protocol
open
bluebugging
10. Replacement for WAP 1.x which corrects security issues
802.11
WAP 2.0
wireless security threats
WAP
11. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
open
access point
WAP 2.0
12. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
WAP
access point
802.11
802.1x
13. SSID stands for...
WPA
wireless security threats
service set Identifier
802.11
14. A ____ consists of a wireless client and access point
WAP 1.x
wireless transport layer security
WLAN
wired equivalent privacy
15. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WAP
WPA
802.11
wireless security threats
16. WPA stands for...
bluesnarfing
wireless application protocol
IV
wi-fi protected access
17. WAP stands for...
wardriving
wireless application protocol
rogue
WPA
18. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
wardriving
802.11g
WEP
802.11n
19. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
bluebugging
message integrity check
wireless application protocol
20. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
WAP
open
WAP
shared key
21. Sending unsolicited messages to a bluetooth device
802.11
bluejacking
wireless transport layer security
WAP
22. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
802.11n
wireless transport layer security
WAP 1.x
WAP
23. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
temporal key integrity protocol
bluesnarfing
wireless security threats
24. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
shared key
wired equivalent privacy
WEP
25. Distinguishes different wireless networks from each other - used by an access point to route traffic
TEMPEST
wireless application protocol
SSID
rogue
26. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
message integrity check
WEP
TKIP
27. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
access point
open
wi-fi protected access
shared key
28. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
wi-fi protected access
WAP
SSID broadcast
WAP 1.x
29. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
wi-fi protected access
SSID broadcast
open
shared key
30. WEP stands for...
802.11g
wired equivalent privacy
802.11a
rogue
31. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
bluesnarfing
SSID broadcast
SSID
message integrity check
32. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
WPA2
wireless transport layer security
open
TKIP
33. Theft of data by connecting to bluetooth device
WLAN
bluesnarfing
access point
IV
34. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.1x
802.11a
802.11n
open
35. TKIP stands for...
802.11g
temporal key integrity protocol
WAP
bluesnarfing
36. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
802.11
IV
TEMPEST
WPA
37. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
rogue
802.11
WAP 1.x