SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An access point that has been installed without authorization usually for malicious intent
rogue
WAP
message integrity check
802.1x
2. Replacement for WAP 1.x which corrects security issues
wired equivalent privacy
rogue
WAP 2.0
bluesnarfing
3. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WAP 1.x
access point
wireless transport layer security
service set Identifier
4. WTLS stands for...
802.1x
message integrity check
wireless transport layer security
bluejacking
5. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
IV
802.1x
WAP
WAP
6. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
SSID
bluebugging
wired equivalent privacy
7. Theft of data by connecting to bluetooth device
service set Identifier
bluesnarfing
wireless security threats
bluebugging
8. MIC stands for...
wireless transport layer security
message integrity check
shared key
access point
9. WEP stands for...
WAP 2.0
wired equivalent privacy
WPA
802.11a
10. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
shared key
WAP
wired equivalent privacy
wardriving
11. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
802.1x
WLAN
temporal key integrity protocol
12. SSID stands for...
open
message integrity check
SSID broadcast
service set Identifier
13. Sending unsolicited messages to a bluetooth device
802.11
bluejacking
WAP 1.x
temporal key integrity protocol
14. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
WPA2
WAP 1.x
802.11
temporal key integrity protocol
15. TKIP stands for...
faraday cage
wardriving
rogue
temporal key integrity protocol
16. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
bluejacking
802.11n
open
17. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
wireless transport layer security
WPA
802.11n
bluejacking
18. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluesnarfing
shared key
WAP 1.x
802.11g
19. An enclosure made out of a specific type of copper wire to block radio waves
SSID broadcast
temporal key integrity protocol
faraday cage
open
20. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
WAP 2.0
wired equivalent privacy
bluebugging
802.11n
21. WPA stands for...
wi-fi protected access
WAP 2.0
wireless transport layer security
wired equivalent privacy
22. Using Bluetooth to establish a serial connection and take control of the device
WAP 2.0
bluebugging
wireless transport layer security
802.11g
23. A ____ consists of a wireless client and access point
open
WAP 1.x
rogue
WLAN
24. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
802.11a
bluesnarfing
WAP
wi-fi protected access
25. A device that connects different wireless stations
bluesnarfing
message integrity check
WAP 2.0
access point
26. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
WPA
TKIP
wi-fi protected access
WAP
27. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
wardriving
open
802.11n
service set Identifier
28. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
wardriving
SSID broadcast
802.11
TKIP
29. WAP stands for...
wireless application protocol
bluesnarfing
bluebugging
shared key
30. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
service set Identifier
TEMPEST
wi-fi protected access
WAP
31. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
WLAN
shared key
wireless application protocol
32. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
faraday cage
wardriving
service set Identifier
802.11g
33. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wireless security threats
open
WAP 1.x
service set Identifier
34. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11g
802.11n
802.11a
WPA2
35. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11a
wireless transport layer security
shared key
802.11n
36. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
WAP 2.0
WAP 1.x
TKIP
37. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
WAP
WPA2
TEMPEST