SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
IV
WLAN
802.11n
2. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
802.11g
WAP
WAP 1.x
rogue
3. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
wi-fi protected access
TEMPEST
faraday cage
4. An 802.11 wireless authentication method where client only communicate directly with the access point
open
temporal key integrity protocol
shared key
WEP
5. A device that connects different wireless stations
access point
WAP
message integrity check
wireless security threats
6. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.1x
wi-fi protected access
802.11
wireless application protocol
7. TKIP stands for...
temporal key integrity protocol
bluebugging
wardriving
WAP 1.x
8. WTLS stands for...
rogue
802.11a
wireless transport layer security
wired equivalent privacy
9. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
shared key
802.11n
WLAN
TEMPEST
10. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
temporal key integrity protocol
WAP
802.11a
WPA2
11. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
wireless application protocol
802.11a
IV
802.11n
12. An enclosure made out of a specific type of copper wire to block radio waves
802.11n
faraday cage
open
bluebugging
13. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
TEMPEST
TKIP
wireless application protocol
access point
14. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
wardriving
shared key
802.11a
15. MIC stands for...
access point
TKIP
message integrity check
SSID
16. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
SSID
WEP
802.11n
wireless security threats
17. A ____ consists of a wireless client and access point
WLAN
wi-fi protected access
TKIP
open
18. Using Bluetooth to establish a serial connection and take control of the device
802.11a
access point
open
bluebugging
19. WAP stands for...
wireless application protocol
wired equivalent privacy
message integrity check
bluesnarfing
20. WPA stands for...
temporal key integrity protocol
wardriving
wi-fi protected access
SSID broadcast
21. Theft of data by connecting to bluetooth device
bluesnarfing
message integrity check
open
wireless security threats
22. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
SSID broadcast
wi-fi protected access
802.11n
WAP
23. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
802.11g
WPA
wireless application protocol
SSID broadcast
24. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
802.11n
faraday cage
open
25. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
wireless security threats
wireless transport layer security
bluesnarfing
26. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
wireless transport layer security
faraday cage
shared key
27. WEP stands for...
TKIP
wired equivalent privacy
802.1x
wireless transport layer security
28. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
IV
message integrity check
WAP
shared key
29. Replacement for WAP 1.x which corrects security issues
open
wireless security threats
WAP
WAP 2.0
30. Sending unsolicited messages to a bluetooth device
bluejacking
WAP
WAP 1.x
SSID broadcast
31. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
open
802.11n
service set Identifier
32. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
shared key
temporal key integrity protocol
wardriving
wireless application protocol
33. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
temporal key integrity protocol
rogue
802.11
802.11g
34. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
WPA
access point
open
35. SSID stands for...
802.11a
802.11g
bluebugging
service set Identifier
36. An access point that has been installed without authorization usually for malicious intent
temporal key integrity protocol
service set Identifier
bluebugging
rogue
37. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
802.11
rogue
open
bluebugging