SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
TEMPEST
802.11
IV
WAP 1.x
2. Using Bluetooth to establish a serial connection and take control of the device
WPA
bluebugging
shared key
service set Identifier
3. WAP stands for...
802.11g
WLAN
wireless application protocol
temporal key integrity protocol
4. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
message integrity check
bluejacking
WEP
802.11n
5. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
bluebugging
open
WLAN
rogue
6. A device that connects different wireless stations
rogue
access point
WAP 1.x
temporal key integrity protocol
7. Theft of data by connecting to bluetooth device
TEMPEST
bluesnarfing
WLAN
wardriving
8. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
open
802.11
wired equivalent privacy
access point
9. SSID stands for...
service set Identifier
wardriving
message integrity check
wired equivalent privacy
10. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WPA2
WAP 2.0
WAP
bluebugging
11. WTLS stands for...
faraday cage
wireless transport layer security
open
WAP
12. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
message integrity check
wi-fi protected access
temporal key integrity protocol
WAP
13. Distinguishes different wireless networks from each other - used by an access point to route traffic
wireless security threats
SSID
wired equivalent privacy
bluejacking
14. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluejacking
802.11g
rogue
802.11n
15. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.11g
802.1x
SSID
TKIP
16. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
SSID
802.11a
wired equivalent privacy
wireless security threats
17. An 802.11 wireless authentication method where client only communicate directly with the access point
bluejacking
open
shared key
bluesnarfing
18. WEP stands for...
wireless application protocol
message integrity check
802.11n
wired equivalent privacy
19. WPA stands for...
WAP
faraday cage
802.1x
wi-fi protected access
20. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
WPA2
802.11n
WAP 1.x
wired equivalent privacy
21. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11g
WPA
WPA2
message integrity check
22. An access point that has been installed without authorization usually for malicious intent
message integrity check
faraday cage
802.11n
rogue
23. A ____ consists of a wireless client and access point
access point
802.11g
wireless application protocol
WLAN
24. An enclosure made out of a specific type of copper wire to block radio waves
WAP
WPA
faraday cage
802.11a
25. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WAP 1.x
bluejacking
open
SSID broadcast
26. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WEP
wireless security threats
rogue
WLAN
27. TKIP stands for...
temporal key integrity protocol
802.11n
bluebugging
WAP 1.x
28. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
bluejacking
faraday cage
wardriving
shared key
29. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
WAP
shared key
802.1x
open
30. MIC stands for...
WAP
message integrity check
wardriving
WAP 1.x
31. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
bluesnarfing
802.11g
WPA2
wardriving
32. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
IV
temporal key integrity protocol
TEMPEST
802.11
33. Sending unsolicited messages to a bluetooth device
bluejacking
temporal key integrity protocol
wireless transport layer security
service set Identifier
34. Replacement for WAP 1.x which corrects security issues
WAP 2.0
wireless security threats
802.11n
rogue
35. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
faraday cage
bluesnarfing
TKIP
wireless transport layer security
36. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
WAP
SSID broadcast
rogue
service set Identifier
37. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
802.11g
access point
WAP 1.x
WPA