SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Theft of data by connecting to bluetooth device
bluesnarfing
802.11n
IV
wireless transport layer security
2. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
SSID
WLAN
WPA2
TKIP
3. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
IV
WAP 1.x
802.1x
WEP
4. An enclosure made out of a specific type of copper wire to block radio waves
802.11g
TEMPEST
faraday cage
802.11a
5. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
SSID broadcast
802.11
WAP 2.0
wireless security threats
6. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
shared key
WAP
802.11
wireless application protocol
7. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
shared key
bluejacking
bluesnarfing
8. WTLS stands for...
802.11
open
WLAN
wireless transport layer security
9. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
shared key
802.1x
bluebugging
TEMPEST
10. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
wi-fi protected access
TKIP
open
11. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP
wireless security threats
wireless application protocol
WAP 2.0
12. Using Bluetooth to establish a serial connection and take control of the device
wired equivalent privacy
WPA
bluebugging
wardriving
13. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WPA
faraday cage
WAP
WPA2
14. A device that connects different wireless stations
WAP 2.0
802.11n
SSID broadcast
access point
15. Sending unsolicited messages to a bluetooth device
WAP 1.x
WPA
TEMPEST
bluejacking
16. TKIP stands for...
temporal key integrity protocol
shared key
wireless security threats
service set Identifier
17. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
rogue
IV
802.11
TKIP
18. WPA stands for...
wi-fi protected access
WAP
open
SSID broadcast
19. WAP stands for...
open
802.11
open
wireless application protocol
20. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
802.11n
wardriving
open
WPA2
21. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
wireless application protocol
WPA
WAP
bluejacking
22. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
802.11a
shared key
WAP
wardriving
23. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
802.11a
IV
wireless security threats
open
24. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
802.11
wardriving
802.1x
25. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
temporal key integrity protocol
open
IV
WLAN
26. MIC stands for...
bluesnarfing
open
message integrity check
WEP
27. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluebugging
802.11g
SSID
WAP
28. An access point that has been installed without authorization usually for malicious intent
WAP
temporal key integrity protocol
shared key
rogue
29. A ____ consists of a wireless client and access point
wireless application protocol
WAP 1.x
WLAN
802.11a
30. An 802.11 wireless authentication method where client only communicate directly with the access point
SSID
bluesnarfing
shared key
wi-fi protected access
31. WEP stands for...
TKIP
shared key
rogue
wired equivalent privacy
32. Replacement for WAP 1.x which corrects security issues
wired equivalent privacy
WAP 2.0
access point
message integrity check
33. SSID stands for...
wireless application protocol
service set Identifier
802.11g
SSID
34. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
SSID
802.11n
WAP 2.0
wi-fi protected access
35. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
802.11g
bluebugging
TEMPEST
wireless transport layer security
36. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11n
802.11a
WLAN
open
37. Distinguishes different wireless networks from each other - used by an access point to route traffic
wired equivalent privacy
SSID
WPA2
shared key