SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
WAP 1.x
wireless application protocol
WLAN
2. WTLS stands for...
SSID broadcast
WEP
wireless transport layer security
bluejacking
3. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
TKIP
SSID
shared key
WEP
4. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
SSID
bluejacking
WAP 1.x
TEMPEST
5. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
WAP
temporal key integrity protocol
open
SSID broadcast
6. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
shared key
wireless application protocol
802.1x
bluebugging
7. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
802.11n
rogue
wardriving
8. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
WEP
open
wireless security threats
WPA2
9. WEP stands for...
802.1x
open
WLAN
wired equivalent privacy
10. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11a
TEMPEST
802.11g
wireless application protocol
11. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
wireless security threats
shared key
IV
WAP 1.x
12. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
wireless transport layer security
open
802.1x
13. An 802.11 wireless authentication method where client only communicate directly with the access point
wired equivalent privacy
wireless security threats
wireless application protocol
shared key
14. TKIP stands for...
802.11
temporal key integrity protocol
bluejacking
WAP
15. Using Bluetooth to establish a serial connection and take control of the device
802.11n
bluesnarfing
bluebugging
WAP
16. A device that connects different wireless stations
TEMPEST
WAP 2.0
access point
802.11
17. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
temporal key integrity protocol
802.1x
WAP
wired equivalent privacy
18. WPA stands for...
wi-fi protected access
WAP
802.11n
802.11a
19. Replacement for WAP 1.x which corrects security issues
wardriving
faraday cage
WAP 2.0
rogue
20. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
802.11g
wireless security threats
802.11a
wardriving
21. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
wardriving
TKIP
SSID
shared key
22. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
wi-fi protected access
WAP
service set Identifier
WAP 1.x
23. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
wi-fi protected access
802.11n
message integrity check
WPA
24. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
temporal key integrity protocol
WAP
faraday cage
wireless security threats
25. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WEP
802.11g
WAP 2.0
WPA2
26. MIC stands for...
wi-fi protected access
message integrity check
open
service set Identifier
27. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
TEMPEST
802.11
wired equivalent privacy
WPA2
28. A ____ consists of a wireless client and access point
WLAN
bluesnarfing
TEMPEST
bluebugging
29. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
shared key
WAP
802.11n
WLAN
30. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
wardriving
802.11
WPA
open
31. Theft of data by connecting to bluetooth device
bluebugging
faraday cage
bluesnarfing
WPA2
32. WAP stands for...
bluebugging
temporal key integrity protocol
wireless application protocol
wired equivalent privacy
33. Sending unsolicited messages to a bluetooth device
WAP
shared key
bluejacking
802.1x
34. An access point that has been installed without authorization usually for malicious intent
SSID broadcast
rogue
wireless application protocol
WEP
35. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
WPA2
faraday cage
802.11
36. SSID stands for...
bluejacking
802.11n
service set Identifier
open
37. Distinguishes different wireless networks from each other - used by an access point to route traffic
bluesnarfing
temporal key integrity protocol
SSID
TKIP