Test your basic knowledge |

Comptia Security +: Wireless Security

Instructions:
  • Answer 37 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Theft of data by connecting to bluetooth device






2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band






3. An 802.11 wireless authentication method where client only communicate directly with the access point






4. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security






5. MIC stands for...






6. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns






7. Sending unsolicited messages to a bluetooth device






8. A ____ consists of a wireless client and access point






9. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis






10. WPA stands for...






11. WEP stands for...






12. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks






13. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band






14. SSID stands for...






15. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing






16. Distinguishes different wireless networks from each other - used by an access point to route traffic






17. An enclosure made out of a specific type of copper wire to block radio waves






18. WAP stands for...






19. An access point that has been installed without authorization usually for malicious intent






20. A wireless security protocol that uses the temporal key integrity protocol (TKIP)






21. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key






22. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits






23. WTLS stands for...






24. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)






25. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band






26. Using Bluetooth to establish a serial connection and take control of the device






27. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers






28. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band






29. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets






30. Replacement for WAP 1.x which corrects security issues






31. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)






32. TKIP stands for...






33. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address






34. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP






35. A device that connects different wireless stations






36. Detecting and using unsecured wi-fi by driving around with a laptop and antenna






37. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)