SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Replacement for WAP 1.x which corrects security issues
bluejacking
802.11g
open
WAP 2.0
2. An access point that has been installed without authorization usually for malicious intent
wireless security threats
wireless transport layer security
rogue
wireless application protocol
3. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
wi-fi protected access
WAP 1.x
WAP 2.0
wireless application protocol
4. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
WAP
802.11
WLAN
open
5. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
wireless security threats
rogue
temporal key integrity protocol
6. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
802.11n
WPA
802.11a
open
7. WPA stands for...
access point
temporal key integrity protocol
802.11a
wi-fi protected access
8. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11
WPA2
wardriving
open
9. Sending unsolicited messages to a bluetooth device
bluebugging
wireless transport layer security
bluejacking
shared key
10. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
TEMPEST
bluejacking
wardriving
IV
11. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
802.1x
WAP 2.0
wardriving
12. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP
rogue
access point
IV
13. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
WAP 2.0
shared key
wardriving
802.11a
14. An enclosure made out of a specific type of copper wire to block radio waves
SSID
faraday cage
bluebugging
bluejacking
15. Distinguishes different wireless networks from each other - used by an access point to route traffic
message integrity check
rogue
faraday cage
SSID
16. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
bluebugging
service set Identifier
TEMPEST
WLAN
17. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WAP
wireless transport layer security
faraday cage
SSID
18. A ____ consists of a wireless client and access point
WPA2
WLAN
access point
WAP 2.0
19. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
802.11a
wardriving
802.1x
service set Identifier
20. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
open
WEP
access point
21. MIC stands for...
message integrity check
SSID
wireless security threats
service set Identifier
22. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
wired equivalent privacy
message integrity check
open
TKIP
23. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
802.11
bluejacking
wardriving
24. WEP stands for...
wired equivalent privacy
802.11
wireless application protocol
WAP 1.x
25. A device that connects different wireless stations
WPA2
WAP
shared key
access point
26. Theft of data by connecting to bluetooth device
WEP
rogue
bluesnarfing
access point
27. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
802.1x
WLAN
bluejacking
28. WTLS stands for...
bluebugging
temporal key integrity protocol
802.11n
wireless transport layer security
29. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
service set Identifier
WEP
shared key
faraday cage
30. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
shared key
802.11n
WLAN
wireless security threats
31. WAP stands for...
wireless application protocol
bluesnarfing
802.11
802.1x
32. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
802.11
WAP
bluejacking
33. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
message integrity check
access point
802.1x
802.11
34. TKIP stands for...
wireless application protocol
shared key
temporal key integrity protocol
WPA2
35. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
TEMPEST
open
WAP 1.x
WPA
36. Using Bluetooth to establish a serial connection and take control of the device
SSID
WAP
bluebugging
temporal key integrity protocol
37. SSID stands for...
temporal key integrity protocol
SSID broadcast
service set Identifier
wired equivalent privacy