/* */

Test your basic knowledge |

Comptia Security +: Wireless Security

Instructions:
  • Answer 37 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WTLS stands for...






2. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers






3. Distinguishes different wireless networks from each other - used by an access point to route traffic






4. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets






5. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing






6. MIC stands for...






7. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band






8. Detecting and using unsecured wi-fi by driving around with a laptop and antenna






9. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band






10. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks






11. WPA stands for...






12. An enclosure made out of a specific type of copper wire to block radio waves






13. A wireless security protocol that uses the temporal key integrity protocol (TKIP)






14. Sending unsolicited messages to a bluetooth device






15. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address






16. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band






17. Using Bluetooth to establish a serial connection and take control of the device






18. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns






19. A ____ consists of a wireless client and access point






20. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)






21. WAP stands for...






22. Theft of data by connecting to bluetooth device






23. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP






24. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits






25. WEP stands for...






26. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key






27. Replacement for WAP 1.x which corrects security issues






28. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)






29. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis






30. A device that connects different wireless stations






31. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security






32. An access point that has been installed without authorization usually for malicious intent






33. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band






34. An 802.11 wireless authentication method where client only communicate directly with the access point






35. TKIP stands for...






36. SSID stands for...






37. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)






//