SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Theft of data by connecting to bluetooth device
message integrity check
bluesnarfing
wireless application protocol
faraday cage
2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
wi-fi protected access
access point
faraday cage
3. An 802.11 wireless authentication method where client only communicate directly with the access point
WPA2
faraday cage
wardriving
shared key
4. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
SSID
wireless security threats
802.11g
WPA
5. MIC stands for...
open
wireless application protocol
service set Identifier
message integrity check
6. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
access point
802.11n
WEP
WAP
7. Sending unsolicited messages to a bluetooth device
WAP
wireless transport layer security
bluejacking
IV
8. A ____ consists of a wireless client and access point
802.11
wireless security threats
WLAN
WPA
9. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
shared key
temporal key integrity protocol
wireless application protocol
10. WPA stands for...
faraday cage
service set Identifier
wi-fi protected access
open
11. WEP stands for...
wired equivalent privacy
faraday cage
bluejacking
802.11
12. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
802.11a
temporal key integrity protocol
TKIP
shared key
13. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
message integrity check
802.11
bluejacking
TEMPEST
14. SSID stands for...
bluesnarfing
rogue
service set Identifier
WAP 1.x
15. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
802.1x
TKIP
bluejacking
open
16. Distinguishes different wireless networks from each other - used by an access point to route traffic
802.11n
wardriving
SSID
bluejacking
17. An enclosure made out of a specific type of copper wire to block radio waves
802.11
faraday cage
rogue
WAP 1.x
18. WAP stands for...
rogue
access point
wireless application protocol
shared key
19. An access point that has been installed without authorization usually for malicious intent
TEMPEST
WAP
rogue
shared key
20. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
shared key
bluesnarfing
802.11n
21. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
shared key
TKIP
SSID broadcast
22. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
802.11a
WPA2
service set Identifier
SSID
23. WTLS stands for...
SSID
wireless security threats
bluejacking
wireless transport layer security
24. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
shared key
open
WAP
wireless application protocol
25. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
IV
802.11a
access point
bluesnarfing
26. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
WAP 2.0
rogue
WEP
27. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
open
WAP
802.11g
802.11n
28. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
wi-fi protected access
wireless transport layer security
WPA
29. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
wireless transport layer security
wi-fi protected access
TKIP
WLAN
30. Replacement for WAP 1.x which corrects security issues
temporal key integrity protocol
WAP 2.0
access point
bluejacking
31. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
TEMPEST
802.1x
SSID broadcast
wireless transport layer security
32. TKIP stands for...
wi-fi protected access
rogue
temporal key integrity protocol
wardriving
33. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
WAP
shared key
bluesnarfing
802.1x
34. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
SSID
access point
WAP 1.x
bluebugging
35. A device that connects different wireless stations
802.11a
open
access point
TKIP
36. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wi-fi protected access
WEP
shared key
wardriving
37. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
access point
TEMPEST
wireless application protocol
faraday cage