SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
802.11
wireless transport layer security
service set Identifier
shared key
2. A ____ consists of a wireless client and access point
wireless transport layer security
wi-fi protected access
WLAN
TEMPEST
3. An 802.11 wireless authentication method where client only communicate directly with the access point
wardriving
bluebugging
shared key
wireless security threats
4. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WPA
TKIP
802.1x
shared key
5. Replacement for WAP 1.x which corrects security issues
wardriving
WAP
WAP 1.x
WAP 2.0
6. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
802.11g
WAP
IV
TKIP
7. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
WLAN
wi-fi protected access
wardriving
8. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11n
TEMPEST
802.11a
SSID broadcast
9. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
IV
WPA
WAP
temporal key integrity protocol
10. Theft of data by connecting to bluetooth device
WEP
wireless transport layer security
IV
bluesnarfing
11. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
SSID broadcast
WPA2
temporal key integrity protocol
TEMPEST
12. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
WAP
IV
rogue
13. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
TKIP
802.11n
shared key
WPA2
14. Sending unsolicited messages to a bluetooth device
WAP 2.0
message integrity check
bluejacking
rogue
15. WAP stands for...
shared key
wireless application protocol
wired equivalent privacy
shared key
16. An access point that has been installed without authorization usually for malicious intent
rogue
message integrity check
bluejacking
wardriving
17. MIC stands for...
wardriving
message integrity check
bluebugging
WEP
18. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
TKIP
WAP
WEP
SSID broadcast
19. SSID stands for...
WAP
wireless transport layer security
802.1x
service set Identifier
20. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
TEMPEST
rogue
shared key
21. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
rogue
802.11g
802.1x
wardriving
22. WPA stands for...
wi-fi protected access
WPA2
service set Identifier
WEP
23. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WAP
IV
WEP
shared key
24. A device that connects different wireless stations
open
access point
message integrity check
temporal key integrity protocol
25. WEP stands for...
WPA
wired equivalent privacy
wireless transport layer security
wireless application protocol
26. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
bluesnarfing
wired equivalent privacy
WAP
802.11n
27. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
SSID
shared key
802.11
WAP
28. Using Bluetooth to establish a serial connection and take control of the device
wired equivalent privacy
WLAN
wireless transport layer security
bluebugging
29. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
SSID broadcast
SSID
access point
30. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
temporal key integrity protocol
802.11a
WAP 1.x
WAP
31. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
wireless security threats
802.11n
802.11
32. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WEP
WPA2
temporal key integrity protocol
faraday cage
33. TKIP stands for...
shared key
bluebugging
temporal key integrity protocol
SSID broadcast
34. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WLAN
open
WAP
wireless security threats
35. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
TKIP
TEMPEST
SSID broadcast
802.11
36. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluesnarfing
802.11g
WAP
TEMPEST
37. WTLS stands for...
open
wi-fi protected access
wardriving
wireless transport layer security