SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Distinguishes different wireless networks from each other - used by an access point to route traffic
wireless transport layer security
SSID
TEMPEST
wardriving
2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
bluejacking
IV
WPA
3. WAP stands for...
bluesnarfing
wireless application protocol
bluejacking
rogue
4. A device that connects different wireless stations
access point
shared key
WEP
shared key
5. An access point that has been installed without authorization usually for malicious intent
rogue
WAP 2.0
WLAN
temporal key integrity protocol
6. SSID stands for...
service set Identifier
wardriving
802.11
WAP
7. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
faraday cage
shared key
wired equivalent privacy
IV
8. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
bluesnarfing
temporal key integrity protocol
WAP 2.0
802.11
9. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wireless security threats
open
service set Identifier
802.11
10. TKIP stands for...
temporal key integrity protocol
wi-fi protected access
shared key
802.11n
11. WEP stands for...
TKIP
WAP 2.0
wi-fi protected access
wired equivalent privacy
12. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
shared key
802.11n
WPA
WAP
13. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
message integrity check
rogue
SSID
WAP
14. Sending unsolicited messages to a bluetooth device
open
service set Identifier
bluejacking
WAP
15. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
WAP 1.x
WAP
rogue
TEMPEST
16. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
wireless application protocol
WPA
temporal key integrity protocol
wired equivalent privacy
17. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
bluejacking
rogue
WAP 1.x
TEMPEST
18. WPA stands for...
open
wi-fi protected access
802.11a
WAP 2.0
19. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
wireless application protocol
WEP
SSID broadcast
SSID
20. An 802.11 wireless authentication method where client only communicate directly with the access point
faraday cage
access point
802.11
shared key
21. Theft of data by connecting to bluetooth device
open
SSID
WAP
bluesnarfing
22. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
802.1x
bluejacking
wireless security threats
SSID broadcast
23. An enclosure made out of a specific type of copper wire to block radio waves
faraday cage
open
TKIP
wireless application protocol
24. Replacement for WAP 1.x which corrects security issues
802.11n
WPA2
rogue
WAP 2.0
25. A ____ consists of a wireless client and access point
WPA2
wireless application protocol
802.11
WLAN
26. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
SSID
802.11a
wireless application protocol
WAP 1.x
27. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
open
wi-fi protected access
bluejacking
802.11a
28. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
SSID broadcast
open
access point
WLAN
29. Using Bluetooth to establish a serial connection and take control of the device
802.11n
wireless security threats
bluebugging
WAP
30. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
access point
TKIP
WEP
rogue
31. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
open
IV
wireless application protocol
32. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11a
bluebugging
access point
bluejacking
33. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WPA2
wired equivalent privacy
IV
802.11
34. MIC stands for...
message integrity check
WAP 2.0
open
WAP
35. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
802.11a
TKIP
IV
bluebugging
36. WTLS stands for...
wireless transport layer security
bluesnarfing
temporal key integrity protocol
IV
37. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wardriving
WAP
wireless application protocol
WAP