SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
WPA
bluesnarfing
802.11a
wireless application protocol
2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluejacking
wireless application protocol
802.1x
802.11g
3. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
bluebugging
802.11n
open
shared key
4. An enclosure made out of a specific type of copper wire to block radio waves
WPA2
access point
802.11n
faraday cage
5. A device that connects different wireless stations
access point
SSID
WPA
802.11g
6. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
wireless security threats
wireless transport layer security
bluebugging
7. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
wireless application protocol
bluesnarfing
wi-fi protected access
WAP
8. Distinguishes different wireless networks from each other - used by an access point to route traffic
open
SSID
rogue
WLAN
9. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
bluebugging
wireless security threats
open
WEP
10. TKIP stands for...
wireless transport layer security
wardriving
802.11g
temporal key integrity protocol
11. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
faraday cage
802.11
WPA2
shared key
12. Theft of data by connecting to bluetooth device
WAP 1.x
wired equivalent privacy
bluesnarfing
IV
13. SSID stands for...
802.11n
WPA
service set Identifier
IV
14. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
open
SSID
802.11n
message integrity check
15. WAP stands for...
wireless application protocol
faraday cage
WPA2
bluejacking
16. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
service set Identifier
open
802.11g
shared key
17. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
WLAN
open
WAP 1.x
802.1x
18. Using Bluetooth to establish a serial connection and take control of the device
bluebugging
wireless application protocol
bluesnarfing
IV
19. Replacement for WAP 1.x which corrects security issues
wi-fi protected access
WPA2
access point
WAP 2.0
20. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
wireless transport layer security
faraday cage
802.11a
WPA
21. WEP stands for...
802.11
SSID broadcast
rogue
wired equivalent privacy
22. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
TKIP
WAP
wardriving
wi-fi protected access
23. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
wired equivalent privacy
TKIP
access point
wardriving
24. Sending unsolicited messages to a bluetooth device
802.11n
bluejacking
service set Identifier
wireless transport layer security
25. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
message integrity check
wi-fi protected access
802.11n
WPA2
26. An access point that has been installed without authorization usually for malicious intent
rogue
WAP 2.0
WAP
802.11
27. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
message integrity check
WEP
open
access point
28. MIC stands for...
message integrity check
temporal key integrity protocol
WPA
TKIP
29. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
WPA
WAP 1.x
802.11
802.11n
30. A ____ consists of a wireless client and access point
WLAN
WAP
802.11n
802.11a
31. WTLS stands for...
wireless application protocol
WPA
802.11g
wireless transport layer security
32. An 802.11 wireless authentication method where client only communicate directly with the access point
802.11g
wardriving
shared key
TEMPEST
33. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
bluesnarfing
wardriving
wireless security threats
shared key
34. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
wireless application protocol
bluejacking
WPA2
SSID broadcast
35. WPA stands for...
wardriving
SSID broadcast
wi-fi protected access
TKIP
36. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
IV
bluejacking
TEMPEST
wireless transport layer security
37. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
bluebugging
bluejacking
SSID
shared key