Test your basic knowledge |

Comptia Security +: Wireless Security

Instructions:
  • Answer 37 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band






2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band






3. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key






4. An enclosure made out of a specific type of copper wire to block radio waves






5. A device that connects different wireless stations






6. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis






7. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers






8. Distinguishes different wireless networks from each other - used by an access point to route traffic






9. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security






10. TKIP stands for...






11. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band






12. Theft of data by connecting to bluetooth device






13. SSID stands for...






14. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band






15. WAP stands for...






16. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing






17. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address






18. Using Bluetooth to establish a serial connection and take control of the device






19. Replacement for WAP 1.x which corrects security issues






20. A wireless security protocol that uses the temporal key integrity protocol (TKIP)






21. WEP stands for...






22. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)






23. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets






24. Sending unsolicited messages to a bluetooth device






25. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits






26. An access point that has been installed without authorization usually for malicious intent






27. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns






28. MIC stands for...






29. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP






30. A ____ consists of a wireless client and access point






31. WTLS stands for...






32. An 802.11 wireless authentication method where client only communicate directly with the access point






33. Detecting and using unsecured wi-fi by driving around with a laptop and antenna






34. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)






35. WPA stands for...






36. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)






37. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks