SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
wireless security threats
temporal key integrity protocol
faraday cage
TEMPEST
2. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
WAP
WPA2
wireless security threats
802.1x
3. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
wireless security threats
open
bluebugging
IV
4. Distinguishes different wireless networks from each other - used by an access point to route traffic
shared key
SSID
WLAN
wardriving
5. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
bluesnarfing
WAP
WEP
bluebugging
6. A ____ consists of a wireless client and access point
WLAN
WEP
message integrity check
802.11a
7. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
wi-fi protected access
802.11a
shared key
rogue
8. Theft of data by connecting to bluetooth device
IV
WAP
TKIP
bluesnarfing
9. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
wireless security threats
WLAN
SSID broadcast
temporal key integrity protocol
10. Replacement for WAP 1.x which corrects security issues
WAP 2.0
faraday cage
wireless security threats
temporal key integrity protocol
11. Using Bluetooth to establish a serial connection and take control of the device
802.11n
service set Identifier
TEMPEST
bluebugging
12. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
service set Identifier
wired equivalent privacy
SSID broadcast
wi-fi protected access
13. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wardriving
temporal key integrity protocol
bluesnarfing
WAP
14. SSID stands for...
open
wi-fi protected access
wireless transport layer security
service set Identifier
15. WTLS stands for...
wi-fi protected access
wireless transport layer security
WPA
WAP 1.x
16. An enclosure made out of a specific type of copper wire to block radio waves
802.1x
WAP 1.x
TKIP
faraday cage
17. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WPA2
bluesnarfing
WEP
WAP
18. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
wi-fi protected access
bluejacking
open
WPA2
19. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
temporal key integrity protocol
TEMPEST
802.11g
TKIP
20. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WPA2
WAP
wireless security threats
open
21. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
SSID
wireless application protocol
802.1x
WAP 1.x
22. An access point that has been installed without authorization usually for malicious intent
service set Identifier
802.11a
802.11n
rogue
23. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
802.11a
bluebugging
TEMPEST
WAP
24. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
faraday cage
802.11n
wired equivalent privacy
WAP 1.x
25. MIC stands for...
message integrity check
service set Identifier
bluebugging
temporal key integrity protocol
26. WAP stands for...
IV
WLAN
wireless application protocol
wireless security threats
27. WPA stands for...
wi-fi protected access
open
WAP
WPA2
28. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
rogue
bluebugging
WPA
wireless application protocol
29. TKIP stands for...
WEP
SSID
temporal key integrity protocol
WAP
30. WEP stands for...
wired equivalent privacy
802.1x
WPA2
open
31. A device that connects different wireless stations
access point
wireless application protocol
SSID
wireless transport layer security
32. An 802.11 wireless authentication method where client only communicate directly with the access point
faraday cage
802.11a
shared key
SSID
33. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
SSID broadcast
WPA2
802.11a
access point
34. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
shared key
802.11
bluesnarfing
802.11g
35. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
wireless security threats
802.11a
access point
36. Sending unsolicited messages to a bluetooth device
WAP
802.11g
rogue
bluejacking
37. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
802.11g
wireless transport layer security
open
WPA