SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Replacement for WAP 1.x which corrects security issues
SSID
WAP 2.0
802.11a
wireless transport layer security
2. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
WEP
802.11n
802.1x
WPA2
3. Theft of data by connecting to bluetooth device
802.11n
bluesnarfing
access point
rogue
4. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
WAP
faraday cage
802.11a
shared key
5. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
802.11n
WPA
open
wireless transport layer security
6. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
wireless security threats
wireless application protocol
WEP
WAP 1.x
7. An enclosure made out of a specific type of copper wire to block radio waves
WAP
open
wireless transport layer security
faraday cage
8. Using Bluetooth to establish a serial connection and take control of the device
wi-fi protected access
bluebugging
temporal key integrity protocol
wireless transport layer security
9. WAP stands for...
802.11
wireless application protocol
SSID
wireless transport layer security
10. TKIP stands for...
open
temporal key integrity protocol
access point
TKIP
11. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
WAP
open
shared key
12. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
wardriving
wired equivalent privacy
open
WPA2
13. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
open
802.11a
WLAN
wireless transport layer security
14. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
802.1x
access point
open
shared key
15. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
TEMPEST
WAP
wireless application protocol
WEP
16. SSID stands for...
service set Identifier
IV
WPA2
shared key
17. An access point that has been installed without authorization usually for malicious intent
wireless security threats
rogue
802.11
wired equivalent privacy
18. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
802.11a
IV
TKIP
bluejacking
19. Distinguishes different wireless networks from each other - used by an access point to route traffic
rogue
SSID
wardriving
TEMPEST
20. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
WAP 1.x
802.11g
service set Identifier
802.11a
21. WTLS stands for...
802.11n
open
wireless transport layer security
bluejacking
22. A device that connects different wireless stations
wi-fi protected access
802.1x
wardriving
access point
23. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
temporal key integrity protocol
IV
wireless transport layer security
WEP
24. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
WLAN
faraday cage
WPA
access point
25. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
WLAN
IV
802.11a
message integrity check
26. Sending unsolicited messages to a bluetooth device
bluejacking
WAP 2.0
open
wardriving
27. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
open
WLAN
802.11
wireless security threats
28. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
WPA2
shared key
WAP
SSID
29. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
service set Identifier
bluejacking
802.1x
802.11
30. A ____ consists of a wireless client and access point
WLAN
bluebugging
802.11a
802.11
31. WPA stands for...
wi-fi protected access
shared key
open
WPA
32. WEP stands for...
wired equivalent privacy
WAP
TEMPEST
WAP 1.x
33. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
802.11g
open
wardriving
WPA2
34. An 802.11 wireless authentication method where client only communicate directly with the access point
shared key
bluesnarfing
TEMPEST
open
35. MIC stands for...
WAP 1.x
message integrity check
bluejacking
shared key
36. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
bluesnarfing
WAP
SSID broadcast
IV
37. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
SSID broadcast
802.11a
temporal key integrity protocol
wireless security threats