/* */
SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WTLS stands for...
bluejacking
message integrity check
WEP
wireless transport layer security
2. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
shared key
WAP
wireless security threats
temporal key integrity protocol
3. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
shared key
WPA
802.11a
4. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
open
wardriving
TKIP
802.11
5. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
bluejacking
wireless transport layer security
WPA2
open
6. MIC stands for...
wireless security threats
WAP 2.0
SSID
message integrity check
7. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
WAP
802.11a
wireless application protocol
wired equivalent privacy
8. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
rogue
wardriving
802.11n
TKIP
9. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
WAP
802.11
802.11a
802.11n
10. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
wardriving
shared key
temporal key integrity protocol
service set Identifier
11. WPA stands for...
wi-fi protected access
SSID
rogue
TKIP
12. An enclosure made out of a specific type of copper wire to block radio waves
rogue
wireless transport layer security
wardriving
faraday cage
13. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
802.11
bluejacking
WPA
WLAN
14. Sending unsolicited messages to a bluetooth device
bluejacking
wired equivalent privacy
rogue
bluebugging
15. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
access point
802.1x
bluejacking
802.11g
16. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
bluejacking
TKIP
WPA
802.11g
17. Using Bluetooth to establish a serial connection and take control of the device
SSID broadcast
bluebugging
shared key
service set Identifier
18. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
service set Identifier
SSID
wi-fi protected access
WEP
19. A ____ consists of a wireless client and access point
WAP
message integrity check
rogue
WLAN
20. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
IV
wired equivalent privacy
WAP
TEMPEST
21. WAP stands for...
802.1x
open
faraday cage
wireless application protocol
22. Theft of data by connecting to bluetooth device
shared key
802.11
802.11g
bluesnarfing
23. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
shared key
WLAN
WAP 1.x
bluesnarfing
24. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
message integrity check
WPA2
802.11g
bluesnarfing
25. WEP stands for...
faraday cage
message integrity check
WAP
wired equivalent privacy
26. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
WAP 1.x
message integrity check
rogue
open
27. Replacement for WAP 1.x which corrects security issues
802.11g
WAP 2.0
open
wireless application protocol
28. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
wireless security threats
service set Identifier
WAP
shared key
29. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
bluejacking
TEMPEST
rogue
30. A device that connects different wireless stations
access point
wi-fi protected access
802.11n
802.11g
31. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
shared key
wi-fi protected access
wireless security threats
wireless application protocol
32. An access point that has been installed without authorization usually for malicious intent
service set Identifier
WAP
WEP
rogue
33. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
WLAN
WPA
wardriving
802.11n
34. An 802.11 wireless authentication method where client only communicate directly with the access point
faraday cage
shared key
bluesnarfing
wi-fi protected access
35. TKIP stands for...
bluebugging
SSID
WPA2
temporal key integrity protocol
36. SSID stands for...
service set Identifier
WAP 2.0
WEP
open
37. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
bluebugging
WAP
wardriving
//
//