SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Wireless Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 37 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSID stands for...
wardriving
shared key
WPA2
service set Identifier
2. Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band
wireless application protocol
service set Identifier
802.11g
802.11a
3. MIC stands for...
WAP
message integrity check
SSID broadcast
rogue
4. SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security
WLAN
wireless security threats
wi-fi protected access
message integrity check
5. A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)
open
SSID broadcast
TEMPEST
rogue
6. Wireless authentication method - also known as ad hoc - where the user must know the SSID or if using WEP the secret key
SSID
wireless security threats
wired equivalent privacy
open
7. Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band
service set Identifier
bluejacking
shared key
802.11n
8. WTLS stands for...
access point
wireless transport layer security
802.1x
bluesnarfing
9. A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis
IV
faraday cage
WAP 1.x
TEMPEST
10. Theft of data by connecting to bluetooth device
TKIP
bluesnarfing
message integrity check
rogue
11. An access point that has been installed without authorization usually for malicious intent
WLAN
open
802.11a
rogue
12. IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address
SSID
TKIP
802.1x
rogue
13. Detecting and using unsecured wi-fi by driving around with a laptop and antenna
wired equivalent privacy
wardriving
temporal key integrity protocol
WAP
14. An enclosure made out of a specific type of copper wire to block radio waves
WAP
WEP
SSID broadcast
faraday cage
15. This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)
SSID broadcast
WAP 1.x
802.11n
802.11a
16. A wireless security protocol that uses the temporal key integrity protocol (TKIP)
faraday cage
WPA
WAP
bluesnarfing
17. Wireless standard with a data rate of 1 to 2 Mpbs in the 2.4GHz band
WAP
rogue
bluejacking
802.11
18. Using Bluetooth to establish a serial connection and take control of the device
temporal key integrity protocol
802.1x
wireless transport layer security
bluebugging
19. Replacement for WAP 1.x which corrects security issues
SSID
WAP 2.0
shared key
wi-fi protected access
20. An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing
WAP 2.0
shared key
open
message integrity check
21. An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)
802.11g
rogue
wi-fi protected access
WAP
22. A wireless security protocol that uses Initialization Vector (IV) and has many security concerns
WEP
SSID
wireless security threats
open
23. WPA stands for...
open
wi-fi protected access
SSID
wireless transport layer security
24. TKIP stands for...
wireless application protocol
faraday cage
temporal key integrity protocol
WEP
25. Distinguishes different wireless networks from each other - used by an access point to route traffic
SSID
802.11n
bluesnarfing
WAP 2.0
26. WAP stands for...
802.11
wireless application protocol
wireless transport layer security
TKIP
27. Wireless standard with a data rate up to 54 Mpbs in the 5GHz band
wi-fi protected access
802.11a
bluejacking
WPA
28. A ____ consists of a wireless client and access point
WLAN
bluesnarfing
TKIP
WAP
29. Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers
bluebugging
wi-fi protected access
bluejacking
WAP
30. An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets
shared key
bluesnarfing
TKIP
WAP
31. Security issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP
wireless application protocol
802.11n
WAP 1.x
bluejacking
32. WEP stands for...
WPA
rogue
wardriving
wired equivalent privacy
33. Sending unsolicited messages to a bluetooth device
temporal key integrity protocol
bluejacking
open
WAP 1.x
34. A device that connects different wireless stations
WAP
access point
wireless security threats
WPA
35. A wireless security protocol that implements requirements of 802.11i - uses AES with key sizes up to 256 bits
wireless transport layer security
WPA2
bluesnarfing
WPA
36. Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks
802.11
wireless application protocol
service set Identifier
shared key
37. An 802.11 wireless authentication method where client only communicate directly with the access point
wireless transport layer security
WPA
shared key
temporal key integrity protocol