Comptia Security +: Wireless Security MCQs

Comptia Security +: Wireless Security MCQs

The following Comptia Security +: Wireless Security MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Comptia Security +: Wireless Security. We encourage you to answer these 30 multiple-choice questions to assess your proficiency.
Please continue by scrolling down.

1: TKIP stands for...

A.   802.1x

B.   802.11g

C.   802.11

D.   Temporal key integrity protocol

2: Wireless standard with a data rate up to 54Mpbs in the 2.4GHz band

A.   Wi-fi protected access

B.   Wireless application protocol

C.   WEP

D.   802.11g

3: IEEE authentication method for wireless networks developed to address weakness of WEP - supports user authentication rather than MAC address

A.   Bluejacking

B.   802.11n

C.   SSID broadcast

D.   802.1x

4: An access point that has been installed without authorization usually for malicious intent

A.   WEP

B.   WPA

C.   Bluejacking

D.   Rogue

5: Distinguishes different wireless networks from each other - used by an access point to route traffic

A.   Wired equivalent privacy

B.   SSID

C.   WAP

D.   WAP 2.0

6: A device that connects different wireless stations

A.   802.11a

B.   Access point

C.   WEP

D.   Open

7: Wireless standard with a data rate up to 54 Mpbs in the 5GHz band

A.   Wi-fi protected access

B.   Bluebugging

C.   802.11n

D.   802.11a

8: A randomly generated value appended to data before encryption - sent by WEP in plain text - only 24 bits long - and reused on a regular basis

A.   Open

B.   WAP 1.x

C.   Bluebugging

D.   IV

9: An enclosure made out of a specific type of copper wire to block radio waves

A.   Open

B.   WAP 1.x

C.   Faraday cage

D.   Message integrity check

10: An algorithm used to secure wireless computer networks that uses 48 bit IV - a secret key for each packet - and message integrity check (MIC) to detect altered packets

A.   Wired equivalent privacy

B.   Wireless application protocol

C.   Shared key

D.   TKIP

11: Replacement for WAP 1.x which corrects security issues

A.   TEMPEST

B.   WAP 2.0

C.   Wireless application protocol

D.   Shared key

12: Ecurity issues - if not using WTLS data is transmitted in clear and even usging WTLS data is clear while it is being converted from WSP to HTTP

A.   WAP 1.x

B.   WLAN

C.   WPA2

D.   IV

13: A wireless security protocol that uses the temporal key integrity protocol (TKIP)

A.   Faraday cage

B.   802.11n

C.   WPA

D.   SSID broadcast

14: This feature should be disabled to hide a wireless network for unauthorized users (security by obscurity)

A.   WAP

B.   WPA2

C.   WAP 1.x

D.   SSID broadcast

15: An 802.11 wireless authentication method where wireless devices connect to each other directly - negotiations are in clear text - is subject to sniffing

A.   802.11g

B.   Open

C.   Wireless application protocol

D.   802.11n

16: Detecting and using unsecured wi-fi by driving around with a laptop and antenna

A.   Temporal key integrity protocol

B.   WPA

C.   Wardriving

D.   Service set Identifier

17: Uses the wireless session protocol (WSP) to move data between mobile wireless devices and application servers

A.   WPA

B.   Bluebugging

C.   Message integrity check

D.   WAP

18: SSID broadcasting - using default SSID and/or settings - access point mapping - rogue access points RF management - data emanation - and bluetooth security

A.   802.11n

B.   Temporal key integrity protocol

C.   Rogue

D.   Wireless security threats

19: A wireless security protocol that uses Initialization Vector (IV) and has many security concerns

A.   WEP

B.   Bluesnarfing

C.   802.11

D.   Wi-fi protected access

20: Theft of data by connecting to bluetooth device

A.   Bluesnarfing

B.   SSID broadcast

C.   Open

D.   WAP 2.0

21: Wireless authentication method where both the SSID and encryption key are required - subject to man in the middle attacks

A.   SSID broadcast

B.   Shared key

C.   802.1x

D.   802.11a

22: An open - global specification designed to deliver information/services to mobile wireless devices (i.e. cell phones)

A.   Service set Identifier

B.   Open

C.   WAP

D.   Wireless application protocol

23: Sending unsolicited messages to a bluetooth device

A.   IV

B.   Open

C.   Bluejacking

D.   WAP 1.x

24: An 802.11 wireless authentication method where client only communicate directly with the access point

A.   Rogue

B.   WAP

C.   Open

D.   Shared key

25: Using Bluetooth to establish a serial connection and take control of the device

A.   802.11n

B.   WAP

C.   Bluebugging

D.   WAP 2.0

26: A 1950s project that looked at ways to prevent interception of signals from systems (keyboard -CRT)

A.   TEMPEST

B.   Wireless transport layer security

C.   Temporal key integrity protocol

D.   IV

27: SSID stands for...

A.   Shared key

B.   802.11

C.   Service set Identifier

D.   Message integrity check

28: WTLS stands for...

A.   802.11

B.   Wireless transport layer security

C.   Access point

D.   Faraday cage

29: WAP stands for...

A.   Wireless application protocol

B.   WPA

C.   Shared key

D.   SSID broadcast

30: Wireless standard with a data rate over 100Mpbs in the 2.4 - 5GHz band

A.   802.11a

B.   IV

C.   802.11n

D.   Wireless security threats