Mobile Security Multiple Choice Questions
1. Which of the following is not a type of hacking any smart-phone.
A. Target mobile hardware vulnerabilities
B. Target apps’ vulnerabilities
C. Snatching
D. Setup Keyloggers
Clarification: Snatching is not a type of hacking any smart-phone. Targeting the hardware and application level vulnerabilities and setting some keylogger or spyware in the target mobile can help get valuable info about the victim.
2. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
A. OS
B. APIs
C. Keyloggers
D. spyware
Clarification: Mobile phone operating systems contain open APIs that or may be vulnerable to different attacks. OS has a number of connectivity mechanisms through which attackers can spread malware.
3. Malware gets propagated through networks and technologies like?
A. SMS
B. Bluetooth
C. Wireless
D. All of the above
Clarification: Malware gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
4. Mobile security is also known as?
A. OS Security
B. APIs Security
C. Wireless Security
D. Database security
Clarification: Mobile security also known as wireless security is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.
5. Which of the following tool is used for Blackjacking?
A. BBAttacker
B. BBProxy
C. Blackburried
D. BBJacking
Clarification: BBProxy (installed on blackberry phones) is the name of the tool used to conduct blackjacking.
6. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
A. Wireless Traffic Sniffing
B. Wireless Traffic Maltego
C. Wireless Traffic BurpSuit
D. Wireless Traffic Wireshark
Clarification: The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called Wireless Traffic Sniffing.
7. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?
A. 8-way handshake
B. 8-way connection
C. 4-way handshake
D. 4-way connection
Clarification: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called 4-way handshake.
8. How many types of types of wireless authentication modes?
A. Two
B. Three
C. Four
D. Five
Clarification: There are 2 achievable authentication types or schemes which are implemented in the wireless security. These are Pre-Shared Key – based authentication & Open Authentication.
9. Base Transceiver Station (BTS) which is also known as a?
A. BA
B. BD
C. BS
D. BZ
Clarification: Base Transceiver Station (BTS) which is also known as a base station (BS) or radio base station (RBS) is alike as that of Access Point (AP) from 802.11, & the mobile operators use it for offering signal coverage.
10. _______________ is the central node of 802.11 wireless operations.
A. WPA
B. Access Point
C. WAP
D. Access Port
Clarification: The central node of 802.11 wireless operations is the Access Point (AP). It is that interface which acts as an intermediary of a wired & wireless network; and all the associated wireless clients’ use this to exchange data with it.