1. What is the benefit of encryption on mobile devices?
- A) Protection against stolen devices
- B) Protection of data on lost or stolen devices
- C) Prevention of malware
- D) Protection of data being sent to websites
Show Answer
2. Jailbreaking a phone refers to what?
- A) Removing DRM from the system
- B) Removing a device from a network
- C) Acquiring root access on a device
- D) Removing ransomware from a system
Show Answer
3. What does rooting a device do?
- A) Removes updates from a system
- B) Removes access to a user
- C) Provides root-level access to a user on a system
- D) Increases security on a device
Show Answer
4. Android is based on which operating system?
- A) Windows
- B) OS X
- C) UNIX
- D) Linux
Show Answer
5. iOS is based on which operating system?
- A) Windows
- B) OS X
- C) Unix
- D) Linux
Show Answer
6. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.)
- A) Passwords
- B) Patching
- C) Encryption
- D) Remote wipe
Show Answer
7. A utility for auditing WordPress from Android is __________.
- A) DroidSheep
- B) Firesheep
- C) WPScan
- D) Nmap
Show Answer
8. What utility could be used to avoid sniffing of traffic?
- A) SandroProxy
- B) Proxify
- C) Psiphon
- D) Shark
Show Answer
9. Jennifer has captured the following URL: www.se.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?
- A) Shark
- B) DroidSheep
- C) Airmon
- D) Droid
Show Answer
10. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans?
- A) Sniffing
- B) SandroProxy
- C) FaceNiff
- D) Blind scanning
Show Answer
11. What option would you use to install software that’s not from the Google Play store?
- A) Install from unknown sources.
- B) Install unsigned sources.
- C) Install from unknown locations.
- D) Install from unsigned services.
Show Answer
12. Which technology can provide protection against session hijacking?
- A) IPSec
- B) UDP
- C) TCP
- D) IDS
Show Answer
13. When a device is rooted, what is the effect on security?
- A) Improved
- B) Lowered
- C) Stays the same
- D) Hardened
Show Answer
14. Session hijacking can be thwarted with which of the following?
- A) SandroProxy
- B) DroidSheep
- C) FaceNiff
- D) Psiphon
Show Answer
15. A denial of service application for Android is __________.
- A) Blaster
- B) LOIC
- C) Evil
- D) Pryfi
Show Answer
16. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following?
- A) Anti-virus
- B) Anti-spyware
- C) Using Firefox
- D) Rooting a device
Show Answer
17. An attack that can be performed using FaceNiff is __________.
- A) Infecting the client system
- B) Infecting the server system
- C) Inserting oneself into an active session
- D) Inserting oneself into a web application
Show Answer
18. Remote wipes do what? (Choose two.)
- A) Wipe all data off a device.
- B) Remove sensitive information such as contacts from a remote system.
- C) Factory reset a device.
- D) Insert cookies and devices.
Show Answer
19. A session hijack can be used against a mobile device using all of the following except?
- A) Emails
- B) Browsers
- C) Worms
- D) Cookies
Show Answer
20. NetCut is used to do what? (Choose two.)
- A) Test firewalls.
- B) Craft packets.
- C) Take over a session.
- D) Scan a network.