1. What is the benefit of encryption on mobile devices?
- A) Protection against stolen devices
 - B) Protection of data on lost or stolen devices
 - C) Prevention of malware
 - D) Protection of data being sent to websites
 
Show Answer
2. Jailbreaking a phone refers to what?
- A) Removing DRM from the system
 - B) Removing a device from a network
 - C) Acquiring root access on a device
 - D) Removing ransomware from a system
 
Show Answer
3. What does rooting a device do?
- A) Removes updates from a system
 - B) Removes access to a user
 - C) Provides root-level access to a user on a system
 - D) Increases security on a device
 
Show Answer
4. Android is based on which operating system?
- A) Windows
 - B) OS X
 - C) UNIX
 - D) Linux
 
Show Answer
5. iOS is based on which operating system?
- A) Windows
 - B) OS X
 - C) Unix
 - D) Linux
 
Show Answer
6. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.)
- A) Passwords
 - B) Patching
 - C) Encryption
 - D) Remote wipe
 
Show Answer
7. A utility for auditing WordPress from Android is __________.
- A) DroidSheep
 - B) Firesheep
 - C) WPScan
 - D) Nmap
 
Show Answer
8. What utility could be used to avoid sniffing of traffic?
- A) SandroProxy
 - B) Proxify
 - C) Psiphon
 - D) Shark
 
Show Answer
9. Jennifer has captured the following URL: www.se.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?
- A) Shark
 - B) DroidSheep
 - C) Airmon
 - D) Droid
 
Show Answer
10. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans?
- A) Sniffing
 - B) SandroProxy
 - C) FaceNiff
 - D) Blind scanning
 
Show Answer
11. What option would you use to install software that’s not from the Google Play store?
- A) Install from unknown sources.
 - B) Install unsigned sources.
 - C) Install from unknown locations.
 - D) Install from unsigned services.
 
Show Answer
12. Which technology can provide protection against session hijacking?
- A) IPSec
 - B) UDP
 - C) TCP
 - D) IDS
 
Show Answer
13. When a device is rooted, what is the effect on security?
- A) Improved
 - B) Lowered
 - C) Stays the same
 - D) Hardened
 
Show Answer
14. Session hijacking can be thwarted with which of the following?
- A) SandroProxy
 - B) DroidSheep
 - C) FaceNiff
 - D) Psiphon
 
Show Answer
15. A denial of service application for Android is __________.
- A) Blaster
 - B) LOIC
 - C) Evil
 - D) Pryfi
 
Show Answer
16. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following?
- A) Anti-virus
 - B) Anti-spyware
 - C) Using Firefox
 - D) Rooting a device
 
Show Answer
17. An attack that can be performed using FaceNiff is __________.
- A) Infecting the client system
 - B) Infecting the server system
 - C) Inserting oneself into an active session
 - D) Inserting oneself into a web application
 
Show Answer
18. Remote wipes do what? (Choose two.)
- A) Wipe all data off a device.
 - B) Remove sensitive information such as contacts from a remote system.
 - C) Factory reset a device.
 - D) Insert cookies and devices.
 
Show Answer
19. A session hijack can be used against a mobile device using all of the following except?
- A) Emails
 - B) Browsers
 - C) Worms
 - D) Cookies
 
Show Answer
20. NetCut is used to do what? (Choose two.)
- A) Test firewalls.
 - B) Craft packets.
 - C) Take over a session.
 - D) Scan a network.
 
