Total No. of Questions = 20

1. What is the benefit of encryption on mobile devices?

  • A) Protection against stolen devices
  • B) Protection of data on lost or stolen devices
  • C) Prevention of malware
  • D) Protection of data being sent to websites

Show Answer

The Correct Answer is:- B

2. Jailbreaking a phone refers to what?

  • A) Removing DRM from the system
  • B) Removing a device from a network
  • C) Acquiring root access on a device
  • D) Removing ransomware from a system

Show Answer

The Correct Answer is:- C

3. What does rooting a device do?

  • A) Removes updates from a system
  • B) Removes access to a user
  • C) Provides root-level access to a user on a system
  • D) Increases security on a device

Show Answer

The Correct Answer is:- C

4. Android is based on which operating system?

  • A) Windows
  • B) OS X
  • C) UNIX
  • D) Linux

Show Answer

The Correct Answer is:- D

5. iOS is based on which operating system?

  • A) Windows
  • B) OS X
  • C) Unix
  • D) Linux

Show Answer

The Correct Answer is:- B

6. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.)

  • A) Passwords
  • B) Patching
  • C) Encryption
  • D) Remote wipe

Show Answer

The Correct Answer is:- A,C,D

7. A utility for auditing WordPress from Android is __________.

  • A) DroidSheep
  • B) Firesheep
  • C) WPScan
  • D) Nmap

Show Answer

The Correct Answer is:- C

8. What utility could be used to avoid sniffing of traffic?

  • A) SandroProxy
  • B) Proxify
  • C) Psiphon
  • D) Shark

Show Answer

The Correct Answer is:- C

9. Jennifer has captured the following URL: www.se.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?

  • A) Shark
  • B) DroidSheep
  • C) Airmon
  • D) Droid

Show Answer

The Correct Answer is:- B

10. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans?

  • A) Sniffing
  • B) SandroProxy
  • C) FaceNiff
  • D) Blind scanning

Show Answer

The Correct Answer is:- B

11. What option would you use to install software that’s not from the Google Play store?

  • A) Install from unknown sources.
  • B) Install unsigned sources.
  • C) Install from unknown locations.
  • D) Install from unsigned services.

Show Answer

The Correct Answer is:- A

12. Which technology can provide protection against session hijacking?

  • A) IPSec
  • B) UDP
  • C) TCP
  • D) IDS

Show Answer

The Correct Answer is:- A

13. When a device is rooted, what is the effect on security?

  • A) Improved
  • B) Lowered
  • C) Stays the same
  • D) Hardened

Show Answer

The Correct Answer is:- B

14. Session hijacking can be thwarted with which of the following?

  • A) SandroProxy
  • B) DroidSheep
  • C) FaceNiff
  • D) Psiphon

Show Answer

The Correct Answer is:- D

15. A denial of service application for Android is __________.

  • A) Blaster
  • B) LOIC
  • C) Evil
  • D) Pryfi

Show Answer

The Correct Answer is:- B

16. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following?

  • A) Anti-virus
  • B) Anti-spyware
  • C) Using Firefox
  • D) Rooting a device

Show Answer

The Correct Answer is:- A

17. An attack that can be performed using FaceNiff is __________.

  • A) Infecting the client system
  • B) Infecting the server system
  • C) Inserting oneself into an active session
  • D) Inserting oneself into a web application

Show Answer

The Correct Answer is:- C

18. Remote wipes do what? (Choose two.)

  • A) Wipe all data off a device.
  • B) Remove sensitive information such as contacts from a remote system.
  • C) Factory reset a device.
  • D) Insert cookies and devices.

Show Answer

The Correct Answer is:- A

19. A session hijack can be used against a mobile device using all of the following except?

  • A) Emails
  • B) Browsers
  • C) Worms
  • D) Cookies

Show Answer

The Correct Answer is:- C

20. NetCut is used to do what? (Choose two.)

  • A) Test firewalls.
  • B) Craft packets.
  • C) Take over a session.
  • D) Scan a network.

Show Answer

The Correct Answer is:- A