Mobile Security MCQ Questions
This section focuses on "Mobile Security" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. Which of the following is not a type of hacking any smart-phone.
A. Target mobile hardware vulnerabilities
B. Target apps’ vulnerabilities
C. Snatching
D. Setup Keyloggers
View Answer
Ans : C
Explanation: Snatching is not a type of hacking any smart-phone. Targeting the hardware and application level vulnerabilities and setting some keylogger or spyware in the target mobile can help get valuable info about the victim.
2. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.
A. OS
B. APIs
C. Keyloggers
D. spyware
View Answer
Ans : B
Explanation: Mobile phone operating systems contain open APIs that or may be vulnerable to different attacks. OS has a number of connectivity mechanisms through which attackers can spread malware.
3. Malware gets propagated through networks and technologies like?
A. SMS
B. Bluetooth
C. Wireless
D. All of the above
View Answer
Ans : D
Explanation: Malware gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.
4. Mobile security is also known as?
A. OS Security
B. APIs Security
C. Wireless Security
D. Database security
View Answer
Ans : C
Explanation: Mobile security also known as wireless security is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.
5. Which of the following tool is used for Blackjacking?
A. BBAttacker
B. BBProxy
C. Blackburried
D. BBJacking
View Answer
Ans : B
Explanation: BBProxy (installed on blackberry phones) is the name of the tool used to conduct blackjacking.
6. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?
A. Wireless Traffic Sniffing
B. Wireless Traffic Maltego
C. Wireless Traffic BurpSuit
D. Wireless Traffic Wireshark
View Answer
Ans : A
Explanation: The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called Wireless Traffic Sniffing.
7. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?
A. 8-way handshake
B. 8-way connection
C. 4-way handshake
D. 4-way connection
View Answer
Ans : C
Explanation: When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called 4-way handshake.
8. How many types of types of wireless authentication modes?
A. Two
B. Three
C. Four
D. Five
View Answer
Ans : A
Explanation: There are 2 achievable authentication types or schemes which are implemented in the wireless security. These are Pre-Shared Key – based authentication & Open Authentication.
9. Base Transceiver Station (BTS) which is also known as a?
A. BA
B. BD
C. BS
D. BZ
View Answer
Ans : C
Explanation: Base Transceiver Station (BTS) which is also known as a base station (BS) or radio base station (RBS) is alike as that of Access Point (AP) from 802.11, & the mobile operators use it for offering signal coverage.
10. _______________ is the central node of 802.11 wireless operations.
A. WPA
B. Access Point
C. WAP
D. Access Port
View Answer
Ans : B
Explanation: The central node of 802.11 wireless operations is the Access Point (AP). It is that interface which acts as an intermediary of a wired & wireless network; and all the associated wireless clients’ use this to exchange data with it.
Discussion