Mobile Security MCQ Questions

This section focuses on "Mobile Security" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.

1. Which of the following is not a type of hacking any smart-phone.

A. Target mobile hardware vulnerabilities
B. Target apps’ vulnerabilities
C. Snatching
D. Setup Keyloggers

View Answer


2. Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks.

A. OS
B. APIs
C. Keyloggers
D. spyware

View Answer


3. Malware gets propagated through networks and technologies like?

A. SMS
B. Bluetooth
C. Wireless
D. All of the above

View Answer


4. Mobile security is also known as?

A. OS Security
B. APIs Security
C. Wireless Security
D. Database security

View Answer


5. Which of the following tool is used for Blackjacking?

A. BBAttacker
B. BBProxy
C. Blackburried
D. BBJacking

View Answer


6. The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called?

A. Wireless Traffic Sniffing
B. Wireless Traffic Maltego
C. Wireless Traffic BurpSuit
D. Wireless Traffic Wireshark

View Answer


7. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called?

A. 8-way handshake
B. 8-way connection
C. 4-way handshake
D. 4-way connection

View Answer


8. How many types of types of wireless authentication modes?

A. Two
B. Three
C. Four
D. Five

View Answer


9. Base Transceiver Station (BTS) which is also known as a?

A. BA
B. BD
C. BS
D. BZ

View Answer


10. _______________ is the central node of 802.11 wireless operations.

A. WPA
B. Access Point
C. WAP
D. Access Port

View Answer





Discussion



* You must be logged in to add comment.