MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. |
| A. | Biometric |
| B. | PIN-based |
| C. | Alphanumeric |
| D. | Short |
| Answer» B. PIN-based | |
| 2. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. |
| A. | Flash Light |
| B. | App updates |
| C. | Bluetooth |
| D. | Rotation |
| Answer» D. Rotation | |
| 3. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
HACKERS_CANNOT_DO_WHICH_OF_THE_FOLLOWING_AFTER_COMPROMISING_YOUR_PHONE??$ |
| A. | Shoulder surfing |
| B. | Accessing your voice mail |
| C. | Steal your information |
| D. | Use your app credentials |
| Answer» B. Accessing your voice mail | |
| 5. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.$# |
| A. | Flash Light |
| B. | App updates |
| C. | Bluetooth |
| D. | Rotation |
| Answer» D. Rotation | |
| 6. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data.$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
Which of the following is not a security issue for PDAs? |
| A. | Password theft |
| B. | Data theft |
| C. | Reverse engineering |
| D. | Wireless vulnerability |
| Answer» D. Wireless vulnerability | |
| 8. |
BBProxy tool is used in which mobile OS? |
| A. | Android |
| B. | Symbian |
| C. | Raspberry |
| D. | Blackberry |
| Answer» E. | |
| 9. |
Which of the following tool is used for Blackjacking? |
| A. | BBAttacker |
| B. | BBProxy |
| C. | Blackburried |
| D. | BBJacking |
| Answer» C. Blackburried | |
| 10. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.$ |
| A. | Biometric |
| B. | PIN-based |
| C. | Alphanumeric |
| D. | Short |
| Answer» B. PIN-based | |
| 11. |
Hackers cannot do which of the following after compromising your phone? |
| A. | Steal your information |
| B. | Rob your e-money |
| C. | Shoulder surfing |
| D. | Spying |
| Answer» D. Spying | |
| 12. |
DDoS in mobile systems wait for the owner of the _____________ to trigger the attack. |
| A. | worms |
| B. | virus |
| C. | botnets |
| D. | programs |
| Answer» D. programs | |
| 13. |
Mobile security is also known as ____________ |
| A. | OS Security |
| B. | Wireless security |
| C. | Cloud security |
| D. | Database security |
| Answer» C. Cloud security | |
| 14. |
____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs. |
| A. | OS Security |
| B. | Database security |
| C. | Cloud security |
| D. | Mobile security |
| Answer» E. | |
| 15. |
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones. |
| A. | Worms |
| B. | Antivirus |
| C. | Malware |
| D. | Multimedia files |
| Answer» D. Multimedia files | |
| 16. |
Mobile Phone OS contains open APIs that may be _____________ attack. |
| A. | useful for |
| B. | vulnerable to |
| C. | easy to |
| D. | meant for |
| Answer» C. easy to | |
| 17. |
Which of the following is not an OS for mobile? |
| A. | Palm |
| B. | Windows |
| C. | Mango |
| D. | Android |
| Answer» D. Android | |
| 18. |
Which of the following is not an appropriate way of targeting a mobile phone for hacking? |
| A. | Target mobile hardware vulnerabilities |
| B. | Target apps’ vulnerabilities |
| C. | Setup Keyloggers and spyware in smart-phones |
| D. | Snatch the phone |
| Answer» E. | |