 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. | 
| A. | Biometric | 
| B. | PIN-based | 
| C. | Alphanumeric | 
| D. | Short | 
| Answer» B. PIN-based | |
| 2. | Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. | 
| A. | Flash Light | 
| B. | App updates | 
| C. | Bluetooth | 
| D. | Rotation | 
| Answer» D. Rotation | |
| 3. | App permissions can cause trouble as some apps may secretly access your memory card or contact data. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | HACKERS_CANNOT_DO_WHICH_OF_THE_FOLLOWING_AFTER_COMPROMISING_YOUR_PHONE??$ | 
| A. | Shoulder surfing | 
| B. | Accessing your voice mail | 
| C. | Steal your information | 
| D. | Use your app credentials | 
| Answer» B. Accessing your voice mail | |
| 5. | Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.$# | 
| A. | Flash Light | 
| B. | App updates | 
| C. | Bluetooth | 
| D. | Rotation | 
| Answer» D. Rotation | |
| 6. | App permissions can cause trouble as some apps may secretly access your memory card or contact data.$ | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 7. | Which of the following is not a security issue for PDAs? | 
| A. | Password theft | 
| B. | Data theft | 
| C. | Reverse engineering | 
| D. | Wireless vulnerability | 
| Answer» D. Wireless vulnerability | |
| 8. | BBProxy tool is used in which mobile OS? | 
| A. | Android | 
| B. | Symbian | 
| C. | Raspberry | 
| D. | Blackberry | 
| Answer» E. | |
| 9. | Which of the following tool is used for Blackjacking? | 
| A. | BBAttacker | 
| B. | BBProxy | 
| C. | Blackburried | 
| D. | BBJacking | 
| Answer» C. Blackburried | |
| 10. | Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.$ | 
| A. | Biometric | 
| B. | PIN-based | 
| C. | Alphanumeric | 
| D. | Short | 
| Answer» B. PIN-based | |
| 11. | Hackers cannot do which of the following after compromising your phone? | 
| A. | Steal your information | 
| B. | Rob your e-money | 
| C. | Shoulder surfing | 
| D. | Spying | 
| Answer» D. Spying | |
| 12. | DDoS in mobile systems wait for the owner of the _____________ to trigger the attack. | 
| A. | worms | 
| B. | virus | 
| C. | botnets | 
| D. | programs | 
| Answer» D. programs | |
| 13. | Mobile security is also known as ____________ | 
| A. | OS Security | 
| B. | Wireless security | 
| C. | Cloud security | 
| D. | Database security | 
| Answer» C. Cloud security | |
| 14. | ____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs. | 
| A. | OS Security | 
| B. | Database security | 
| C. | Cloud security | 
| D. | Mobile security | 
| Answer» E. | |
| 15. | ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones. | 
| A. | Worms | 
| B. | Antivirus | 
| C. | Malware | 
| D. | Multimedia files | 
| Answer» D. Multimedia files | |
| 16. | Mobile Phone OS contains open APIs that may be _____________ attack. | 
| A. | useful for | 
| B. | vulnerable to | 
| C. | easy to | 
| D. | meant for | 
| Answer» C. easy to | |
| 17. | Which of the following is not an OS for mobile? | 
| A. | Palm | 
| B. | Windows | 
| C. | Mango | 
| D. | Android | 
| Answer» D. Android | |
| 18. | Which of the following is not an appropriate way of targeting a mobile phone for hacking? | 
| A. | Target mobile hardware vulnerabilities | 
| B. | Target apps’ vulnerabilities | 
| C. | Setup Keyloggers and spyware in smart-phones | 
| D. | Snatch the phone | 
| Answer» E. | |