

MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. |
A. | Biometric |
B. | PIN-based |
C. | Alphanumeric |
D. | Short |
Answer» B. PIN-based | |
2. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. |
A. | Flash Light |
B. | App updates |
C. | Bluetooth |
D. | Rotation |
Answer» D. Rotation | |
3. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data. |
A. | True |
B. | False |
Answer» B. False | |
4. |
HACKERS_CANNOT_DO_WHICH_OF_THE_FOLLOWING_AFTER_COMPROMISING_YOUR_PHONE??$ |
A. | Shoulder surfing |
B. | Accessing your voice mail |
C. | Steal your information |
D. | Use your app credentials |
Answer» B. Accessing your voice mail | |
5. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.$# |
A. | Flash Light |
B. | App updates |
C. | Bluetooth |
D. | Rotation |
Answer» D. Rotation | |
6. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data.$ |
A. | True |
B. | False |
Answer» B. False | |
7. |
Which of the following is not a security issue for PDAs? |
A. | Password theft |
B. | Data theft |
C. | Reverse engineering |
D. | Wireless vulnerability |
Answer» D. Wireless vulnerability | |
8. |
BBProxy tool is used in which mobile OS? |
A. | Android |
B. | Symbian |
C. | Raspberry |
D. | Blackberry |
Answer» E. | |
9. |
Which of the following tool is used for Blackjacking? |
A. | BBAttacker |
B. | BBProxy |
C. | Blackburried |
D. | BBJacking |
Answer» C. Blackburried | |
10. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.$ |
A. | Biometric |
B. | PIN-based |
C. | Alphanumeric |
D. | Short |
Answer» B. PIN-based | |
11. |
Hackers cannot do which of the following after compromising your phone? |
A. | Steal your information |
B. | Rob your e-money |
C. | Shoulder surfing |
D. | Spying |
Answer» D. Spying | |
12. |
DDoS in mobile systems wait for the owner of the _____________ to trigger the attack. |
A. | worms |
B. | virus |
C. | botnets |
D. | programs |
Answer» D. programs | |
13. |
Mobile security is also known as ____________ |
A. | OS Security |
B. | Wireless security |
C. | Cloud security |
D. | Database security |
Answer» C. Cloud security | |
14. |
____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs. |
A. | OS Security |
B. | Database security |
C. | Cloud security |
D. | Mobile security |
Answer» E. | |
15. |
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones. |
A. | Worms |
B. | Antivirus |
C. | Malware |
D. | Multimedia files |
Answer» D. Multimedia files | |
16. |
Mobile Phone OS contains open APIs that may be _____________ attack. |
A. | useful for |
B. | vulnerable to |
C. | easy to |
D. | meant for |
Answer» C. easy to | |
17. |
Which of the following is not an OS for mobile? |
A. | Palm |
B. | Windows |
C. | Mango |
D. | Android |
Answer» D. Android | |
18. |
Which of the following is not an appropriate way of targeting a mobile phone for hacking? |
A. | Target mobile hardware vulnerabilities |
B. | Target apps’ vulnerabilities |
C. | Setup Keyloggers and spyware in smart-phones |
D. | Snatch the phone |
Answer» E. | |