MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Technical MCQs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
_______________ is the central node of 802.11 wireless operations. |
| A. | WPA |
| B. | Access Point |
| C. | WAP |
| D. | Access Port |
| E. | |
| Answer» C. WAP | |
| 2. |
Base Transceiver Station (BTS) which is also known as a? |
| A. | BA |
| B. | BD |
| C. | BS |
| D. | BZ |
| Answer» D. BZ | |
| 3. |
How many types of types of wireless authentication modes? |
| A. | Two |
| B. | Three |
| C. | Four |
| D. | Five |
| Answer» B. Three | |
| 4. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called? |
| A. | 8-way handshake |
| B. | 8-way connection |
| C. | 4-way handshake |
| D. | 4-way connection |
| Answer» D. 4-way connection | |
| 5. |
The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called? |
| A. | Wireless Traffic Sniffing |
| B. | Wireless Traffic Maltego |
| C. | Wireless Traffic BurpSuit |
| D. | Wireless Traffic Wireshark |
| Answer» B. Wireless Traffic Maltego | |
| 6. |
Mobile security is also known as? |
| A. | OS Security |
| B. | APIs Security |
| C. | Wireless Security |
| D. | Database security |
| Answer» D. Database security | |
| 7. |
Malware gets propagated through networks and technologies like? |
| A. | SMS |
| B. | Bluetooth |
| C. | Wireless |
| D. | All of the above |
| Answer» E. | |
| 8. |
Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks. |
| A. | OS |
| B. | APIs |
| C. | Keyloggers |
| D. | spyware |
| Answer» C. Keyloggers | |
| 9. |
Which of the following is not a type of hacking any smart-phone. |
| A. | Target mobile hardware vulnerabilities |
| B. | Target apps’ vulnerabilities |
| C. | Snatching |
| D. | Setup Keyloggers |
| Answer» D. Setup Keyloggers | |