

MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Technical MCQs knowledge and support exam preparation. Choose a topic below to get started.
1. |
_______________ is the central node of 802.11 wireless operations. |
A. | WPA |
B. | Access Point |
C. | WAP |
D. | Access Port |
E. | |
Answer» C. WAP | |
2. |
Base Transceiver Station (BTS) which is also known as a? |
A. | BA |
B. | BD |
C. | BS |
D. | BZ |
Answer» D. BZ | |
3. |
How many types of types of wireless authentication modes? |
A. | Two |
B. | Three |
C. | Four |
D. | Five |
Answer» B. Three | |
4. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called? |
A. | 8-way handshake |
B. | 8-way connection |
C. | 4-way handshake |
D. | 4-way connection |
Answer» D. 4-way connection | |
5. |
The process of analyzing wireless traffic that may be helpful for forensic investigations or during troubleshooting any wireless issue is called? |
A. | Wireless Traffic Sniffing |
B. | Wireless Traffic Maltego |
C. | Wireless Traffic BurpSuit |
D. | Wireless Traffic Wireshark |
Answer» B. Wireless Traffic Maltego | |
6. |
Mobile security is also known as? |
A. | OS Security |
B. | APIs Security |
C. | Wireless Security |
D. | Database security |
Answer» D. Database security | |
7. |
Malware gets propagated through networks and technologies like? |
A. | SMS |
B. | Bluetooth |
C. | Wireless |
D. | All of the above |
Answer» E. | |
8. |
Mobile phone operating systems contain open ________ that or may be vulnerable to different attacks. |
A. | OS |
B. | APIs |
C. | Keyloggers |
D. | spyware |
Answer» C. Keyloggers | |
9. |
Which of the following is not a type of hacking any smart-phone. |
A. | Target mobile hardware vulnerabilities |
B. | Target apps’ vulnerabilities |
C. | Snatching |
D. | Setup Keyloggers |
Answer» D. Setup Keyloggers | |