Chapter 13-15 Practice Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

True or False: Madware often tracks people illegally by pulling data from a device without the owner's knowledge or consent

False

True or False: On mobile devices, it is difficult to find unique characteristics for fingerprinting. Once, however, they tend to be stable.

False

True or False: PC-based USB exploits are not a concern for mobile devices because most of these devices do not have USB ports.

False

True or False: Remote fingerprinting is primarily accomplished with spyware

False

True or False: Spy cells enable law enforcement to set up rogue access points on local area networks

False

True or False: Weaker server-side security does not pose a direct threat to mobile clients.

False

Which of the following are not used in passive fingerprinting?

GPS locations

Which of the following describes spy software?

It can open up a phone to much greater abuse because it typically requires jail breaking

Which of the following describes proximity fingerprinting?

It is a standard practice for managing networks

Which of the following describes Android-targeted malware?

It mostly exists due to software fragmentation

Which of the following describes Apple iOS malware?

It primarily targets iPhones that have been jailbroken

The advertising identifier tag in Apple-based applications does which of the following?

It remains active even if the application is deleted

Which of the following describes binary protection?

Prevents rogue developers from tampering or reverse engineering application code

Why are Certificate Authority (CA) exploits an issue on smart device?

Some mobile apps are deployed without requiring a check of the validity of SSL certs

Mobile malware tends to focus on which of the following?

All of these -Gaining access to the ports that control GPS and other location information to sell to third-party advertisers -Gaining control of phone file systems to steal data, photos, and so on or to lock out the user for ransom -Gaining control of phones to launch DDoS attacks or send premium SMS messages

Which of the following describes fingerprinting?

All of these -It can lead to abuse from aggressive advertisers -It makes for richer user experience online. Enabling sites to offer customized content and more convenient consumer transactions -It can lead to serious security issues on jailbroken phones

Which of the following is an example of a malware-delivery technique?

All of these -USB exploits that jailbreak phones when they're connected to PCs -Like jacking -Captive portals

Which of the following is not a risk from client-side injection attacks?

Data Leakage

The ability of many smart devices to access mobile & WiFi networks simultaneously creates potential issues with which of the following?

Data leakage

What is one of the simplest ways to avoid mobile device fingerprinting

Disable javascript

Any application that harvests data from applications or storage is considered to be either malware or madware

False

Malware tends to be evenly distributed across Android & Apple iOS phone devices

False

Social engineering does not play a prominent role in mobile malware

False

True or False: Device fingerprinting is a relatively new networking phenomenon and is always malicious

False

True or False: Given the improvement that developers have made on their mobile platforms, user security awareness is no longer an issue.

False

Which of the following is not true about captive portals?

They can be used only for hacking purposes and should be avoided

In what way are the top categories of mobile device malware financially focused?

They extract data or services that are easily monetized

In addition to searching for rogue devices, scanning wireless networks is also used to do which of the following?

Verify that security measures are in place on authorized access points

Drive-By browser exploits target which of the following?

Web browser plug-ins for Java, Adobe & Flash on mobile devices


Conjuntos de estudio relacionados

American History Trading Cards: Unit 1

View Set

ISACA CSX Fundamentals Certificate Practice Quiz

View Set

PN Compound Fracture (Preschooler)

View Set