HOD401 Chapter 16

¡Supera tus tareas y exámenes ahora con Quizwiz!

B

1. What is the benefit of encryption on mobile devices? A. Protection against stolen devices B. Protection of data on lost or stolen devices C. Prevention of malware D. Protection of data being sent to websites

B

10. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans? A. Sniffing B. SandroProxy C. FaceNiff D. Blind scanning

A

11. What option would you use to install software that's not from the Google Play store? A. Install from unknown sources. B. Install unsigned sources. C. Install from unknown locations. D. Install from unsigned services.

A

12. Which technology can provide protection against session hijacking? A. IPsec B. UDP C. TCP D. IDS

B

13. When a device is rooted, what is the effect on security? A. Improved B. Lowered C. Stays the same D. Hardened

D

14. Session hijacking can be thwarted with which of the following? A. SandroProxy B. DroidSheep C. FaceNiff D. Psiphon

B

15. A denial of service application for Android is __________. A. Blaster B. LOIC C. Evil D. Pryfi

A

16. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following? A. Anti-virus B. Anti-spyware C. Using Firefox D. Rooting a device

C

17. An attack that can be performed using FaceNiff is __________. A. Infecting the client system B. Infecting the server system C. Inserting oneself into an active session D. Inserting oneself into a web application

AB

18. Remote wipes do what? (Choose two.) A. Wipe all data off a device. B. Remove sensitive information such as contacts from a remote system. C. Factory reset a device. D. Insert cookies and devices.

C

19. A session hijack can be used against a mobile device using all of the following except? A. Emails B. Browsers C. Worms D. Cookies

C

2. Jailbreaking a phone refers to what? A. Removing DRM from the system B. Removing a device from a network C. Acquiring root access on a device D. Removing ransomware from a system

AB

20. NetCut is used to do what? (Choose two.) A. Test firewalls. B. Craft packets. C. Take over a session. D. Scan a network.

C

3. What does rooting a device do? A. Removes updates from a system B. Removes access to a user C. Provides root-level access to a user on a system D. Increases security on a device

D

4. Android is based on which operating system? A. Windows B. OS X C. Unix D. Linux

B

5. iOS is based on which operating system? A. Windows B. OS X C. Unix D. Linux

ACD

6. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.) A. Passwords B. Patching C. Encryption D. Remote wipe

C

7. A utility for auditing WordPress from Android is __________. A. DroidSheep B. Firesheep C. WPScan D. Nmap

C

8. What utility could be used to avoid sniffing of traffic? A. SandroProxy B. Proxify C. Psiphon D. Shark

B

9. Jennifer has captured the following URL: www.snaz22enu.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use? A. Shark B. DroidSheep C. Airmon D. Droid


Conjuntos de estudio relacionados

Medication and I.V. Administration

View Set

Greatest Common Factor (GCF) Vocabulary:

View Set

Microbio exam 2 old exam questions

View Set

Biological and Biochemical Section

View Set

CompTIA Security+ SY0-401 Practice Exam (2 of 4)

View Set

OSHA: Process Safety Management: Mechanical Integrity, Emergencies, Contractor Safety and Audits

View Set

Module 10-Physiological Health Problems

View Set