HOD401 Chapter 16
16. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following? A. Anti-virus B. Anti-spyware C. Using Firefox D. Rooting a device
A
18. Remote wipes do what? (Choose two.) A. Wipe all data off a device. B. Remove sensitive information such as contacts from a remote system. C. Factory reset a device. D. Insert cookies and devices.
AB
13. When a device is rooted, what is the effect on security? A. Improved B. Lowered C. Stays the same D. Hardened
B
11. What option would you use to install software that's not from the Google Play store? A. Install from unknown sources. B. Install unsigned sources. C. Install from unknown locations. D. Install from unsigned services.
A
12. Which technology can provide protection against session hijacking? A. IPsec B. UDP C. TCP D. IDS
A
14. Session hijacking can be thwarted with which of the following? A. SandroProxy B. DroidSheep C. FaceNiff D. Psiphon
D
17. An attack that can be performed using FaceNiff is __________. A. Infecting the client system B. Infecting the server system C. Inserting oneself into an active session D. Inserting oneself into a web application
C
19. A session hijack can be used against a mobile device using all of the following except? A. Emails B. Browsers C. Worms D. Cookies
C
2. Jailbreaking a phone refers to what? A. Removing DRM from the system B. Removing a device from a network C. Acquiring root access on a device D. Removing ransomware from a system
C
3. What does rooting a device do? A. Removes updates from a system B. Removes access to a user C. Provides root-level access to a user on a system D. Increases security on a device
C
7. A utility for auditing WordPress from Android is __________. A. DroidSheep B. Firesheep C. WPScan D. Nmap
C
8. What utility could be used to avoid sniffing of traffic? A. SandroProxy B. Proxify C. Psiphon D. Shark
C
20. NetCut is used to do what? (Choose two.) A. Test firewalls. B. Craft packets. C. Take over a session. D. Scan a network.
AB
6. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all that apply.) A. Passwords B. Patching C. Encryption D. Remote wipe
ACD
1. What is the benefit of encryption on mobile devices? A. Protection against stolen devices B. Protection of data on lost or stolen devices C. Prevention of malware D. Protection of data being sent to websites
B
10. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans? A. Sniffing B. SandroProxy C. FaceNiff D. Blind scanning
B
15. A denial of service application for Android is __________. A. Blaster B. LOIC C. Evil D. Pryfi
B
5. iOS is based on which operating system? A. Windows B. OS X C. Unix D. Linux
B
9. Jennifer has captured the following URL: www.snaz22enu.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use? A. Shark B. DroidSheep C. Airmon D. Droid
B
4. Android is based on which operating system? A. Windows B. OS X C. Unix D. Linux
D