Module 17 Quiz
Which of the following mobile Bluetooth attacks enables an attacker to gain remote access to the victims mobile and use its features without the victim's knowledge or consent? BlueSniff Bluesnarfing Bluesmacking Bluebugging
Bluebugging
Which of the following refers to a policy allowing an employee to bring his or her personal devices such as laptops, smartphones, and tablets to the workplace and using them for accessing the organization's resources as per their access privileges? Social Engineering Phishing Spear-Phishing BYOD
BYOD Explanation:Bring your own device (BYOD) refers to a policy allowing an employee to bring his or her personal devices such as laptops, smartphones, and tablets to the workplace and using them for accessing the organization's resources as per their access privileges. BYOD policy allows employees to use the devices that they are comfortable with and best fits their preferences and work purposes. Social Engineering, Phishing and Spear-phishing are some of the types of attacks.
If an attacker is able to access the email contact list, text messages, photos, etc. on your mobile device, then what type of attack did the attacker employ? BlueSniff Bluebugging Bluesmacking Bluesnarfing
Bluesnarfing Explanation:Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, PDAs, and others. This technique allows an attacker to access the victim's contact list, emails, text messages, photos, videos, business data, and so on stored on the device.Any device with its Bluetooth connection enabled and set to "discoverable" or "discovery" mode (allowing other Bluetooth devices within range to view the device) may be susceptible to bluesnarfing if the vendor's software contains certain vulnerabilities. Bluesnarfing exploits others' Bluetooth connections without their knowledge.
Which of the following is not an OWASP Top 10-2016 Mobile Risks? Insecure Cryptography Reverse Engineering Insecure Communication Buffer Overflow
Buffer Overflow Explanation:According to OWASP, following are the Top 10 Mobile Risks: 1. Improper platform usage 2. Insecure data storage 3. Insecure communication 4. Insecure authentication 5. Insufficient cryptography 6. Insecure authorization 7. Client code quality 8. Code tampering 9. Reverse engineering 10. Extraneous functionality Answer is "buffer overflow," as it is not considered in the OWASP Top 10 List.
Which of the following applications allows attackers to identify the target devices and block the access of Wi-Fi to the victim devices in a network? DroidSheep KingoRoot Network Spoofer NetCut
NetCut Explanation:NetCut is an is a Wi-Fi killing mobile application that quickly detects all network users in the WIFI and allows the attacker to kill Wi-Fi access to any specific user in a network. Attackers use this tool to identify target devices and block the access of Wi-Fi to the victim devices in a network.
Which of the following can pose a risk to mobile platform security? Disable wireless access such as Wi-Fi and Bluetooth, if not in use Install applications from trusted application stores Connecting two separate networks such as Wi-Fi and Bluetooth simultaneously Securely wipe or delete the data when disposing of the device
Connecting two separate networks such as Wi-Fi and Bluetooth simultaneously Explanation: Given below are some of the guidelines that help one to protect their mobile device: -Do not load too many applications and avoid auto-upload of photos to social networks -Perform a Security Assessment of the Application Architecture -Maintain configuration control and management -Install applications from trusted application stores -Securely wipe or delete the data disposing of the device -Do not share the information within GPS-enabled apps unless they are necessary -Never connect two separate networks such as Wi-Fi and Bluetooth simultaneously -Disable wireless access such as Wi-Fi and Bluetooth, if not in use -In order to provide security to the mobile device platform, never connect two separate networks such as Wi-Fi and Bluetooth simultaneously.
When Jason installed a malicious application on his mobile, the application modified the content in other applications on Jason's mobile phone. What process did the malicious application perform? Data Mining Data Exfiltration Data Loss Data Tampering
Data Tampering Explanation:Data Tampering is a process of modifying content on the victim's mobile. Here, the malicious application has performed data tampering over other applications in Jason's mobile phone.
Which of the following statements is not true for securing iOS devices? Disable Javascript and add-ons from web browser Do not store sensitive data on client-side database Do not jailbreak or root your device if used within enterprise environments Disable Jailbreak detection
Disable Jailbreak detection Explanation:Jailbreak detection has to be enabled all the time in any iOS device. Disabling Jailbreaking detection in the device cannot secure the device from jailbreaking and once if jailbreaking has been performed on the device, the device can be prone to installation of applications from any untrusted sources and can also lead to various attacks that can cause data theft.
Which of the following is not a countermeasure for phishing attacks? Do not click on any links included in the SMS Never reply to a SMS that urges you to act or respond quickly Disable the "block texts from the internet" feature from your provider Review the bank's policy on sending SMS
Disable the "block texts from the internet" feature from your provider Explanation:By disabling the "block texts from the internet" feature from your provider you may receive spam text messages from the internet which may lead to phishing attacks.
Which of the following android applications allows you to find, lock or erase a lost or stolen device?
Find My Device
Which of the following iOS applications allows you to find, lock or erase a lost or stolen device? Find My Device X-Ray Faceniff Find My iPhone
Find My iPhone
If you are responsible for securing a network from any type of attack and if you have found that one of your employees is able to access any website that may lead to clickjacking, attacks, what would you do to avoid the attacks? Delete Cookies Configure Application certification rules Enable Remote Management Harden browser permission rules
Harden browser permission rules Explanation:As you have observed that the employee is able to access any website that may lead to potential attacks, you have to harden the browser permission rules according to the company's security policies in order to avoid attacks from taking place.
Which of the following processes is supposed to install a modified set of kernel patches that allows users to run third-party applications not signed by the OS vendor? WarDriving Sandboxing Spear-Phishing JailBreaking
JailBreaking Explanation:Jailbreaking is defined as the process of installing a modified set of kernel patches that allows users to run third-party applications not signed by the OS vendor. It is the process of bypassing user limitations set by Apple, such as modifying the OS, attaining admin privileges, and installing unofficially approved apps via "side loading." You can accomplish jailbreaking simply by modifying iOS system kernels. A reason for jailbreaking iOS devices such as iPhone, iPad, and iPod Touch is to expand the feature set restricted by Apple and its App Store. Jailbreaking provides root access to the OS and permits downloading of third-party applications, themes, and extensions that are unavailable through the official Apple App Store. Jailbreaking also removes sandbox restrictions, which enables malicious apps to access restricted mobile resources and information.
Which of the following mobile applications is used to perform Denial-of-Service Attacks? MTK Droid DroidSheep Unrevoked Low Orbit Ion Cannon (LOIC)
Low Orbit Ion Cannon (LOIC) Explanation: Low Orbit Ion Cannon (LOIC): LOIC is a mobile application that allows the attackers to perform DoS/DDoS attacks on the target IP address. This application can perform UPD, HTTP, or TCP flood attacks. DroidSheep: DroidSheep is a simple Android tool for web session hijacking ("sidejacking"), using libpcap and arpspoof. Unrevoked: Unrevoked is an Android rooting tool. MTK Droid: MTK Droid is an Android rooting tool.
Which of the following browser applications encrypts your Internet traffic and then hides it by bouncing through a series of computers around the world? Mozilla FireFox Google Chrome UC Browser ORBOT
ORBOT Explanation:Orbot is a proxy app that empowers other apps to use the internet more privately. It uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Attackers can use this application to hide their identity while performing attacks or surfing through the target web applications.
Which of the following applications is used for Jailbreaking iOS? One Click Root Superboot Pangu Anzhuang KingoRoot
Pangu Anzhuang Explanation:Among the given options, KingoRoot, One Click Root and Superboot are Android rooting tools whereas Pangu Anzuhang is the tool that is used to perform jailbreaking for iOS mobile devices.
In order to avoid data loss from a Mobile device, which of following Mobile Device Management security measures should you consider? Encrypt Storage Configure Application certification rules Enable Remote Management Perform periodic backup and synchronization
Perform periodic backup and synchronization Explanation:In order to secure your data from any kind of data loss, the first thing you have to do is to take periodic backups of the data. You can use a secure, over-the-air backup-and-restore tool that performs periodic background synchronization
Which of the following attacks can be performed by Spam messages? Wardriving Attacks Denial-of-Service Attacks Bluesnarfing Attacks Phishing Attacks
Phishing Attacks
Which of the following processes allows Android users to attain privileged control within Android's subsystem? Jailbreaking Wardriving Warchalking Rooting
Rooting Explanation: Data Caching: An OS cache stores used data/information in memory on temporary basis in the hard disk. An attacker can dump this memory by rebooting the victim's computer to a malicious OS and can extract sensitive data from the dumped memory. Wardriving: In a wardriving attack, wireless LANS are detected either by sending probe requests over a connection or by listening to web beacons. An attacker who discovers a penetration point can launch further attacks on the LAN. Rooting: Rooting allows Android users to attain privileged control (known as "root access") within Android's subsystem. Rooting can result in the exposure of sensitive data stored in the mobile device. WarChalking: A method used to draw symbols in public places to advertise open WiFi networks.
Which of the following technique helps protect mobile systems and users by limiting the resources the mobile application can access on the mobile platform? Anti-Malware Firewall Spam Filter Sandbox
Sandbox
Which of the following is not a mobile platform risk? Jailbreaking and Rooting Malicious Apps in App Store Sandboxing Mobile Malware
Sandboxing Explanation:Sandboxing helps protect systems and users by limiting the resources an app can access to the mobile platform.
By performing which of the following Jailbreaking techniques does a mobile device start up completely, and it will no longer have a patched kernel after a user turns the device off and back on? None of the listed Untethered Jailbreaking Tethered Jailbreaking Semi-Tethered Jailbreaking
Semi-Tethered Jailbreaking Explanation: A semi-tethered jailbreaking has the property that if the user turns the device off and back on, the device will start up completely; it will no longer have a patched kernel, but it will still be usable for normal functions. To use jailbroken addons, the user needs to start the device with the help of the jailbreaking tool.
Which of the following is not a feature of Mobile Device Management Software? Remotely wipe data in the lost or stolen device Enforce policies and track inventory Perform real time monitoring and reporting Sharing confidential data among devices and networks
Sharing confidential data among devices and networks Explanation:Mobile Device Management provides platforms for over-the-air or wired distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, and so on. It enforces policies and tracks inventory, remotely wipe data in the lost or stolen device, and performs real time monitoring and reporting. MDM does not share confidential data among devices and networks.
Which of the following tools is used to root the Android OS? DroidSheep LOIC zANTI TunesGo
TunesGo Explanation:zANTI is an android application which allows you to perform various attacks. Low Orbit Ion Cannon (LOIC) is a mobile application that allows the attackers to perform DoS/DDoS attacks on the target IP address, and DroidSheep is a simple Android tool for web session hijacking (sidejacking). TunesGo is an android tool that has an advanced android root module that recognize and analyzes your Android device and choose an appropriate Android-root-plan for it automatically.
Which of the following tools is not used for iOS Jailbreaking? TaiG Yalu Velonzy Unrevoked
Unrevoked Explanation:Among the given options, Yalu, Velonzy and TaiG are iOS Jailbreaking tools, whereas Unrevoked is an Android rooting tool.
Which of the following Jail-breaking techniques will make the mobile device jailbroken after each reboot? Tethered Jailbreaking None of the listed Semi-Tethered Jailbreaking Untethered Jailbreaking
Untethered Jailbreaking Explanation:An untethered jailbreak has the property that if the user turns the device off and back on, the device will start up completely, and the kernel will be patched without the help of a computer - in other words, it will be jailbroken after each reboot.
Which of the following types of jail-breaking allows user-level access but does not allow iboot-level access? None of the listed iBoot Exploit Bootrom Exploit Userland Exploit
Userland Exploit Explanation:Userland Exploit uses a loophole in the system application. It allows user-level access but does not allow iboot-level access. You cannot secure iOS devices against this exploit, as nothing can cause a recovery mode loop. Only firmware updates can patch these types of vulnerabilities. iBoot Exploit and Bootrom Exploit allow user-level access and also iboot-level access.
Which of the following is an Android Vulnerability Scanning Tool? Velonzy ]Yalu TaiG X-Ray
X-Ray Explanation:Among the given options, Yalu, Velonzy and TaiG are iOS Jailbreaking tools, whereas X-Ray is an android Vulnerability Scanner.
Which of the following is a Mobile Device Management Software? SpyBubble GadgetTrak Phonty XenMobile
XenMobile Explanation:Among the options, XenMobile is the only tool that can provide complete Mobile Device Management. The remaining tools mentioned in the options are used only for tracking the geographical location of mobile devices.