Security Awareness - Ch5 Unit 5 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a risk that someone would face using an unprotected home Wi-Fi network? An attacker could steal sensitive data from a computer on the wireless network. Malware could be injected into computers connected to the Wi-Fi network. An attacker could take control of the user's keyboard over the network. The information contained in wireless transmissions could be captured and read.

An attacker could take control of the user's keyboard over the network.

What is one reason Android devices are considered to be at a higher security risk than iOS devices? All Android apps are free. iOS has been available longer and has more of its vulnerabilities worked out. Android apps can be sideloaded. Apple apps are written in a more secure binary language.

Android apps can be sideloaded.

_____ protects a mobile device when it has not been used for a set period of time. Auto-lock Screen refresh Manager tie down (MTD) Remote security

Auto-lock

_____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. Bluestealing Bluejacking Bluesending Bluesnarfing

Bluejacking

Which of the following is false about a wireless router? It sends and receives wireless signals between all wireless devices. It is usually found in a large business with hundreds of wireless users. It typically is connected to the user's modem. It combines several networking technologies.

It is usually found in a large business with hundreds of wireless users.

_____ is the process of bypassing the built-in limitations and protections of a mobile device. Cracking Twisting Jailbreaking Slicing

Jailbreaking

Why should you not sideload apps from an unofficial app store? Apps are always inferior on an unofficial app store. It always takes longer to download the app than from an approved store. It deprives the developers of any royalties. The apps on these sites are generally not previewed and may contain malware.

The apps on these sites are generally not previewed and may contain malware.

Which of the following is not a best practice for using a mobile device? Back up data stored on the mobile device on a regular basis. Do not jailbreak a mobile device. Wait 24 hours before reporting a lost device. Be aware of current threats affecting mobile devices.

Wait 24 hours before reporting a lost device.

What is the first step in securing a Wi-Fi wireless broadband router? creating a password to protect its internal configuration settings disabling all wireless connections turning on short preamble packets monitoring the Wi-Fi signal with a remote telemonitor

creating a password to protect its internal configuration settings

Tablet computers are designed for _____. processing capabilities ease of use wireless connection speed hardware upgrades

ease of use

The primary design of a(n) _____ is to capture the transmissions from legitimate users. rogue access point Wireless Equivalent Privacy (WEP) evil twin Bluetooth grabber

evil twin

Which of the following devices does not have an operating system that allows it to run third-party applications? tablet feature phone smartphone laptop

feature phone

What prevents a mobile device from being used until the user enters the correct passcode? swipe identifier (SW-ID) keyboard touchpad lock screen

lock screen

Which of the following is not a step to reduce the risk of theft or loss of a mobile device? recording the MAC address of the device before using it keeping the mobile device out of sight when traveling in a high-risk area using both hands to hold a device, making it more difficult for a thief to snatch not using the device on escalators or near transit train doors

recording the MAC address of the device before using it

10. Alice has attempted to enter the passcode on her mobile device but keeps entering the wrong code. Now she is asked to enter a special phrase to continue. This means that her mobile device is configured to _____. use PIN codes as passcodes reset to factory settings extend the lockout period double the amount of time she is prevented from accessing her device

reset to factory settings

When a user moves from one cell of coverage to another cell in a Wi-Fi network this is called _____. migrating traveling roaming handshaking

roaming

Which of the following can add a stronger degree of security to a Wi-Fi network? disable SSID broadcasts restrict users by MAC address limit the number of users turn on guest access

turn on guest access

What provides the optimum level of wireless security for a home Wi-Fi network? placing the wireless router in a box using a good identifier turning on Wi-Fi Protected Setup (WPS) turning on Wi-Fi Protected Access 2 (WPA2) Personal

turning on Wi-Fi Protected Access 2 (WPA2) Personal

Each of the following is a sound security practice when using a public Wi-Fi network except _____. watching out for an evil twin using the network for less than one hour per day using a virtual private network (VPN) not using a public network when entering confidential information on a website

using the network for less than one hour per day

The technical name for a Wi-Fi network is: wireless personal area network (WPAN) wireless local area network (WLAN) Bluetooth wireless ultraband (WU)

wireless local area network (WLAN)


Ensembles d'études connexes

Unit 10 - Macroeconomic Strategies and Policies

View Set

AH 1 Final - Chapters 18, 20, 21, 61, 62, 65, 66, 67, 68, 69

View Set

infectious diseases of the respiratory tract

View Set

Research Methods- Multiple regression

View Set

Chapter 28: Respiratory Care Practitioners

View Set