Security Awareness - Ch5 Unit 5 Quiz
Which of the following is not a risk that someone would face using an unprotected home Wi-Fi network? An attacker could steal sensitive data from a computer on the wireless network. Malware could be injected into computers connected to the Wi-Fi network. An attacker could take control of the user's keyboard over the network. The information contained in wireless transmissions could be captured and read.
An attacker could take control of the user's keyboard over the network.
What is one reason Android devices are considered to be at a higher security risk than iOS devices? All Android apps are free. iOS has been available longer and has more of its vulnerabilities worked out. Android apps can be sideloaded. Apple apps are written in a more secure binary language.
Android apps can be sideloaded.
_____ protects a mobile device when it has not been used for a set period of time. Auto-lock Screen refresh Manager tie down (MTD) Remote security
Auto-lock
_____ is an attack that sends unsolicited messages to Bluetooth-enabled devices. Bluestealing Bluejacking Bluesending Bluesnarfing
Bluejacking
Which of the following is false about a wireless router? It sends and receives wireless signals between all wireless devices. It is usually found in a large business with hundreds of wireless users. It typically is connected to the user's modem. It combines several networking technologies.
It is usually found in a large business with hundreds of wireless users.
_____ is the process of bypassing the built-in limitations and protections of a mobile device. Cracking Twisting Jailbreaking Slicing
Jailbreaking
Why should you not sideload apps from an unofficial app store? Apps are always inferior on an unofficial app store. It always takes longer to download the app than from an approved store. It deprives the developers of any royalties. The apps on these sites are generally not previewed and may contain malware.
The apps on these sites are generally not previewed and may contain malware.
Which of the following is not a best practice for using a mobile device? Back up data stored on the mobile device on a regular basis. Do not jailbreak a mobile device. Wait 24 hours before reporting a lost device. Be aware of current threats affecting mobile devices.
Wait 24 hours before reporting a lost device.
What is the first step in securing a Wi-Fi wireless broadband router? creating a password to protect its internal configuration settings disabling all wireless connections turning on short preamble packets monitoring the Wi-Fi signal with a remote telemonitor
creating a password to protect its internal configuration settings
Tablet computers are designed for _____. processing capabilities ease of use wireless connection speed hardware upgrades
ease of use
The primary design of a(n) _____ is to capture the transmissions from legitimate users. rogue access point Wireless Equivalent Privacy (WEP) evil twin Bluetooth grabber
evil twin
Which of the following devices does not have an operating system that allows it to run third-party applications? tablet feature phone smartphone laptop
feature phone
What prevents a mobile device from being used until the user enters the correct passcode? swipe identifier (SW-ID) keyboard touchpad lock screen
lock screen
Which of the following is not a step to reduce the risk of theft or loss of a mobile device? recording the MAC address of the device before using it keeping the mobile device out of sight when traveling in a high-risk area using both hands to hold a device, making it more difficult for a thief to snatch not using the device on escalators or near transit train doors
recording the MAC address of the device before using it
10. Alice has attempted to enter the passcode on her mobile device but keeps entering the wrong code. Now she is asked to enter a special phrase to continue. This means that her mobile device is configured to _____. use PIN codes as passcodes reset to factory settings extend the lockout period double the amount of time she is prevented from accessing her device
reset to factory settings
When a user moves from one cell of coverage to another cell in a Wi-Fi network this is called _____. migrating traveling roaming handshaking
roaming
Which of the following can add a stronger degree of security to a Wi-Fi network? disable SSID broadcasts restrict users by MAC address limit the number of users turn on guest access
turn on guest access
What provides the optimum level of wireless security for a home Wi-Fi network? placing the wireless router in a box using a good identifier turning on Wi-Fi Protected Setup (WPS) turning on Wi-Fi Protected Access 2 (WPA2) Personal
turning on Wi-Fi Protected Access 2 (WPA2) Personal
Each of the following is a sound security practice when using a public Wi-Fi network except _____. watching out for an evil twin using the network for less than one hour per day using a virtual private network (VPN) not using a public network when entering confidential information on a website
using the network for less than one hour per day
The technical name for a Wi-Fi network is: wireless personal area network (WPAN) wireless local area network (WLAN) Bluetooth wireless ultraband (WU)
wireless local area network (WLAN)