Chapter 13-15 Practice Quiz
True or False: Madware often tracks people illegally by pulling data from a device without the owner's knowledge or consent
False
True or False: On mobile devices, it is difficult to find unique characteristics for fingerprinting. Once, however, they tend to be stable.
False
True or False: PC-based USB exploits are not a concern for mobile devices because most of these devices do not have USB ports.
False
True or False: Remote fingerprinting is primarily accomplished with spyware
False
True or False: Spy cells enable law enforcement to set up rogue access points on local area networks
False
True or False: Weaker server-side security does not pose a direct threat to mobile clients.
False
Which of the following are not used in passive fingerprinting?
GPS locations
Which of the following describes spy software?
It can open up a phone to much greater abuse because it typically requires jail breaking
Which of the following describes proximity fingerprinting?
It is a standard practice for managing networks
Which of the following describes Android-targeted malware?
It mostly exists due to software fragmentation
Which of the following describes Apple iOS malware?
It primarily targets iPhones that have been jailbroken
The advertising identifier tag in Apple-based applications does which of the following?
It remains active even if the application is deleted
Which of the following describes binary protection?
Prevents rogue developers from tampering or reverse engineering application code
Why are Certificate Authority (CA) exploits an issue on smart device?
Some mobile apps are deployed without requiring a check of the validity of SSL certs
Mobile malware tends to focus on which of the following?
All of these -Gaining access to the ports that control GPS and other location information to sell to third-party advertisers -Gaining control of phone file systems to steal data, photos, and so on or to lock out the user for ransom -Gaining control of phones to launch DDoS attacks or send premium SMS messages
Which of the following describes fingerprinting?
All of these -It can lead to abuse from aggressive advertisers -It makes for richer user experience online. Enabling sites to offer customized content and more convenient consumer transactions -It can lead to serious security issues on jailbroken phones
Which of the following is an example of a malware-delivery technique?
All of these -USB exploits that jailbreak phones when they're connected to PCs -Like jacking -Captive portals
Which of the following is not a risk from client-side injection attacks?
Data Leakage
The ability of many smart devices to access mobile & WiFi networks simultaneously creates potential issues with which of the following?
Data leakage
What is one of the simplest ways to avoid mobile device fingerprinting
Disable javascript
Any application that harvests data from applications or storage is considered to be either malware or madware
False
Malware tends to be evenly distributed across Android & Apple iOS phone devices
False
Social engineering does not play a prominent role in mobile malware
False
True or False: Device fingerprinting is a relatively new networking phenomenon and is always malicious
False
True or False: Given the improvement that developers have made on their mobile platforms, user security awareness is no longer an issue.
False
Which of the following is not true about captive portals?
They can be used only for hacking purposes and should be avoided
In what way are the top categories of mobile device malware financially focused?
They extract data or services that are easily monetized
In addition to searching for rogue devices, scanning wireless networks is also used to do which of the following?
Verify that security measures are in place on authorized access points
Drive-By browser exploits target which of the following?
Web browser plug-ins for Java, Adobe & Flash on mobile devices
