Mobile Security Online

Ace your homework & exams now with Quizwiz!

How can an administrator reduce the effectiveness of a network discovery tool such as InSSIDer or Kismet? A. Apply an advanced security measure such as Extensible Authentication Protocol (EAP). B. Change media access control (MAC) addresses of wireless access points. C. Use a captive portal. D. Change service set identifiers (SSIDs) daily. Answer Key:A

A

Which of the following is NOT true of the Android operating system and apps? A. Android allows owners to download applications and software from any Web site. B. Google vets the trustworthiness of all apps regardless of the source. C. The Android security model is based on an open system. D. Android apps run on the Dalvik platform on all Android devices.

B

Which of the following can be used to protect against OS fingerprinting or port scanning? A. a password-cracking utility B. a discovery tool like InSSIDer or Kismet C. a wireless intrusion prevention system (WIPS) D. a utility like LanGuard or Nessus

C

Which of the following is NOT true of penetration testing? A. It helps an organization detect network weaknesses before attackers. B. Pentests may be performed manually or using automated tools. C. It is best not to seek permission ahead of time to more closely mimic an actual attack. D. It requires permission.

C

Rooting, or overriding Android operating system (OS) security, gives the user root (super-user) permissions on an Android device. Which subset or section of the Android operating system is rooted? A. the Linux file system B. the boot loader C. the entire operating system D. the OS kernel

D

An enterprise security policy typically does NOT align with which of the following? A. employees' home network configurations B. internal security requirements C. an organization's goals D. available resources

a

There are two opposing models of source code management for mobile operating systems. One is the open source model, which developers can freely alter. The Android operating system follows this model. Apple's operating system iOS follows the other model. Which of the following best characterizes the Apple iOS philosophy? A. walled garden B. rooted C. jailbroken D. non-component-layered model

a

Which of the following security model characteristics are shared by Apple iOS and the Android operating system (OS)? A. applications run in a sandbox B. open system C. strict application provenance D. limited permission-based access control

a

Which of the following is true of potentially unwanted applications (PUAs)? A. are referred to as rootkits B. are created by developers to monetize their applications C. are specific to Windows Phone D. are specific to Apple iOS

b

What is the best use of virtual private networks (VPNs) today? A. For Wi-Fi access with Wired Equivalent Privacy (WEP) encryption B. For client station access C. For secure remote connections from public networks to corporate resources D. For configuring inter-building bridges

c

Which of the following is NOT true of Kali Linux? A. can perform stress tests B. can perform hardware hacking C. is an insecure platform by design D. contains exploitation tools

c

Which type of enterprise network connection health check sends traffic through antivirus servers and intrusion detection/protection systems for devices such as printers and scanners? A. mobile device management (MDM) B. mobile application management (MAM) C. network-based services D. client integrity control

c

You are a network administrator. The network you manage has a wireless access point and a repeater. You detect a dead spot while checking coverage. How do you compensate for the dead spot? A. Decrease the power setting of the wireless access point. B. Ensure that the channel setting on the repeater doesn't match the wireless access point. C. Increase the power settings of the wireless access point. D. Increase the distance between the wireless access point and the repeater.

c

You are a networking consultant who has been asked to penetration test the network of a small business. You located a target wireless network and can connect, but you cannot authenticate because it uses WPA2-PSK encryption. How can you bypass the encryption? A. Use media access control (MAC) filtering techniques. B. You cannot break or bypass WPA2-PSK encryption. C. You can try social engineering techniques to get the shared password. D. Use SSID cloaking.

c

A hotel is an environment in which many individuals demand wireless access, yet access should be granted only to paying guests. A solution is needed to interrupt the connection attempt and validate paying hotel guests. Which of the following solutions provides the best and most common approach? A. Guests use a virtual private network (VPN). B. Guest requests use Extensible Authentication Protocol (EAP) to encapsulate the wireless request. C. Guest requests go through a network-based wireless intrusion prevention system (WIPS). D. Guests use a captive portal and authenticated Dynamic Host Configuration Protocol.

d

What makes the Apple iPhone with iOS ideal for bring your own device (BYOD)? A. Apple iOS is an open system. B. Apple iOS doesn't have strong built-in security, which makes it more manageable. C. It cannot be jailbroken. D. It has one operating system and only one or two models of each version of the device.

d

Which mobile phone vulnerability is used for eavesdropping and potential extortion? A. sending premium-rate SMS messages B. International Mobile Station Equipment Identity (IMEI) number theft C. making expensive calls D. SMS redirection

d

Which mobile vulnerability enables rogue developers to reverse engineer or tamper with application code, and then inject malicious code in the form of malware into the application to perform some hidden functionality? A. poor authorization and authentication B. security decisions via untrusted inputs C. improper session handling D. lack of binary protections

d

Which of the following is NOT true of Handoff? A. It requires inter-device continuity, using Bluetooth 4 and Wi-Fi direct connections. B. It works with iOS apps and browsers used on an iPhone. C. It allows a user to make calls from a Mac or an iPad. D. It allows a user to switch between an iPhone and a Windows Phone device seamlessly.

d

Which of the following is the official Android development tool? A. AndroRAT B. Android Framework for Exploitation C. DroidBox D. Android SDK

d

A sandbox approach to mobile development uses a black list to determine which apps are permitted to communicate with other apps.

false

A virtual local area network (VLAN) is a Layer 3 technique.

false

An important distinction between vulnerability scanning and pentesting is that pentests are non-intrusive and do not cause damage, whereas vulnerability scans can cause an outage.

false

An intrusion detection system (IDS) actively confronts and blocks any suspicious traffic it detects.

false

Android device manufacturers typically release one new device every other year.

false

Android does not have the ability to encrypt data through cryptographic application programming interfaces (APIs).

false

Google Play provides a market for users to browse Google and third-party applications for Android devices, and then installs selected applications on the devices.

false

Mobile device management (MDM) is a subset of mobile application management (MAM) and automates the management of a wide range of mobile devices.

false

Radio frequency (RF) signals that extend beyond a property's boundaries does not affect the performance of neighboring wireless networks.

false

The Kali Linux security platform, which can be downloaded as open source and loaded on a laptop, a USB drive, or an Android phone, is based on Ubuntu Linux.

false

Wireless network auditing requires a few highly specialized tools.

false

A host-based wireless intrusion prevention system (WIPS) is an application loaded onto a server or client computer or device that monitors for threats in applications, operating systems, and files, as well as known suspicious behavior.

true

A protocol analyzer can reveal insights in unencrypted systems, such as Layer 2 and Layer 3 information and packet payloads.

true

A share enumerator scans a Windows subnet for open file shares, looking for usernames and for information on groups, shares, and available services.

true

A smart device is vulnerable during the handshake between a USB port and the device when it is connected.

true

A wireless network should be subject to at least the same level of diligence and penetration testing as all other external components, such as firewalls and routers.

true

Advanced Encryption Standard (AES) is a block cipher algorithm.

true

An access control list (ACL) is a simple lookup list that allows access to certain services. Access to restricted areas can then be controlled via the ACL.

true

An access point with a built-in Remote Authentication Dial-In User Service (RADIUS) client can communicate directly with both a client device and a RADIUS server.

true

Android users who download apps only from Google Play run little chance of infecting their devices.

true

Because Android is an open source platform, every application created for Android devices consists of essential building blocks. Therefore, every application can be decompiled and reviewed as blocks of source code.

true

Client-side injection leads to the execution of malicious code on a mobile application.

true

Drive-by browser exploits target Web browser plug-ins on mobile devices for Java, Adobe Reader, and Flash.

true

Hackers can steal account numbers from a mobile phone that is used as a data repository or a mobile wallet with an unsecure data store.

true

In most Windows clients, a wireless device will automatically attempt to attach to any network to which it has previously been attached and will favor the access point with the highest transmit signal.

true

MAC addresses represent the physical address of a machine or device.

true

Media access control (MAC) filters are used in a "deny by default, permit by exception" scheme, where only those MAC addresses that are listed are permitted access.

true

Open access is the most common form of guest network access.

true

Protocol analyzers do not have a network signature that would give away their presence on a network, making them difficult to detect.

true

Robust Security Network (RSN) is the IEEE 802.11i security standard.

true

Service set identifier (SSID) cloaking is a best practice for avoiding casual or opportunistic access to a wireless network.

true

The main difference between mobile device management (MDM) and mobile application management (MAM) is that MDM handles device activation, enrollment, and provisioning, and MAM assists in delivering software.

true


Related study sets

Life, Health & Variable Annuity (2-15 Exam)

View Set

PASSOS 1:BASIC 1: 1: Hola, Sóc la Maria

View Set

InQuizitive: Chapter 24: The Reactionary Twenties

View Set

Pharm Made Easy 4.0 Neuro Part 1

View Set

Spanish Beginners 2 Lesson 10.2 Imperfect vs Preterite

View Set