Unit 6 - Practice Quiz

INT244

1 Which IEEE standard governs Wireless LAN (WLAN) technologies?

A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.15
D. IEEE 802.1X

2 In the context of wireless security, what is an 'Evil Twin' attack?

A. A rogue access point that mimics a legitimate SSID to intercept traffic
B. A bluetooth attack that crashes the device
C. Two hackers working simultaneously on the same network
D. A virus that replicates itself on mobile devices

3 Which wireless encryption protocol is considered the weakest and has been deprecated due to severe vulnerabilities?

A. WPA2
B. WPA3
C. WEP
D. WPA-Enterprise

4 What is the primary difference between Bluejacking and Bluesnarfing?

A. Bluejacking involves stealing data, while Bluesnarfing sends unsolicited messages
B. Bluejacking sends unsolicited messages, while Bluesnarfing involves stealing data
C. Bluejacking takes full control of the device, while Bluesnarfing only crashes it
D. There is no difference; they are synonyms

5 Which Bluetooth attack allows an attacker to take full control of a target device to make calls or send texts?

A. Bluejacking
B. Bluesnarfing
C. Bluebugging
D. Bluestriking

6 What is the primary function of a SIEM (Security Information and Event Management) system?

A. To act as a firewall for wireless networks
B. To aggregate and analyze log data from various sources to detect security incidents
C. To encrypt mobile device hard drives
D. To manage cloud subscriptions

7 In a Security Operations Center (SOC), what is the main responsibility of Tier 1 analysts?

A. Deep forensic analysis
B. Threat hunting
C. Triage and initial classification of security alerts
D. Managing the budget of the security team

8 What core component does the Android operating system use as its foundation?

A. Windows NT Kernel
B. Linux Kernel
C. Darwin Kernel
D. Microkernel

9 iOS utilizes a security mechanism that restricts apps from accessing data or processes of other apps. What is this called?

A. Rooting
B. Containerization
C. Sandboxing
D. Hypervising

10 The process of removing software restrictions imposed by Apple on iOS devices is known as:

A. Rooting
B. Jailbreaking
C. Sideloading
D. Unlocking

11 On Android devices, gaining administrative (superuser) privileges is referred to as:

A. Rooting
B. Jailbreaking
C. Phishing
D. Bootloading

12 Which mobile security model involves separating personal and corporate data on the same device?

A. BYOD (Bring Your Own Device)
B. Containerization
C. CYOD (Choose Your Own Device)
D. Direct Access

13 What is 'Sideloading' in the context of mobile security?

A. Charging a device via a malicious USB port
B. Installing applications from sources other than the official app store
C. Turning the phone sideways to bypass facial recognition
D. Transferring data to the cloud

14 Which solution allows IT administrators to remotely wipe, lock, and configure mobile devices across an enterprise?

A. MDM (Mobile Device Management)
B. VPN (Virtual Private Network)
C. WPA2
D. IDS (Intrusion Detection System)

15 What is the 'Shared Responsibility Model' in cloud computing?

A. The cloud provider is responsible for everything
B. The customer is responsible for everything
C. Security obligations are divided between the cloud provider and the customer
D. Multiple cloud providers share the cost of security

16 Which Cloud Service Model provides the consumer with the capability to provision processing, storage, and networks (e.g., AWS EC2)?

A. SaaS (Software as a Service)
B. PaaS (Platform as a Service)
C. IaaS (Infrastructure as a Service)
D. DaaS (Desktop as a Service)

17 Which Cloud Service Model delivers applications over the internet (e.g., Gmail, Salesforce)?

A. SaaS (Software as a Service)
B. PaaS (Platform as a Service)
C. IaaS (Infrastructure as a Service)
D. FaaS (Function as a Service)

18 Google App Engine and Microsoft Azure App Service are examples of which cloud model?

A. SaaS
B. PaaS
C. IaaS
D. Hybrid

19 Which cloud deployment model is exclusively used by a single organization?

A. Public Cloud
B. Private Cloud
C. Hybrid Cloud
D. Community Cloud

20 What is a major security risk associated with Insecure APIs in cloud computing?

A. They consume too much electricity
B. They can expose sensitive data or allow unauthorized control if not properly authenticated
C. They slow down the internet connection
D. They prevent the use of firewalls

21 In the context of Wireless security, what is 'War Driving'?

A. Driving a tank into a data center
B. Physically driving around to locate and map open or vulnerable wireless networks
C. Using a drone to jam signals
D. Overclocking a CPU to increase speed

22 Which of the following is a countermeasure against Bluetooth attacks?

A. Keeping Bluetooth in 'Discoverable' mode at all times
B. Using a PIN of '0000'
C. Setting the device to 'Non-discoverable' or 'Hidden' mode when not pairing
D. Broadcasting the device name publicly

23 What is a 'Rogue Access Point'?

A. An unauthorized wireless access point installed on a secure network
B. A firewall rule that blocks traffic
C. A secure router provided by the ISP
D. A software update for Wi-Fi drivers

24 What is the purpose of SSID broadcasting?

A. To encrypt the data traffic
B. To announce the presence and name of the wireless network to nearby devices
C. To block unauthorized users
D. To increase the speed of the internet

25 Which mobile threat involves an attacker intercepting communication between the user and a server?

A. Man-in-the-Middle (MitM) attack
B. Screen locking
C. Data resting
D. Geofencing

26 What is 'Shadow IT' in the context of Cloud Security?

A. Dark mode interfaces in cloud apps
B. The use of IT systems and cloud services without explicit approval from the IT department
C. A hacking group targeting clouds
D. Backup data stored in a dark room

27 Which cloud attack involves an attacker exploiting the shared resources in a virtualized environment to access data from another tenant?

A. Guest-Escape / Hypervisor Jumping
B. Phishing
C. SQL Injection
D. DDoS

28 What is a CASB (Cloud Access Security Broker)?

A. A physical lock for server rooms
B. Software that sits between cloud service users and cloud applications to enforce security policies
C. A type of cloud malware
D. A government agency regulating clouds

29 Why is 'Multitenancy' a security concern in the cloud?

A. It increases the cost of storage
B. Multiple customers share the same physical resources, creating a risk of data leakage if isolation fails
C. It requires more electricity
D. It makes the internet slower

30 Which of the following is a critical step when testing security in the cloud (Penetration Testing)?

A. Launching an attack without warning
B. Obtaining permission from the Cloud Service Provider (CSP) before testing
C. Ignoring the Service Level Agreement
D. Testing only on weekends

31 What does WPA3 use to replace the WPA2 Pre-Shared Key exchange, making it resistant to offline dictionary attacks?

A. WEP
B. Simultaneous Authentication of Equals (SAE)
C. TKIP
D. Plaintext

32 What is a 'Botnet' often used for in cloud attacks?

A. Mining cryptocurrency legally
B. Perform Distributed Denial of Service (DDoS) attacks
C. Backing up data
D. Indexing web pages

33 What allows Android users to verify what capabilities an application is requesting (e.g., access to camera, contacts)?

A. App Permissions
B. Kernel Panic
C. Root Access
D. The instruction manual

34 Which wireless security protocol uses TKIP (Temporal Key Integrity Protocol)?

A. WEP
B. WPA
C. WPA2
D. WPA3

35 What is 'Geo-tagging' and why is it a mobile security risk?

A. Playing games based on location; it wastes battery
B. Embedding location data in photos/posts; it reveals the user's physical location to stalkers
C. Tagging friends in photos; it is a privacy violation
D. Using GPS for maps; it uses data

36 In the context of SOC, what does 'Correlation' mean?

A. Connecting the power cables
B. Linking different events from log files to identify a complex attack pattern
C. Communicating with the HR department
D. Backing up files to two locations

37 Which of the following is a physical security threat to mobile devices?

A. Malware
B. Phishing
C. Theft or Loss
D. SQL Injection

38 What is 'Cryptojacking' in a cloud environment?

A. Stealing credit card numbers
B. Unauthorized use of cloud computing resources to mine cryptocurrency
C. Encrypting data for ransom
D. Hacking into a bank

39 The NIST definition of Cloud Computing includes 'Rapid Elasticity'. What does this mean?

A. The cloud is made of rubber
B. Capabilities can be elastically provisioned and released to scale rapidly outward and inward
C. The internet speed is constant
D. Data is stored on flexible disks

40 Which attack vector involves a malicious insider abusing their authorized access to cloud data?

A. Insider Threat
B. Outsider Threat
C. DDoS
D. War Driving

41 What is the primary function of a Virtual Private Network (VPN) on a mobile device connecting to public Wi-Fi?

A. To boost signal strength
B. To create an encrypted tunnel for data, protecting it from interception
C. To bypass battery limits
D. To download apps faster

42 Which Bluetooth class has the longest range (approximately 100 meters)?

A. Class 1
B. Class 2
C. Class 3
D. Class 4

43 What is 'MAM' in mobile security?

A. Mobile Application Management
B. Mobile Access Monitoring
C. Main Access Module
D. Man-Against-Machine

44 Which file format is used for installing software on the Android operating system?

A. .EXE
B. .DMG
C. .APK
D. .IPA

45 In cloud security, what does 'Data Sovereignty' refer to?

A. The king of data
B. The concept that data is subject to the laws of the country in which it is physically stored
C. The encryption level of data
D. The speed of data transfer

46 What is a 'Hybrid Cloud'?

A. A cloud that runs on gas and electricity
B. A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together
C. A cloud that only stores images
D. A cloud maintained by a single person

47 Which wireless attack involves capturing handshake packets and attempting to crack the password offline?

A. WPA Cracking / Dictionary Attack
B. Signal Jamming
C. Beacon Flooding
D. MAC Filtering

48 What is 'MAC Address Filtering'?

A. Filtering out Mac computers
B. Allowing or denying network access based on the hardware address of the network card
C. Cleaning the router
D. Blocking websites

49 Why is 'Remote Wipe' a critical feature for enterprise mobile security?

A. To clean the screen remotely
B. To erase sensitive corporate data if a device is lost or stolen
C. To delete apps that are not used
D. To update the OS remotely

50 Which of the following is a symptom of a mobile device being infected with malware?

A. Extended battery life
B. Unexpected data usage spikes and rapid battery drain
C. Faster performance
D. Screen becoming brighter