Unit 6 - Practice Quiz

INT244 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which IEEE standard governs Wireless LAN (WLAN) technologies?

A. IEEE 802.15
B. IEEE 802.3
C. IEEE 802.1X
D. IEEE 802.11

2 In the context of wireless security, what is an 'Evil Twin' attack?

A. A bluetooth attack that crashes the device
B. A rogue access point that mimics a legitimate SSID to intercept traffic
C. A virus that replicates itself on mobile devices
D. Two hackers working simultaneously on the same network

3 Which wireless encryption protocol is considered the weakest and has been deprecated due to severe vulnerabilities?

A. WPA3
B. WPA2
C. WEP
D. WPA-Enterprise

4 What is the primary difference between Bluejacking and Bluesnarfing?

A. Bluejacking takes full control of the device, while Bluesnarfing only crashes it
B. Bluejacking sends unsolicited messages, while Bluesnarfing involves stealing data
C. Bluejacking involves stealing data, while Bluesnarfing sends unsolicited messages
D. There is no difference; they are synonyms

5 Which Bluetooth attack allows an attacker to take full control of a target device to make calls or send texts?

A. Bluestriking
B. Bluesnarfing
C. Bluebugging
D. Bluejacking

6 What is the primary function of a SIEM (Security Information and Event Management) system?

A. To act as a firewall for wireless networks
B. To encrypt mobile device hard drives
C. To manage cloud subscriptions
D. To aggregate and analyze log data from various sources to detect security incidents

7 In a Security Operations Center (SOC), what is the main responsibility of Tier 1 analysts?

A. Triage and initial classification of security alerts
B. Threat hunting
C. Deep forensic analysis
D. Managing the budget of the security team

8 What core component does the Android operating system use as its foundation?

A. Windows NT Kernel
B. Darwin Kernel
C. Linux Kernel
D. Microkernel

9 iOS utilizes a security mechanism that restricts apps from accessing data or processes of other apps. What is this called?

A. Rooting
B. Sandboxing
C. Hypervising
D. Containerization

10 The process of removing software restrictions imposed by Apple on iOS devices is known as:

A. Unlocking
B. Jailbreaking
C. Rooting
D. Sideloading

11 On Android devices, gaining administrative (superuser) privileges is referred to as:

A. Phishing
B. Rooting
C. Jailbreaking
D. Bootloading

12 Which mobile security model involves separating personal and corporate data on the same device?

A. CYOD (Choose Your Own Device)
B. Containerization
C. Direct Access
D. BYOD (Bring Your Own Device)

13 What is 'Sideloading' in the context of mobile security?

A. Turning the phone sideways to bypass facial recognition
B. Transferring data to the cloud
C. Installing applications from sources other than the official app store
D. Charging a device via a malicious USB port

14 Which solution allows IT administrators to remotely wipe, lock, and configure mobile devices across an enterprise?

A. IDS (Intrusion Detection System)
B. VPN (Virtual Private Network)
C. WPA2
D. MDM (Mobile Device Management)

15 What is the 'Shared Responsibility Model' in cloud computing?

A. The cloud provider is responsible for everything
B. The customer is responsible for everything
C. Security obligations are divided between the cloud provider and the customer
D. Multiple cloud providers share the cost of security

16 Which Cloud Service Model provides the consumer with the capability to provision processing, storage, and networks (e.g., AWS EC2)?

A. SaaS (Software as a Service)
B. IaaS (Infrastructure as a Service)
C. PaaS (Platform as a Service)
D. DaaS (Desktop as a Service)

17 Which Cloud Service Model delivers applications over the internet (e.g., Gmail, Salesforce)?

A. PaaS (Platform as a Service)
B. SaaS (Software as a Service)
C. IaaS (Infrastructure as a Service)
D. FaaS (Function as a Service)

18 Google App Engine and Microsoft Azure App Service are examples of which cloud model?

A. SaaS
B. PaaS
C. Hybrid
D. IaaS

19 Which cloud deployment model is exclusively used by a single organization?

A. Community Cloud
B. Public Cloud
C. Hybrid Cloud
D. Private Cloud

20 What is a major security risk associated with Insecure APIs in cloud computing?

A. They slow down the internet connection
B. They prevent the use of firewalls
C. They can expose sensitive data or allow unauthorized control if not properly authenticated
D. They consume too much electricity

21 In the context of Wireless security, what is 'War Driving'?

A. Physically driving around to locate and map open or vulnerable wireless networks
B. Driving a tank into a data center
C. Overclocking a CPU to increase speed
D. Using a drone to jam signals

22 Which of the following is a countermeasure against Bluetooth attacks?

A. Keeping Bluetooth in 'Discoverable' mode at all times
B. Broadcasting the device name publicly
C. Setting the device to 'Non-discoverable' or 'Hidden' mode when not pairing
D. Using a PIN of '0000'

23 What is a 'Rogue Access Point'?

A. A firewall rule that blocks traffic
B. An unauthorized wireless access point installed on a secure network
C. A secure router provided by the ISP
D. A software update for Wi-Fi drivers

24 What is the purpose of SSID broadcasting?

A. To announce the presence and name of the wireless network to nearby devices
B. To block unauthorized users
C. To encrypt the data traffic
D. To increase the speed of the internet

25 Which mobile threat involves an attacker intercepting communication between the user and a server?

A. Man-in-the-Middle (MitM) attack
B. Geofencing
C. Screen locking
D. Data resting

26 What is 'Shadow IT' in the context of Cloud Security?

A. A hacking group targeting clouds
B. Backup data stored in a dark room
C. The use of IT systems and cloud services without explicit approval from the IT department
D. Dark mode interfaces in cloud apps

27 Which cloud attack involves an attacker exploiting the shared resources in a virtualized environment to access data from another tenant?

A. Guest-Escape / Hypervisor Jumping
B. DDoS
C. SQL Injection
D. Phishing

28 What is a CASB (Cloud Access Security Broker)?

A. A physical lock for server rooms
B. Software that sits between cloud service users and cloud applications to enforce security policies
C. A type of cloud malware
D. A government agency regulating clouds

29 Why is 'Multitenancy' a security concern in the cloud?

A. Multiple customers share the same physical resources, creating a risk of data leakage if isolation fails
B. It requires more electricity
C. It makes the internet slower
D. It increases the cost of storage

30 Which of the following is a critical step when testing security in the cloud (Penetration Testing)?

A. Ignoring the Service Level Agreement
B. Obtaining permission from the Cloud Service Provider (CSP) before testing
C. Launching an attack without warning
D. Testing only on weekends

31 What does WPA3 use to replace the WPA2 Pre-Shared Key exchange, making it resistant to offline dictionary attacks?

A. Simultaneous Authentication of Equals (SAE)
B. WEP
C. TKIP
D. Plaintext

32 What is a 'Botnet' often used for in cloud attacks?

A. Mining cryptocurrency legally
B. Indexing web pages
C. Perform Distributed Denial of Service (DDoS) attacks
D. Backing up data

33 What allows Android users to verify what capabilities an application is requesting (e.g., access to camera, contacts)?

A. Root Access
B. App Permissions
C. Kernel Panic
D. The instruction manual

34 Which wireless security protocol uses TKIP (Temporal Key Integrity Protocol)?

A. WEP
B. WPA2
C. WPA
D. WPA3

35 What is 'Geo-tagging' and why is it a mobile security risk?

A. Using GPS for maps; it uses data
B. Embedding location data in photos/posts; it reveals the user's physical location to stalkers
C. Playing games based on location; it wastes battery
D. Tagging friends in photos; it is a privacy violation

36 In the context of SOC, what does 'Correlation' mean?

A. Linking different events from log files to identify a complex attack pattern
B. Connecting the power cables
C. Backing up files to two locations
D. Communicating with the HR department

37 Which of the following is a physical security threat to mobile devices?

A. Malware
B. Phishing
C. SQL Injection
D. Theft or Loss

38 What is 'Cryptojacking' in a cloud environment?

A. Stealing credit card numbers
B. Encrypting data for ransom
C. Unauthorized use of cloud computing resources to mine cryptocurrency
D. Hacking into a bank

39 The NIST definition of Cloud Computing includes 'Rapid Elasticity'. What does this mean?

A. The cloud is made of rubber
B. Data is stored on flexible disks
C. Capabilities can be elastically provisioned and released to scale rapidly outward and inward
D. The internet speed is constant

40 Which attack vector involves a malicious insider abusing their authorized access to cloud data?

A. Outsider Threat
B. War Driving
C. Insider Threat
D. DDoS

41 What is the primary function of a Virtual Private Network (VPN) on a mobile device connecting to public Wi-Fi?

A. To download apps faster
B. To boost signal strength
C. To create an encrypted tunnel for data, protecting it from interception
D. To bypass battery limits

42 Which Bluetooth class has the longest range (approximately 100 meters)?

A. Class 4
B. Class 2
C. Class 3
D. Class 1

43 What is 'MAM' in mobile security?

A. Mobile Access Monitoring
B. Main Access Module
C. Mobile Application Management
D. Man-Against-Machine

44 Which file format is used for installing software on the Android operating system?

A. .APK
B. .DMG
C. .EXE
D. .IPA

45 In cloud security, what does 'Data Sovereignty' refer to?

A. The king of data
B. The speed of data transfer
C. The concept that data is subject to the laws of the country in which it is physically stored
D. The encryption level of data

46 What is a 'Hybrid Cloud'?

A. A composition of two or more clouds (private, community, or public) that remain unique entities but are bound together
B. A cloud maintained by a single person
C. A cloud that only stores images
D. A cloud that runs on gas and electricity

47 Which wireless attack involves capturing handshake packets and attempting to crack the password offline?

A. Beacon Flooding
B. WPA Cracking / Dictionary Attack
C. MAC Filtering
D. Signal Jamming

48 What is 'MAC Address Filtering'?

A. Allowing or denying network access based on the hardware address of the network card
B. Filtering out Mac computers
C. Blocking websites
D. Cleaning the router

49 Why is 'Remote Wipe' a critical feature for enterprise mobile security?

A. To delete apps that are not used
B. To erase sensitive corporate data if a device is lost or stolen
C. To clean the screen remotely
D. To update the OS remotely

50 Which of the following is a symptom of a mobile device being infected with malware?

A. Unexpected data usage spikes and rapid battery drain
B. Screen becoming brighter
C. Extended battery life
D. Faster performance