Cyber Security Multiple Choice Question MCQ
Categories: MCQS
1. Which of the following is not an appropriate way of targeting a mobile phone for hacking? a) Target mobile hardware vulnerabilities b) Target apps’ vulnerabilities c) Setup Keyloggers and spyware in smart-phones d) Snatch the phone Answer: d 2. Which of the following is not an OS for mobile? a) Palm b) Windows c) Mango d) Android Answer: c 3. Mobile Phone OS contains open APIs that may be _________ attack. a) useful for b) vulnerable to c) easy to d) meant for Answer: b 4. ______ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones. a) Worms b) Antivirus c) Malware d) Multimedia files Answer: c 5. ________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs. a) OS Security b) Database security c) Cloud security d) Mobile security Answer: d 6. Mobile security is also known as _________ a) OS Security b) Wireless security c) Cloud security d) Database security Answer: b 7. DDoS in mobile systems wait for the owner of the _______ to trigger the attack. a) worms b) virus c) botnets d) programs Answer: c 8. Hackers cannot do which of the following after compromising your phone? a) Steal your information b) Rob your e-money c) Shoulder surfing d) Spying Answer: c 9. Hackers cannot do which of the following after compromising your phone? a) Shoulder surfing b) Accessing your voice mail c) Steal your information d) Use your app credentials Answer: a 10. App permissions can cause trouble as some apps may secretly access your memory card or contact data. a) True b) False Answer: a 11. Activate _______ when you’re required it to use, otherwise turn it off for security purpose. a) Flash Light b) App updates c) Bluetooth d) Rotation Answer: c 12. Try not to keep __________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. a) Biometric b) PIN-based c) Alphanumeric d) Short Answer: a 13. Which of the following tool is used for Blackjacking? a) BBAttacker b) BBProxy c) Blackburried d) BBJacking Answer: b 14. BBProxy tool is used in which mobile OS? a) Android b) Symbian c) Raspberry d) Blackberry Answer: d 15. Which of the following is not a security issue for PDAs? a) Password theft b) Data theft c) Reverse engineering d) Wireless vulnerability Answer: c