Module 17 - Hacking Mobile Platforms ( EC Mode ) Flashcards

1
Q

Which of the following categories of mobile risk covers “Security Decisions via Untrusted Inputs” and is one of the less frequently used categories?

A. Improper platform usage
B. Insecure communication
C. Code tampering
D. Client code quality

A

Answer: D. Client code quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which browser-based attack involves emails or pop-ups that redirect users to fake web pages that mimic trustworthy sites, demanding the users to submit personal information?

A. Man-in-the-Mobile
B. Framing
C. Clickjacking
D. Phishing

A

Answer: D. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following categories of mobile risk covers binary patching, local resource modification, method hooking, method swizzling, and dynamic memory modification?

A. Extraneous functionality
B. Code tampering
C. Client code quality
D. Reverse engineering

A

Answer: B. Code tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not an OWASP Top 10 Mobile Risk?

A. Insecure communication
B. Reverse engineering
C. Buffer overflow
D. Insecure cryptography

A

Answer: C. Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following technique helps protect mobile systems and users by limiting the resources the mobile application can access on the mobile platform?

A. Sandbox
B. Spam filter
C. Anti-malware
D. Firewall

A

Answer: A. Sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following mobile Bluetooth attacks enables an attacker to gain remote access to the victim’s mobile and use its features without the victim’s knowledge or consent?

A. Bluebugging
B. Bluesmacking
C. Bluesnarfing
D. BlueSniff

A

Answer: A. Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not a mobile platform risk?

A. Malicious Apps in App Store
B. Sandboxing
C. Jailbreaking and Rooting
D. Mobile Malware

A

Answer: B. Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Given below are the various steps involved in an OTP hijacking attack. Identify the correct sequence of steps involved in an OTP hijacking attack.

1.The attacker performs social engineering on the telecom operator.
2.The attacker’s device receives the OTP.
3.The telecom operator transfers the victim’s SIM control.
4.The attacker logs in to the victim’s online accounts via the OTP.
5.The attacker gains the target user’s PII.

Identify the correct sequence of steps involved in an OTP hijacking attack.?

A. 5 → 1 → 3 → 2 → 4

B. 3 → 1 → 2 → 5 → 4

C.1 → 3 → 2 → 4 → 5

D. 4 → 3 → 1 → 5 → 2

A

Answer: A. 5 → 1 → 3 → 2 → 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In which of the following attacks does an attacker infect the target device with a remote access Trojan (RAT) and compromise it to access the victim’s camera and microphone?

A. OS command execution
B. Rainbow table attack
C. Camfecting attack
D. GPU-based attack

A

Answer: C. Camfecting attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a type of attack, attackers exploit various bypass vulnerabilities on a target Android device by tricking the victim into downloading a malicious app. When the victim starts using the infected application, a persistent connection is established between the victim and attacker. Identify this attack.

A. Jamming attack
B. Cryptanalysis attack
C. BlueBorne attack
D. Android camera hijack attack

A

Answer: D. Android camera hijack attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following attacks is performed by attackers to eavesdrop on existing network connections between two systems, intrude, and then read or modify data?

A. Packet sniffing
B. DNS poisoning
C. Man-in-the-middle
D. Fake SSL certificates

A

Answer: C. Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which of the following attacks does an attacker exploit vulnerabilities in the SSL/TLS implementation on websites and invisibly downgrade connections to HTTP without encryption?

A. SSLStrip
B. Packet sniffing
C. Rogue access points
D. Fake SSL certificates

A

Answer: A. SSLStrip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the following attacks does an attacker bribe or socially engineer telecom providers to obtain ownership of a target user’s SIM?

A. OTP hijacking
B. Camfecting attack
C. Clickjacking
D. Framing

A

Answer: A. OTP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an attack technique used by an attacker to gain remote access to a target Bluetooth-enabled device, use its features without the victim’s knowledge or consent, and perform a backdoor attack before returning control to its owner?

A. Bluesnarfing
B. Bluebugging
C. SMiShing
D. Agent Smith attack

A

Answer: B. Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which of the following attacks does an attacker adopt the trial-and-error approach to guess the valid input to a particular field?

A. Brute-force attack
B. Platform vulnerabilities
C. Cross-site scripting attack
D. Cross-site request forgery attack

A

Answer: A. Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following attacks can be performed by spam messages?

A. Bluesnarfing attacks
B. Wardriving attacks
C. Phishing attacks
D. Bluebugging attacks

A

Answer: C. Phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If an attacker is able to access the email contact list, text messages, photos, etc. on your mobile device, then what type of attack did the attacker employ?

A. Bluesnarfing
B. Bluesmacking
C. Bluebugging
D. BlueSniff

A

Answer: A. Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When Jason installed a malicious application on his mobile, the application modified the content in other applications on Jason’s mobile phone. What process did the malicious application perform?

A. Data Tampering
B. Data Mining
C. Data Exfiltration
D. Data Loss

A

Answer: A. Data Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

James, an attacker, attempted to gain illegitimate access to a user’s bank account. To achieve his goal, James tricked mobile phone sellers into providing PII of the target user and exploited the instant message service on the user’s device, which helped him reset the password and access the victim’s account. Identify the type of attack performed by James in the above scenario.

A. DNS poisoning
B. Brute-force attack
C. Cross-site request forgery
D. OTP hijacking

A

Answer: D. OTP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following Java API framework blocks manages the data sharing between applications?

A. Activity manager
B. Notification manager
C. Content providers
D. Window manager

A

Answer: C. Content providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a native library used in the Android OS architecture and is meant for rendering fonts?

A. Libc
B. Surface Manager
C. Open Max AL
D. FreeType

A

Answer: D. FreeType

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following countermeasures helps in protecting an Android device from malicious users?

A. Do not directly download Android package (APK) files
B. Disable screen lock for the Android device
C. Install apps that invade privacy
D. Never block ads displayed by apps

A

Answer: A. Do not directly download Android package (APK) files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is an option in Android OS that is used to store private primitive data in key-value pairs?

A. External storage
B. Internal storage
C. SQLite databases
D. Shared preferences

A

Answer: D. Shared preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following practices is NOT a countermeasure to protect an Android device and the data stored on it from malicious users?

A. Enable the screen pinning option to securely access Android apps
B. Download apps only from official Android markets
C. Enable features such as SmartLock instead of passwords
D. Never root the Android device

A

Answer: C. Enable features such as SmartLock instead of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following processes allows Android users to attain privileged control within Android’s subsystem?

A. Warchalking
B. Data caching
C. Wardriving
D. Rooting

A

Answer: D. Rooting

26
Q

Which of the following tools is used to root the Android OS?

A. TunesGo
B. zANTI
C. LOIC
D. DroidSheep

A

Answer: A. TunesGo

27
Q

Which of the following browser applications encrypts your Internet traffic and then hides it by bouncing through a series of computers around the world?

A. Google Chrome
B. ORBOT
C. UC Browser
D. Mozilla FireFox

A

Answer: B. ORBOT

28
Q

Which of the following applications allows attackers to identify the target devices and block the access of Wi-Fi to the victim devices in a network?

A. DroidSheep
B. KingoRoot
C. Network Spoofer
D. NetCut

A

Answer: D. NetCut

29
Q

Which of the following android applications allows you to find, lock or erase a lost or stolen device?

A. Find My Device
B. X-Ray
C. Find My iPhone
D. Faceniff

A

Answer: A. Find My Device

30
Q

Which of the following native libraries in the Android OS architecture is meant for Internet security?

A. SSL
B. SQLite
C. WebKit and Blink
D. Open GL | ES

A

Answer: A. SSL

31
Q

Which of the following mobile applications is used to perform denial-of-service attacks?

A. DroidSheep
B. MTK droid
C. Low orbit ion cannon (LOIC)
D. Unrevoked

A

Answer: C. Low orbit ion cannon (LOIC)

32
Q

Which of the following practices is NOT a countermeasure to secure iOS devices?

A. Set separate passcodes for applications containing sensitive data
B. Do not jailbreak or root the device if used within enterprise environments
C. Install Vault apps to hide critical data stored on the iOS mobile device
D. Enable JavaScript and add-ons from the web browser

A

Answer: D. Enable JavaScript and add-ons from the web browser

33
Q

One of the following layers in Apple iOS contains low-level features on which most other technologies are based. Furthermore, frameworks in this layer are useful when dealing explicitly with security or communicating with external hardware and networks. Which is this layer?

A. Media
B. Core services
C. Cocoa application
D. Core OS

A

Answer: D. Core OS

34
Q

Which of the following is an online tool that allows attackers to hack a device remotely in an invisible mode without jailbreaking the device and access SMSes, call logs, app chats, GPS, etc.?

A. Spyzie
B. Cydia
C. Hexxa Plus
D. Apricot

A

Answer: A. Spyzie

35
Q

Which of the following iOS applications allows you to find, lock or erase a lost or stolen device?

A. X-Ray
B. Faceniff
C. Find My Device
D. Find My iPhone

A

Answer: D. Find My iPhone

36
Q

Which of the following Jailbreaking techniques will make the mobile device jailbroken after each reboot?

A. Untethered Jailbreaking
B. Semi-Tethered Jailbreaking
C. None of the Above
D. Tethered Jailbreaking

A

Answer: A. Untethered Jailbreaking

37
Q

By performing which of the following Jailbreaking techniques does a mobile device start up completely, and it will no longer have a patched kernel after a user turns the device off and back on?

A. None of the Above
B. Untethered Jailbreaking
C. Tethered Jailbreaking
D. Semi-Tethered Jailbreaking

A

Answer: D. Semi-Tethered Jailbreaking

38
Q

Which of the following processes is supposed to install a modified set of kernel patches that allows users to run third-party applications not signed by the OS vendor?

A. WarDriving
B. Spear-Phishing
C. Sandboxing
D. JailBreaking

A

Answer: D. JailBreaking

39
Q

Given below are the various steps associated with the method swizzling technique used by attackers to assess the security posture and identify the vulnerabilities of the target iOS application:

1.Run the application on the device.
2.Create a new method with customized functionalities.
3.Swap the functionality of the method by providing the new method reference to the Objective-C runtime.
Identify the existing method selector reference to be swapped.
4.Identify the correct sequence of steps involved in the method swizzling technique.

A. 2 → 4 → 3 → 1

B. 1 → 3 → 4 → 2

C. 4 → 2 → 3 → 1

D. 4 → 2 → 1 → 3

A

Answer: D. 4 → 2 → 1 → 3

40
Q

Chris, a professional hacker, was tasked with obtaining credentials and certificates from a target iOS device. For this purpose, Chris employed a tool to extract secrets such as passwords, certificates, and encryption keys from the target iOS device’s storage system. Identify the tool used by Chris in the above scenario.

A. ScanMyServer
B. N-Stalker X
C. CORE Impact
D. Keychain Dumper

A

Answer: D. Keychain Dumper

41
Q

Which of the following tools helps attackers perform method hooking on an iOS application at runtime and gain illegal access to the sensitive information stored on the device?

A. objection
B. iStumbler
C. Aircrack-ng Suite
D. Kismet

A

Answer: A. objection

42
Q

Which of the following tools is a web-based mirror operating system for all the latest iPhones?

A. Apricot
B. Hexxa Plus
C. Cydia
D. Spyzie

A

Answer: A. Apricot

43
Q

Which of the following tools is not used for iOS Jailbreaking?

A. Apricot
B. checkra1n
C. Magisk Manager
D. Yuxigon

A

Answer: C. Magisk Manager

44
Q

Which of the following statements is not true for securing iOS devices?

A. Do not jailbreak or root your device if used within enterprise environments
B. Disable Javascript and add-ons from web browser
C. Disable Jailbreak detection
D. Do not store sensitive data on client-side database

A

Answer: C. Disable Jailbreak detection

45
Q

Which of the following is a runtime manipulation tool used by attackers to exploit vulnerabilities in source code and modify functionality during iOS application runtime?

A. OpenOCD
B. SEMRush
C. cycript
D. Censys

A

Answer: C. cycript

46
Q

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

A. iBoot Exploit
B. None of the above
C. Bootrom Exploit
D. Userland Exploit

A

Answer: D. Userland Exploit

47
Q

Which of the following is the correct BYOD security guideline that an employee should follow to secure sensitive personal or corporate information stored on a mobile device?

A. Provide offline access to the organization’s sensitive information
B. Never control access based on a need-to-know basis
C. Do not allow jailbroken and rooted devices
D. Disable session authentication and the timeout policy on the access gateway

A

Answer: C. Do not allow jailbroken and rooted devices

48
Q

Which of the following is not a feature of Mobile Device Management Software?

A. Sharing confidential data among devices and networks
B. Remotely wipe data in the lost or stolen device
C. Enforce policies and track inventory
D. Perform real time monitoring and reporting

A

Answer: A. Sharing confidential data among devices and networks

49
Q

Which of the following is a Mobile Device Management Software?

A. iHound
B. Mobistealth
C. SpyBubble
D. VMware AirWatch

A

Answer: D. VMware AirWatch

50
Q

In order to avoid data loss from a mobile device, which of following Mobile Device Management security measures should you consider?

A. Configure Application certification rules
B. Enable Remote Management
C. Encrypt Storage
D. Perform periodic backup and synchronization

A

Answer: D. Perform periodic backup and synchronization

51
Q

Which of the following refers to a policy allowing an employee to bring his or her personal devices such as laptops, smartphones, and tablets to the workplace and using them for accessing the organization’s resources as per their access privileges?

A. Social Engineering
B. Spear-Phishing
C. BYOD
D. Phishing

A

Answer: C. BYOD

52
Q

John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network?

A. Providing support for many different devices
B. Not reporting a lost or stolen device
C. Improperly disposing of a device
D. Separating personal and private data

A

Answer: D. Separating personal and private data

53
Q

Which of the following tools helps security professionals reverse engineer third-party, closed, binary Android apps and allows them to decode resources to their original form and rebuild them after making some modifications?

A. FaceNiff
B. Promon Shield
C. Apktool
D. Lookout Personal

A

Answer: C. Apktool

54
Q

Which of the following is not a countermeasure for phishing attacks?

A. Disable the “block texts from the internet” feature from your provider
B. Never reply to a SMS that urges you to act or respond quickly
C. Review the bank’s policy on sending SMS
D. Do not click on any links included in the SMS

A

Answer: A. Disable the “block texts from the internet” feature from your provider

55
Q

Which of the following recommendations helps developers store critical data securely on an Android device?

A. Never derive keys using the passphrase provided by the user.
B. Employ a hardware-backed Android KeyStore to ensure the security of the data stored.
C. Use methods to store data in a readable format.
D. Ensure that the keys stored in the server can be accessed without proper authentication.

A

Answer: B. Employ a hardware-backed Android KeyStore to ensure the security of the data stored.

56
Q

Which of the following guidelines can help administrators secure the mobile devices connected to a corporate network?

A. Avoid publishing an enterprise policy for the cloud.
B. Use a management console to restrict access to open public Wi-Fi.
C. Avoid specifying a session timeout through Access Gateway.
D. Disable all the required security settings for mobile devices before issuing them to users.

A

Answer: B. Use a management console to restrict access to open public Wi-Fi.

57
Q

Which of the following practices makes mobile devices vulnerable to SMS phishing attacks?

A. Subscribe or sign-up using the links provided via SMS by any third-party vendor.
B. Review the bank’s SMS policy.
C. Do not fall for scams, gifts, and offers that seem unexpected.
D. Report any fraud SMS.

A

Answer: A. Subscribe or sign-up using the links provided via SMS by any third-party vendor.

58
Q

Identify the practice that makes Android devices susceptible to critical data exposure.

A. Employ authentication mechanisms such as patterns, PINs, passwords, and fingerprints.
B. Ensure that the master key and other keys are stored in the same location.
C. Implement authorization techniques to create and import keys.
D. Use encryption methods to store data in a non-readable format.

A

Answer: B. Ensure that the master key and other keys are stored in the same location.

59
Q

Identify the security practice that helps mobile users defend themselves against SMS phishing attempts.

A. Always click on any links included in SMS messages for checking.
B. Never save confidential, sensitive data such as credit card details, PINs, and passwords on mobile phones.
C. Disable the “block texts from the Internet” feature from your service provider.
D. Reply to SMS messages that urge you to act or respond quickly.

A

Answer: B. Never save confidential, sensitive data such as credit card details, PINs, and passwords on mobile phones.

60
Q

Which of the following guidelines must be followed to protect a mobile device from malicious attackers?

A. Do not share information within GPS-enabled apps unless necessary
B. Always load too many applications and auto-upload photos to social networks
C. Always connect to two separate networks such as Wi-Fi and Bluetooth simultaneously
D. Never install applications from trusted stores

A

Answer: A. Do not share information within GPS-enabled apps unless necessary