Wireless and mobile security Flashcards

1
Q

Eavesdropping is a security threat to WiFi security

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Injecting bogus messages is a threat to WiFi security

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Replaying previously recorded messages is a threat to WiFi security

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Illegitimate access to the network and its services is a threat to WiFi securty

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial-of-service is a threat to Wifi security

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the security threats to WiFi?

A

Eavesdroppinginjecting bogus messagesreplaying previously recorded messagesillegitimate access to the network and its servicesdenial of serviceP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is the security standard that should be used for WiFi

A

WPA2P2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 operating systems with the most vulnerabilities in 2014?

A

Apple Mac OS XApple iOSLinux Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In iOS, all cryptographic keys are stored in flash memory

A

falseP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in iOS, trusted boot can verify the kernel before it is run

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in iOS, all files of an app are encrypted using the same key

A

falseP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How were researches able to bypass Apple’s App Store security in 2013?

A

Uploaded an app that morphed into malware after it passed the review process.P2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What weakness were exploited by researchers in the Apple apps security in 2015?

A

The malware was uploadable to the Apple Apps storeThe malware was able to bypass Sandbox securityThe malware was able to hijack browser extensions and collect passwordsP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in iOS, each app runs in a sandbox and has its own home directory for its files

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All iOS apps must be reviewed and approved by Apple

A

trueP2 L11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

iOS apps can be self-signed by app developers

A

falseP2 L11

17
Q

Android apps can be self-signed

A

trueP2 L11

18
Q

Android apps can have more powerful permissions than iOS apps

A

trueP2 L11