Wireless and mobile security Flashcards
Eavesdropping is a security threat to WiFi security
trueP2 L11
Injecting bogus messages is a threat to WiFi security
trueP2 L11
Replaying previously recorded messages is a threat to WiFi security
trueP2 L11
Illegitimate access to the network and its services is a threat to WiFi securty
trueP2 L11
Denial-of-service is a threat to Wifi security
trueP2 L11
What are the security threats to WiFi?
Eavesdroppinginjecting bogus messagesreplaying previously recorded messagesillegitimate access to the network and its servicesdenial of serviceP2 L11
_____ is the security standard that should be used for WiFi
WPA2P2 L11
What are the 3 operating systems with the most vulnerabilities in 2014?
Apple Mac OS XApple iOSLinux Kernel
In iOS, all cryptographic keys are stored in flash memory
falseP2 L11
in iOS, trusted boot can verify the kernel before it is run
trueP2 L11
in iOS, all files of an app are encrypted using the same key
falseP2 L11
How were researches able to bypass Apple’s App Store security in 2013?
Uploaded an app that morphed into malware after it passed the review process.P2 L11
What weakness were exploited by researchers in the Apple apps security in 2015?
The malware was uploadable to the Apple Apps storeThe malware was able to bypass Sandbox securityThe malware was able to hijack browser extensions and collect passwordsP2 L11
in iOS, each app runs in a sandbox and has its own home directory for its files
trueP2 L11
All iOS apps must be reviewed and approved by Apple
trueP2 L11