mobile hacking

mobile hacking

1st Grade

8 Qs

quiz-placeholder

Similar activities

2nd and 3rd grade vocab

2nd and 3rd grade vocab

1st - 2nd Grade

8 Qs

PKPB week 10

PKPB week 10

1st - 5th Grade

9 Qs

Mobile  Ad Hoc Network

Mobile Ad Hoc Network

1st Grade

10 Qs

Komputer dan Jaringan Dasar

Komputer dan Jaringan Dasar

1st - 10th Grade

13 Qs

Networking Vocab

Networking Vocab

KG - University

10 Qs

DFS4143 Chapter 1 Quiz

DFS4143 Chapter 1 Quiz

1st - 5th Grade

10 Qs

R001 - Network Devices

R001 - Network Devices

1st - 9th Grade

12 Qs

CONFIGURATION OF CLIENT DEVICE SYSTEM QUIZ

CONFIGURATION OF CLIENT DEVICE SYSTEM QUIZ

1st - 12th Grade

10 Qs

mobile hacking

mobile hacking

Assessment

Quiz

Computers

1st Grade

Hard

Created by

Shafinaz Fauzi

Used 49+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The picture show

mobile economy

mobile ecosystem

mobile ecodynamic

mobile service

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mobile THREAT can be in which vector? (Choose two)

device

provider

network

internet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CHOOSE network behaviors and configuration for mobile risk.

malicious apps can steal info, damage devices, and give unauthorized remote access

USB debugging for android or installing apps from non-official app stores

threats include malicious URLs opened from phishing emails or SMS messages

misconfigure routers, unknown captive portals, or content filtering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

- Set a voicemail password.

- Configure access so that entering the password is required from all phones.


The countermeasure refer to __________________

Rouge Station

Rogue Mobile Device

Rogue Femtocell

Voicemail

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is FEMTOCELL

a device you purchase to boost mobile pictures

a device you purchase to boost mobile storage

a device you purchase to boost mobile phone signal.

a device you purchase to boost hacking signal

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

CHOOSE two countermeasure for ROUGE STATION

It's up to the carriers to authenticate their networks

There's nothing an end-user can do, meaning, there’s nothing that you and I can do.

Networks need to authenticate themselves to the handsets reliably

SIP and IPsec allow for strong authentication

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

CHOOSE three things needed by network for rouge network device detection

Periodic scanning

fast reply

Continuous monitoring

Immediate alerting

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There are multiple ways rogue devices can connect to your network except

Employee-owned devices

second-party vendors

shadow it

Lack of device visibility