
History of iPhone Attacks
Interactive Video
•
Information Technology (IT), Architecture, Business, Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the main vulnerability in iOS version 1 that allowed remote access through malicious websites?
Ike Worm
SMS vulnerability
Libtif vulnerability
XcodeGhost
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which vulnerability in iOS version 2 allowed attackers to exploit the SMS manager program?
Libtif vulnerability
SMS vulnerability
Ike Worm
Storm 8 breach
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was a common security risk associated with jailbreaking iOS devices?
Battery drain
Data loss
Bypassing security controls
Installing malicious apps
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the name of the malware that repackaged Xcode in 2015?
Storm 8
Ike Worm
XcodeGhost
Pegasus
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which spyware discovered in 2021 exploited zero-click vulnerabilities to control iOS devices?
Libtif
Ike Worm
Pegasus
XcodeGhost
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
3 questions
IMF Chief Wants Trust for Middle-Income Nations Set by Year-End
Interactive video
•
University
3 questions
Former Envoy Says Australia Adaptable, Wants Open Markets
Interactive video
•
University
3 questions
As Virus Sends Ripples Through Markets, How Are Currencies Affected?
Interactive video
•
University
2 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-What is Covered in This Course?
Interactive video
•
University
2 questions
Complete Python Scripting for Automation - Introduction to OS Module and Basic operation
Interactive video
•
University
2 questions
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation
Interactive video
•
University
2 questions
The Rise of Fake News
Interactive video
•
University
2 questions
Java Programming for Complete Beginners - Java 16 - Step 01 - Overview of the Java Platform - an Introduction - java, ja
Interactive video
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University