Mobile Device Security: Malware and Attacks
40 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of a mobile malware that aims to send messages on victim's phones?

  • To steal personal information from the victim's device
  • To install additional malware on the device
  • To crash the victim's phone
  • To generate revenues for hackers (correct)
  • What is a vulnerability of smartphone browsers and web-supported apps?

  • Lack of antivirus software
  • Limited storage capacity
  • Vulnerability to scripting attacks (correct)
  • Insufficient battery life
  • What is an example of how hackers can exploit non-obvious devices in corporate networks?

  • Via ransomware attacks
  • Through phishing emails
  • By accessing a printer's inbuilt memory function (correct)
  • Using diversion theft
  • What is the name of the malware that was discovered in September 2017?

    <p>BlueBorne</p> Signup and view all the answers

    What is the purpose of the 'Weeping Angel' malware?

    <p>To spy on people in a room by recording their conversations</p> Signup and view all the answers

    What could be a consequence of a data manipulation attack on a bank?

    <p>Customer balances would be incorrectly calculated</p> Signup and view all the answers

    What was the result of the hackers' tweet on the Associated Press's Twitter account?

    <p>The Dow dropped by 150 points</p> Signup and view all the answers

    What type of attack involves installing backdoors in network devices?

    <p>Backdoor attack</p> Signup and view all the answers

    What is a potential motive for hackers to launch a data manipulation attack on a company?

    <p>To bring down a competitor</p> Signup and view all the answers

    What type of data can be compromised by data manipulation attacks?

    <p>Healthcare, financial, and government data</p> Signup and view all the answers

    What is the success rate of spear phishing attacks?

    <p>70%</p> Signup and view all the answers

    What is the primary goal of a water holing attack?

    <p>To infect a group of people with malware</p> Signup and view all the answers

    What is the main tactic used in baiting attacks?

    <p>Leaving infected storage devices in public places</p> Signup and view all the answers

    What is the purpose of a rootkit virus in a baiting attack?

    <p>To infect computers when they boot</p> Signup and view all the answers

    What is the name of the attack strategy that involves infecting a website or network used by a specific group of people?

    <p>Water holing</p> Signup and view all the answers

    What do attackers typically gain from an external reconnaissance?

    <p>Insight into user behavior</p> Signup and view all the answers

    What is the primary goal of extortion attacks?

    <p>To demand money or ransom</p> Signup and view all the answers

    What was the purpose of the Mirai attack?

    <p>To commandeer large networks of IoT devices to generate vast illegitimate traffic</p> Signup and view all the answers

    What is the name of the ransomware attack that requires a payment of $300 within 72 hours?

    <p>WannaCry</p> Signup and view all the answers

    Why are IoT devices vulnerable to attacks?

    <p>Because manufacturers have not prioritized their security and users often leave them with default security configurations</p> Signup and view all the answers

    What is the term for holding computer files for ransom?

    <p>Ransomware</p> Signup and view all the answers

    What is a potential consequence of the backdoor being discovered in the firewall?

    <p>It will likely lead to more extensive use of similar backdoors by hackers</p> Signup and view all the answers

    What is the current trend in hacking techniques?

    <p>They are becoming more sophisticated</p> Signup and view all the answers

    What type of attack was the Mirai attack?

    <p>A type of distributed denial of service (DDoS) attack</p> Signup and view all the answers

    Why are backdoors similar to the one discovered in the firewall a threat?

    <p>Because they are hard to find and can be extensively used by hackers</p> Signup and view all the answers

    What happens to the money after 7 days in WannaCry ransomware attacks?

    <p>It becomes double and permanently locked</p> Signup and view all the answers

    What was the consequence of the failed extortion attempt in the Ashley Madison incident?

    <p>The user data of millions of people was exposed</p> Signup and view all the answers

    What did the hacker do with the user data in the United Arab Emirates bank incident?

    <p>Released the data to the public</p> Signup and view all the answers

    What is a characteristic of data manipulation attacks?

    <p>It is difficult to detect</p> Signup and view all the answers

    Why do hackers prefer to negotiate with owners of valuable data?

    <p>Because they can negotiate for more money</p> Signup and view all the answers

    What is the main reason behind the high success rate of baiting in social engineering?

    <p>Human nature to be greedy or curious</p> Signup and view all the answers

    What is quid pro quo commonly used for in social engineering attacks?

    <p>Offering technical assistance in exchange for access</p> Signup and view all the answers

    What is the primary goal of tailgating in social engineering attacks?

    <p>Gaining physical access to a restricted area</p> Signup and view all the answers

    What is the key difference between internal and external reconnaissance?

    <p>Internal reconnaissance is done onsite, while external is done remotely</p> Signup and view all the answers

    What is the purpose of internal reconnaissance in social engineering attacks?

    <p>To identify vulnerabilities in an organization's network</p> Signup and view all the answers

    What makes quid pro quo attacks less successful compared to other social engineering tactics?

    <p>They have a low success rate due to low-level attackers</p> Signup and view all the answers

    What is the primary goal of baiting attacks in social engineering?

    <p>To exploit human nature and gain access to a restricted area</p> Signup and view all the answers

    How do attackers often carry out quid pro quo attacks?

    <p>By calling victims and claiming to be from technical support</p> Signup and view all the answers

    What is the primary characteristic of tailgating attacks in social engineering?

    <p>They involve an attacker gaining unauthorized access to a restricted area</p> Signup and view all the answers

    Why are internal reconnaissance attacks often aided by software tools?

    <p>To interact with the target systems and find vulnerabilities</p> Signup and view all the answers

    More Like This

    Mobile Malware Detection Quiz
    16 questions
    Spyware and Mobile Devices Security
    5 questions
    Use Quizgecko on...
    Browser
    Browser