quiz image

Mobile Device Security: Malware and Attacks

LegendaryDecagon avatar
LegendaryDecagon
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What is the primary goal of a mobile malware that aims to send messages on victim's phones?

To generate revenues for hackers

What is a vulnerability of smartphone browsers and web-supported apps?

Vulnerability to scripting attacks

What is an example of how hackers can exploit non-obvious devices in corporate networks?

By accessing a printer's inbuilt memory function

What is the name of the malware that was discovered in September 2017?

BlueBorne

What is the purpose of the 'Weeping Angel' malware?

To spy on people in a room by recording their conversations

What could be a consequence of a data manipulation attack on a bank?

Customer balances would be incorrectly calculated

What was the result of the hackers' tweet on the Associated Press's Twitter account?

The Dow dropped by 150 points

What type of attack involves installing backdoors in network devices?

Backdoor attack

What is a potential motive for hackers to launch a data manipulation attack on a company?

To bring down a competitor

What type of data can be compromised by data manipulation attacks?

Healthcare, financial, and government data

What is the success rate of spear phishing attacks?

70%

What is the primary goal of a water holing attack?

To infect a group of people with malware

What is the main tactic used in baiting attacks?

Leaving infected storage devices in public places

What is the purpose of a rootkit virus in a baiting attack?

To infect computers when they boot

What is the name of the attack strategy that involves infecting a website or network used by a specific group of people?

Water holing

What do attackers typically gain from an external reconnaissance?

Insight into user behavior

What is the primary goal of extortion attacks?

To demand money or ransom

What was the purpose of the Mirai attack?

To commandeer large networks of IoT devices to generate vast illegitimate traffic

What is the name of the ransomware attack that requires a payment of $300 within 72 hours?

WannaCry

Why are IoT devices vulnerable to attacks?

Because manufacturers have not prioritized their security and users often leave them with default security configurations

What is the term for holding computer files for ransom?

Ransomware

What is a potential consequence of the backdoor being discovered in the firewall?

It will likely lead to more extensive use of similar backdoors by hackers

What is the current trend in hacking techniques?

They are becoming more sophisticated

What type of attack was the Mirai attack?

A type of distributed denial of service (DDoS) attack

Why are backdoors similar to the one discovered in the firewall a threat?

Because they are hard to find and can be extensively used by hackers

What happens to the money after 7 days in WannaCry ransomware attacks?

It becomes double and permanently locked

What was the consequence of the failed extortion attempt in the Ashley Madison incident?

The user data of millions of people was exposed

What did the hacker do with the user data in the United Arab Emirates bank incident?

Released the data to the public

What is a characteristic of data manipulation attacks?

It is difficult to detect

Why do hackers prefer to negotiate with owners of valuable data?

Because they can negotiate for more money

What is the main reason behind the high success rate of baiting in social engineering?

Human nature to be greedy or curious

What is quid pro quo commonly used for in social engineering attacks?

Offering technical assistance in exchange for access

What is the primary goal of tailgating in social engineering attacks?

Gaining physical access to a restricted area

What is the key difference between internal and external reconnaissance?

Internal reconnaissance is done onsite, while external is done remotely

What is the purpose of internal reconnaissance in social engineering attacks?

To identify vulnerabilities in an organization's network

What makes quid pro quo attacks less successful compared to other social engineering tactics?

They have a low success rate due to low-level attackers

What is the primary goal of baiting attacks in social engineering?

To exploit human nature and gain access to a restricted area

How do attackers often carry out quid pro quo attacks?

By calling victims and claiming to be from technical support

What is the primary characteristic of tailgating attacks in social engineering?

They involve an attacker gaining unauthorized access to a restricted area

Why are internal reconnaissance attacks often aided by software tools?

To interact with the target systems and find vulnerabilities

Learn about the increasing threats of mobile device attacks, including malware that can steal personal information and send messages on victims' phones. Test your knowledge of mobile security risks and how to protect yourself.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser