Mobile Device Security: Malware and Attacks
40 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of a mobile malware that aims to send messages on victim's phones?

  • To steal personal information from the victim's device
  • To install additional malware on the device
  • To crash the victim's phone
  • To generate revenues for hackers (correct)

What is a vulnerability of smartphone browsers and web-supported apps?

  • Lack of antivirus software
  • Limited storage capacity
  • Vulnerability to scripting attacks (correct)
  • Insufficient battery life

What is an example of how hackers can exploit non-obvious devices in corporate networks?

  • Via ransomware attacks
  • Through phishing emails
  • By accessing a printer's inbuilt memory function (correct)
  • Using diversion theft

What is the name of the malware that was discovered in September 2017?

<p>BlueBorne (B)</p> Signup and view all the answers

What is the purpose of the 'Weeping Angel' malware?

<p>To spy on people in a room by recording their conversations (C)</p> Signup and view all the answers

What could be a consequence of a data manipulation attack on a bank?

<p>Customer balances would be incorrectly calculated (B)</p> Signup and view all the answers

What was the result of the hackers' tweet on the Associated Press's Twitter account?

<p>The Dow dropped by 150 points (A)</p> Signup and view all the answers

What type of attack involves installing backdoors in network devices?

<p>Backdoor attack (B)</p> Signup and view all the answers

What is a potential motive for hackers to launch a data manipulation attack on a company?

<p>To bring down a competitor (D)</p> Signup and view all the answers

What type of data can be compromised by data manipulation attacks?

<p>Healthcare, financial, and government data (D)</p> Signup and view all the answers

What is the success rate of spear phishing attacks?

<p>70% (D)</p> Signup and view all the answers

What is the primary goal of a water holing attack?

<p>To infect a group of people with malware (A)</p> Signup and view all the answers

What is the main tactic used in baiting attacks?

<p>Leaving infected storage devices in public places (B)</p> Signup and view all the answers

What is the purpose of a rootkit virus in a baiting attack?

<p>To infect computers when they boot (D)</p> Signup and view all the answers

What is the name of the attack strategy that involves infecting a website or network used by a specific group of people?

<p>Water holing (D)</p> Signup and view all the answers

What do attackers typically gain from an external reconnaissance?

<p>Insight into user behavior (D)</p> Signup and view all the answers

What is the primary goal of extortion attacks?

<p>To demand money or ransom (C)</p> Signup and view all the answers

What was the purpose of the Mirai attack?

<p>To commandeer large networks of IoT devices to generate vast illegitimate traffic (C)</p> Signup and view all the answers

What is the name of the ransomware attack that requires a payment of $300 within 72 hours?

<p>WannaCry (D)</p> Signup and view all the answers

Why are IoT devices vulnerable to attacks?

<p>Because manufacturers have not prioritized their security and users often leave them with default security configurations (D)</p> Signup and view all the answers

What is the term for holding computer files for ransom?

<p>Ransomware (C)</p> Signup and view all the answers

What is a potential consequence of the backdoor being discovered in the firewall?

<p>It will likely lead to more extensive use of similar backdoors by hackers (D)</p> Signup and view all the answers

What is the current trend in hacking techniques?

<p>They are becoming more sophisticated (C)</p> Signup and view all the answers

What type of attack was the Mirai attack?

<p>A type of distributed denial of service (DDoS) attack (D)</p> Signup and view all the answers

Why are backdoors similar to the one discovered in the firewall a threat?

<p>Because they are hard to find and can be extensively used by hackers (A)</p> Signup and view all the answers

What happens to the money after 7 days in WannaCry ransomware attacks?

<p>It becomes double and permanently locked (B)</p> Signup and view all the answers

What was the consequence of the failed extortion attempt in the Ashley Madison incident?

<p>The user data of millions of people was exposed (B)</p> Signup and view all the answers

What did the hacker do with the user data in the United Arab Emirates bank incident?

<p>Released the data to the public (B)</p> Signup and view all the answers

What is a characteristic of data manipulation attacks?

<p>It is difficult to detect (A)</p> Signup and view all the answers

Why do hackers prefer to negotiate with owners of valuable data?

<p>Because they can negotiate for more money (B)</p> Signup and view all the answers

What is the main reason behind the high success rate of baiting in social engineering?

<p>Human nature to be greedy or curious (C)</p> Signup and view all the answers

What is quid pro quo commonly used for in social engineering attacks?

<p>Offering technical assistance in exchange for access (B)</p> Signup and view all the answers

What is the primary goal of tailgating in social engineering attacks?

<p>Gaining physical access to a restricted area (D)</p> Signup and view all the answers

What is the key difference between internal and external reconnaissance?

<p>Internal reconnaissance is done onsite, while external is done remotely (A)</p> Signup and view all the answers

What is the purpose of internal reconnaissance in social engineering attacks?

<p>To identify vulnerabilities in an organization's network (C)</p> Signup and view all the answers

What makes quid pro quo attacks less successful compared to other social engineering tactics?

<p>They have a low success rate due to low-level attackers (B)</p> Signup and view all the answers

What is the primary goal of baiting attacks in social engineering?

<p>To exploit human nature and gain access to a restricted area (D)</p> Signup and view all the answers

How do attackers often carry out quid pro quo attacks?

<p>By calling victims and claiming to be from technical support (B)</p> Signup and view all the answers

What is the primary characteristic of tailgating attacks in social engineering?

<p>They involve an attacker gaining unauthorized access to a restricted area (A)</p> Signup and view all the answers

Why are internal reconnaissance attacks often aided by software tools?

<p>To interact with the target systems and find vulnerabilities (D)</p> Signup and view all the answers

More Like This

Spyware and Mobile Devices Security
5 questions
Mobile Device Security Threats
16 questions
Use Quizgecko on...
Browser
Browser