NSCT – Wireless & Mobile Security MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Wireless and Mobile Security focuses on: (A) Installing apps faster (B) Protecting wireless networks and mobile devices from unauthorized access and attacks (C) Deleting old messages (D) Increasing battery lifeShow All AnswersShow All Answers 2. . WPA2 is: (A) A mobile device (B) A type of malware (C) A security protocol for Wi-Fi networks (D) An encryption algorithm for filesShow All Answers 3. . Which of the following is a common threat to wireless networks? (A) Eavesdropping (B) All of the above (C) Man-in-the-Middle attacks (D) Rogue access pointsShow All Answers 4. . WEP is considered: (A) A VPN (B) The most secure protocol (C) A firewall (D) An outdated and insecure Wi-Fi encryption protocolShow All Answers 5. . Man-in-the-Middle (MITM) attack in wireless networks occurs when: (A) Devices connect to VPN (B) Files are automatically deleted (C) Network speed increases (D) An attacker intercepts communication between devicesShow All Answers 6. . VPN (Virtual Private Network) helps in wireless security by: (A) Increasing device speed (B) Deleting old emails (C) Encrypting internet traffic and hiding the user's IP (D) Compressing filesShow All Answers 7. . Mobile malware includes: (A) Firewalls (B) Only antivirus programs (C) Only VPN apps (D) Spyware, Trojans, ransomwareShow All Answers 8. . Bluetooth security threats include: (A) Bluejacking and Bluesnarfing (B) Email phishing (C) SQL Injection (D) Cross-Site ScriptingShow All Answers 9. . Mobile device management (MDM) is used to: (A) Increase device storage (B) Secure, monitor, and manage mobile devices (C) Encrypt files automatically (D) Delete appsShow All Answers 10. . Two-Factor Authentication (2FA) on mobile devices provides: (A) Increased network speed (B) Faster battery charging (C) Automatic app updates (D) Extra layer of security during loginShow All Answers 11. . Rogue access points are: (A) Firewalls (B) Authorized routers (C) Unauthorized Wi-Fi access points set up to capture user data (D) Encryption algorithmsShow All Answers 12. . Mobile device encryption helps to: (A) Delete all apps (B) Protect sensitive data if the device is lost or stolen (C) Increase internet speed (D) Compress files automaticallyShow All Answers 13. . Wi-Fi Protected Setup (WPS) vulnerability can allow: (A) Faster connection speeds (B) Attackers to gain unauthorized access to Wi-Fi networks (C) Free internet (D) Better signal strengthShow All Answers 14. . Mobile phishing attacks aim to: (A) Delete malware (B) Increase battery life (C) Trick users into revealing sensitive information like passwords (D) Encrypt device automaticallyShow All Answers 15. . Session hijacking on mobile devices occurs when: (A) An attacker takes over a user's session with an app or website (B) Files are deleted automatically (C) Battery drains fast (D) Network speed increasesShow All Answers 16. . IMEI (International Mobile Equipment Identity) is used to: (A) Identify mobile devices uniquely (B) Encrypt emails (C) Increase internet speed (D) Backup appsShow All Answers 17. . Mobile application security focuses on: (A) Increasing battery performance (B) Installing apps faster (C) Deleting apps automatically (D) Protecting apps from vulnerabilities, malware, and unauthorized accessShow All Answers 18. . Hotspot attacks occur when: (A) Apps crash (B) Devices overheat (C) Battery drains quickly (D) Attackers exploit unsecured public Wi-Fi to steal dataShow All Answers 19. . The principle of least privilege in mobile security ensures: (A) Apps and users have only the permissions necessary to perform their functions (B) Full access to all apps (C) Free internet (D) Automatic updatesShow All Answers 20. . The main goal of wireless and mobile security is to: (A) Increase battery life (B) Ensure confidentiality, integrity, and availability of mobile and wireless resources (C) Compress files (D) Improve signal strength onlyShow All Answers