1. . Wireless and Mobile Security focuses on:
(A) Installing apps faster
(B) Protecting wireless networks and mobile devices from unauthorized access and attacks
(C) Deleting old messages
(D) Increasing battery life
2. . WPA2 is:
(A) A mobile device
(B) A type of malware
(C) A security protocol for Wi-Fi networks
(D) An encryption algorithm for files
3. . Which of the following is a common threat to wireless networks?
(A) Eavesdropping
(B) All of the above
(C) Man-in-the-Middle attacks
(D) Rogue access points
4. . WEP is considered:
(A) A VPN
(B) The most secure protocol
(C) A firewall
(D) An outdated and insecure Wi-Fi encryption protocol
5. . Man-in-the-Middle (MITM) attack in wireless networks occurs when:
(A) Devices connect to VPN
(B) Files are automatically deleted
(C) Network speed increases
(D) An attacker intercepts communication between devices
6. . VPN (Virtual Private Network) helps in wireless security by:
(A) Increasing device speed
(B) Deleting old emails
(C) Encrypting internet traffic and hiding the user's IP
(D) Compressing files
7. . Mobile malware includes:
(A) Firewalls
(B) Only antivirus programs
(C) Only VPN apps
(D) Spyware, Trojans, ransomware
8. . Bluetooth security threats include:
(A) Bluejacking and Bluesnarfing
(B) Email phishing
(C) SQL Injection
(D) Cross-Site Scripting
9. . Mobile device management (MDM) is used to:
(A) Increase device storage
(B) Secure, monitor, and manage mobile devices
(C) Encrypt files automatically
(D) Delete apps
10. . Two-Factor Authentication (2FA) on mobile devices provides:
(A) Increased network speed
(B) Faster battery charging
(C) Automatic app updates
(D) Extra layer of security during login
11. . Rogue access points are:
(A) Firewalls
(B) Authorized routers
(C) Unauthorized Wi-Fi access points set up to capture user data
(D) Encryption algorithms
12. . Mobile device encryption helps to:
(A) Delete all apps
(B) Protect sensitive data if the device is lost or stolen
(C) Increase internet speed
(D) Compress files automatically
13. . Wi-Fi Protected Setup (WPS) vulnerability can allow:
(A) Faster connection speeds
(B) Attackers to gain unauthorized access to Wi-Fi networks
(C) Free internet
(D) Better signal strength
14. . Mobile phishing attacks aim to:
(A) Delete malware
(B) Increase battery life
(C) Trick users into revealing sensitive information like passwords
(D) Encrypt device automatically
15. . Session hijacking on mobile devices occurs when:
(A) An attacker takes over a user's session with an app or website
(B) Files are deleted automatically
(C) Battery drains fast
(D) Network speed increases
16. . IMEI (International Mobile Equipment Identity) is used to:
(A) Identify mobile devices uniquely
(B) Encrypt emails
(C) Increase internet speed
(D) Backup apps
17. . Mobile application security focuses on:
(A) Increasing battery performance
(B) Installing apps faster
(C) Deleting apps automatically
(D) Protecting apps from vulnerabilities, malware, and unauthorized access
18. . Hotspot attacks occur when:
(A) Apps crash
(B) Devices overheat
(C) Battery drains quickly
(D) Attackers exploit unsecured public Wi-Fi to steal data
19. . The principle of least privilege in mobile security ensures:
(A) Apps and users have only the permissions necessary to perform their functions
(B) Full access to all apps
(C) Free internet
(D) Automatic updates
20. . The main goal of wireless and mobile security is to:
(A) Increase battery life
(B) Ensure confidentiality, integrity, and availability of mobile and wireless resources
(C) Compress files
(D) Improve signal strength only