T4Tutorials .PK

NSCT – Wireless & Mobile Security MCQs

1. . Wireless and Mobile Security focuses on:

(A) Installing apps faster


(B) Protecting wireless networks and mobile devices from unauthorized access and attacks


(C) Deleting old messages


(D) Increasing battery life




2. . WPA2 is:

(A) A mobile device


(B) A type of malware


(C) A security protocol for Wi-Fi networks


(D) An encryption algorithm for files




3. . Which of the following is a common threat to wireless networks?

(A) Eavesdropping


(B) All of the above


(C) Man-in-the-Middle attacks


(D) Rogue access points




4. . WEP is considered:

(A) A VPN


(B) The most secure protocol


(C) A firewall


(D) An outdated and insecure Wi-Fi encryption protocol




5. . Man-in-the-Middle (MITM) attack in wireless networks occurs when:

(A) Devices connect to VPN


(B) Files are automatically deleted


(C) Network speed increases


(D) An attacker intercepts communication between devices




6. . VPN (Virtual Private Network) helps in wireless security by:

(A) Increasing device speed


(B) Deleting old emails


(C) Encrypting internet traffic and hiding the user's IP


(D) Compressing files




7. . Mobile malware includes:

(A) Firewalls


(B) Only antivirus programs


(C) Only VPN apps


(D) Spyware, Trojans, ransomware




8. . Bluetooth security threats include:

(A) Bluejacking and Bluesnarfing


(B) Email phishing


(C) SQL Injection


(D) Cross-Site Scripting




9. . Mobile device management (MDM) is used to:

(A) Increase device storage


(B) Secure, monitor, and manage mobile devices


(C) Encrypt files automatically


(D) Delete apps




10. . Two-Factor Authentication (2FA) on mobile devices provides:

(A) Increased network speed


(B) Faster battery charging


(C) Automatic app updates


(D) Extra layer of security during login




11. . Rogue access points are:

(A) Firewalls


(B) Authorized routers


(C) Unauthorized Wi-Fi access points set up to capture user data


(D) Encryption algorithms




12. . Mobile device encryption helps to:

(A) Delete all apps


(B) Protect sensitive data if the device is lost or stolen


(C) Increase internet speed


(D) Compress files automatically




13. . Wi-Fi Protected Setup (WPS) vulnerability can allow:

(A) Faster connection speeds


(B) Attackers to gain unauthorized access to Wi-Fi networks


(C) Free internet


(D) Better signal strength




14. . Mobile phishing attacks aim to:

(A) Delete malware


(B) Increase battery life


(C) Trick users into revealing sensitive information like passwords


(D) Encrypt device automatically




15. . Session hijacking on mobile devices occurs when:

(A) An attacker takes over a user's session with an app or website


(B) Files are deleted automatically


(C) Battery drains fast


(D) Network speed increases




16. . IMEI (International Mobile Equipment Identity) is used to:

(A) Identify mobile devices uniquely


(B) Encrypt emails


(C) Increase internet speed


(D) Backup apps




17. . Mobile application security focuses on:

(A) Increasing battery performance


(B) Installing apps faster


(C) Deleting apps automatically


(D) Protecting apps from vulnerabilities, malware, and unauthorized access




18. . Hotspot attacks occur when:

(A) Apps crash


(B) Devices overheat


(C) Battery drains quickly


(D) Attackers exploit unsecured public Wi-Fi to steal data




19. . The principle of least privilege in mobile security ensures:

(A) Apps and users have only the permissions necessary to perform their functions


(B) Full access to all apps


(C) Free internet


(D) Automatic updates




20. . The main goal of wireless and mobile security is to:

(A) Increase battery life


(B) Ensure confidentiality, integrity, and availability of mobile and wireless resources


(C) Compress files


(D) Improve signal strength only




Exit mobile version