Trivia Quiz: Do You Know About Mobile And Wireless Networks Security?

50 Questions | Total Attempts: 58

SettingsSettingsSettings
Please wait...
Trivia Quiz: Do You Know About Mobile And Wireless Networks Security?

Do You Know About Mobile And Wireless Networks Security? If you own a mobile phone that does not have access to the internet, there is much that you will miss out on as a lot of things are happening online. How do you keep your data secure while using the wireless network? The quiz below will help you learn a thing or two about using wireless networks


Questions and Answers
  • 1. 
    TDMA Stands for
    • A. 

      Time Division Multiple Access

    • B. 

      Time Division Mono Application

    • C. 

      Time Data Multiple Authority

    • D. 

      Non of the above

  • 2. 
    EXPLOITS DEPEND ON
    • A. 

      OS AND THEIR CONFIGURATION

    • B. 

      LAN

    • C. 

      SOFTWARE CONFIGURATION

    • D. 

      ALL OF THE ABOVE

  • 3. 
    Registry key can be altered directly with?
    • A. 

      Control Panel

    • B. 

      Registry Editor

    • C. 

      Key Editor

    • D. 

      Control Editor

  • 4. 
    Forensic Examiners are interested in following file because these contain portions of all documents and other materials a user produce while using the computer ?
    • A. 

      Temporary

    • B. 

      Swap

    • C. 

      Slack

    • D. 

      Unallocated

  • 5. 
    Which of the following are the two primary U.S.Laws that address Cybercrime?
    • A. 

      1030 and 2701

    • B. 

      2510 and 1029

    • C. 

      2510 and 2701

    • D. 

      1029 and 1030

  • 6. 
    An access token dose not contain?
    • A. 

      Security identifier

    • B. 

      Group identifier

    • C. 

      Date and time

    • D. 

      User rights and permissions

  • 7. 
    Power-On Passwords are function of
    • A. 

      Computer Hardware

    • B. 

      Operating System Software

    • C. 

      Application Software

    • D. 

      Peripherals

  • 8. 
    Which element of the Intellectual property law provides the creator of a work exclusive right for 17 Years?
    • A. 

      Patent

    • B. 

      Copyright

    • C. 

      Trade secret

    • D. 

      Trademark

  • 9. 
    Digital certificates are used in the IPSec connection, What type of network infrastructure device issue digital certificate?
    • A. 

      SECP

    • B. 

      ACS

    • C. 

      SA

    • D. 

      CA

  • 10. 
    CDMA stand for
    • A. 

      Code data multiple access

    • B. 

      Code division multiple access

    • C. 

      Code data management authority

    • D. 

      None of the above

  • 11. 
    At which layer of the OSI communication model dose bridge operate?
    • A. 

      Transport

    • B. 

      Datalink

    • C. 

      Network

    • D. 

      Physical

  • 12. 
    Which of the following federal Law makes it a crime to knowingly and intentionally use cellular telephones that are altered or have been cloned?
    • A. 

      18 USC 2701

    • B. 

      18 USC 2511

    • C. 

      18 USC 2319

    • D. 

      18 USC 1029

  • 13. 
    Forensic ToolKit (FTK) is a?
    • A. 

      Software

    • B. 

      Hardware

    • C. 

      Both Hardware as well as Software

    • D. 

      None

  • 14. 
    FAT stands for
    • A. 

      File allocation tables

    • B. 

      Forensic analysis tool

    • C. 

      File allocation transfer

    • D. 

      Format allocation test

  • 15. 
    Which of the following is evidence that is not based on personal knowledge but that was told to the witness?
    • A. 

      Best evidence

    • B. 

      Secondary evidence

    • C. 

      Conclusive evidence

    • D. 

      Hearsay evidence

  • 16. 
    CDMA 2000-1x is network, which achieves data rates up to ...
    • A. 

      4.2mbit/s

    • B. 

      3.6mbit/s

    • C. 

      2.4mbit/s

    • D. 

      3.8mbit/s

  • 17. 
    International roaming is not a problem for
    • A. 

      CDMA

    • B. 

      GSM

    • C. 

      FOR BOTH

    • D. 

      NONE OF THE ABOVE

  • 18. 
    ACL in the NT Security environment stands for
    • A. 

      Axis Control List

    • B. 

      Area Control List

    • C. 

      Account Control LIst

    • D. 

      None of these

  • 19. 
    Enhanced GPRS can provide a maximum data rate of _______ by using eight-time slots.
    • A. 

      275 kbps

    • B. 

      115 kbps

    • C. 

      144 kbps

    • D. 

      384 kbps

  • 20. 
    The term DDoS expands to _______.
    • A. 

      Divisive Denial of Service

    • B. 

      Distributed Denial of Service

    • C. 

      Detailed Denial of Service

    • D. 

      None of the above

  • 21. 
    The software Metasploit is used for _______.
    • A. 

      Anti-virus

    • B. 

      Vulnerability Assessment

    • C. 

      Anti-malware

    • D. 

      . None of the above

  • 22. 
    The term XSS refers to _______.
    • A. 

      EXtended Site Scripting

    • B. 

      EXtreme Secured Services

    • C. 

      Cross site scripting

    • D. 

      None of the above

  • 23. 
    The tool OllDbg is used for analyzing code for which operating system _______.
    • A. 

      Microsoft Windows

    • B. 

      Linux

    • C. 

      Macintosh

    • D. 

      None of the above

  • 24. 
    The operating system back track is used for _______.
    • A. 

      Penetration testing

    • B. 

      Virus scanning and removal

    • C. 

      Malware scanning and removal

    • D. 

      None of the above

  • 25. 
    John works as a C programmer. He develops the following C program: #include <stdlib.h> #include <stdio.h> #include <string.h> int buffer(char *str) { char buffer1[10]; strcpy(buffer1, str); return 1; } int main(int argc, char *argv[]) { buffer (argv[1]); printf("Executed\n"); return 1; } His program is vulnerable to a __________ attack.
    • A. 

      Denial-of-Service

    • B. 

      Buffer overflow

    • C. 

      Cross site scripting

    • D. 

      SQL injection

Back to Top Back to top