72. | Mobile Phone OS contains open APIs that may be _____________ attack. |
Discuss |
Answer: (b).vulnerable to
|
73. | ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones. |
Discuss |
Answer: (c).Malware
|
74. | ____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs. |
Discuss |
Answer: (d).Mobile security
|
75. | Mobile security is also known as ____________ |
Discuss |
Answer: (b).Wireless security
|
76. | DDoS in mobile systems wait for the owner of the _____________ to trigger the attack. |
Discuss |
Answer: (c).botnets
|
77. | Hackers cannot do which of the following after compromising your phone? |
Discuss |
Answer: (c).Shoulder surfing
|
78. | Hackers cannot do which of the following after compromising your phone? |
Discuss |
Answer: (a).Shoulder surfing
|
79. | App permissions can cause trouble as some apps may secretly access your memory card or contact data. |
Discuss |
Answer: (a).True
|
80. | Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. |
Discuss |
Answer: (c).Bluetooth
|