adplus-dvertising
81. Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.
a. Biometric
b. PIN-based
c. Alphanumeric
d. Short
Discuss
Answer: (a).Biometric

82. Which of the following tool is used for Blackjacking?
a. BBAttacker
b. BBProxy
c. Blackburried
d. BBJacking
Discuss
Answer: (b).BBProxy

83. BBProxy tool is used in which mobile OS?
a. Android
b. Symbian
c. Raspberry
d. Blackberry
Discuss
Answer: (d).Blackberry

84. Which of the following is not a security issue for PDAs?
a. Password theft
b. Data theft
c. Reverse engineering
d. Wireless vulnerability
Discuss
Answer: (c).Reverse engineering

85. ____________________ is the anticipation of unauthorized access or break to computers or data by means of wireless networks.
a. Wireless access
b. Wireless security
c. Wired Security
d. Wired device apps
Discuss
Answer: (b).Wireless security

86. Which among them has the strongest wireless security?
a. WEP
b. WPA
c. WPA2
d. WPA3
Discuss
Answer: (d).WPA3

87. Which among the following is the least strong security encryption standard?
a. WEP
b. WPA
c. WPA2
d. WPA3
Discuss
Answer: (a).WEP

88. _________ is an old IEEE 802.11 standard from the year 1999.
a. WPA2
b. WPA3
c. WEP
d. WPA
Discuss
Answer: (c).WEP

89. _______________ is the central node of 802.11 wireless operations.
a. WPA
b. Access Point
c. WAP
d. Access Port
Discuss
Answer: (b).Access Point

90. AP is abbreviated as _____________
a. Access Point
b. Access Port
c. Access Position
d. Accessing Port
Discuss
Answer: (a).Access Point

Page 9 of 10