81. Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.
a. Biometric
b. PIN-based
c. Alphanumeric
d. Short
Answer: (a).Biometric

82. Which of the following tool is used for Blackjacking?
a. BBAttacker
b. BBProxy
c. Blackburried
d. BBJacking
Answer: (b).BBProxy

83. BBProxy tool is used in which mobile OS?
a. Android
b. Symbian
c. Raspberry
d. Blackberry
Answer: (d).Blackberry

84. Which of the following is not a security issue for PDAs?
a. Password theft
b. Data theft
c. Reverse engineering
d. Wireless vulnerability
Answer: (c).Reverse engineering

85. ____________________ is the anticipation of unauthorized access or break to computers or data by means of wireless networks.
a. Wireless access
b. Wireless security
c. Wired Security
d. Wired device apps
Answer: (b).Wireless security

86. Which among them has the strongest wireless security?
a. WEP
b. WPA
c. WPA2
d. WPA3
Answer: (d).WPA3

87. Which among the following is the least strong security encryption standard?
a. WEP
b. WPA
c. WPA2
d. WPA3
Answer: (a).WEP

88. _________ is an old IEEE 802.11 standard from the year 1999.
a. WPA2
b. WPA3
c. WEP
d. WPA
Answer: (c).WEP

89. _______________ is the central node of 802.11 wireless operations.
a. WPA
b. Access Point
c. WAP
d. Access Port
Answer: (b).Access Point

90. AP is abbreviated as _____________
a. Access Point
b. Access Port
c. Access Position
d. Accessing Port
Answer: (a).Access Point

Page 9 of 10