Question 1
____________ is a virus that infects Windows systems by searching all the drives and connected network shares to locate files with an EXE or SCR extension. The virus can also connect to remote websites to download malicious code.
W32/Dzan-C
W32/Hasnot-A
W32/Madang-Fam
W32/Fujacks-AK
Question 2
____________ is a type of RFID attack that produces illegal copies of legitimate RFIP tags-for example, when a supermarket item tag is replaced with a similar tag so that thieves can purchase the items at lower prices.
Replay
Switching
Spoofing
Tracking
Question 3
____________ is a method used to allow the installation of third-party software on an iPhone or iPod Touch device.
iHacking
Jailbreaking
iActivate
iFreedom
Question 4
Which of the following are Bluetooth security issues? (Select all that apply.)
short PINs
nonnegotiable length of encryption
shared master key
reusable unit keys
Question 5
The ____________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network and make it easier to deactivate a device that has been lost or stolen.
International Mobile Equipment Identity (IMEI)
Subscriber Identity module (SIM)
SIM lock number (SLN)
International Mobile Identity number (IMIN)
Question 6
Electrical attacks on USB drives involve ____________ access to a device's circuit board.
remote
unauthorized
root
physical
Question 7
____________ is a communication service standardized in the GSM mobile communication system that allows exchange of short text messages between mobile telephone devices.
GPRS
SMS
CDMA
SIP
Question 8
This USB security tool integrates with Active Directory, using built-in Group Policy mechanisms to enforce centralized access control.
USB Blocker
USBDeview
MyUSBOnly
ADUSBpolicy
Question 9
In this Bluetooth attack, the attacker poses as one of the two devices and sends a message to the other, claiming that the device has forgotten the link key and prompting the devices to pair again and generate a new link key. The attacker then uses the new key to eavesdrop on communication between the two devices.
bluejacking
blueprinting
bluesmacking
short pairing code attack
Question 10
____________ RFIP tags are larger and more expensive than passive tags because they have their own power source, which is used to run the microchip's circuitry and send a signal to the reader.
Semipassive
Active
Nonpassive
Reader
Question 11
This cryptographic key is used to generate working session keys for the encrypted exchange of information between two Bluetooth devices.
certificate
Master Session Key (MSK)
key pairing
piconet
Question 12
____________ is wireless technology that allows mobile phones, computers, and other devices to exchange information using short-range connections.
Blue pairing
Piconet
Bluetooth
BlackBerry
Question 13
Which type of RFID tag has a read-only chip?
passive
active
read-only
semipassive
Question 14
Which of the following tools can be used to copy files to a USB storage device and dynamically encrypt and compress files and folders?
USBlyzer
USBLock
Remora USB File Guard
USBSwitchblade
Question 15
This Bluetooth attack causes no damage to the targeted device but may be annoying and disruptive to its victims, similar to e-mail spamming.
bluejacking
bluespamming
bluebugging
bluesmacking
Question 16
The SymbOS/MultiDropper.CG malware targets the Symbian operating system and comes bundled with different multidropper mobile phone ____________.
Trojans
apps
rootkits
viruses
Question 17
What type of attack on a USB device driver can allow an attacker to bypass Windows security and gain administrator access on the host machine?
denial of service
rootkit
buffer overflow
Trojan
Question 18
____________ is a security tool that alerts system administrators anytime a removable USB storage device is used on any computer on the network.
USBNotifier
Remora USB Alerter
Advanced USB Monitor
USB CopyNotify!
Question 19
This USB hacking tool runs in the background and automatically downloads the content of any USB drive connected to the system. This tool can be integrated with other hacking tools such as USB Hacksaw and scripts to send downloaded files to remote locations through encrypted e-mail or FTP.
USB Switchblade
USBDumper
USBDeview
USBDownloader
Question 20
When this is used in an RFID tag, a command can be sent to deactivate the tag and can never be reactivated.
RSA blocker tag
RFID wipe
format switch
kill switch