CSI454 Test 2 Revision Questions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to wireless, mobile, cloud, and IoT attacks and countermeasures, along with associated tools and commands.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What type of wireless attack disrupts the connection between a client and an access point?

A) Evil Twin
B) Deauthentication attacks
C) Mobile Device Management
D) Public cloud storage misconfiguration
(Correct Answer: B)

2
New cards

What is a malicious Wi-Fi access point that appears to be legitimate, tricking users into connecting?

A) Open port
B) Evil Twin/Rogue Access Point
C) Multi-cloud security assessment
D) Network scanning tool
(Correct Answer: B)

3
New cards

What wireless encryption standard provides security for wireless networks?

A) Airodump-ng
B) Open port
C) WPA2/WPA3
D) Wireshark
(Correct Answer: C)

4
New cards

Which tool is used for wireless traffic monitoring and capturing?

A) Nmap
B) Android Debug Bridge (ADB)
C) Airodump-ng
D) Cloud encryption
(Correct Answer: C)

5
New cards

What is the name of the system for managing and securing mobile devices within an organization?

A) Remote wipe
B) Mobile Device Management (MDM)
C) IAM and least privilege policies
D) Monitoring tools
(Correct Answer: B)

6
New cards

Which feature allows the deletion of data from a device remotely?

A) Remote wipe
B) Default credentials
C) Access control
D) Netcat
(Correct Answer: A)

7
New cards

What are standard usernames and passwords set by manufacturers often exploited in IoT device attacks?

A) Secure communication protocols
B) Default credentials
C) Cloud encryption
D) Monitoring tools
(Correct Answer: B)

8
New cards

Which term refers to a network port that is accessible, making it a potential entry point for attacks?

A) Open port
B) Secure communication protocols
C) Monitoring tools
D) IAM and least privilege policies
(Correct Answer: A)

9
New cards

What evaluation assesses security measures across multiple cloud service providers?

A) Mobile Device Management
B) Public cloud storage misconfiguration
C) Multi-cloud security assessment
D) Metasploit
(Correct Answer: C)

10
New cards

What is the process of encrypting data stored in cloud environments to enhance security?

A) Cloud encryption
B) Remote wipe
C) Access control
D) Wireshark
(Correct Answer: A)