1/9
Flashcards covering key concepts related to wireless, mobile, cloud, and IoT attacks and countermeasures, along with associated tools and commands.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What type of wireless attack disrupts the connection between a client and an access point?
A) Evil Twin
B) Deauthentication attacks
C) Mobile Device Management
D) Public cloud storage misconfiguration
(Correct Answer: B)
What is a malicious Wi-Fi access point that appears to be legitimate, tricking users into connecting?
A) Open port
B) Evil Twin/Rogue Access Point
C) Multi-cloud security assessment
D) Network scanning tool
(Correct Answer: B)
What wireless encryption standard provides security for wireless networks?
A) Airodump-ng
B) Open port
C) WPA2/WPA3
D) Wireshark
(Correct Answer: C)
Which tool is used for wireless traffic monitoring and capturing?
A) Nmap
B) Android Debug Bridge (ADB)
C) Airodump-ng
D) Cloud encryption
(Correct Answer: C)
What is the name of the system for managing and securing mobile devices within an organization?
A) Remote wipe
B) Mobile Device Management (MDM)
C) IAM and least privilege policies
D) Monitoring tools
(Correct Answer: B)
Which feature allows the deletion of data from a device remotely?
A) Remote wipe
B) Default credentials
C) Access control
D) Netcat
(Correct Answer: A)
What are standard usernames and passwords set by manufacturers often exploited in IoT device attacks?
A) Secure communication protocols
B) Default credentials
C) Cloud encryption
D) Monitoring tools
(Correct Answer: B)
Which term refers to a network port that is accessible, making it a potential entry point for attacks?
A) Open port
B) Secure communication protocols
C) Monitoring tools
D) IAM and least privilege policies
(Correct Answer: A)
What evaluation assesses security measures across multiple cloud service providers?
A) Mobile Device Management
B) Public cloud storage misconfiguration
C) Multi-cloud security assessment
D) Metasploit
(Correct Answer: C)
What is the process of encrypting data stored in cloud environments to enhance security?
A) Cloud encryption
B) Remote wipe
C) Access control
D) Wireshark
(Correct Answer: A)