A single swipe with a near-field communication (NFC) tag can reveal…

QuestionAnswered step-by-stepA single swipe with a near-field communication (NFC) tag can reveal…A single swipe with a near-field communication (NFC) tag can reveal financial information stored on the mobile device.Question 81 options:  True  False Question 82 (1 point)         What is the SmartScreen Filter in Windows Phone?Question 82 options:  a sandboxing technology  a defense technology that reduces the attack surface area for memory-related exploits  a method of providing two-factor authentication  a mechanism for preventing phishing attacks Question 83 (1 point)         Cybercriminals are constantly searching for weak points in wireless networks to exploit. For a long time, typical wireless network infrastructures provided enough weaknesses for hackers. However, in recent years, hackers have shifted to client-side exploits. Why?Question 83 options:  less reliance on defense in depth with wireless  people are more trustworthy about mobile devices than PCs  smartphones are inherently less secure than PCs  recent advancement in encryption and authentication Question 84 (1 point)         When scanning wireless access points for vulnerabilities, which of the following is typically NOT a concern?Question 84 options:  the latest firmware and security patches  the correct security credentials  antivirus software  the appropriate security protocols Question 85 (1 point)         Even with strict enterprise mobility management (EMM) in place, administrators must still run security checks of their wireless network. Which of the following is NOT a typical security-related task?Question 85 options:  Assess it for vulnerabilities.  Assess it for noncompliance with security policies.  Assess it for vulnerability to malicious attacks.  Assess it for upgrades to new communications devices. Question 86 (1 point)         PUA stands for potentially usable application.Question 86 options:  True  False Question 87 (1 point)         _______ is highly aggressive, commercial mobile adware.Question 87 options:  Madware  Spyware  DoS  Metasploit Question 88 (1 point)         The problem with antivirus and anti-malware tools is that they are NOT restricted to a sandbox.Question 88 options:  True  False Question 89 (1 point)         Which of the following is true of application identification for fingerprinting purposes?Question 89 options:  It examines the HTTP user agent headers for application-specific information.  It works even if the combination of applications is not diverse.  It can detect applications that are no longer installed.  It requires server scanning. Question 90 (1 point)         Android device owners may download applications from any third party.Question 90 options:  True  False Question 91 (1 point)         Which of the following is true of Windows Phone in general?Question 91 options:  low market share  low programming complexity  experiences a high rate of successful malware attacks  is more likely to be jailbroken than Apple iOS due to the diversity of devices on which it runs Question 92 (1 point)         Which mobile phone vulnerability involves hijacking the camera to monitor the user or the user’s surroundings?Question 92 options:  audio attack  photographs and video attack  camera attack  SMS redirection Question 93 (1 point)         Rogue access points are difficult to locate because they are typically not on all the time.Question 93 options:  True  False Question 94 (1 point)         Rooting, or overriding Android operating system (OS) security, gives the user root (super-user) permissions on an Android device. Which subset or section of the Android operating system is rooted?Question 94 options:  the OS kernel  the boot loader  the entire operating system  the Linux file system Question 95 (1 point)         Part of the reason that madware is prevalent is because relatively few users read the entire terms and conditions associated with apps.Question 95 options:  True  False Question 96 (1 point)         Which of the following is a mobile security challenge NOT caused by end users?Question 96 options:  open source operating system  side-loaded mobile applications  failure to install system updates  interfacing with a PC through a USB or Bluetooth connection Question 97 (1 point)         Mobile device management (MDM) tasks include inventory management, device provisioning, and software distribution, among others.Question 97 options:  True  False Question 98 (1 point)         The top types of Android malware are financially focused.Question 98 options:  True  False Question 99 (1 point)         Which of the following makes mobile apps vulnerable to man-in-the-middle (MITM) attacks and eavesdropping?Question 99 options:  unintended data leakage  unsecure data storage  insufficient Transport Layer protection  poor authorization and authentication Question 100 (1 point)         Apple iOS has no security vulnerabilities.Question 100 options:  True  False  Computer ScienceEngineering & TechnologyInformation SecurityCET CET2850Share Question