Question: Flag question: Question 5 4 Question 5 4 1 pts What is a spy cell? Group of answer choices A legitimate device that manages cellular

Flag question: Question 54
Question 541 pts
What is a spy cell?
Group of answer choices
A legitimate device that manages cellular traffic between mobile devices and the mobile network
A phone feature that keeps a microphone active at all times to listen for key phrases
A software program or device that creates a fake cell phone tower
A cell within a mobile system with a large coverage area
Flag question: Question 55
Question 551 pts
True or False? Spy software on mobile devices can remotely control the device's camera without the user's knowledge.
Group of answer choices
True
False
Flag question: Question 56
Question 561 pts
Which of the following is not true of fingerprinting?
Group of answer choices
It can be used to aggressively target users with unwanted advertisements and pop-ups.
It identifies who or what is on a network.
It identifies wireless connectivity problems.
It enables websites to offer customized content.
Flag question: Question 57
Question 571 pts
Attackers use a variety of techniques to target the inherent risks associated with mobile devices. Which of the following is not an inherent risk?
Group of answer choices
Authorization and authentication
Improper session handling
Insecure data storage
Poorly implemented encryption
Flag question: Question 58
Question 581 pts
True or False? A best practice for mitigating mobile browser attacks is to use autofill dialog boxes, JavaScript, and HTML5
Group of answer choices
True
False
Flag question: Question 59
Question 591 pts
True or False? One way for a malware developer to ask for a long list of permissions without raising an alarm is to split the application into modules, each requesting only one or two permissions each.
Group of answer choices
True
False
Flag question: Question 60
Question 601 pts
Penetration testing of smartphones consists of several stages: reconnaissance, scanning, exploitation, and post-exploitation. What occurs during the reconnaissance stage?
Group of answer choices
The tester captures and gains control of the target device.
The tester inspects the phone for sensitive data in common areas, such as notes, text messages, and browser history databases.
The tester gathers information by identifying the types of mobile devices on the target network.
The tester identifies networks sought out by mobile devices.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!