Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 13 ASSESSMENT

  1. Weak server-side security does not pose a direct threat to mobile clients.
    1. True
    2. False
  2. Which of the following is not a risk from client-side injection attacks?
    1. SQL injection
    2. Data leakage
    3. JavaScript injection
    4. Hackers gaining access to application interfaces or functions
  3. Which of the following describes binary protection?
    1. It is a two-way handshake for authentication.
    2. It prevents rogue developers from reverse engineering or tampering with application code.
    3. It is a form of session security.
    4. It prevents Bluetooth-based attacks.
  4. In addition to searching for rogue devices, scanning wireless networks is also used to do which of the following?
    1. To see which websites employees are using
    2. To prevent data leakage
    3. To frequency-jam ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733