Search Header Logo

Wireless Technologies Quiz

Authored by Anthony DellaRosa

Computers

9th Grade

Wireless Technologies Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is Bluejacking in the context of Bluetooth threats?

A) Installing a backdoor for future access

B) Pulling sensitive data from a device

C) Sending unsolicited messages to a device

D) Remotely controlling a device

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Bluetooth threat involves pulling email, contacts, passwords, images, or other data off the device?

A) Bluejacking

B) Bluesnarfing

C) Bluebugging

D) None of the above

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does Bluebugging allow an attacker to do?

A) Send spam messages

B) Steal personal data

C) Install a backdoor and remotely control the device

D) Block device communications

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What happens when you disable Bluetooth from the Control Center or Quick Settings on a mobile device?

Bluetooth is disabled permanently until manually turned back on

Bluetooth is disabled temporarily and will turn back on the next day

Bluetooth is disabled and cannot be enabled again

Bluetooth settings disappear from the device

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which feature will still function when Bluetooth is turned off from the Control Center or Quick Settings on an iPhone?

Wi-Fi

Cellular Data

AirDrop

SMS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can you completely turn off Bluetooth on a mobile device so that it does not turn back on automatically?

Restart the device

Turn it off from the Control Center

Turn it off from the device Settings

Put the device in Airplane Mode

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why should you avoid sharing sensitive information or images via Bluetooth?

It is too slow.

It is not necessary.

It can be intercepted by unauthorized users.

It uses too much battery.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?