Mobile App Security | Fresco Play
Question 1: Attacks that aim at performing malicious acts without being noticed:
Answer: Harmful malicious approach
Question 2: Which among the following are the most commonly exploited hardware features?
Answer: All the options
Question 3: Which security concerns are highlighted during a privacy breach?
Answer: 1. Confidentiality and Integrity 2. Integrity and availability
Question 4: Technique used by an attacker to gain access to another device may be broadly termed as:
Answer: Attack Vector
Question 5: It is easy to detect poor code quality in an application
Answer: False
Question 6: Facebook and Pinterest are examples of:
Answer: Native Apps
Question 7: Type of mobile apps that provide the highest degree of reliability:
Answer: Native Apps
Question 8: Which among the following pave way for malware to spread?
Answer: All the options
Question 9: Testing approach that is more useful for protection against internal attacks
Answer: White-box testing
Question 10: The most widely used Mobile OS as of Jan 2018:
Answer: Android
Question 11: DroidDream malware that hit the Android Market in 2011 is an example of:
Answer: Botnet
Question 12: The security model adopted by Android is: ________________
Answer: Permission based
Question 13: The __________ permission is needed for an application to use telephony services, network access or location information
Answer: Dangerous
Question 14: A part of malware that performs the malicious action:
Answer: 1. Backdoor 2. Exploits
Question 15: _____________ frees a iOS device from dependence on Apple as the exclusive source of applications.
Answer: Jailbreaking
Question 16: Which among the following malware are stand alone programs?
Answer: ALL the options
Question 17: Which among the following may be considered a covert approach?
Answer: Collecting private data
Question 18: Android Version 4.4 is popularly know as __________
Answer: KitKat
Question 19: The attack that is associated with capturing small packets transmitted between mobile devices from the network:
Answer: Eavesdropping
Question 20: Jailbreaking a device helps enhance security.
Answer: False
Question 21: A means to gain access to a system by bypassing the device’s customary security mechanisms:
Answer: Backdoor
Question 22: In Android, each application executes in its own environment and does not influence the execution of other applications.
Answer: True
Question 23: Programs designed to gain root or administrative access to a device:
Answer: Rootkit
Question 24: Instagram, Uber, Evernote are examples of:
Answer: Hybrid Apps
Question 25: Testing approach where the tester has no prior knowledge about the application being tested:
Answer: Black-box testing
Question 26: Which among the following are part of the Application layer of Android architecture
Answer: All the options
Question 27: Apps that render a consistent User Interface:
Answer: Hybrid Apps
Question 28: Apps that are associated with a single code base:
Answer: Web Apps
Question 29: Which among the following are the impacts of insecure data storage?
Answer: All the options
Question 30: “Normal Permissions” in Android gives access to isolated application-level functionalities.
Answer: True
Question 31: The malware that is believed to be the first computer worm to infect mobile devices:
Answer: Cabir
Post a comment
Get your FREE PDF on "100 Ways to Try ChatGPT Today"
Generating link, please wait for: 60 seconds
Comments
Join the conversation and share your thoughts! Leave the first comment.