Mobile App Security | Fresco Play

Mobile App Security | Fresco Play

Monday, May 22, 2023
~ 3 min read
Mobile App Security | Fresco Play

Question 1: Attacks that aim at performing malicious acts without being noticed:

Answer: Harmful malicious approach


Question 2: Which among the following are the most commonly exploited hardware features?

Answer: All the options


Question 3: Which security concerns are highlighted during a privacy breach?

Answer: 1. Confidentiality and Integrity 2. Integrity and availability


Question 4: Technique used by an attacker to gain access to another device may be broadly termed as:

Answer: Attack Vector


Question 5: It is easy to detect poor code quality in an application

Answer: False


Question 6: Facebook and Pinterest are examples of:

Answer: Native Apps


Question 7: Type of mobile apps that provide the highest degree of reliability:

Answer: Native Apps


Question 8: Which among the following pave way for malware to spread?

Answer: All the options


Question 9: Testing approach that is more useful for protection against internal attacks

Answer: White-box testing


Question 10: The most widely used Mobile OS as of Jan 2018:

Answer: Android


Question 11: DroidDream malware that hit the Android Market in 2011 is an example of:

Answer: Botnet


Question 12: The security model adopted by Android is: ________________

Answer: Permission based


Question 13: The __________ permission is needed for an application to use telephony services, network access or location information

Answer: Dangerous


Question 14: A part of malware that performs the malicious action:

Answer: 1. Backdoor 2. Exploits


Question 15: _____________ frees a iOS device from dependence on Apple as the exclusive source of applications.

Answer: Jailbreaking


Question 16: Which among the following malware are stand alone programs?

Answer: ALL the options


Question 17: Which among the following may be considered a covert approach?

Answer: Collecting private data


Question 18: Android Version 4.4 is popularly know as __________

Answer: KitKat


Question 19: The attack that is associated with capturing small packets transmitted between mobile devices from the network:

Answer: Eavesdropping


Question 20: Jailbreaking a device helps enhance security.

Answer: False


Question 21: A means to gain access to a system by bypassing the device’s customary security mechanisms:

Answer: Backdoor


Question 22: In Android, each application executes in its own environment and does not influence the execution of other applications.

Answer: True


Question 23: Programs designed to gain root or administrative access to a device:

Answer: Rootkit


Question 24: Instagram, Uber, Evernote are examples of:

Answer: Hybrid Apps


Question 25: Testing approach where the tester has no prior knowledge about the application being tested:

Answer: Black-box testing


Question 26: Which among the following are part of the Application layer of Android architecture

Answer: All the options


Question 27: Apps that render a consistent User Interface:

Answer: Hybrid Apps


Question 28: Apps that are associated with a single code base:

Answer: Web Apps


Question 29: Which among the following are the impacts of insecure data storage?

Answer: All the options


Question 30: “Normal Permissions” in Android gives access to isolated application-level functionalities.

Answer: True


Question 31: The malware that is believed to be the first computer worm to infect mobile devices:

Answer: Cabir


Post a comment

Comments

Join the conversation and share your thoughts! Leave the first comment.

Get your FREE PDF on "100 Ways to Try ChatGPT Today"

Generating link, please wait for: 60 seconds

Checkout all hot deals now 🔥

Search blogs

No blog posts found