Mobile App Security Quiz
Mobile App Security Quiz
Mobile App Security Quiz
Native Apps
Native Apps
Covert approach
Technique used by an attacker to gain access to another device may be broadly termed as:
Attack Vector
Which among the following are the most commonly exploited hardware features?
False
KitKat
Permission based
Rootkit
Hybrid Apps
In Android, each application executes in its own environment and does not influence the
execution of other applications.
True
True
_____________ frees a iOS device from dependence on Apple as the exclusive source of
applications.
Jailbreaking
This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:58 GMT -05:00
https://www.coursehero.com/file/40043640/Mobile-App-Security-quizdocx/
The malware that is believed to be the first computer worm to infect mobile devices:
Cabir
Native Apps
Web Apps
Which among the following are the impacts of insecure data storage?
Which among the following are part of the Application layer of Android architecture
The __________ permission is needed for an application to use telephony services, network
access or location information
Signature
Dangerous
Normal
DroidDream malware that hit the Android Market in 2011 is an example of:
Virus
Spyware
Botnet
Worms
This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:58 GMT -05:00
https://www.coursehero.com/file/40043640/Mobile-App-Security-quizdocx/
Powered by TCPDF (www.tcpdf.org)