Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mobile App Security PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Which among the following pave way for malware to spread?

All the options

Facebook and Pinterest are examples of:

Native Apps

Type of mobile apps that provide the highest degree of reliability:

Native Apps

Which security concerns are highlighted during a privacy breach?

Integrity

Attacks that aim at performing malicious acts without being noticed:

Covert approach

Technique used by an attacker to another device may be broadly termed

Attack Vector

It is easy to detect poor code quality in an application

FALSO

Which among the following are the most commonly exploited hardware features?

All the options

Testing approach where the tester has no prior knowledge about the application being tested:

Black-box testing

Which among the following malware are stand alone programs?

All the options

Android Version 4.4 is popularly known as

KitKat

In Android, each application executes in its own environment and does not influence the execution of
other applications.

VERDADERO

DroidDream malware that hit the Android Market in 2811 is an example of:

Botnet

The malware that is believed to be the first computer worm to infect mobile devices:

Cabir

This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00

https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
The security model adopted by Android is:

Permission based

The attack that is associated with capturing small packets transmitted mobile devices from the
network:

Eavesdropping

Apps that are associated with a single code base:

Web Apps

“Normal Permissions” in Android gives access to isolated application-level functionalities.

VERDADERO

____ frees an iOS device from dependence on Apple as the exclusive source of applications.

Jailbreaking

Which among the following are part of the Application layer of Android architecture

All the options

Which among the following are the impacts of insecure data storage?

All the options

A part of malware that performs the malicious action:

Payload

Jailbreaking a device helps enhance security.

FALSO

Which among the following may be consider a covert approach?

Collecting private data

Means to gain access to a system by bypassing the device’s customary security mechanisms:

Backdoor

Testing approach that is more useful for protection against internal attacks

White-box testing

Programs designed to gain root or administrative access to a device:

Rootkit

Testing approach that is more useful for protection against internal attacks

White-box testing

This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00

https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
Programs designed to gain root or administrative access to a device:

Rootkit

The ____ permission is needed for an application to use telephony services, network access or
location information.

Dangerous

Apps that render a consistent User Interface:

Native Apps

Instagram, Uber, Evernote are examples of:

Hybrid Apps

The most widely used Mobile OS as of Jan 2e18:

Android

This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00

https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
Powered by TCPDF (www.tcpdf.org)

You might also like