Which among the following pave way for malware to spread?
All the options
Facebook and Pinterest are examples of:
Native Apps
Type of mobile apps that provide the highest degree of reliability:
Native Apps
Which security concerns are highlighted during a privacy breach?
Integrity
Attacks that aim at performing malicious acts without being noticed:
Covert approach
Technique used by an attacker to another device may be broadly termed
Attack Vector
It is easy to detect poor code quality in an application
FALSO
Which among the following are the most commonly exploited hardware features?
All the options
Testing approach where the tester has no prior knowledge about the application being tested:
Black-box testing
Which among the following malware are stand alone programs?
All the options
Android Version 4.4 is popularly known as
KitKat
In Android, each application executes in its own environment and does not influence the execution of
other applications.
VERDADERO
DroidDream malware that hit the Android Market in 2811 is an example of:
Botnet
The malware that is believed to be the first computer worm to infect mobile devices:
Cabir
This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00
https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
The security model adopted by Android is:
Permission based
The attack that is associated with capturing small packets transmitted mobile devices from the
network:
Eavesdropping
Apps that are associated with a single code base:
Web Apps
“Normal Permissions” in Android gives access to isolated application-level functionalities.
VERDADERO
____ frees an iOS device from dependence on Apple as the exclusive source of applications.
Jailbreaking
Which among the following are part of the Application layer of Android architecture
All the options
Which among the following are the impacts of insecure data storage?
All the options
A part of malware that performs the malicious action:
Payload
Jailbreaking a device helps enhance security.
FALSO
Which among the following may be consider a covert approach?
Collecting private data
Means to gain access to a system by bypassing the device’s customary security mechanisms:
Backdoor
Testing approach that is more useful for protection against internal attacks
White-box testing
Programs designed to gain root or administrative access to a device:
Rootkit
Testing approach that is more useful for protection against internal attacks
White-box testing
This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00
https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
Programs designed to gain root or administrative access to a device:
Rootkit
The ____ permission is needed for an application to use telephony services, network access or
location information.
Dangerous
Apps that render a consistent User Interface:
Native Apps
Instagram, Uber, Evernote are examples of:
Hybrid Apps
The most widely used Mobile OS as of Jan 2e18:
Android
This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:47 GMT -05:00
https://www.coursehero.com/file/60127387/Mobile-App-Securitypdf/
Powered by TCPDF (www.tcpdf.org)