Top 20 Mobile App Security Interview Questions and Answers

Mobile app security is a measure to secure applications from external threats like malware and other digital frauds that risk critical personal and financial information from hackers.

Below are few of the issues that affect mobile apps include:

  • Storing or unintentionally leaking sensitive data in ways that it could be read by other applications on the user’s phone.
  • Implementing poor authentication and authorization checks that could be bypassed by malicious applications or users.
  • Using data encryption methods that are known to be vulnerable or can be easily broken.
  • Transmitting sensitive data without encryption over the Internet.

 

Mobile App Security

Mobile App Security Questions and Answers 2022

Question:-1 Which among the following pave the way for malware to spread?
Find the correct answer below
1.Portable Media devices

2..Malicious Software

3.Social Network

4.All the options

Ans : All the options

Question:-2 Attacks that aim at performing malicious acts without being noticed:
Find the correct answer below
1.Stealthy approach

2..Harmful malicious approach

3.Disruptive approach

4.Covert approach

Ans : Covert approach

Question:-3 The type of mobile apps that provide the highest degree of reliability is __________.
Find the correct answer below
1.Native Apps

2..Hybrid Apps

3.Web Apps

Ans : Native Apps

Question:-4 The technique used by an attacker to gain access to another device may be broadly termed as __________.
Find the correct answer below
1.Threat

2..Attack

3.Attack Vector

4.Attack Strategy

Ans : Attack Vector

Question:-5 The security model adopted by Android is __________.
Find the correct answer below
1.Identity-based

2..Permission-based

3.Application-based

Ans : Permission-based

Question:-6 It is easy to detect poor code quality in an application.
Find the correct answer below
1.True

2..False

Ans : False

Question:-7 Which among the following is a part of the application layer of Android architecture?
Find the correct answer below
1.Browser

2..Contacts

3.Phone

4.All the options

Ans : All the options

Question:-8 The testing approach that is more useful for protection against internal attacks is __________.
Find the correct answer below
1.Gray-box testing

2..Black-box testing

3.White-box testing

Ans : White-box testing

Question:-9 Which among the following malware are stand-alone programs?
Find the correct answer below
1.Worms

2..Spyware

3.Trojan Horse

4.All the options

Ans : All the options

Question:-10 The testing approach, where the tester has no prior knowledge about the application being tested is _________.
Find the correct answer below
1.White-box testing

2..Gray-box testing

3.Black-box testing

Ans : Black-box testing

Question:-11 DroidDream malware that hit the Android Market in 2011 is an example of _____________.
Find the correct answer below
1.Virus

2..Botnet

3.Worms

4.Spyware

Ans : Botnet

Question:-12 Instagram, Uber, Evernote are examples of _________.
Find the correct answer below
1.Native Apps

2..Hybrid Apps

3.Web Apps

Ans : Hybrid Apps

Question:-13 Normal Permissions in Android give access to isolated application-level functionalities.
Find the correct answer below
1.True

2..False

Ans : True

Question:-14 __________ permission is needed for an application to use telephony services, network access or location information.
Find the correct answer below
1.Signature

2..Normal

3.Dangerous

Ans : Normal

Question:-15 Which among the following are the impacts of insecure data storage?
Find the correct answer below
1.Identity theft

2..External policy violation

3.Fraud

4.All the options

5.Reputational degradation

Ans : All the options

Question:-16 Apps that are associated with a single code base are _________.
Find the correct answer below
1.Web Apps

2..Native Apps

3.Hybrid Apps

Ans : Native Apps

Question:-17 Android Version 4.4 is popularly know as _________.
Find the correct answer below
1.Jelly Bean

2..Honeycomb

3.KitKat

4.Ice Cream Sandwich

Ans : KitKat

Question:-18 Programs designed to gain root or administrative access to a device is __________.
Find the correct answer below
1.Adware

2..Rootkit

3.Trojan Horse

4.Spyware

Ans : Rootkit

Mobile App Security MCQ’s

Question:-19 A part of malware that performs the malicious action is _____________.
Find the correct answer below
1.Scams

2..Payload

3.Backdoor

4.Exploits

Ans : Payload

Question:-20 Apps that render a consistent User Interface are __________.
Find the correct answer below
1.Hybrid Apps

2..Native Apps

3.Web Apps

Ans : Web Apps

About Author


After years of Technical Work, I feel like an expert when it comes to Develop wordpress website. Check out How to Create a Wordpress Website in 5 Mins, and Earn Money Online Follow me on Facebook for all the latest updates.