Mobile app security is a measure to secure applications from external threats like malware and other digital frauds that risk critical personal and financial information from hackers.
Below are few of the issues that affect mobile apps include:
- Storing or unintentionally leaking sensitive data in ways that it could be read by other applications on the user’s phone.
- Implementing poor authentication and authorization checks that could be bypassed by malicious applications or users.
- Using data encryption methods that are known to be vulnerable or can be easily broken.
- Transmitting sensitive data without encryption over the Internet.
Mobile App Security Questions and Answers 2022
Question:-1 Which among the following pave the way for malware to spread?
Find the correct answer below
1.Portable Media devices
2..Malicious Software
3.Social Network
4.All the options
Ans : All the options
Question:-2 Attacks that aim at performing malicious acts without being noticed:
Find the correct answer below
1.Stealthy approach
2..Harmful malicious approach
3.Disruptive approach
4.Covert approach
Ans : Covert approach
Question:-3 The type of mobile apps that provide the highest degree of reliability is __________.
Find the correct answer below
1.Native Apps
2..Hybrid Apps
3.Web Apps
Ans : Native Apps
Question:-4 The technique used by an attacker to gain access to another device may be broadly termed as __________.
Find the correct answer below
1.Threat
2..Attack
3.Attack Vector
4.Attack Strategy
Ans : Attack Vector
Question:-5 The security model adopted by Android is __________.
Find the correct answer below
1.Identity-based
2..Permission-based
3.Application-based
Ans : Permission-based
Question:-6 It is easy to detect poor code quality in an application.
Find the correct answer below
1.True
2..False
Ans : False
Question:-7 Which among the following is a part of the application layer of Android architecture?
Find the correct answer below
1.Browser
2..Contacts
3.Phone
4.All the options
Ans : All the options
Question:-8 The testing approach that is more useful for protection against internal attacks is __________.
Find the correct answer below
1.Gray-box testing
2..Black-box testing
3.White-box testing
Ans : White-box testing
Question:-9 Which among the following malware are stand-alone programs?
Find the correct answer below
1.Worms
2..Spyware
3.Trojan Horse
4.All the options
Ans : All the options
Question:-10 The testing approach, where the tester has no prior knowledge about the application being tested is _________.
Find the correct answer below
1.White-box testing
2..Gray-box testing
3.Black-box testing
Ans : Black-box testing
Question:-11 DroidDream malware that hit the Android Market in 2011 is an example of _____________.
Find the correct answer below
1.Virus
2..Botnet
3.Worms
4.Spyware
Ans : Botnet
Question:-12 Instagram, Uber, Evernote are examples of _________.
Find the correct answer below
1.Native Apps
2..Hybrid Apps
3.Web Apps
Ans : Hybrid Apps
Question:-13 Normal Permissions in Android give access to isolated application-level functionalities.
Find the correct answer below
1.True
2..False
Ans : True
Question:-14 __________ permission is needed for an application to use telephony services, network access or location information.
Find the correct answer below
1.Signature
2..Normal
3.Dangerous
Ans : Normal
Question:-15 Which among the following are the impacts of insecure data storage?
Find the correct answer below
1.Identity theft
2..External policy violation
3.Fraud
4.All the options
5.Reputational degradation
Ans : All the options
Question:-16 Apps that are associated with a single code base are _________.
Find the correct answer below
1.Web Apps
2..Native Apps
3.Hybrid Apps
Ans : Native Apps
Question:-17 Android Version 4.4 is popularly know as _________.
Find the correct answer below
1.Jelly Bean
2..Honeycomb
3.KitKat
4.Ice Cream Sandwich
Ans : KitKat
Question:-18 Programs designed to gain root or administrative access to a device is __________.
Find the correct answer below
1.Adware
2..Rootkit
3.Trojan Horse
4.Spyware
Ans : Rootkit
Mobile App Security MCQ’s
Question:-19 A part of malware that performs the malicious action is _____________.
Find the correct answer below
1.Scams
2..Payload
3.Backdoor
4.Exploits
Ans : Payload
Question:-20 Apps that render a consistent User Interface are __________.
Find the correct answer below
1.Hybrid Apps
2..Native Apps
3.Web Apps
Ans : Web Apps