Mobile App Security Interview Question-Answer

Q.1 Which among the following pave the way for malware to spread?

       A. Portable Media devices

       B. Malicious Software

       C. Social Network

       D. All the options

Ans : All the options

Q.2 Attacks that aim at performing malicious acts without being noticed:

       A. Stealthy approach

       B. Harmful malicious approach

       C. Disruptive approach

       D. Covert approach

Ans : Covert approach

Q.3 The type of mobile apps that provide the highest degree of reliability is __________.

       A. Native Apps

       B. Hybrid Apps

       C. Web Apps

Ans : Native Apps

Q.4 The technique used by an attacker to gain access to another device may be broadly termed as __________.

       A. Threat

       B. Attack

       C. Attack Vector

       D. Attack Strategy

Ans : Attack Vector

Q.5 The security model adopted by Android is __________.

       A. Identity-based

       B. Permission-based

       C. Application-based

Ans : Permission-based

Q.6 It is easy to detect poor code quality in an application.

       A. True

       B. False

Ans : False

Q.7 Which among the following is a part of the application layer of Android architecture?

       A. Browser

       B. Contacts

       C. Phone

       D. All the options

Ans : All the options

Q.8 The testing approach that is more useful for protection against internal attacks is __________.

       A. Gray-box testing

       B. Black-box testing

       C. White-box testing

Ans : White-box testing

Q.9 Which among the following malware are stand-alone programs?

       A. Worms

       B. Spyware

       C. Trojan Horse

       D. All the options

Ans : All the options

Q.10 The testing approach, where the tester has no prior knowledge about the application being tested is _________.

       A. White-box testing

       B. Gray-box testing

       C. Black-box testing

Ans : Black-box testing

Q.11 DroidDream malware that hit the Android Market in 2011 is an example of _____________.

       A. Virus

       B. Botnet

       C. Worms

       D. Spyware

Ans : Botnet

Q.12 Instagram, Uber, Evernote are examples of _________.

       A. Native Apps

       B. Hybrid Apps

       C. Web Apps

Ans : Hybrid Apps

Q.13 Normal Permissions in Android give access to isolated application-level functionalities.

       A. True

       B. False

Ans : True

Q.14 __________ permission is needed for an application to use telephony services, network access or location information.

       A. Signature

       B. Normal

       C. Dangerous

Ans : Normal

Q.15 Which among the following are the impacts of insecure data storage?

       A. Identity theft

       B. External policy violation

       C. Fraud

       D. All the options

       E. Reputational degradation

Ans : All the options

Q.16 Apps that are associated with a single code base are _________.

       A. Web Apps

       B. Native Apps

       C. Hybrid Apps

Ans : Native Apps

Q.17 Android Version 4.4 is popularly know as _________.

       A. Jelly Bean

       B. Honeycomb

       C. KitKat

       D. Ice Cream Sandwich

Ans : KitKat

Q.18 Programs designed to gain root or administrative access to a device is __________.

       A. Adware

       B. Rootkit

       C. Trojan Horse

       D. Spyware

Ans : Rootkit

Q.19 A part of malware that performs the malicious action is _____________.

       A. Scams

       B. Payload

       C. Backdoor

       D. Exploits

Ans : Payload

Q.20 Apps that render a consistent User Interface are __________.

       A. Hybrid Apps

       B. Native Apps

       C. Web Apps

Ans : Web Apps

Leave a Comment

Your email address will not be published. Required fields are marked *