Q.1 Which among the following pave the way for malware to spread?
A. Portable Media devices
B. Malicious Software
C. Social Network
D. All the options
Ans : All the options
Q.2 Attacks that aim at performing malicious acts without being noticed:
A. Stealthy approach
B. Harmful malicious approach
C. Disruptive approach
D. Covert approach
Ans : Covert approach
Q.3 The type of mobile apps that provide the highest degree of reliability is __________.
A. Native Apps
B. Hybrid Apps
C. Web Apps
Ans : Native Apps
Q.4 The technique used by an attacker to gain access to another device may be broadly termed as __________.
A. Threat
B. Attack
C. Attack Vector
D. Attack Strategy
Ans : Attack Vector
Q.5 The security model adopted by Android is __________.
A. Identity-based
B. Permission-based
C. Application-based
Ans : Permission-based
Q.6 It is easy to detect poor code quality in an application.
A. True
B. False
Ans : False
Q.7 Which among the following is a part of the application layer of Android architecture?
A. Browser
B. Contacts
C. Phone
D. All the options
Ans : All the options
Q.8 The testing approach that is more useful for protection against internal attacks is __________.
A. Gray-box testing
B. Black-box testing
C. White-box testing
Ans : White-box testing
Q.9 Which among the following malware are stand-alone programs?
A. Worms
B. Spyware
C. Trojan Horse
D. All the options
Ans : All the options
Q.10 The testing approach, where the tester has no prior knowledge about the application being tested is _________.
A. White-box testing
B. Gray-box testing
C. Black-box testing
Ans : Black-box testing
Q.11 DroidDream malware that hit the Android Market in 2011 is an example of _____________.
A. Virus
B. Botnet
C. Worms
D. Spyware
Ans : Botnet
Q.12 Instagram, Uber, Evernote are examples of _________.
A. Native Apps
B. Hybrid Apps
C. Web Apps
Ans : Hybrid Apps
Q.13 Normal Permissions in Android give access to isolated application-level functionalities.
A. True
B. False
Ans : True
Q.14 __________ permission is needed for an application to use telephony services, network access or location information.
A. Signature
B. Normal
C. Dangerous
Ans : Normal
Q.15 Which among the following are the impacts of insecure data storage?
A. Identity theft
B. External policy violation
C. Fraud
D. All the options
E. Reputational degradation
Ans : All the options
Q.16 Apps that are associated with a single code base are _________.
A. Web Apps
B. Native Apps
C. Hybrid Apps
Ans : Native Apps
Q.17 Android Version 4.4 is popularly know as _________.
A. Jelly Bean
B. Honeycomb
C. KitKat
D. Ice Cream Sandwich
Ans : KitKat
Q.18 Programs designed to gain root or administrative access to a device is __________.
A. Adware
B. Rootkit
C. Trojan Horse
D. Spyware
Ans : Rootkit
Q.19 A part of malware that performs the malicious action is _____________.
A. Scams
B. Payload
C. Backdoor
D. Exploits
Ans : Payload
Q.20 Apps that render a consistent User Interface are __________.
A. Hybrid Apps
B. Native Apps
C. Web Apps
Ans : Web Apps