---Advertisement---
Android Digital Security IOS

Mobile App Security Interview Question-Answer

By Smart Answer

Updated on:

---Advertisement---

Q.1 Which among the following pave the way for malware to spread?

       A. Portable Media devices

       B. Malicious Software

       C. Social Network

       D. All the options

Ans : All the options


Q.2 Attacks that aim at performing malicious acts without being noticed:

       A. Stealthy approach

       B. Harmful malicious approach

       C. Disruptive approach

       D. Covert approach

Ans : Covert approach


Q.3 The type of mobile apps that provide the highest degree of reliability is __________.

       A. Native Apps

       B. Hybrid Apps

       C. Web Apps

Ans : Native Apps


Q.4 The technique used by an attacker to gain access to another device may be broadly termed as __________.

       A. Threat

       B. Attack

       C. Attack Vector

       D. Attack Strategy

Ans : Attack Vector


Q.5 The security model adopted by Android is __________.

       A. Identity-based

       B. Permission-based

       C. Application-based

Ans : Permission-based


Q.6 It is easy to detect poor code quality in an application.

       A. True

       B. False

Ans : False


Q.7 Which among the following is a part of the application layer of Android architecture?

       A. Browser

       B. Contacts

       C. Phone

       D. All the options

Ans : All the options


Q.8 The testing approach that is more useful for protection against internal attacks is __________.

       A. Gray-box testing

       B. Black-box testing

       C. White-box testing

Ans : White-box testing


Q.9 Which among the following malware are stand-alone programs?

       A. Worms

       B. Spyware

       C. Trojan Horse

       D. All the options

Ans : All the options


Q.10 The testing approach, where the tester has no prior knowledge about the application being tested is _________.

       A. White-box testing

       B. Gray-box testing

       C. Black-box testing

Ans : Black-box testing


Q.11 DroidDream malware that hit the Android Market in 2011 is an example of _____________.

       A. Virus

       B. Botnet

       C. Worms

       D. Spyware

Ans : Botnet


Q.12 Instagram, Uber, Evernote are examples of _________.

       A. Native Apps

       B. Hybrid Apps

       C. Web Apps

Ans : Hybrid Apps


Q.13 Normal Permissions in Android give access to isolated application-level functionalities.

       A. True

       B. False

Ans : True


Q.14 __________ permission is needed for an application to use telephony services, network access or location information.

       A. Signature

       B. Normal

       C. Dangerous

Ans : Normal


Q.15 Which among the following are the impacts of insecure data storage?

       A. Identity theft

       B. External policy violation

       C. Fraud

       D. All the options

       E. Reputational degradation

Ans : All the options


Q.16 Apps that are associated with a single code base are _________.

       A. Web Apps

       B. Native Apps

       C. Hybrid Apps

Ans : Native Apps


Q.17 Android Version 4.4 is popularly know as _________.

       A. Jelly Bean

       B. Honeycomb

       C. KitKat

       D. Ice Cream Sandwich

Ans : KitKat


Q.18 Programs designed to gain root or administrative access to a device is __________.

       A. Adware

       B. Rootkit

       C. Trojan Horse

       D. Spyware

Ans : Rootkit


Q.19 A part of malware that performs the malicious action is _____________.

       A. Scams

       B. Payload

       C. Backdoor

       D. Exploits

Ans : Payload


Q.20 Apps that render a consistent User Interface are __________.

       A. Hybrid Apps

       B. Native Apps

       C. Web Apps

Ans : Web Apps


Smart Answer

---Advertisement---

Related Post

PhoneGap Interview Question-Answer

Q.1 Which of the following apps will have access to all native features?        A. Web apps        B. Native apps       ...

Cyber Security Interview Question-Answer Part – 3

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 1 Cyber Security Interview Question-Answer Part – 2 Q.1 Which of the following can also consider as the ...

Cyber Security Interview Question-Answer Part – 2

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question- – 1 Cyber Security Interview Question- – 3 Q.1 Which of the following can be considered as the elements of ...

Cyber Security Interview Question-Answer

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 2 Cyber Security Interview Question-Answer Part – 3 Q.1 Which of the following refers to stealing one’s idea ...

Leave a Comment