Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Mobile App Security
Home
Questions
Mobile App Security
0
votes
Q: Apps that render a consistent User Interface are __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
user-interface
malware-apps
0
votes
Q: A part of malware that performs the malicious action is _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
malware-programs
malware-application
0
votes
Q: Programs designed to gain root or administrative access to a device is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
root-gain
adminstrative-access
0
votes
Q: Android Version d) 4 is popularly know as _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
android-version
version4
0
votes
Q: Apps that are associated with a single code base are _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps
hybrid-apps
0
votes
Q: Which among the following are the impacts of insecure data storage?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
insecure-data-storage
0
votes
Q: __________ permission is needed for an application to use telephony services, network access or location information.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
application-permission
network-access
0
votes
Q: Normal Permissions in Android give access to isolated application-level functionalities.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
application-permission
application-functionalities
0
votes
Q: Instagram, Uber, Evernote are examples of _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
instagram
uber
evernote
0
votes
Q: DroidDream malware that hit the Android Market in 2011 is an example of _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
droiddream-malware
android-market
0
votes
Q: The testing approach, where the tester has no prior knowledge about the application being tested is _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
application-knowledge
0
votes
Q: Which among the following malware are stand-alone programs?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
stand-alone-programs
malware-programs
0
votes
Q: The testing approach that is more useful for protection against internal attacks is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
protection
internal-attacks
0
votes
Q: Which among the following is a part of the application layer of Android architecture?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
android-architecture
0
votes
Q: It is easy to detect poor code quality in an application.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
poor-quality-application
poor-security
0
votes
Q: The security model adopted by Android is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-app-security
security-model
0
votes
Q: The technique used by an attacker to gain access to another device may be broadly termed as __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps-security
access-gain
0
votes
Q: The type of mobile apps that provide the highest degree of reliability is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps
realiable-apps
0
votes
Q: Attacks that aim at performing malicious acts without being noticed:
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-attacks
system-attacks
malware-attacks
0
votes
Q: Which among the following pave the way for malware to spread?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-app-security
malware-spread
To see more, click for the
full list of questions
or
popular tags
.
...