Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Apps that render a consistent User Interface are __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
user-interface
malware-apps
0
votes
1
answer
A part of malware that performs the malicious action is _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
malware-programs
malware-application
0
votes
1
answer
Programs designed to gain root or administrative access to a device is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
root-gain
adminstrative-access
0
votes
1
answer
Android Version d) 4 is popularly know as _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
android-version
version4
0
votes
1
answer
Apps that are associated with a single code base are _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps
hybrid-apps
0
votes
1
answer
Which among the following are the impacts of insecure data storage?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
insecure-data-storage
0
votes
1
answer
__________ permission is needed for an application to use telephony services, network access or location information.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
application-permission
network-access
0
votes
1
answer
Normal Permissions in Android give access to isolated application-level functionalities.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
application-permission
application-functionalities
0
votes
1
answer
Instagram, Uber, Evernote are examples of _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
instagram
uber
evernote
0
votes
1
answer
DroidDream malware that hit the Android Market in 2011 is an example of _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
droiddream-malware
android-market
0
votes
1
answer
The testing approach, where the tester has no prior knowledge about the application being tested is _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
application-knowledge
0
votes
1
answer
Which among the following malware are stand-alone programs?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
stand-alone-programs
malware-programs
0
votes
1
answer
The testing approach that is more useful for protection against internal attacks is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
protection
internal-attacks
0
votes
1
answer
Which among the following is a part of the application layer of Android architecture?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
android-architecture
0
votes
1
answer
It is easy to detect poor code quality in an application.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
poor-quality-application
poor-security
0
votes
1
answer
The security model adopted by Android is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-app-security
security-model
0
votes
1
answer
The technique used by an attacker to gain access to another device may be broadly termed as __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps-security
access-gain
0
votes
1
answer
The type of mobile apps that provide the highest degree of reliability is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-apps
realiable-apps
0
votes
1
answer
Attacks that aim at performing malicious acts without being noticed:
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-attacks
system-attacks
malware-attacks
0
votes
1
answer
Which among the following pave the way for malware to spread?
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
mobile-app-security
malware-spread
0
votes
1
answer
A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
1
answer
Malicious code activated by a specific event or when a specific condition is met is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-code-activate
malicious-code
0
votes
1
answer
Which of the following is/are steps included in Static Analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
statc-analysis
0
votes
1
answer
Malicious software gathering information about users without their consent/knowledge is called _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-software
+1
vote
1
answer
Which of the following option/options is/are steps included in Dynamic Analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
dynamic-analysis
0
votes
1
answer
Which of the following types of files is supported by IDA pro?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
ida-pro
0
votes
1
answer
Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
malware
0
votes
1
answer
Which one of these is a Windows Hashing Tool?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
windows-hashing-tool
0
votes
1
answer
Dynamic malware analysis doesn’t need a lab set-up to run malware samples.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
dynamic-malware
malware-sample
0
votes
1
answer
The process by which malware avoids detection by changing the underlying code is known as polymorphism.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware
malware
code-snippet
Page:
« prev
1
...
562
563
564
565
566
567
568
569
570
571
572
...
667
...
next »
Recent questions
...