Sample Questions
Q) Which of the following is a reason to take a mobile application security seriously when developing a social networking application, which does not accept payments? (Choose two)
a) PCI DSS rules
b) Privacy expectations of consumers and rules
c) HIPAA rules
d) compliance with FIPS
e) company image
Q) Which of the following attempts to prevent the program from the Trojan and multiply?
a) Change security code.
b) Encrypting configuration file.
c) Ensuring proper authorization is allocated to each component.
d) Enter the information coming through the network using the HTTPS protocol.
e) None
Q) Which of the following are essential for most implementations of encryption transport layer?
a) device password
b) blackout
c) HTTPS
d) Trinket
e) None
Q) Which of the following can be performed to find constructive security flaws in mobile applications, before you write code?
a) threat modeling
b) Penetration tests
c) Static source code analysis
d) Testing Dynamic check
e) None