Exam ADR-001: Mobile App Security+ Certification (Android Edition) Questions & Answers

Which of the following is a reason to take mobile app security seriously when developing a social networking app that does NOT accept payments?
Which of the following accurately explains why many people criticize the use of a unique hardware ID such as IMEI/MEID to identify users?
Which of the following attempts to inhibit an application from being trojanized and proliferating?
Which of the following is fundamental to MOST transport layer encryption implementations?
Which of the following can be performed to find security design flaws in mobile apps prior to writing code?
Which of the following methodologies is BEST for a developer to find input validation weaknesses in their own mobile app source code?
Which of the following techniques are useful in a secure software development process?
Which of the following will LEAST likely be detected through source code analysis?
Which of the following is the MOST reliable form of input validation?
Which of the following storage strategies is MOST secure?
Which of the following describes a best practice in a software system?
Which of the following provides an enumeration of software weaknesses to be avoided?
Which potential key security risk?
Which of the following is true regarding DNS?
Which of the following is an effective means of confirming data integrity?
Which of the following is the MOST important piece of data to start with?
Which of the following security defects?
Which of the following describes a security risk that may have to be accepted when using a commercial cross-platform mobile application framework?
What categories of weaknesses are considered using Microsoft’s threat modeling process?
Android’s kernel-level app sandbox provides security by:
Back to the top