Failing to declare a class final can enable which of the following attacks on a developers code?
Answer : D
Which of the following describes a process by which one party confirms the identity of another party?
Answer : A
What level of security is provided by placing sensitive methods and data inside its own
Java package?
Answer : B
What is meant by one way function?
Answer : A
An architectural review is BEST for finding which of the following security defects?
Answer : C
Fine grained permission control for Content Providers can be achieved with:
Answer : D
A onetime pad is considered cryptographically secure, which are two ways it can be broken? (Select TWO).
Answer : B,C
Which of the following must be done on a typical Android project to enable reverse engineering countermeasures provided with the standard Android SDK?
Answer : A
Which of the following methodologies is BEST for a developer to find input validation weaknesses in their own mobile app source code?
Answer : C
What are two advantages to using OAuth as the authentication method for an Android application to access a web application or service? (Select TWO).
Answer : C,D
Which of the following must be protected in a symmetric encryption system?
Answer : B
Why should a developer add a ‘salt’ to a password?
Answer : B
How does HTTP Digest Authentication work?
Answer : D
Which of the following is fundamental to MOST transport layer encryption implementations?
Answer : C