Mobile app privacy Flashcards

1
Q

Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping

A

Insecure network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.

A

Web browser vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors.

A

Vulnerabilities in third-party libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly