iOS
Android
Web
General
AWS Cloud
100

Feature in iOS allows you to securely store small pieces of data like passwords

What is Keychain?

100

Themain purpose of Google Play Protect in Android devices

What is to scan and verify apps for malware and security threats?

100

The principle of Least Privilege in web security.

What is giving users the minimum levels of access necessary to perform their jobs?

100

This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability

What is White Hat?

100

Which AWS service can be used to manage users and groups both inside and outside of AWS?

What is AWS IAM?

200

Role of Secure Enclave in iOS devices.

What is to securely handle encryption keys and biometric data?

200

The security measure in Android that isolates the app and prevents an app from accessing sensitive data of another app.

What is Application Sandbox?

200

HTTPS stand for this, and why is it important.

What is HyperText Transfer Protocol Secure; it encrypts data between the browser and the server?

200

Define the act of spoofing.

What is the act of disguising a communication from an unknown source as being from a known, trusted source

200

Amazon VPC, AWS Direct Connect and Amazon Route 53 are parts of what.

What is AWS Networking Services?

300

Term for checking the code of an app to ensure it has not been tampered with in iOS.

What is code signing?

300

The Android component helps in securing inter-process communication.

What is Binder?

300

This HTTP header can be used to prevent MIME type sniffing.

What is X-Content-Type-Options?

300

Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.

What is, Bring Your Own Device

300

True or False. Each AWS service is priced independently

What is True?

400

This iOS framework helps in managing permissions and entitlements.

What is Security Framework?

400

The Android feature that uses a hardware-based keystore to manage cryptographic keys.

What is Android Keystore System?

400

Define Cross-Site Request Forgery (CSRF), and how can it be mitigated.

What is an attack where unauthorized commands are transmitted from a user that the web application trusts; mitigated by using CSRF tokens?

400

A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.

What is, Bitcoins?

400

This Amazon S3 storage class has the lowest cost.

What is S3 Glacier Deep Archive?

500

Type of attack does iOS mitigate by using techniques like pointer authentication.

What is memory corruption attacks?

500

SELinux's role in enhancing Android security.

What is Security-Enhanced Linux; it enforces mandatory access controls?

500

This HTTP header is used to prevent clickjacking attacks.

What is X-Frame-Options?

500

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.

What is, Keylogging?

500

Which disaster recovery solution requires a scaled down version of a fully functional environment always running in the cloud.

What is Warm Standby?