Feature in iOS allows you to securely store small pieces of data like passwords
What is Keychain?
Themain purpose of Google Play Protect in Android devices
What is to scan and verify apps for malware and security threats?
The principle of Least Privilege in web security.
What is giving users the minimum levels of access necessary to perform their jobs?
This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
What is White Hat?
Which AWS service can be used to manage users and groups both inside and outside of AWS?
What is AWS IAM?
Role of Secure Enclave in iOS devices.
What is to securely handle encryption keys and biometric data?
The security measure in Android that isolates the app and prevents an app from accessing sensitive data of another app.
What is Application Sandbox?
HTTPS stand for this, and why is it important.
What is HyperText Transfer Protocol Secure; it encrypts data between the browser and the server?
Define the act of spoofing.
What is the act of disguising a communication from an unknown source as being from a known, trusted source
Amazon VPC, AWS Direct Connect and Amazon Route 53 are parts of what.
What is AWS Networking Services?
Term for checking the code of an app to ensure it has not been tampered with in iOS.
What is code signing?
The Android component helps in securing inter-process communication.
What is Binder?
This HTTP header can be used to prevent MIME type sniffing.
What is X-Content-Type-Options?
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.
What is, Bring Your Own Device
True or False. Each AWS service is priced independently
What is True?
This iOS framework helps in managing permissions and entitlements.
What is Security Framework?
The Android feature that uses a hardware-based keystore to manage cryptographic keys.
What is Android Keystore System?
Define Cross-Site Request Forgery (CSRF), and how can it be mitigated.
What is an attack where unauthorized commands are transmitted from a user that the web application trusts; mitigated by using CSRF tokens?
A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.
What is, Bitcoins?
This Amazon S3 storage class has the lowest cost.
What is S3 Glacier Deep Archive?
Type of attack does iOS mitigate by using techniques like pointer authentication.
What is memory corruption attacks?
SELinux's role in enhancing Android security.
What is Security-Enhanced Linux; it enforces mandatory access controls?
This HTTP header is used to prevent clickjacking attacks.
What is X-Frame-Options?
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
What is, Keylogging?
Which disaster recovery solution requires a scaled down version of a fully functional environment always running in the cloud.
What is Warm Standby?