Mobile Security Quiz
Across
- 4. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.
- 6. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.
- 8. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.
- 9. (9) | Collecting data remotely from devices to monitor performance or security status.
- 10. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.
Down
- 1. (7) | An isolated environment restricting app access to the broader system to contain threats.
- 2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.
- 3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.
- 5. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.
- 7. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.