Mobile Security Quiz

12345678910
Across
  1. 4. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.​
  2. 6. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.​
  3. 8. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.​
  4. 9. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. 10. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.​
Down
  1. 1. (7) | An isolated environment restricting app access to the broader system to contain threats.​
  2. 2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.​
  3. 3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.​
  4. 5. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.​
  5. 7. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.​