GIAC GMOB Certification Sample Questions

GMOB Dumps, GMOB PDF, GMOB VCE, GIAC Mobile Device Security Analyst VCE, GIAC GMOB PDFThe purpose of this Sample Question Set is to provide you with information about the GIAC Mobile Device Security Analyst (GMOB) exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the GMOB certification test. To get familiar with real exam environment, we suggest you try our Sample GIAC GMOB Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual GIAC Mobile Device Security Analyst (GMOB) certification exam.

These sample questions are simple and basic questions that represent likeness to the real GIAC Mobile Device Security Analyst exam questions. To assess your readiness and performance with real-time scenario based questions, we suggest you prepare with our Premium GIAC GMOB Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

GIAC GMOB Sample Questions:

01. What functionality allows a device owner to locate, lock, or erase a mobile device remotely?
a) Bluetooth tethering
b) Remote wipe
c) Custom launcher
d) NFC payments
 
02. Which of the following are key elements to examine when performing a security assessment of Android applications?
(Choose Three)
a) Application sandboxing
b) APK file permissions
c) Use of third-party libraries
d) Android version compatibility
 
03. How can you observe and manipulate the data traffic of an encrypted app without breaking the encryption?
a) By decrypting the traffic using brute force attacks
b) By using antivirus software
c) By enabling Airplane mode on the device
d) By setting up a proxy server to intercept the traffic
 
04. What is the significance of using SSL/TLS interception in network security testing?
a) To validate the strength of encryption algorithms
b) To decrypt and inspect SSL/TLS encrypted traffic
c) To increase the encryption level
d) To streamline network traffic
 
05. In penetration testing, which methods are effective for capturing traffic from mobile applications?
(Choose Two)
a) ARP poisoning
b) DNS spoofing
c) Installing a legitimate SSL certificate
d) Port scanning
 
06. When evaluating an application's security, which of the following is a red flag related to permission usage?
(Choose Two)
a) Requesting permissions not relevant to the app’s functionality
b) Requesting permission to access the Internet
c) Usage of ACCESS_BACKGROUND_LOCATION
d) Usage of NFC for data transfer
 
07. How does encryption contribute to data security on stolen mobile devices?
a) It enhances the speed of the device
b) It prevents unauthorized access to data
c) It improves the accuracy of GPS tracking
d) It reduces battery consumption
 
08. Which technique is effective in detecting obfuscated or hidden malicious code in mobile applications?
a) Syntax highlighting
b) Code linting
c) Static code analysis
d) Peer review
 
09. In the context of MASVS, what is the purpose of regression testing?
a) To ensure the app remains effective after updates
b) To validate new features against security standards
c) To check the effectiveness of the reverse engineering tools
d) To benchmark app performance over time
 
10. What iOS tool can be used to perform dynamic analysis on iOS apps to monitor system calls and runtime changes?
a) Xcode
b) Cycript
c) Frida
d) LLVM

Answers:

Question: 01
Answer: b
Question: 02
Answer: a, b, c
Question: 03
Answer: d
Question: 04
Answer: b
Question: 05
Answer: a, b
Question: 06
Answer: a, c
Question: 07
Answer: b
Question: 08
Answer: c
Question: 09
Answer: a
Question: 10
Answer: c

Note: For any error in GIAC Mobile Device Security Analyst (GMOB) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 5 / 5 (76 votes)