ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 78 - ECSS discussion

Report
Export

Wesley, a fitness freak, purchased a new Apple smartwatch and synced it with a mobile app downloaded from an unauthorized third party. At the end of the day, when Wesley attempted to access his fitness report from the app, it generated an unusual report and asked for some unnecessary permissions to view it.

Which of the following mobile risks is demonstrated in the above scenario?

A.

Insecure data storage

Answers
A.

Insecure data storage

B.

Improper platform usage

Answers
B.

Improper platform usage

C.

Client code quality

Answers
C.

Client code quality

D.

Insecure authentication

Answers
D.

Insecure authentication

Suggested answer: B

Explanation:

In this scenario, Wesley's use of an unauthorized third-party mobile app to sync with his Apple smartwatch highlights the risk ofimproper platform usage. Here's why:

Unauthorized Third-Party App: Wesley downloaded the app from an unauthorized source, which means it hasn't undergone proper security checks or vetting. Such apps may contain vulnerabilities or malicious code.

Unusual Report and Unnecessary Permissions: The app generated an unusual fitness report and requested unnecessary permissions. This behavior indicates that the app is not following proper guidelines for platform usage.

Platform Security Guidelines: Mobile platforms (like iOS or Android) have specific guidelines for app development and usage. When users sideload apps from untrusted sources, they bypass these guidelines, risking security and privacy.

Risk Implications:

Data Privacy: Unauthorized apps may mishandle sensitive data (like fitness reports), leading to privacy breaches.

Malware or Spyware: The app could contain malicious code, potentially compromising the device or user data.

Permissions Abuse: Requesting unnecessary permissions can lead to data leakage or unauthorized access.

EC-Council Certified Security Specialist (E|CSS) documents and study guide provide insights into mobile security risks and best practices1.

EC-Council's focus on information security emphasizes the importance of proper platform usage and adherence to guidelines1.

asked 24/10/2024
David Guest
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first