which of the following attacks?
An attacker intercepts and potentially tampers with communication between two entities without
the knowledge of either of the two entities. This BEST describes which of the following attacks?
Which of the following is the simplest method to protect the network communications of the application?
A developer has written an Android application that uses the HttpURLConnection API to
communicate with a backend server. Which of the following is the simplest method to protect the
network communications of the application?
Which of the following BEST describes the responsibility of a TrustManager object when used in an Android appl
Which of the following BEST describes the responsibility of a TrustManager object when used in
an Android application with SSL?
Which of the following describes a way to perform certificate pinning in an SSL Android application?
Which of the following describes a way to perform certificate pinning in an SSL Android
application?
What does a KeyStore do in the Android SSL implementation?
What does a KeyStore do in the Android SSL implementation?
What additional task is accomplished by using mutual-authentication SSL as opposed to standard SSL?
What additional task is accomplished by using mutual-authentication SSL as opposed to standard
SSL?
How does HTTP Basic Authentication work?
How does HTTP Basic Authentication work?
How does HTTP Digest Authentication work?
How does HTTP Digest Authentication work?
What is an advantage of mutually authenticated SSL over standard HTTP authentication methods?
What is an advantage of mutually authenticated SSL over standard HTTP authentication
methods?
What are two advantages to using OAuth as the authentication method for an Android application to access a web
What are two advantages to using OAuth as the authentication method for an Android application
to access a web application or service? (Select TWO).