Skip to content

Chapter 34 Quiz: Mobile & IoT Security

Test your knowledge of mobile threat categories, OWASP Mobile Top 10, MDM/MAM frameworks, platform security models, IoT attack surfaces, and mobile incident response.


Questions

1. An OWASP Mobile Top 10 finding shows that a banking application stores the user's authentication token in Android SharedPreferences in plaintext. Which OWASP Mobile Top 10 (2024) category does this violate?

  • A) M1: Improper Credential Usage
  • B) M2: Inadequate Supply Chain Security
  • C) M9: Insecure Data Storage
  • D) M4: Insufficient Input/Output Validation
Answer

C — M9: Insecure Data Storage

OWASP Mobile M9 (Insecure Data Storage) covers scenarios where sensitive data is stored in insecure locations accessible to other apps or attackers with device access: SharedPreferences, SQLite databases, log files, SD card, or app cache. The Android Keystore system should be used for cryptographic keys and sensitive credentials. Plaintext tokens in SharedPreferences are readable by any app with root access.


2. A corporation deploys Mobile Device Management (MDM) to company-owned devices. An employee also wants to use their personal iPhone for work email. Which mobile management approach best addresses BYOD without enrolling the personal device into full MDM?

  • A) Full MDM enrollment with a corporate configuration profile applied to the personal device
  • B) Mobile Application Management (MAM) — manage and protect only the corporate apps and data container, without controlling the personal device
  • C) Require the employee to use a separate company-issued device instead
  • D) Deploy a VPN client on the personal device and route all traffic through corporate infrastructure
Answer

B — Mobile Application Management (MAM) — manage and protect only the corporate apps and data container, without controlling the personal device

MAM (also called app-level management or containerization) allows the organization to manage corporate apps and the data within them without enrolling the personal device into MDM. The corporate data container is encrypted, can be remotely wiped independently of the device, and enforces copy/paste restrictions between work and personal apps. Full MDM on personal devices raises privacy concerns and legal issues in many jurisdictions.


3. What is the fundamental security model difference between Android and iOS regarding application installation?

  • A) Android requires apps to be signed; iOS does not
  • B) iOS uses a mandatory App Store review process and code signing enforced by Apple; Android allows sideloading (installation from unknown sources) with user permission
  • C) Android uses a sandbox; iOS applications share a common runtime environment
  • D) iOS supports rooting to bypass app restrictions; Android does not
Answer

B — iOS uses a mandatory App Store review process and code signing enforced by Apple; Android allows sideloading (installation from unknown sources) with user permission

iOS enforces a closed ecosystem: all apps must be notarized and signed by Apple; sideloading (outside TestFlight/MDM enterprise profiles) is restricted. Android allows APK sideloading from unknown sources with user acknowledgment. Both platforms use application sandboxing to isolate apps from each other, but Android's openness increases exposure to malicious APK distribution. Android enterprise features (Work Profile) can restrict sideloading on corporate devices.


4. An IoT medical device uses MQTT protocol to report patient telemetry to a cloud broker. A penetration tester discovers the device connects with username=device01 and password=device01 hardcoded in the firmware. Which IoT risk category does this represent?

  • A) Insecure Update Mechanism
  • B) Default and Hardcoded Credentials
  • C) Lack of Physical Hardening
  • D) Poor Physical Security
Answer

B — Default and Hardcoded Credentials

Hardcoded and default credentials are one of the most pervasive and exploited IoT vulnerabilities (OWASP IoT Top 10: I1). The Mirai botnet infected hundreds of thousands of IoT devices by scanning for default credentials. Hardcoded credentials cannot be changed by the user — firmware updates are required to fix them. MQTT without TLS and with weak credentials enables eavesdropping on sensitive telemetry (patient data in this case, creating HIPAA implications).


5. A security architect is asked to segment IoT devices on a manufacturing floor from the corporate network. What is the recommended network architecture?

  • A) Place all IoT devices on the corporate VLAN with firewall rules restricting their internet access
  • B) Deploy IoT devices on a dedicated isolated VLAN/network segment with a firewall enforcing strict whitelisted communication rules to a purpose-built IoT gateway
  • C) Use MAC address filtering on the corporate switch to restrict IoT devices
  • D) Disable DHCP for IoT devices and use static IPs to prevent unauthorized access
Answer

B — Deploy IoT devices on a dedicated isolated VLAN/network segment with a firewall enforcing strict whitelisted communication rules to a purpose-built IoT gateway

IoT network segmentation places OT/IoT devices on a dedicated network segment, isolated from the corporate LAN. A firewall enforces allow-list rules: IoT devices can only communicate with their specific management/telemetry gateway — not with each other (east-west blocked) or the internet (direct). MAC filtering (C) and static IPs (D) are trivially bypassed and do not provide real isolation.


6. A researcher performs firmware analysis on a consumer IoT thermostat and discovers the UART debug interface is accessible on the PCB and outputs a root shell on boot. Which attack surface category does this represent?

  • A) Supply chain compromise
  • B) Insecure network services
  • C) Physical attack surface — exposed debug interfaces (JTAG, UART, ICSP)
  • D) Insecure cloud interface
Answer

C — Physical attack surface — exposed debug interfaces (JTAG, UART, ICSP)

Manufacturing debug interfaces (UART, JTAG, SWD, ICSP) left active and accessible on production hardware expose a physical attack surface. An attacker with physical access can extract firmware, inject code, or obtain a root shell. Mitigations include: disabling or destroying debug interfaces in production firmware, requiring authentication on debug ports, and using secure boot. Physical attacks are often overlooked in IoT security modeling.


7. MQTT (Message Queuing Telemetry Transport) is a common IoT messaging protocol. Which security configuration is most critical when deploying MQTT in a production IoT environment?

  • A) Use MQTT over port 1883 (default) for maximum compatibility
  • B) Enable TLS on port 8883, require client certificate authentication, and implement topic-level ACLs to restrict what each device can publish/subscribe to
  • C) Disable the MQTT broker's logging to reduce storage costs
  • D) Use MQTT v3.1 for backward compatibility with legacy devices
Answer

B — Enable TLS on port 8883, require client certificate authentication, and implement topic-level ACLs to restrict what each device can publish/subscribe to

MQTT security best practices: TLS encryption (port 8883 vs. plaintext 1883), client certificate authentication (prevents unauthorized devices from connecting), and topic-level ACLs (device01 can only publish to devices/device01/telemetry, not subscribe to other devices' topics). Without these controls, any device on the network can read all telemetry and publish arbitrary commands to any actuator.


8. A mobile application undergoes penetration testing. The tester finds that the app uses certificate pinning for its API calls but is bypassed using Frida to hook the SSL validation function at runtime. What does this bypass technique demonstrate?

  • A) Certificate pinning is fundamentally broken and should not be used
  • B) Certificate pinning is effective against network-based MitM attacks but can be bypassed by attackers with root/jailbreak access who can instrument the app's runtime
  • C) The app is using the wrong pinning method — only public key pinning is bypassable
  • D) iOS certificate pinning is stronger than Android and would not be bypassed by Frida
Answer

B — Certificate pinning is effective against network-based MitM attacks but can be bypassed by attackers with root/jailbreak access who can instrument the app's runtime

Certificate pinning prevents network-level MitM (e.g., a corporate proxy or attacker inserting their certificate). However, on a rooted/jailbroken device, dynamic instrumentation tools (Frida, Objection) can hook the app's runtime and override the pin validation logic. This is a known limitation: pinning protects against passive network interception but not against an attacker who controls the device. Defense-in-depth (obfuscation, anti-tampering, root detection) reduces but does not eliminate this risk.


9. During a mobile incident response, an analyst must preserve evidence from an iOS device that may contain malware installed via a malicious MDM profile. What is the recommended first step?

  • A) Perform a factory reset to eliminate the malware before forensic collection
  • B) Isolate the device from the network (airplane mode / Faraday bag) to prevent remote wipe, then perform a logical or filesystem acquisition using a mobile forensics tool
  • C) Remove the SIM card and reboot the device into recovery mode
  • D) Submit the device directly to Apple for analysis
Answer

B — Isolate the device from the network (airplane mode / Faraday bag) to prevent remote wipe, then perform a logical or filesystem acquisition using a mobile forensics tool

The first preservation priority in mobile IR is network isolation — an MDM or remote wipe command sent before acquisition destroys evidence. Airplane mode disconnects cellular and Wi-Fi; a Faraday bag provides RF shielding. After isolation, use a validated mobile forensics tool (Cellebrite UFED, Oxygen Forensics, GrayKey) for acquisition. Factory reset (A) is evidence destruction. Rebooting (C) may alter volatile state.


10. An organization's security team reviews the OWASP Mobile Top 10 category "M6: Inadequate Privacy Controls." Which scenario is the best example?

  • A) An app stores passwords in a local SQLite database without encryption
  • B) A fitness tracking app collects precise GPS location in the background and shares it with third-party advertising SDKs without user consent or disclosure in the privacy policy
  • C) An app communicates with its API over HTTP rather than HTTPS
  • D) An app fails to validate server-side input, allowing SQL injection
Answer

B — A fitness tracking app collects precise GPS location in the background and shares it with third-party advertising SDKs without user consent or disclosure in the privacy policy

OWASP Mobile M6 (Inadequate Privacy Controls) covers scenarios where apps collect, process, or share personal data in ways that violate user expectations or privacy regulations (GDPR, CCPA). Covert GPS collection and undisclosed third-party data sharing is a textbook M6 violation. It also creates regulatory liability. M9 covers insecure storage (A), M5 covers insecure communication (C), and M4 covers input validation (D).


Scoring

Score Performance
9–10 Expert — Mobile and IoT security threats and mitigations fully mastered
7–8 Proficient — Ready to lead mobile security programs and IoT risk assessments
5–6 Developing — Review Chapter 34 sections on OWASP Mobile Top 10, MDM/MAM, and IoT segmentation
<5 Foundational — Re-read Chapter 34 before proceeding

Return to Chapter 34 | Next: Chapter 35