1. What is Apple’s primary security model for protecting user data and device integrity?
A) Open-source security model
B) Walled garden security model
C) Decentralized trust model
D) Cloud-based security model
Answer: B) Walled garden security model
Explanation: Apple follows a walled garden security model, meaning it tightly controls hardware, software, and app distribution through the App Store. This approach reduces malware risks by restricting third-party access and ensuring apps are reviewed before being published.
2. What is the primary purpose of the Secure Enclave in iOS devices?
A) To store all installed apps securely
B) To provide secure processing for sensitive data like biometrics
C) To speed up device performance
D) To encrypt iCloud backups
Answer: B) To provide secure processing for sensitive data like biometrics
Explanation: The Secure Enclave is a separate co-processor in Apple devices designed to handle sensitive operations like Face ID, Touch ID, and encryption keys. It runs an isolated operating system, preventing unauthorized access even if the main OS is compromised.
3. What encryption standard does Apple use for encrypting user data on iPhones?
A) AES-256
B) RSA-2048
C) SHA-512
D) DES-128
Answer: A) AES-256
Explanation: Apple employs AES-256 encryption for securing data at rest on iOS devices. This strong encryption standard ensures that even if a device is lost or stolen, the data remains protected against brute-force attacks.
4. How does Apple enforce app security in the iOS ecosystem?
A) By allowing only apps from verified developers
B) By performing static and dynamic analysis on apps before approval
C) By restricting access to certain APIs
D) All of the above
Answer: D) All of the above
Explanation: Apple enforces strict app security by:
- Requiring developers to be verified.
- Performing static and dynamic analysis on apps to detect malicious behavior.
- Restricting access to sensitive APIs (e.g., private frameworks) to prevent exploitation.
5. What is the role of the iOS sandboxing mechanism?
A) To prevent one app from accessing another app’s data
B) To allow apps to run with administrative privileges
C) To increase battery life
D) To improve network performance
Answer: A) To prevent one app from accessing another app’s data
Explanation: Sandboxing isolates apps from each other and the operating system, preventing unauthorized access to sensitive data. Even if an app is compromised, it cannot access other apps or system files.
6. What security feature ensures that only Apple-approved code runs on iOS devices?
A) FileVault
B) Code signing
C) Kernel patching
D) Firewall rules
Answer: B) Code signing
Explanation: Apple uses code signing to verify that only approved software can run on iOS devices. This prevents malware and unauthorized modifications, ensuring system integrity.
7. What is the purpose of Apple’s Lockdown Mode introduced in iOS 16?
A) To disable all iCloud features
B) To provide extreme security for high-risk users
C) To encrypt all app data twice
D) To block incoming calls
Answer: B) To provide extreme security for high-risk users
Explanation: Lockdown Mode is an advanced security feature designed for users facing targeted cyber threats, such as journalists and activists. It disables certain functionalities, like message attachments and link previews, to minimize attack surfaces.
8. What method does Apple use to prevent brute-force attacks on device passcodes?
A) Rate limiting login attempts
B) Automatic device shutdown
C) Biometric authentication only
D) Disabling passcode entry
Answer: A) Rate limiting login attempts
Explanation: Apple implements rate limiting for passcode entry, making it increasingly difficult to guess passcodes by introducing time delays and, in some cases, wiping data after multiple incorrect attempts.
9. What is the purpose of iOS App Transport Security (ATS)?
A) To enforce HTTPS connections for apps
B) To optimize app performance
C) To limit app permissions
D) To increase battery life
Answer: A) To enforce HTTPS connections for apps
Explanation: ATS (App Transport Security) forces apps to use secure HTTPS connections instead of HTTP, ensuring encrypted data transmission between apps and servers to prevent man-in-the-middle attacks.
10. What is Apple’s FileVault used for?
A) Encrypting macOS disks
B) Encrypting iPhone backups
C) Encrypting iOS app data
D) Encrypting emails
Answer: A) Encrypting macOS disks
Explanation: FileVault is a full-disk encryption feature used in macOS, not iOS. iOS devices use built-in AES-256 encryption to secure data.
11. Which Apple feature helps prevent phishing attacks in Safari?
A) Intelligent Tracking Prevention
B) App Sandboxing
C) Secure Boot
D) FileVault
Answer: A) Intelligent Tracking Prevention
Explanation: Intelligent Tracking Prevention (ITP) is a Safari feature that blocks tracking cookies and prevents phishing attacks by limiting cross-site tracking.
12. What is Apple’s Secure Boot process?
A) A method to encrypt all installed apps
B) A security feature that checks system integrity at startup
C) A feature that blocks all third-party software
D) A way to reset iOS devices remotely
Answer: B) A security feature that checks system integrity at startup
Explanation: Secure Boot ensures that only Apple-signed software runs during startup, preventing rootkits and malware from tampering with the boot process.
13. How does Apple’s Private Relay improve user privacy?
A) By encrypting all web traffic
B) By preventing Apple from seeing user IP addresses
C) By blocking all tracking cookies
D) By disabling location services
Answer: B) By preventing Apple from seeing user IP addresses
Explanation: Private Relay is part of iCloud+ that routes web traffic through multiple relay servers, hiding users’ IP addresses from both Apple and third parties.
14. What security feature prevents third-party keyboards from logging sensitive data?
A) App Transport Security
B) Secure Enclave
C) Data Protection API
D) iOS Sandbox
Answer: D) iOS Sandbox
Explanation: Third-party keyboards are sandboxed, meaning they cannot access user data outside their permitted scope, preventing keylogging.
15. What does Apple use to detect jailbroken devices?
A) Secure Boot
B) Runtime integrity checks
C) Remote device scanning
D) FileVault
Answer: B) Runtime integrity checks
Explanation: iOS performs runtime integrity checks to detect unauthorized modifications (jailbreaking), ensuring the system remains secure.
16. How does Apple ensure that iOS updates are not tampered with during transmission?
A) By requiring manual installation from Apple Stores
B) By encrypting updates with Secure Socket Layer (SSL)
C) By using signed firmware with cryptographic verification
D) By distributing updates only via iCloud
Answer: C) By using signed firmware with cryptographic verification
Explanation: Apple signs all iOS firmware updates using cryptographic keys. During installation, the device verifies the signature to ensure it has not been modified by an attacker, preventing malicious updates.
17. What security feature does Apple use to protect sensitive data stored on the device when it is locked?
A) Data-at-rest encryption
B) Secure Shell (SSH)
C) Web Application Firewall
D) JavaScript Obfuscation
Answer: A) Data-at-rest encryption
Explanation: Apple encrypts all user data at rest using AES-256 encryption when the device is locked. This ensures that even if a device is stolen, the data remains secure unless unlocked.
18. What is Apple’s approach to handling zero-day vulnerabilities?
A) Apple provides bug bounties and security patches
B) Apple waits for security researchers to release fixes
C) Apple ignores zero-day vulnerabilities
D) Apple removes vulnerable apps from the App Store
Answer: A) Apple provides bug bounties and security patches
Explanation: Apple runs a bug bounty program that rewards security researchers for finding zero-day vulnerabilities. They also release security patches through iOS updates to fix vulnerabilities as quickly as possible.
19. What security feature protects Apple ID accounts from unauthorized access?
A) Two-Factor Authentication (2FA)
B) App Transport Security
C) Secure Enclave
D) FileVault
Answer: A) Two-Factor Authentication (2FA)
Explanation: Apple enforces Two-Factor Authentication (2FA) for Apple ID, requiring both a password and a one-time code sent to a trusted device for added security.
20. Which security measure prevents third-party applications from accessing user contacts, photos, or microphone without permission?
A) App Sandbox
B) Biometric Authentication
C) Firewall Rules
D) Secure Boot
Answer: A) App Sandbox
Explanation: Apple’s App Sandbox enforces strict permission controls, ensuring that apps can only access user data (e.g., photos, contacts, microphone) with explicit user permission.
21. How does Apple protect biometric authentication data (Face ID & Touch ID)?
A) By storing it in iCloud for backups
B) By encrypting and storing it in the Secure Enclave
C) By storing it on Apple servers
D) By sharing it with third-party apps
Answer: B) By encrypting and storing it in the Secure Enclave
Explanation: Biometric data is never stored in iCloud or shared. Instead, it is stored securely in the Secure Enclave, where it cannot be accessed even by iOS itself.
22. What security feature prevents malicious apps from running in the background without user consent?
A) App Review Process
B) Runtime App Permissions
C) Automatic Process Termination
D) All of the above
Answer: D) All of the above
Explanation: iOS enforces strict background execution policies through app review, runtime permissions, and automatic termination of unauthorized processes.
23. What is Apple’s approach to detecting malicious activity within apps?
A) Static and dynamic analysis of apps before approval
B) Periodic scanning of installed apps
C) Disabling unverified applications
D) Encrypting app data
Answer: A) Static and dynamic analysis of apps before approval
Explanation: Apple analyzes app behavior using static and dynamic techniques before allowing apps into the App Store, preventing malware infiltration.
24. What is a major difference between iOS security and Android security?
A) iOS allows sideloading of apps
B) iOS does not allow third-party app stores
C) iOS uses open-source security policies
D) iOS does not have sandboxing
Answer: B) iOS does not allow third-party app stores
Explanation: Unlike Android, iOS restricts app installation to the Apple App Store, preventing unauthorized or malicious apps from being installed.
25. What is the purpose of Apple’s Private Relay in Safari?
A) To provide an encrypted VPN for all network traffic
B) To hide the user’s IP address and prevent tracking
C) To disable cookies
D) To scan for phishing websites
Answer: B) To hide the user’s IP address and prevent tracking
Explanation: Private Relay helps prevent websites and advertisers from tracking users by hiding IP addresses and routing traffic through multiple relay points.
26. How does Apple prevent unauthorized firmware modifications?
A) Secure Boot
B) Secure Enclave
C) FileVault
D) App Store Review
Answer: A) Secure Boot
Explanation: Secure Boot ensures that only Apple-signed firmware can be loaded onto an iOS device, preventing unauthorized modifications or jailbreak attempts.
27. Which Apple security feature ensures that a lost or stolen iPhone cannot be reactivated without the owner’s Apple ID?
A) Secure Boot
B) Activation Lock
C) Private Relay
D) Find My iPhone
Answer: B) Activation Lock
Explanation: Activation Lock prevents stolen iPhones from being reset and used by unauthorized users without the original owner’s Apple ID and password.
28. What is Apple’s approach to protecting messages in iMessage?
A) End-to-end encryption
B) Hash-based message integrity
C) Server-based encryption
D) Firewall protection
Answer: A) End-to-end encryption
Explanation: Apple uses end-to-end encryption for iMessage, ensuring that messages can only be read by the sender and the recipient.
29. Which Apple framework is used to enforce secure authentication and cryptographic functions?
A) CoreCrypto
B) CryptoKit
C) SecureStore
D) AppleCrypto
Answer: B) CryptoKit
Explanation: CryptoKit is an Apple framework that provides secure cryptographic functions for authentication, hashing, and encryption.
30. What security risk does Jailbreaking introduce to iOS devices?
A) Bypasses security restrictions and allows malware installation
B) Enables additional security features
C) Prevents Apple from updating iOS
D) Makes biometric authentication stronger
Answer: A) Bypasses security restrictions and allows malware installation
Explanation: Jailbreaking removes Apple’s security protections, allowing malware, spyware, and unauthorized modifications, making the device vulnerable.
31. What is the main security risk of using an iPhone with outdated iOS software?
A) Reduced battery life
B) Exposure to known security vulnerabilities
C) Loss of Face ID
D) Slower app performance
Answer: B) Exposure to known security vulnerabilities
Explanation: Apple regularly patches security vulnerabilities in iOS updates. Using an outdated version increases the risk of exploitation.
32. How does Apple’s “Sign in with Apple” enhance security over other sign-in methods?
A) It provides end-to-end encryption for login details
B) It uses private email relay to mask user email addresses
C) It stores passwords securely on iCloud
D) It allows users to bypass authentication
Answer: B) It uses private email relay to mask user email addresses
Explanation: Sign in with Apple prevents websites from tracking users by providing a randomized email address instead of the user’s real email.
33. What is Apple’s strategy for reducing the risk of zero-click exploits on iOS?
A) Requiring manual approval for all app installations
B) Implementing hardware-based memory protections
C) Allowing only Apple apps on iOS
D) Blocking all network traffic by default
Answer: B) Implementing hardware-based memory protections
Explanation: Apple uses hardware-based security mechanisms like Pointer Authentication Codes (PAC) and Memory Tagging to protect against zero-click exploits, which do not require user interaction to execute.
34. What is Apple’s BlastDoor sandbox, introduced in iOS 14, designed to protect?
A) The iOS kernel from malware
B) iMessage from malicious payloads
C) The App Store from fake apps
D) Safari from phishing attacks
Answer: B) iMessage from malicious payloads
Explanation: BlastDoor is a sandboxing system for iMessage, introduced in iOS 14 to analyze and process incoming messages in isolation, preventing exploits from affecting the rest of the system.
35. How does Apple protect sensitive data in iCloud backups?
A) By using end-to-end encryption for all backup data
B) By encrypting only media files
C) By allowing users to set custom encryption keys
D) By storing backups in plain text on Apple servers
Answer: A) By using end-to-end encryption for all backup data
Explanation: Apple provides end-to-end encryption for certain data types in iCloud, ensuring that only the user can access their information.
36. How does iOS prevent unauthorized USB access when a device is locked?
A) By disabling USB functionality after a period of inactivity
B) By requiring a passcode before allowing data transfer
C) By automatically wiping all USB data
D) By allowing only Apple-verified accessories to connect
Answer: B) By requiring a passcode before allowing data transfer
Explanation: iOS includes USB Restricted Mode, which blocks USB data connections if the device has been locked for more than an hour, preventing unauthorized access via forensic tools.
37. What security feature does Apple use to ensure that malicious web pages cannot access device hardware?
A) App Sandboxing
B) Safari Intelligent Tracking Prevention
C) WebKit Process Isolation
D) Secure Boot
Answer: C) WebKit Process Isolation
Explanation: WebKit Process Isolation ensures that each web page runs in a separate process, preventing malicious pages from accessing the camera, microphone, or system resources.
38. What is the primary role of the T2 Security Chip in Apple devices?
A) To enhance processing power
B) To act as a separate security processor
C) To store additional user data
D) To increase storage encryption speed
Answer: B) To act as a separate security processor
Explanation: The T2 Security Chip (found in Mac devices) provides hardware-level security for encryption, biometric authentication, and Secure Boot.
39. How does iOS protect against brute-force attacks on Face ID and Touch ID?
A) By requiring additional authentication after multiple failed attempts
B) By locking the device permanently after five failed attempts
C) By wiping all biometric data after three failed attempts
D) By resetting Face ID and Touch ID every 24 hours
Answer: A) By requiring additional authentication after multiple failed attempts
Explanation: If multiple failed Face ID or Touch ID attempts occur, iOS requires a passcode to unlock the device, preventing brute-force attacks.
40. What security advantage does Apple’s Secure Element provide for Apple Pay transactions?
A) It stores payment data securely and prevents external access
B) It encrypts credit card details using user passwords
C) It requires additional PIN entry for transactions
D) It connects to third-party banking apps for verification
Answer: A) It stores payment data securely and prevents external access
Explanation: The Secure Element is a dedicated hardware chip that securely processes Apple Pay transactions and prevents tampering or external access.
41. How does iOS prevent rogue configuration profiles from compromising security?
A) By only allowing profiles signed by Apple
B) By blocking all third-party profiles
C) By requiring user approval and authentication
D) By scanning profiles for malware before installation
Answer: C) By requiring user approval and authentication
Explanation: iOS requires users to manually approve configuration profiles and enter their passcode, reducing the risk of malicious MDM (Mobile Device Management) attacks.
42. What is the primary role of Apple’s Find My Network encryption?
A) To allow users to track stolen devices anonymously
B) To encrypt Bluetooth connections
C) To prevent location data from being intercepted
D) To erase stolen devices remotely
Answer: C) To prevent location data from being intercepted
Explanation: Find My Network encryption ensures that a lost device’s location data is end-to-end encrypted, preventing unauthorized access.
43. How does iOS protect users from app permission abuse?
A) By allowing users to revoke permissions at any time
B) By blocking third-party apps from using system resources
C) By running background security scans
D) By only allowing apps from Apple developers
Answer: A) By allowing users to revoke permissions at any time
Explanation: iOS enables users to manage and revoke app permissions for camera, microphone, location, and more, protecting against app abuse.
44. How does Apple’s “Hide My Email” feature improve privacy?
A) By creating randomized email addresses for sign-ups
B) By encrypting all emails before delivery
C) By blocking spam messages automatically
D) By disabling email tracking scripts
Answer: A) By creating randomized email addresses for sign-ups
Explanation: Hide My Email allows users to generate randomized email aliases to prevent tracking and reduce spam.
45. What is the purpose of Apple’s System Integrity Protection (SIP) in macOS?
A) To prevent unauthorized modifications to system files
B) To enforce biometric authentication for login
C) To encrypt user data automatically
D) To block all network connections by default
Answer: A) To prevent unauthorized modifications to system files
Explanation: SIP (System Integrity Protection) restricts root-level modifications to system files, preventing malware and unauthorized tampering.
46. How does iOS protect against spyware such as Pegasus?
A) Lockdown Mode
B) Safari Tracking Prevention
C) Secure Boot
D) T2 Security Chip
Answer: A) Lockdown Mode
Explanation: Lockdown Mode disables potentially vulnerable features like link previews and message attachments, protecting users from spyware like Pegasus.
47. What security measure does Apple use to prevent cross-site scripting (XSS) attacks in Safari?
A) Content Security Policy (CSP)
B) Intelligent Tracking Prevention
C) Secure Boot
D) App Review Process
Answer: A) Content Security Policy (CSP)
Explanation: Safari enforces Content Security Policy (CSP) to block unauthorized scripts, preventing XSS attacks.
48. What happens when an iPhone enters “Stolen Device Protection” mode?
A) Certain security settings are restricted
B) It automatically locks the device
C) All user data is erased
D) The device is permanently disabled
Answer: A) Certain security settings are restricted
Explanation: Stolen Device Protection restricts security settings when the device is away from familiar locations, preventing thieves from disabling security features.
49. How does Apple’s Mail Privacy Protection enhance security?
A) By blocking email tracking pixels
B) By encrypting all emails
C) By disabling email attachments
D) By verifying sender authenticity
Answer: A) By blocking email tracking pixels
Explanation: Mail Privacy Protection prevents email senders from tracking user activity by blocking tracking pixels.
50. What security feature ensures that AirDrop file transfers are protected?
A) Encryption and mutual authentication
B) Firewall-based scanning
C) Time-limited access control
D) Apple ID verification
Answer: A) Encryption and mutual authentication
Explanation: AirDrop uses end-to-end encryption and mutual authentication to prevent man-in-the-middle (MITM) attacks during file transfers.
51. What is the purpose of Apple’s Gatekeeper security feature in macOS?
A) To prevent malware from running on macOS
B) To encrypt all files on the device
C) To block network traffic
D) To enforce firewall settings
Answer: A) To prevent malware from running on macOS
Explanation: Gatekeeper ensures that only Apple-approved and notarized apps can run on macOS, preventing malware infections from unauthorized apps.
52. How does iOS handle kernel-level security?
A) By making the kernel read-only at runtime
B) By allowing users to modify the kernel
C) By enabling root access for all apps
D) By using an open-source kernel
Answer: A) By making the kernel read-only at runtime
Explanation: Apple makes the iOS kernel read-only at runtime, preventing malicious modifications or rootkits from altering the system.
53. What security feature ensures apps cannot access clipboard data without permission?
A) Clipboard Transparency
B) App Sandbox
C) Secure Enclave
D) Runtime Integrity Checks
Answer: A) Clipboard Transparency
Explanation: Clipboard Transparency (introduced in iOS 14) notifies users when an app accesses the clipboard, preventing unauthorized data extraction.
54. How does Apple protect iOS devices from MITM (Man-in-the-Middle) attacks on Wi-Fi networks?
A) By enforcing certificate pinning in apps
B) By allowing only Apple-verified networks
C) By encrypting all network traffic
D) By requiring VPN connections
Answer: A) By enforcing certificate pinning in apps
Explanation: Apple encourages certificate pinning, ensuring that apps verify server certificates before establishing a secure connection, reducing MITM risks.
55. What happens if an attacker tries to brute-force an iPhone passcode?
A) iOS introduces increasing time delays after failed attempts
B) iPhone sends an alert to Apple
C) iPhone automatically wipes all data
D) The passcode is reset to a default value
Answer: A) iOS introduces increasing time delays after failed attempts
Explanation: iOS uses progressive time delays between failed passcode attempts, making brute-force attacks time-consuming and impractical.
56. What mechanism does Apple use to verify AirTag ownership and prevent stalking?
A) Anti-Stalking Alerts
B) Secure Boot
C) Device Pairing Encryption
D) Activation Lock
Answer: A) Anti-Stalking Alerts
Explanation: Apple provides Anti-Stalking Alerts, notifying users if an unknown AirTag is traveling with them, preventing unauthorized tracking.
57. How does Apple’s Secure Enclave differ from the main processor?
A) It operates independently for secure data processing
B) It has its own operating system
C) It cannot be accessed by iOS directly
D) All of the above
Answer: D) All of the above
Explanation: The Secure Enclave is isolated from the main processor, has its own OS, and cannot be accessed by iOS, ensuring secure handling of encryption keys and biometric data.
58. What security feature ensures that macOS updates are tamper-proof?
A) Cryptographically signed updates
B) Encrypted update packages
C) Secure Boot validation
D) Apple ID authentication
Answer: A) Cryptographically signed updates
Explanation: MacOS updates are cryptographically signed, ensuring that only legitimate Apple updates can be installed.
59. What Apple feature ensures that emergency contacts can always be reached?
A) Emergency SOS
B) Secure Boot
C) Private Relay
D) Two-Factor Authentication
Answer: A) Emergency SOS
Explanation: Emergency SOS allows users to quickly contact emergency services even when the phone is locked, ensuring safety.
60. What Apple feature helps prevent accidental access to sensitive account credentials?
A) Password AutoFill with Face ID
B) Touch ID logging for all apps
C) Encrypted emails for passwords
D) VPN encryption
Answer: A) Password AutoFill with Face ID
Explanation: Password AutoFill in iOS is protected by Face ID or Touch ID, ensuring only the user can access saved credentials.
61. What is the role of Apple’s Secure Boot Chain?
A) To verify each stage of the iOS boot process
B) To disable unauthorized apps
C) To reset the device on failure
D) To encrypt all app data
Answer: A) To verify each stage of the iOS boot process
Explanation: Secure Boot Chain verifies each stage of the boot process, preventing unauthorized code execution.
62. How does iOS prevent apps from exploiting microphone access?
A) By displaying a visual indicator when the microphone is in use
B) By requiring admin approval for microphone use
C) By disabling microphones in third-party apps
D) By scanning for malware before opening the microphone
Answer: A) By displaying a visual indicator when the microphone is in use
Explanation: iOS displays an orange dot indicator when an app is using the microphone, alerting users to unauthorized access.
63. What security feature allows users to generate strong, unique passwords easily?
A) iCloud Keychain
B) Private Relay
C) Secure Enclave
D) Secure Boot
Answer: A) iCloud Keychain
Explanation: iCloud Keychain stores and generates strong, unique passwords, reducing the risk of password reuse attacks.
64. What does Apple use to prevent credential stuffing attacks on iCloud accounts?
A) Rate limiting login attempts
B) Secure Boot
C) Encrypted email alerts
D) iCloud backup encryption
Answer: A) Rate limiting login attempts
Explanation: Apple uses rate limiting to restrict excessive login attempts, preventing credential stuffing attacks.
65. How does iOS prevent fraudulent contact tracing apps from stealing location data?
A) By requiring government or health authority approval
B) By using randomized Bluetooth identifiers
C) By encrypting all tracking data
D) All of the above
Answer: D) All of the above
Explanation: iOS requires app approval, encrypts data, and uses randomized Bluetooth identifiers to prevent fraud in contact tracing apps.
66. How does Apple protect users from phishing websites in Safari?
A) By using Safari Fraudulent Website Warning
B) By encrypting bookmarks
C) By disabling JavaScript in all web pages
D) By blocking all pop-ups
Answer: A) By using Safari Fraudulent Website Warning
Explanation: Safari Fraudulent Website Warning alerts users when visiting phishing sites, protecting against credential theft.
67. How does Apple’s iOS differ from Android in terms of software updates?
A) iOS devices receive updates directly from Apple
B) iOS users must download updates manually
C) iOS updates are delivered via carriers
D) iOS devices do not support OTA updates
Answer: A) iOS devices receive updates directly from Apple
Explanation: Unlike Android, which relies on carriers and manufacturers, Apple directly pushes updates to iOS devices, ensuring faster security patches.
68. How does iOS prevent unauthorized third-party app stores?
A) By requiring App Store verification
B) By blocking unsigned apps
C) By enforcing strict security policies
D) All of the above
Answer: D) All of the above
Explanation: Apple prevents unauthorized app stores by requiring App Store verification, blocking unsigned apps, and enforcing security policies.
69. How does Apple prevent SIM swap attacks?
A) By requiring Apple ID authentication for iMessage & FaceTime
B) By encrypting all SIM card data
C) By storing SIM data in iCloud
D) By using Secure Boot
Answer: A) By requiring Apple ID authentication for iMessage & FaceTime
Explanation: Apple requires Apple ID authentication to prevent SIM swap attacks, ensuring attackers cannot hijack iMessage or FaceTime.
70. What technology does Apple use for privacy-preserving analytics?
A) Differential Privacy
B) Secure Boot
C) Biometric Hashing
D) Firewall Isolation
Answer: A) Differential Privacy
Explanation: Differential Privacy allows Apple to collect aggregate data while preserving user anonymity, enhancing privacy protections.
71. What is Apple’s approach to preventing unauthorized firmware downgrades?
A) Apple stops signing older firmware versions
B) Apple allows firmware downgrades only with two-factor authentication
C) Apple encrypts all firmware updates
D) Apple blocks downgrades using Secure Enclave
Answer: A) Apple stops signing older firmware versions
Explanation: Apple stops signing older firmware versions to prevent users from downgrading to vulnerable versions that could be exploited by attackers.
72. What feature in iOS prevents malicious apps from accessing saved passwords?
A) iCloud Keychain Encryption
B) Password AutoFill Lock
C) Secure Storage Mode
D) Secure Boot
Answer: A) iCloud Keychain Encryption
Explanation: iCloud Keychain stores passwords in an encrypted format and only allows access after Face ID, Touch ID, or passcode authentication.
73. What method does Apple use to ensure Face ID authentication cannot be bypassed using photos or videos?
A) Depth-sensing infrared camera
B) High-resolution image scanning
C) Retina-based biometric validation
D) Secure Enclave fingerprint comparison
Answer: A) Depth-sensing infrared camera
Explanation: Face ID uses a depth-sensing infrared camera to map a 3D image of the user’s face, ensuring it cannot be tricked using photos or videos.
74. How does iOS protect against malicious Bluetooth attacks?
A) Randomized MAC addresses for Bluetooth connections
B) Blocking all Bluetooth signals by default
C) Encrypting all Bluetooth data transfers
D) Requiring Face ID for Bluetooth connections
Answer: A) Randomized MAC addresses for Bluetooth connections
Explanation: iOS randomizes Bluetooth MAC addresses to prevent tracking and exploitation from malicious Bluetooth attacks.
75. What is the purpose of Apple’s “Sign in with Apple” feature?
A) To provide a secure authentication method with minimal personal data sharing
B) To enforce Apple ID verification on all third-party apps
C) To prevent users from using third-party login methods
D) To generate a one-time access code for all apps
Answer: A) To provide a secure authentication method with minimal personal data sharing
Explanation: Sign in with Apple uses private email relay and minimal data sharing, ensuring secure authentication with better privacy than traditional login methods.
76. What Apple feature helps detect malicious background activity in apps?
A) App Activity Report
B) Secure Boot Monitoring
C) Safari Anti-Tracking
D) Automatic System Scanning
Answer: A) App Activity Report
Explanation: App Activity Report (introduced in iOS 15) logs app behaviors, alerting users if an app accesses the camera, microphone, or location unexpectedly.
77. What security measure does iOS use to protect data when a device is turned off?
A) Full-disk encryption
B) Secure Boot
C) Remote Data Wipe
D) Encrypted iCloud Backup
Answer: A) Full-disk encryption
Explanation: iOS encrypts all stored data using AES-256 encryption, ensuring it remains secure even when the device is off.
78. How does Apple’s iOS handle memory management to prevent attacks?
A) Hardware-based memory protections
B) Manual memory allocation
C) Full read/write memory access for apps
D) Open-source memory handlers
Answer: A) Hardware-based memory protections
Explanation: iOS uses hardware-based protections such as Pointer Authentication Codes (PAC) and Address Space Layout Randomization (ASLR) to prevent memory corruption attacks.
79. What happens if an attacker attempts to bypass Activation Lock?
A) The device remains locked until the original Apple ID credentials are entered
B) The device sends an alert to Apple security
C) The device erases itself immediately
D) The device allows temporary access but disables iCloud features
Answer: A) The device remains locked until the original Apple ID credentials are entered
Explanation: Activation Lock prevents stolen iPhones from being used without the original owner’s Apple ID and password, making them useless to thieves.
80. What security feature ensures AirPods cannot be secretly paired with another device?
A) Apple ID-based pairing authentication
B) End-to-end encryption for AirPods
C) Secure Boot for AirPods firmware
D) Manual confirmation for every Bluetooth connection
Answer: A) Apple ID-based pairing authentication
Explanation: AirPods are paired to an Apple ID, ensuring they cannot be easily stolen and used with another device.
81. How does Apple protect iMessage content from being read by unauthorized users?
A) End-to-end encryption
B) Encrypted Apple ID authentication
C) Firewall-based message scanning
D) Secure Enclave storage for all messages
Answer: A) End-to-end encryption
Explanation: iMessage uses end-to-end encryption, ensuring that only the sender and recipient can read messages, preventing eavesdropping.
82. What security risk does sideloading apps introduce?
A) It allows unverified code execution
B) It increases app performance
C) It bypasses battery optimization policies
D) It makes the device more efficient
Answer: A) It allows unverified code execution
Explanation: Sideloading apps (installing apps from outside the App Store) allows unverified and potentially malicious code to run, increasing security risks.
83. What does iOS do if it detects unauthorized modification of system files?
A) The device enters Security Lockdown Mode
B) The device automatically restores to factory settings
C) The device sends an alert to Apple
D) The device shuts down immediately
Answer: A) The device enters Security Lockdown Mode
Explanation: If iOS detects unauthorized system file modifications, it enters Lockdown Mode, blocking further actions to prevent tampering.
84. How does Apple ensure that Safari extensions do not pose security risks?
A) Extensions must be downloaded from the App Store
B) Apple manually reviews all extensions
C) Extensions run in a restricted environment
D) All of the above
Answer: D) All of the above
Explanation: Safari extensions must be downloaded from the App Store, reviewed by Apple, and run in a restricted environment, preventing security threats.
85. What security feature does Apple use to prevent forced biometric unlocks?
A) Attention-aware Face ID
B) Two-Factor Authentication
C) Retina Scan Lock
D) Secure Biometric Mode
Answer: A) Attention-aware Face ID
Explanation: Attention-aware Face ID requires eye contact with the screen to unlock, preventing forced unlock attempts while the user is unconscious.
86. How does iOS protect against malicious NFC transactions?
A) Secure Element-based authentication
B) Randomized NFC signals
C) Encrypted NFC logs
D) Remote NFC blocking
Answer: A) Secure Element-based authentication
Explanation: iOS uses Secure Element-based authentication to process Apple Pay transactions, preventing NFC-based fraud.
87. What is the purpose of Apple’s Private Click Measurement (PCM)?
A) To measure ad effectiveness without compromising privacy
B) To block all ad tracking
C) To enforce two-factor authentication for ads
D) To encrypt all cookies
Answer: A) To measure ad effectiveness without compromising privacy
Explanation: Private Click Measurement (PCM) allows advertisers to track conversion rates without exposing user identity, enhancing privacy.
88. What happens when an iPhone is set to Erase Data mode?
A) It wipes all data after 10 incorrect passcode attempts
B) It disables biometric authentication permanently
C) It resets to factory settings after a soft reboot
D) It sends an alert to Apple for further action
Answer: A) It wipes all data after 10 incorrect passcode attempts
Explanation: If Erase Data Mode is enabled, an iPhone wipes all data after 10 failed passcode attempts to prevent brute-force attacks.
89. What is Apple’s approach to protecting app review integrity?
A) Human and automated app review processes
B) Machine learning-based review systems
C) Mandatory developer authentication
D) All of the above
Answer: D) All of the above
Explanation: Apple uses human reviewers, machine learning-based checks, and mandatory developer authentication to maintain App Store integrity.
90. How does iOS protect against Wi-Fi-based location tracking?
A) By randomizing MAC addresses
B) By blocking all public Wi-Fi networks
C) By encrypting Wi-Fi connections
D) By requiring Face ID for Wi-Fi access
Answer: A) By randomizing MAC addresses
Explanation: iOS randomizes MAC addresses for Wi-Fi connections, preventing location tracking via network logs.
91. What is Apple’s primary method for preventing unauthorized changes to iOS system files?
A) System Integrity Protection (SIP)
B) Secure Enclave
C) App Transport Security
D) Runtime Execution Lock
Answer: A) System Integrity Protection (SIP)
Explanation: System Integrity Protection (SIP) prevents unauthorized modification of system files, making it difficult for malware to alter iOS.
92. How does Apple ensure that app updates do not introduce malware?
A) By requiring developers to notarize updates
B) By scanning all updates for malicious code
C) By using automated and manual app review processes
D) All of the above
Answer: D) All of the above
Explanation: Apple requires notarization, malware scanning, and manual reviews to ensure app updates do not introduce security threats.
93. What is the primary purpose of iOS’s Address Space Layout Randomization (ASLR)?
A) To prevent memory-based attacks
B) To encrypt data stored in memory
C) To isolate apps from each other
D) To prevent malware from executing
Answer: A) To prevent memory-based attacks
Explanation: ASLR randomizes memory locations of system processes, making it harder for attackers to exploit memory corruption vulnerabilities.
94. How does Apple prevent tracking of iOS users across apps?
A) App Tracking Transparency (ATT)
B) Encrypted Device Tracking Prevention
C) Private Network Addressing
D) Secure iCloud Tracking
Answer: A) App Tracking Transparency (ATT)
Explanation: ATT requires apps to ask for user consent before tracking, preventing advertisers from collecting cross-app tracking data.
95. How does iOS handle phishing protection in Mail and Messages?
A) Link verification and fraud warnings
B) Biometric authentication for opening links
C) Blocking all email links by default
D) Forcing all links to open in Safari Private Mode
Answer: A) Link verification and fraud warnings
Explanation: iOS detects suspicious links in Mail and Messages, warning users before opening potentially dangerous websites.
96. What Apple security feature prevents malware from accessing system permissions?
A) App Sandbox
B) Secure Clipboard
C) FileVault Encryption
D) Automatic Firewall Rules
Answer: A) App Sandbox
Explanation: App Sandbox restricts apps to their own environments, preventing them from accessing system resources without permission.
97. What happens if an iPhone is reported stolen using Apple’s Find My feature?
A) The device is locked and cannot be reactivated without the owner’s Apple ID
B) The device automatically wipes all data
C) The device sends its last known location to Apple
D) The device disables all network activity
Answer: A) The device is locked and cannot be reactivated without the owner’s Apple ID
Explanation: If a device is marked as stolen, Activation Lock ensures it cannot be reactivated without the original owner’s Apple ID credentials.
98. What security measure does Apple use to protect against SIM cloning attacks?
A) Requiring Apple ID authentication for iMessage and FaceTime
B) Encrypting all SIM data
C) Randomizing SIM identifiers
D) Blocking unauthorized SIM card changes
Answer: A) Requiring Apple ID authentication for iMessage and FaceTime
Explanation: SIM cloning can allow attackers to hijack messages and calls, but Apple prevents this by linking iMessage and FaceTime to an Apple ID.
99. What is Apple’s approach to protecting metadata in iMessage?
A) Encrypting metadata separately from message content
B) Storing metadata in the Secure Enclave
C) Not storing metadata on Apple servers
D) Allowing users to delete metadata manually
Answer: A) Encrypting metadata separately from message content
Explanation: iMessage metadata is separately encrypted, preventing attackers from tracking when or where messages were sent.
100. How does iOS prevent malicious charging attacks (juice jacking)?
A) USB Restricted Mode
B) Secure Charge Mode
C) Encrypted Charging
D) Firewall-based USB Blocking
Answer: A) USB Restricted Mode
Explanation: USB Restricted Mode blocks data transfer over USB unless the device is unlocked, preventing juice jacking attacks.
101. What is Apple’s method of preventing unauthorized logins from unknown devices?
A) Two-Factor Authentication (2FA)
B) Secure iCloud Lock
C) Apple Biometric Gateway
D) Firewall-based Login Authentication
Answer: A) Two-Factor Authentication (2FA)
Explanation: Apple enforces 2FA, requiring both a password and a trusted device verification code to prevent unauthorized logins.
102. What is Apple’s response to detecting spyware like Pegasus on a device?
A) Apple notifies affected users and issues security patches
B) Apple automatically wipes the device
C) Apple disables iMessage and FaceTime on affected devices
D) Apple tracks the attacker’s IP and reports it to authorities
Answer: A) Apple notifies affected users and issues security patches
Explanation: Apple has notified users targeted by spyware like Pegasus and released emergency patches to block vulnerabilities.
103. What feature in iOS ensures that apps do not record user screen activity without permission?
A) Privacy Indicators
B) Secure Screen Recording
C) Encrypted Screen Sessions
D) Camera and Microphone Firewall
Answer: A) Privacy Indicators
Explanation: Privacy Indicators (green for the camera, orange for the microphone) notify users when an app is actively recording.
104. How does iOS ensure that NFC-based payments are secure?
A) Secure Element and Tokenization
B) End-to-End NFC Encryption
C) VPN-based NFC Transactions
D) Face ID for all transactions
Answer: A) Secure Element and Tokenization
Explanation: Apple Pay uses a Secure Element chip and tokenization to process NFC transactions securely without sharing card details.
105. How does Apple prevent device tampering at the firmware level?
A) Secure Boot with cryptographic verification
B) Cloud-based firmware validation
C) Manual firmware integrity checks by Apple
D) Secure Enclave-controlled firmware updates
Answer: A) Secure Boot with cryptographic verification
Explanation: Secure Boot ensures only Apple-signed firmware is loaded during startup, preventing malicious modifications.
106. What security measure prevents unauthorized access to Safari browsing history?
A) End-to-End Encrypted Syncing
B) Automatic Browser Reset
C) Secure Private Mode
D) Password-Protected History
Answer: A) End-to-End Encrypted Syncing
Explanation: Safari’s browsing history is encrypted end-to-end, ensuring only the user can access synced data across devices.
107. How does iOS protect against unauthorized access to Wi-Fi passwords stored on the device?
A) Passwords are stored in iCloud Keychain with encryption
B) Wi-Fi passwords are hashed and hidden
C) Wi-Fi passwords require Face ID authentication for access
D) Wi-Fi passwords are randomized
Answer: A) Passwords are stored in iCloud Keychain with encryption
Explanation: Wi-Fi passwords are encrypted and stored in iCloud Keychain, preventing unauthorized access.
108. How does Apple prevent AirDrop abuse from unknown users?
A) AirDrop privacy settings require user approval
B) Apple encrypts all AirDrop transfers
C) AirDrop works only with Apple-verified contacts
D) AirDrop requests must be reviewed manually by Apple
Answer: A) AirDrop privacy settings require user approval
Explanation: AirDrop allows users to restrict file sharing to contacts only, preventing abuse from unknown users.
109. What security feature ensures that AirPods cannot be tracked by unauthorized users?
A) AirPods’ automatic pairing encryption
B) Secure Element-based pairing
C) Find My Network security alerts
D) Bluetooth Firewall for unauthorized connections
Answer: C) Find My Network security alerts
Explanation: Find My Network alerts users if unknown AirPods are detected traveling with them, preventing unauthorized tracking.
110. How does Apple prevent credential stuffing attacks against Apple ID accounts?
A) Login attempt rate limiting
B) Enforcing biometric authentication for Apple ID
C) Automatic Apple ID password rotation
D) Blocking VPN access to Apple ID login
Answer: A) Login attempt rate limiting
Explanation: Apple uses rate limiting to restrict multiple failed login attempts, preventing credential stuffing attacks.
111. How does Apple ensure that stolen iPhones cannot be wiped and reused by thieves?
A) Activation Lock
B) Secure Wipe Mode
C) Remote Data Encryption
D) Secure Boot Lock
Answer: A) Activation Lock
Explanation: Activation Lock ensures that even if a device is erased, it cannot be reactivated without the original Apple ID credentials, making it useless to thieves.
112. How does Apple ensure that Apple Pay transactions cannot be intercepted?
A) Tokenization and encryption
B) End-to-end encrypted NFC signals
C) VPN-based payment processing
D) Secure Boot-level verification
Answer: A) Tokenization and encryption
Explanation: Apple Pay uses tokenization, replacing card details with a unique token that is encrypted and securely processed, preventing interception.
113. What security feature prevents attackers from injecting malicious code into iOS apps?
A) Code Signing and App Sandboxing
B) Encrypted App Storage
C) Runtime Firewall Execution
D) Secure Boot Validation
Answer: A) Code Signing and App Sandboxing
Explanation: Code Signing ensures that only Apple-approved apps run on iOS, while App Sandboxing isolates apps from accessing unauthorized system resources.
114. How does iOS protect user data stored in Notes?
A) End-to-end encryption for locked notes
B) Secure Enclave storage
C) Face ID/Touch ID authentication for notes
D) All of the above
Answer: D) All of the above
Explanation: iOS encrypts locked notes end-to-end, stores them securely, and requires biometric authentication for access.
115. How does iOS prevent third-party keyboards from logging keystrokes without permission?
A) App Sandboxing and explicit permission requests
B) Biometric authentication for every keystroke
C) Secure Keyboard Logging Mode
D) Firewall-based keyboard security
Answer: A) App Sandboxing and explicit permission requests
Explanation: iOS isolates third-party keyboards in a sandbox and requires explicit user permission before they can access system data.
116. What Apple security feature ensures private browsing in Safari?
A) iCloud Private Relay
B) Safari Fraudulent Website Protection
C) Secure Boot
D) WebKit Process Isolation
Answer: A) iCloud Private Relay
Explanation: iCloud Private Relay hides users’ IP addresses and encrypts Safari traffic, preventing tracking.
117. What is Apple’s solution for securing business and corporate devices?
A) Apple Business Manager with MDM (Mobile Device Management)
B) Secure Boot Mode
C) iCloud for Business
D) Apple Enterprise Security
Answer: A) Apple Business Manager with MDM (Mobile Device Management)
Explanation: Apple Business Manager and MDM solutions allow IT administrators to enforce device security policies and manage enterprise devices.
118. What security feature prevents iPhones from being remotely exploited via SMS vulnerabilities?
A) BlastDoor sandbox for iMessage
B) Encrypted SMS Transport
C) Secure SMS Firewall
D) iOS Security Lock
Answer: A) BlastDoor sandbox for iMessage
Explanation: BlastDoor isolates iMessage processing from the core system, preventing malicious SMS exploits from affecting iOS.
119. How does iOS prevent unauthorized biometric authentication while a user is sleeping?
A) Attention-aware Face ID
B) Touch ID inactivity timeout
C) Secure Sleep Mode
D) Encrypted Biometric Authentication
Answer: A) Attention-aware Face ID
Explanation: Attention-aware Face ID requires users to look at the screen before unlocking, preventing forced unlocking while asleep.
120. What security feature does Apple provide to prevent unauthorized app installations?
A) App Store notarization and review
B) Secure Boot Lock
C) Secure App Download Mode
D) iCloud Verified Apps
Answer: A) App Store notarization and review
Explanation: Apple notarizes and reviews apps before publishing them in the App Store, ensuring security and preventing unauthorized installations.
121. How does iOS prevent unauthorized Bluetooth tracking?
A) Bluetooth MAC address randomization
B) Biometric authentication for Bluetooth connections
C) Firewall-based Bluetooth security
D) End-to-end encrypted Bluetooth signals
Answer: A) Bluetooth MAC address randomization
Explanation: iOS randomizes Bluetooth MAC addresses, preventing devices from being persistently tracked by external entities.
122. What security mechanism ensures that an iOS device cannot be accessed using hardware hacking tools?
A) Secure Enclave and Secure Boot
B) Firewall-based Hardware Lock
C) Device-Level Kernel Encryption
D) Secure iCloud Recovery
Answer: A) Secure Enclave and Secure Boot
Explanation: Secure Enclave protects encryption keys, while Secure Boot ensures that only Apple-signed firmware runs, preventing hardware-based attacks.
123. How does iOS prevent spam calls and robocalls?
A) Silence Unknown Callers and Call Blocking
B) Firewall-based call verification
C) Encrypted call logs
D) Secure Contact List
Answer: A) Silence Unknown Callers and Call Blocking
Explanation: iOS allows users to block numbers and silence unknown callers, preventing spam and robocalls.
124. What security feature prevents unauthorized access to health data in the Health app?
A) End-to-end encryption and Face ID/Touch ID protection
B) Secure Enclave Health Mode
C) Secure Health Firewall
D) iCloud Encrypted Health Data
Answer: A) End-to-end encryption and Face ID/Touch ID protection
Explanation: Health data is encrypted and protected using biometric authentication, ensuring only the user can access it.
125. How does Apple protect against man-in-the-middle attacks on AirDrop?
A) Mutual authentication and encryption
B) Firewall-based AirDrop protection
C) Secure iCloud AirDrop Sync
D) Randomized encryption for every transfer
Answer: A) Mutual authentication and encryption
Explanation: AirDrop uses mutual authentication and encryption, ensuring data transfers cannot be intercepted.
126. What is Apple’s approach to preventing unauthorized iCloud data access?
A) End-to-end encryption and two-factor authentication (2FA)
B) Firewall-based iCloud verification
C) Biometric authentication for all iCloud logins
D) Secure iCloud File Lock
Answer: A) End-to-end encryption and two-factor authentication (2FA)
Explanation: iCloud data is end-to-end encrypted, and 2FA is required for account access, preventing unauthorized logins.
127. How does Apple protect iOS users from potentially unwanted software?
A) App Store review process and notarization
B) Firewall-based malware blocking
C) Secure iCloud File Scanning
D) iOS Software Lock
Answer: A) App Store review process and notarization
Explanation: Apple scans and reviews apps before publishing them to the App Store, preventing malicious software from reaching users.
128. What is the purpose of Apple’s Hardware Root of Trust?
A) To ensure cryptographic integrity of the system
B) To store encrypted passwords
C) To generate random encryption keys
D) To verify internet connections
Answer: A) To ensure cryptographic integrity of the system
Explanation: Apple’s Hardware Root of Trust ensures that the boot process and system integrity are cryptographically verified.
129. How does iOS prevent unauthorized location tracking by installed apps?
A) Location Services permissions and App Tracking Transparency (ATT)
B) Firewall-based location tracking prevention
C) Secure GPS Lock
D) iCloud Location Encryption
Answer: A) Location Services permissions and App Tracking Transparency (ATT)
Explanation: iOS allows users to control location access, and App Tracking Transparency blocks unauthorized tracking.
130. What is the primary purpose of Apple’s privacy nutrition labels in the App Store?
A) To inform users about data collection practices of apps
B) To block malicious apps
C) To restrict app installations
D) To enforce end-to-end encryption for all apps
Answer: A) To inform users about data collection practices of apps
Explanation: Privacy nutrition labels display what data an app collects, allowing users to make informed choices before installation.
131. How does Apple ensure that iOS updates are delivered securely?
A) Updates are digitally signed and verified before installation
B) Updates require biometric authentication
C) Apple encrypts update files with user passwords
D) Updates can only be installed via iCloud
Answer: A) Updates are digitally signed and verified before installation
Explanation: iOS updates are cryptographically signed by Apple, ensuring that only official updates can be installed, preventing attackers from injecting malicious software.
132. What security mechanism prevents unauthorized copying of Apple ID credentials?
A) Keychain encryption and Face ID/Touch ID authentication
B) Firewall-based Apple ID protection
C) iCloud Encrypted Password Sync
D) Apple ID Secure Wipe
Answer: A) Keychain encryption and Face ID/Touch ID authentication
Explanation: Apple Keychain encrypts stored credentials, and Face ID/Touch ID ensures that only the authorized user can access saved passwords.
133. How does Apple prevent unauthorized data collection by Safari extensions?
A) Extensions require explicit permission for data access
B) Safari encrypts all browsing data
C) Extensions are run in a secure enclave
D) Apple blocks third-party extensions by default
Answer: A) Extensions require explicit permission for data access
Explanation: Safari extensions must request user permission before accessing browsing data, preventing unauthorized data collection.
134. How does Apple secure CarPlay from external threats?
A) CarPlay data is encrypted and isolated from the vehicle’s main system
B) CarPlay requires a special encrypted Apple cable
C) CarPlay only works in offline mode
D) CarPlay requires a unique device certificate
Answer: A) CarPlay data is encrypted and isolated from the vehicle’s main system
Explanation: Apple encrypts CarPlay data and isolates it from the car’s core systems, preventing external attacks.
135. What security feature prevents unauthorized pairing of Apple Watch with an iPhone?
A) Activation Lock for Apple Watch
B) Secure Bluetooth Pairing
C) iCloud Encrypted Sync
D) Secure NFC Handshake
Answer: A) Activation Lock for Apple Watch
Explanation: Activation Lock ensures that an Apple Watch remains linked to its owner’s Apple ID, preventing unauthorized pairing.
136. How does iOS prevent malicious email attachments from executing?
A) Mail app sandboxing and attachment isolation
B) Encrypting all attachments before opening
C) Blocking attachments from unknown senders
D) Scanning all attachments for malware
Answer: A) Mail app sandboxing and attachment isolation
Explanation: Attachments are processed in a sandboxed environment, preventing them from executing malicious code on the device.
137. How does iOS ensure security when using the Shared with You feature?
A) Content is verified against Apple’s privacy policies
B) Shared content is encrypted before being stored
C) Only contacts with iMessage access can share content
D) All shared content requires explicit user permission before opening
Answer: D) All shared content requires explicit user permission before opening
Explanation: Shared content is not automatically opened, preventing potential phishing or malware from being executed.
138. What technology does Apple use to verify email authenticity in the Mail app?
A) Domain-based Message Authentication, Reporting & Conformance (DMARC)
B) Encrypted Email Headers
C) Secure Email Firewall
D) Secure iCloud Mail Gateway
Answer: A) Domain-based Message Authentication, Reporting & Conformance (DMARC)
Explanation: DMARC helps verify email authenticity, reducing phishing and spoofing attacks in the Mail app.
139. How does Apple secure biometric data from being extracted by third-party apps?
A) Biometric data is stored only in the Secure Enclave
B) iOS encrypts all biometric data at rest
C) Biometric data requires explicit user approval before access
D) Biometric data is stored in iCloud with two-factor authentication
Answer: A) Biometric data is stored only in the Secure Enclave
Explanation: Face ID and Touch ID data are securely stored in the Secure Enclave, and never shared with apps or stored in iCloud.
140. What happens if an iOS device detects an unauthorized USB connection?
A) USB Restricted Mode blocks data access until the device is unlocked
B) The device shuts down immediately
C) iOS automatically enables airplane mode
D) A system alert warns the user about the unauthorized connection
Answer: A) USB Restricted Mode blocks data access until the device is unlocked
Explanation: USB Restricted Mode blocks unauthorized USB connections after an hour of inactivity to prevent data theft via USB exploits.
141. How does iOS prevent unauthorized access to clipboard data?
A) Apps must request permission to access clipboard content
B) Clipboard data is encrypted with each copy
C) Secure Clipboard locks data after a timeout
D) iCloud Keychain syncs clipboard securely
Answer: A) Apps must request permission to access clipboard content
Explanation: iOS prevents apps from accessing clipboard data without user consent, reducing data leakage risks.
142. What is the primary purpose of Apple’s Advanced Data Protection for iCloud?
A) Extending end-to-end encryption to more iCloud data categories
B) Enforcing two-factor authentication for all iCloud services
C) Allowing users to control their own encryption keys
D) Encrypting all app data in iCloud
Answer: A) Extending end-to-end encryption to more iCloud data categories
Explanation: Advanced Data Protection adds end-to-end encryption to more iCloud services, making user data more secure.
143. How does Apple secure credit card autofill in Safari?
A) Face ID or Touch ID authentication is required
B) Credit card data is encrypted using Secure Enclave
C) Only cards verified with Apple Pay can be auto-filled
D) Autofill requires a one-time security code
Answer: A) Face ID or Touch ID authentication is required
Explanation: Safari requires Face ID or Touch ID to autofill credit card details, preventing unauthorized usage.
144. How does Apple prevent unauthorized modification of system fonts?
A) System Integrity Protection (SIP) restricts font modifications
B) Fonts are encrypted within the system partition
C) Secure Boot prevents font injection
D) Fonts are stored in the Secure Enclave
Answer: A) System Integrity Protection (SIP) restricts font modifications
Explanation: SIP blocks unauthorized modifications to system files, including fonts, ensuring system stability.
145. What security feature ensures that app developers cannot track users without permission?
A) App Tracking Transparency (ATT)
B) Secure App Store Permissions
C) Biometric Tracking Protection
D) App Isolation Mode
Answer: A) App Tracking Transparency (ATT)
Explanation: ATT requires apps to request user consent before tracking, preventing unauthorized data collection.
146. How does iOS prevent unauthorized QR code phishing attacks?
A) Safari warns users about suspicious QR codes
B) QR code scanning requires biometric authentication
C) Secure Enclave verifies QR codes before processing
D) iOS blocks all QR codes from unknown sources
Answer: A) Safari warns users about suspicious QR codes
Explanation: Safari scans QR codes for suspicious links and alerts users before opening them, preventing phishing attacks.
147. How does iOS prevent malicious websites from hijacking user sessions?
A) Safari enforces strict SameSite cookie policies
B) iOS blocks all third-party cookies
C) Safari encrypts all web traffic by default
D) Secure Enclave verifies session authenticity
Answer: A) Safari enforces strict SameSite cookie policies
Explanation: SameSite cookies prevent cross-site request forgery (CSRF) attacks, reducing session hijacking risks.
148. How does Apple protect AirPods from unauthorized tracking?
A) Unknown AirPods tracking alerts in Find My
B) Secure Bluetooth Pairing
C) End-to-end encrypted pairing keys
D) Secure Boot for AirPods firmware
Answer: A) Unknown AirPods tracking alerts in Find My
Explanation: Find My alerts users if unknown AirPods are traveling with them, preventing unauthorized tracking.
149. What security feature ensures secure FaceTime calls?
A) End-to-end encryption
B) Secure Enclave audio processing
C) Biometric-based FaceTime verification
D) iCloud Keychain-secured calls
Answer: A) End-to-end encryption
Explanation: FaceTime calls are end-to-end encrypted, ensuring only the sender and recipient can access the conversation.
150. How does iOS protect against accidental app deletions?
A) App offloading instead of full deletion
B) Secure Deletion Confirmation
C) Encryption-based App Recovery
D) App Restore Firewall
Answer: A) App offloading instead of full deletion
Explanation: Offloading apps removes the app but keeps its data, allowing users to restore it without losing information.
151. How does Apple prevent malware from persisting after a reboot?
A) Signed System Volume (SSV) and Secure Boot
B) Auto-erase mode after each reboot
C) Firewall-based malware detection
D) App Tracking Prevention
Answer: A) Signed System Volume (SSV) and Secure Boot
Explanation: Signed System Volume (SSV) ensures that system files remain unchanged after each reboot, and Secure Boot prevents unsigned code from executing, blocking malware persistence.
152. What feature helps prevent brute-force attacks on iCloud accounts?
A) Rate-limiting and CAPTCHA-based login protection
B) Secure Boot verification
C) Biometric login enforcement
D) Firewall-based iCloud login scanning
Answer: A) Rate-limiting and CAPTCHA-based login protection
Explanation: Apple uses rate-limiting and CAPTCHA-based verification to prevent automated brute-force attacks on iCloud accounts.
153. What security mechanism prevents unauthorized access to a lost iPhone’s notifications?
A) Lock Screen Privacy Protection
B) Secure App Firewall
C) App Tracking Transparency (ATT)
D) Automatic Do Not Disturb Mode
Answer: A) Lock Screen Privacy Protection
Explanation: iOS hides notifications on the Lock Screen until the user authenticates with Face ID or Touch ID, preventing unauthorized access to sensitive notifications.
154. How does Apple ensure the security of HomeKit-enabled smart home devices?
A) End-to-end encryption and device authentication
B) Secure Enclave-based processing
C) Firewall protection for all connected devices
D) Apple ID biometric verification
Answer: A) End-to-end encryption and device authentication
Explanation: HomeKit uses end-to-end encryption and device authentication, ensuring that only trusted devices can access the smart home ecosystem.
**155. What is the purpose of iOS’s Data Protection Class APIs?
A) Encrypting files based on the device’s lock state
B) Blocking data from being shared over Wi-Fi
C) Preventing background apps from accessing sensitive data
D) Ensuring apps run in a sandboxed environment
Answer: A) Encrypting files based on the device’s lock state
Explanation: Data Protection Class APIs ensure that certain files remain encrypted until the device is unlocked, preventing unauthorized access.
156. How does iOS prevent JavaScript-based malware attacks in Safari?
A) WebKit Process Isolation
B) Encrypted JavaScript Execution
C) App Tracking Prevention (ATP)
D) Secure Boot Firewall
Answer: A) WebKit Process Isolation
Explanation: Safari isolates each web page in its own process, preventing JavaScript-based malware from affecting the entire system.
157. What happens if an attacker enters too many incorrect Face ID attempts?
A) The device locks and requires the passcode to unlock
B) Face ID is permanently disabled
C) The device sends a security alert to Apple
D) The iPhone automatically shuts down
Answer: A) The device locks and requires the passcode to unlock
Explanation: After multiple failed Face ID attempts, iOS requires the passcode to unlock, preventing brute-force biometric attacks.
158. How does Apple ensure that iOS system updates cannot be replaced with older, vulnerable versions?
A) Apple stops signing old iOS versions
B) iOS automatically deletes older firmware
C) iOS requires biometric authentication for updates
D) Secure Enclave prevents firmware downgrades
Answer: A) Apple stops signing old iOS versions
Explanation: Apple stops signing older iOS versions, ensuring that users cannot downgrade to vulnerable firmware.
159. What security feature prevents third-party apps from accessing personal contacts without permission?
A) App Permission Requests
B) Secure Contact Firewall
C) iOS Biometric Contact Protection
D) Apple ID Linked Contacts
Answer: A) App Permission Requests
Explanation: iOS requires explicit permission before apps can access contacts, photos, microphone, or other sensitive data.
160. What security mechanism prevents iOS devices from being accessed by forensic tools?
A) USB Restricted Mode
B) Secure App Execution
C) iOS Firewall Mode
D) Encrypted Secure Boot
Answer: A) USB Restricted Mode
Explanation: USB Restricted Mode blocks USB data access when the device is locked for more than an hour, preventing forensic tools from extracting data.
161. How does Apple prevent accidental deletion of iCloud Photos?
A) Deleted photos are moved to the “Recently Deleted” album for 30 days
B) iCloud requires Face ID for all deletions
C) Apple automatically backs up deleted photos
D) Secure Deletion Firewall
Answer: A) Deleted photos are moved to the “Recently Deleted” album for 30 days
Explanation: When photos are deleted, they move to the “Recently Deleted” album for 30 days, allowing users to recover them.
162. What encryption standard does Apple use for iMessage end-to-end encryption?
A) AES-256 and RSA-2048
B) SHA-512
C) MD5 Hashing
D) Blowfish-128
Answer: A) AES-256 and RSA-2048
Explanation: iMessage uses AES-256 and RSA-2048 encryption, ensuring that messages cannot be intercepted or decrypted.
163. How does Apple secure clipboard content across devices?
A) Universal Clipboard uses end-to-end encryption
B) Clipboard data is stored only in Secure Enclave
C) iCloud Keychain stores clipboard history
D) Apple blocks third-party apps from clipboard syncing
Answer: A) Universal Clipboard uses end-to-end encryption
Explanation: Universal Clipboard allows users to copy and paste between Apple devices using end-to-end encryption.
164. What prevents an attacker from accessing a lost iPhone’s Wallet app?
A) Wallet is locked with Face ID/Touch ID
B) iCloud encrypts all Wallet data
C) Secure Enclave wipes Wallet data on failed attempts
D) Wallet requires an internet connection to function
Answer: A) Wallet is locked with Face ID/Touch ID
Explanation: Apple Wallet requires biometric authentication, ensuring only the authorized user can access payment cards.
165. How does iOS prevent malicious apps from accessing system logs?
A) System logs are restricted to Apple and trusted system components
B) Logs are encrypted with each system update
C) Apps must request explicit permissions to read logs
D) Secure Boot blocks unauthorized log access
Answer: A) System logs are restricted to Apple and trusted system components
Explanation: iOS restricts access to system logs, preventing malicious apps from gathering sensitive system information.
166. How does Apple protect AirPods from being linked to another Apple ID?
A) Apple ID-based pairing lock
B) Biometric authentication for pairing
C) Secure Bluetooth ID verification
D) End-to-end encrypted pairing keys
Answer: A) Apple ID-based pairing lock
Explanation: AirPods are tied to an Apple ID, preventing them from being relinked without the owner’s credentials.
167. How does Apple prevent malicious websites from tracking user behavior?
A) Safari Intelligent Tracking Prevention (ITP)
B) Secure WebKit
C) Safari Firewall Mode
D) Encrypted Web Data Storage
Answer: A) Safari Intelligent Tracking Prevention (ITP)
Explanation: Safari ITP blocks third-party tracking cookies, preventing websites from tracking user behavior.
168. What security measure prevents unauthorized device migration?
A) Activation Lock and iCloud Verification
B) Secure Data Firewall
C) iCloud Device Encryption
D) Encrypted Apple ID Recovery
Answer: A) Activation Lock and iCloud Verification
Explanation: Activation Lock and iCloud verification prevent unauthorized device transfers, ensuring that only the original owner can migrate data.
169. What does Apple use to detect jailbroken devices?
A) Runtime Integrity Checks
B) Secure Boot Firewall
C) iCloud Security Lock
D) Kernel-Level Encryption
Answer: A) Runtime Integrity Checks
Explanation: iOS performs runtime integrity checks, detecting unauthorized modifications or jailbreak attempts.
170. How does iOS ensure privacy when sharing location?
A) Location Sharing uses randomized temporary identifiers
B) Secure Enclave encrypts location data
C) iCloud encrypts location-sharing requests
D) Face ID verification is required for location sharing
Answer: A) Location Sharing uses randomized temporary identifiers
Explanation: iOS randomizes location-sharing identifiers, ensuring that location data is private and cannot be tracked.
171. What security feature prevents iOS apps from accessing other apps’ data?
A) App Sandboxing
B) Secure Enclave
C) iCloud Data Protection
D) Secure Boot
Answer: A) App Sandboxing
Explanation: App Sandboxing isolates each app’s data, preventing one app from accessing or modifying another app’s data, thereby increasing security.
172. How does Apple prevent third-party apps from accessing sensitive API functions?
A) API entitlement verification and explicit user permissions
B) Secure Enclave API Isolation
C) API Biometric Lock
D) Encrypted API Requests
Answer: A) API entitlement verification and explicit user permissions
Explanation: iOS restricts access to sensitive APIs, requiring explicit developer entitlements and user permissions before an app can access critical functions.
173. How does Apple protect iOS backups stored in iCloud?
A) End-to-end encryption for sensitive data
B) Face ID authentication before backup retrieval
C) Firewall-based iCloud Security Lock
D) Secure Boot Verification for backups
Answer: A) End-to-end encryption for sensitive data
Explanation: Apple encrypts iCloud backups, and some sensitive data (like Keychain and health data) use end-to-end encryption, making them inaccessible to unauthorized users.
174. What prevents a malicious app from sending premium SMS messages without the user’s consent?
A) iOS Permission System and App Sandboxing
B) Secure SMS Firewall
C) iMessage-Only SMS Routing
D) Biometric Authentication for SMS
Answer: A) iOS Permission System and App Sandboxing
Explanation: iOS restricts SMS sending permissions, and apps must request explicit user consent before sending premium SMS messages.
175. How does iOS prevent malicious configuration profiles from hijacking network settings?
A) Configuration profiles require manual installation and user authentication
B) Secure Boot blocks all unauthorized profiles
C) iOS encrypts network configurations
D) Secure Enclave stores all configuration profiles
Answer: A) Configuration profiles require manual installation and user authentication
Explanation: iOS prevents silent installation of malicious configuration profiles by requiring manual installation and user authentication.
176. What security feature prevents iOS devices from being remotely wiped by attackers?
A) Two-Factor Authentication (2FA) for iCloud and Find My
B) Secure Boot Firewall
C) iCloud Wipe Protection
D) Encrypted Secure Erase
Answer: A) Two-Factor Authentication (2FA) for iCloud and Find My
Explanation: iOS requires 2FA authentication for remote wipe actions via Find My, preventing unauthorized remote erasures.
177. How does Apple ensure that iOS devices only run trusted kernel extensions?
A) System Integrity Protection (SIP) and Secure Boot
B) Secure Enclave Kernel Lock
C) App Store-Verified Kernel Updates
D) iCloud Kernel Verification
Answer: A) System Integrity Protection (SIP) and Secure Boot
Explanation: Secure Boot and SIP prevent unauthorized kernel extensions, ensuring that only Apple-approved code runs on iOS devices.
178. What prevents iOS devices from automatically connecting to rogue Wi-Fi networks?
A) Private Wi-Fi Address and Auto-Join Control
B) Secure Boot for Network Verification
C) Encrypted DNS Firewall
D) Wi-Fi iCloud Sync Lock
Answer: A) Private Wi-Fi Address and Auto-Join Control
Explanation: iOS randomizes MAC addresses and allows users to control Auto-Join settings, reducing the risk of rogue Wi-Fi network attacks.
179. How does iOS prevent malicious apps from capturing audio in the background?
A) Orange indicator in the status bar and microphone permission prompts
B) Secure Audio Firewall
C) iCloud Encrypted Audio Storage
D) Face ID Authentication for Audio Recording
Answer: A) Orange indicator in the status bar and microphone permission prompts
Explanation: iOS displays an orange indicator when an app is using the microphone, preventing covert audio recording without user knowledge.
180. What security mechanism prevents unauthorized Apple ID account recovery?
A) Recovery Key and Two-Factor Authentication (2FA)
B) Secure Boot-Based Apple ID Lock
C) iCloud Backup Biometric Authentication
D) Encrypted Apple ID Reset
Answer: A) Recovery Key and Two-Factor Authentication (2FA)
Explanation: Apple requires a Recovery Key and 2FA for account recovery, preventing attackers from taking over Apple ID accounts.
181. How does iOS ensure that deleted messages in iMessage cannot be recovered?
A) Secure deletion with end-to-end encryption
B) Automatic Secure Wipe
C) Secure Enclave Message Deletion
D) Encrypted iMessage Auto-Erase
Answer: A) Secure deletion with end-to-end encryption
Explanation: Deleted iMessages are permanently removed and cannot be retrieved, ensuring privacy and data security.
182. How does iOS protect users from malicious autofill attacks in Safari?
A) Face ID or Touch ID authentication for autofill
B) Secure Autofill Firewall
C) Secure Enclave-Based Web Autofill
D) iCloud Keychain Auto-Reset
Answer: A) Face ID or Touch ID authentication for autofill
Explanation: Safari requires Face ID or Touch ID before autofilling passwords, preventing unauthorized access to saved credentials.
183. What security measure protects iOS devices from malicious Lightning accessories?
A) USB Restricted Mode
B) Secure Lightning Port Firewall
C) Lightning Encrypted Access Control
D) Apple Verified Accessories Only Mode
Answer: A) USB Restricted Mode
Explanation: USB Restricted Mode blocks data access through the Lightning port when a device has been locked for an extended period, preventing malicious accessory attacks.
184. How does Apple prevent malicious pop-ups from hijacking Safari sessions?
A) Safari blocks automatic pop-ups and redirects
B) Secure WebKit Pop-Up Prevention
C) Encrypted Pop-Up Firewall
D) Secure Safari Window Lock
Answer: A) Safari blocks automatic pop-ups and redirects
Explanation: Safari blocks automatic pop-ups and redirects, reducing the risk of malicious pop-up attacks.
185. How does Apple protect iOS devices from network-based attacks?
A) Private Relay, VPN Support, and Encrypted DNS
B) Secure iCloud Proxy
C) iOS Network Firewall Mode
D) Secure Network Boot
Answer: A) Private Relay, VPN Support, and Encrypted DNS
Explanation: iOS protects network traffic with Private Relay, VPN support, and Encrypted DNS, preventing man-in-the-middle (MITM) attacks.
186. How does Apple ensure that Face ID data cannot be extracted from the device?
A) Face ID data is processed and stored only in the Secure Enclave
B) Biometric Data Firewall Protection
C) End-to-End Encrypted Face ID Backup
D) iCloud-Restricted Face ID Data
Answer: A) Face ID data is processed and stored only in the Secure Enclave
Explanation: Face ID data never leaves the Secure Enclave, ensuring it cannot be extracted or shared with third parties.
187. How does iOS prevent SIM swap attacks?
A) Apple ID verification for iMessage and FaceTime activation
B) Secure SIM Lock
C) Encrypted SIM Firewall
D) Biometric SIM Authentication
Answer: A) Apple ID verification for iMessage and FaceTime activation
Explanation: iOS requires Apple ID verification for iMessage and FaceTime activation, preventing SIM swap fraud.
188. How does iOS prevent malware from hiding inside app data?
A) App Sandbox and File System Protection
B) Secure Boot for Installed Apps
C) iCloud Scanning of App Data
D) Secure App Encryption Mode
Answer: A) App Sandbox and File System Protection
Explanation: App Sandbox and File System Protection prevent apps from storing hidden malware or modifying system data.
189. What security feature helps prevent device spoofing attacks?
A) Hardware-Based Device Authentication
B) Secure Network Proxy
C) Encrypted iCloud Lock
D) Face ID-Verified Device Sync
Answer: A) Hardware-Based Device Authentication
Explanation: Apple uses hardware-based device authentication, ensuring that only genuine Apple devices can access iCloud and Apple services.
190. How does iOS protect against malicious email tracking?
A) Mail Privacy Protection
B) Secure iCloud Email Encryption
C) Encrypted Email Address Firewall
D) Auto-Delete Suspicious Emails
Answer: A) Mail Privacy Protection
Explanation: Mail Privacy Protection blocks tracking pixels, preventing senders from knowing when an email is opened.
191. What is Apple’s method for ensuring that App Store apps do not contain hidden malicious code?
A) Static and dynamic analysis during the app review process
B) iCloud-based malware scanning
C) Firewall-based app verification
D) Secure Boot validation for apps
Answer: A) Static and dynamic analysis during the app review process
Explanation: Apple reviews apps using static and dynamic analysis to detect malware, suspicious behavior, and security vulnerabilities before approval.
192. What feature helps prevent brute-force attacks on Apple Watch?
A) Automatic Erase Mode after multiple failed attempts
B) Secure iCloud Sync Lock
C) Apple ID-Based Two-Factor Authentication
D) Secure Boot for Apple Watch
Answer: A) Automatic Erase Mode after multiple failed attempts
Explanation: Apple Watch can be set to erase all data after 10 failed passcode attempts, preventing brute-force access attempts.
193. How does iOS prevent unauthorized tracking via Bluetooth accessories?
A) Bluetooth Tracking Prevention Alerts
B) Secure Bluetooth Device Lock
C) Biometric Bluetooth Authorization
D) iCloud-Verified Bluetooth Pairing
Answer: A) Bluetooth Tracking Prevention Alerts
Explanation: iOS alerts users when an unknown Bluetooth device (such as an AirTag) is tracking them, preventing unauthorized tracking.
194. How does Apple ensure that Wi-Fi networks do not track iOS devices persistently?
A) Randomized MAC addresses for each network connection
B) Encrypted Wi-Fi Traffic Firewall
C) Biometric Authentication for Wi-Fi Access
D) Secure Boot for Wi-Fi Drivers
Answer: A) Randomized MAC addresses for each network connection
Explanation: iOS randomizes the MAC address for each Wi-Fi network, preventing tracking by Wi-Fi network operators.
195. What prevents iOS devices from accepting malicious firmware updates?
A) Secure Boot and Signed Firmware Validation
B) Firewall-Based Firmware Verification
C) iCloud-Encrypted Firmware Updates
D) Two-Factor Authentication for Updates
Answer: A) Secure Boot and Signed Firmware Validation
Explanation: Secure Boot and cryptographic signatures ensure that only Apple-signed firmware updates can be installed, preventing malicious modifications.
196. How does iOS prevent websites from fingerprinting users based on device settings?
A) Safari reduces available system information for fingerprinting
B) Secure Enclave-Based Website Tracking Prevention
C) iCloud Masked Device Mode
D) Private Wi-Fi Address Encryption
Answer: A) Safari reduces available system information for fingerprinting
Explanation: Safari limits the amount of system data websites can collect, making device fingerprinting more difficult.
197. What Apple security feature ensures that Safari does not execute potentially harmful website scripts?
A) Content Security Policy (CSP) and WebKit Process Isolation
B) iCloud Secure Browser Mode
C) Secure WebKit Firewall
D) iOS Application Gateway
Answer: A) Content Security Policy (CSP) and WebKit Process Isolation
Explanation: CSP restricts which scripts a website can execute, while WebKit Process Isolation ensures that scripts do not affect the system.
198. How does Apple protect iOS backups stored locally on a Mac?
A) Local backups can be encrypted with a user-defined password
B) Secure Enclave automatically encrypts all backups
C) iCloud Sync encrypts all local backups
D) Local backups require two-factor authentication
Answer: A) Local backups can be encrypted with a user-defined password
Explanation: iTunes and Finder allow users to encrypt iOS backups with a user-defined password, ensuring data security.
199. How does Apple ensure secure Face ID data processing?
A) Face ID data is stored and processed only in the Secure Enclave
B) Biometric Firewall protects Face ID data
C) iCloud encrypts all Face ID processing
D) Face ID requires two-factor authentication
Answer: A) Face ID data is stored and processed only in the Secure Enclave
Explanation: Face ID data never leaves the Secure Enclave, making it secure against remote attacks.
200. How does Apple prevent unauthorized pairing of iPhones with unknown devices?
A) Explicit user approval is required for all pairing requests
B) Secure Bluetooth Lock Mode
C) iCloud Pairing Protection
D) Secure Boot for External Devices
Answer: A) Explicit user approval is required for all pairing requests
Explanation: iOS requires user approval for device pairing, preventing unauthorized connections to iPhones.
201. What feature ensures that iOS users can control how apps use their personal data?
A) Privacy Labels in the App Store
B) Secure Enclave-Based Data Control
C) iCloud Secure Data Gateway
D) Biometric Data Consent
Answer: A) Privacy Labels in the App Store
Explanation: Privacy labels in the App Store inform users about how apps collect and use personal data, helping them make informed choices.
202. How does iOS protect against SIM-based phishing attacks?
A) iMessage Verification and Two-Factor Authentication (2FA)
B) Secure SIM Firewall
C) iCloud-Synced SIM Authentication
D) Biometric-Based SIM Lock
Answer: A) iMessage Verification and Two-Factor Authentication (2FA)
Explanation: iMessage verification and 2FA prevent attackers from using a stolen SIM card to access Apple services.
203. What prevents third-party keyboards from accessing sensitive information?
A) App Sandboxing and Restricted API Access
B) Secure Enclave Keyboard Encryption
C) Biometric Authentication for Third-Party Keyboards
D) Encrypted iCloud Keyboard Storage
Answer: A) App Sandboxing and Restricted API Access
Explanation: iOS restricts third-party keyboards from accessing passwords and sensitive fields, ensuring data security.
204. How does Apple protect iCloud users from credential stuffing attacks?
A) Login Attempt Rate-Limiting and Security Alerts
B) Secure iCloud Gateway Encryption
C) iCloud Biometric Login Mode
D) Two-Factor Authentication for Every Login
Answer: A) Login Attempt Rate-Limiting and Security Alerts
Explanation: Apple limits the number of failed login attempts and notifies users of suspicious activity, preventing credential stuffing attacks.
205. What is Apple’s approach to handling security vulnerabilities in iOS?
A) Bug Bounty Program and Regular Security Patches
B) Secure iOS Gateway Firewall
C) Secure Boot-Level Patch Encryption
D) iCloud-Based Security Verification
Answer: A) Bug Bounty Program and Regular Security Patches
Explanation: Apple runs a bug bounty program and releases security patches regularly, ensuring vulnerabilities are fixed quickly.