1. What is the primary purpose of jailbreaking an iOS device?
A) To increase security and privacy
B) To bypass manufacturer restrictions and gain full control
C) To improve battery life
D) To enhance device speed
Answer: B) To bypass manufacturer restrictions and gain full control
Explanation: Jailbreaking removes software restrictions imposed by Apple, allowing users to install unauthorized apps, modify system settings, and access restricted files.
2. Which of the following is a major risk of rooting an Android device?
A) Improved battery optimization
B) Reduced app performance
C) Increased vulnerability to malware and exploits
D) Automatic updates from Google
Answer: C) Increased vulnerability to malware and exploits
Explanation: Rooting bypasses Android’s built-in security measures, making the device more susceptible to malicious apps and unauthorized access.
3. What security mechanism does jailbreaking often disable in iOS devices?
A) Secure Boot
B) App Store Verification
C) Data Encryption
D) Mandatory Software Updates
Answer: A) Secure Boot
Explanation: Secure Boot ensures that only trusted, signed code runs on the device. Jailbreaking disables this, allowing untrusted code to execute, increasing security risks.
4. Why do official banking apps often block access on jailbroken or rooted devices?
A) To improve user experience
B) To prevent account synchronization issues
C) To protect against keyloggers and financial fraud
D) To save battery life
Answer: C) To protect against keyloggers and financial fraud
Explanation: Rooted or jailbroken devices can run malicious apps that intercept sensitive information, making them a security risk for financial applications.
5. Which type of malware is commonly associated with jailbroken and rooted devices?
A) Ransomware
B) Adware
C) Spyware
D) Rootkits
Answer: D) Rootkits
Explanation: Rootkits exploit system-level privileges to hide malicious activities, often found on rooted or jailbroken devices where system security is compromised.
6. What is a major consequence of jailbreaking or rooting in terms of device warranty?
A) Extended warranty coverage
B) Manufacturer may void the warranty
C) Faster replacement services
D) More frequent software updates
Answer: B) Manufacturer may void the warranty
Explanation: Most manufacturers consider jailbreaking or rooting as unauthorized modifications, which voids warranty and support agreements.
7. Which security feature does Android use to prevent unauthorized root access?
A) iBoot
B) SafetyNet
C) Secure Enclave
D) BitLocker
Answer: B) SafetyNet
Explanation: Google’s SafetyNet detects modifications like rooting and prevents access to certain apps (e.g., banking apps, Google Pay) for security reasons.
8. What is the primary reason app developers implement jailbreak/root detection?
A) To limit user customization
B) To prevent software piracy and security threats
C) To improve user interface
D) To optimize battery performance
Answer: B) To prevent software piracy and security threats
Explanation: Rooted or jailbroken devices allow users to bypass app security mechanisms, making it easier to manipulate or pirate software.
9. What can a malicious app do if installed on a rooted device?
A) Access and modify system files
B) Improve device security
C) Extend battery life
D) Improve Wi-Fi speed
Answer: A) Access and modify system files
Explanation: With root access, malware can manipulate system files, steal data, and grant hackers full control over the device.
10. Which of the following is a method attackers use to gain root access to a device?
A) Drive-by downloads
B) Keylogging
C) Phishing emails
D) Privilege escalation
Answer: D) Privilege escalation
Explanation: Privilege escalation exploits vulnerabilities to gain administrative control over the device, often used in rooting or jailbreaking attacks.
11. Which of the following is a common security risk when sideloading apps on a jailbroken/rooted device?
A) Poor user experience
B) App crashes
C) Unauthorized data access and malware infections
D) Slow network speed
Answer: C) Unauthorized data access and malware infections
Explanation: Sideloaded apps from third-party sources are often unverified and may contain malware that exploits root privileges.
12. How can a user detect if their device has been jailbroken or rooted without their knowledge?
A) Slower device performance
B) Use of root detection apps or security tools
C) Increased battery life
D) Improved app compatibility
Answer: B) Use of root detection apps or security tools
Explanation: Security tools like Root Checker (Android) or Jailbreak Detection SDKs can verify if a device has been compromised.
13. What type of attack can occur due to weak security in a jailbroken/rooted device?
A) Denial of Service (DoS)
B) Man-in-the-Middle (MITM) attacks
C) Phishing
D) SQL Injection
Answer: B) Man-in-the-Middle (MITM) attacks
Explanation: Compromised security in a jailbroken/rooted device allows attackers to intercept and manipulate network traffic.
14. What is one of the biggest risks of granting root access to a third-party app?
A) Longer app loading times
B) App may delete itself
C) Complete device compromise
D) Increased app permissions
Answer: C) Complete device compromise
Explanation: Apps with root access can modify system files, install persistent malware, and completely control the device.
15. Why do some users still jailbreak or root their devices despite the risks?
A) To improve security
B) To bypass restrictions and install unauthorized apps
C) To increase battery life
D) To make the device more resistant to malware
Answer: B) To bypass restrictions and install unauthorized apps
Explanation: Many users jailbreak/root their devices to access custom ROMs, third-party apps, and modify system settings.
16. How does jailbreaking/rooting affect automatic system updates?
A) Updates occur more frequently
B) Updates are blocked or need manual installation
C) Updates improve security automatically
D) Updates enhance warranty coverage
Answer: B) Updates are blocked or need manual installation
Explanation: Jailbreaking/rooting often disables OTA (Over-the-Air) updates, requiring manual updates that may not be secure.
17. What is a “tethered jailbreak”?
A) A jailbreak that works only when connected to a computer
B) A jailbreak that allows only partial root access
C) A jailbreak that cannot be reversed
D) A jailbreak that increases battery life
Answer: A) A jailbreak that works only when connected to a computer
Explanation: Tethered jailbreaks require the device to be connected to a PC for every reboot; otherwise, it won’t function correctly.
18. What is the risk of using a custom ROM on a rooted Android device?
A) Faster performance
B) Improved security features
C) Potential security vulnerabilities and instability
D) Increased app compatibility
Answer: C) Potential security vulnerabilities and instability
Explanation: Custom ROMs may lack security updates, making them vulnerable to exploits and malware.
19. What should be done before jailbreaking or rooting a device to minimize risk?
A) Disable internet connection
B) Create a full device backup
C) Use a weak password
D) Increase screen brightness
Answer: B) Create a full device backup
Explanation: Rooting/jailbreaking can brick a device or cause data loss, so backups ensure recovery if anything goes wrong.
20. What is a safer alternative to jailbreaking or rooting for customization?
A) Using third-party app stores
B) Installing security updates manually
C) Using developer options and official APIs
D) Disabling device encryption
Answer: C) Using developer options and official APIs
Explanation: Official customization tools like Android Developer Options or iOS Shortcuts offer some flexibility without bypassing security protections.
21. What happens if a user installs an untrusted root management app on a rooted Android device?
A) The device becomes immune to malware
B) The app could grant root access to malicious applications
C) The device will automatically unroot itself
D) The battery life will improve
Answer: B) The app could grant root access to malicious applications
Explanation: Root management apps control which apps get root access. A malicious or untrusted root management app can allow unauthorized apps to execute dangerous commands.
22. Why do some malware strains specifically target rooted or jailbroken devices?
A) They can exploit root privileges to execute commands without user consent
B) They increase device performance
C) They can only infect devices with low battery
D) They improve network security
Answer: A) They can exploit root privileges to execute commands without user consent
Explanation: Malware on rooted/jailbroken devices can bypass normal app sandboxing and escalate privileges to steal data or execute malicious commands.
23. How does jailbreaking affect iOS sandboxing?
A) It strengthens sandboxing security
B) It removes app sandboxing, allowing unrestricted app access
C) It improves app compatibility
D) It limits unauthorized app installations
Answer: B) It removes app sandboxing, allowing unrestricted app access
Explanation: iOS sandboxing isolates apps from one another. Jailbreaking removes this restriction, allowing apps to access system files and sensitive data.
24. What is the impact of jailbreaking on Apple’s Secure Enclave?
A) It enhances Secure Enclave’s encryption
B) It bypasses Secure Enclave, potentially exposing sensitive data
C) It speeds up fingerprint recognition
D) It prevents unauthorized access
Answer: B) It bypasses Secure Enclave, potentially exposing sensitive data
Explanation: Secure Enclave is responsible for encryption and secure key storage. Jailbreaking may weaken its security, increasing data theft risks.
25. What is a “semi-tethered jailbreak”?
A) A jailbreak that persists but requires a tool to re-enable full functionality after a reboot
B) A jailbreak that only works when connected to Wi-Fi
C) A jailbreak that permanently unlocks the bootloader
D) A jailbreak that improves iOS updates
Answer: A) A jailbreak that persists but requires a tool to re-enable full functionality after a reboot
Explanation: Semi-tethered jailbreaks allow partial functionality after a reboot but require a tool to restore full jailbreak access.
26. Why does jailbreaking make a device more susceptible to zero-day vulnerabilities?
A) It removes the ability to detect malware
B) It disables security patches and updates
C) It automatically uninstalls security apps
D) It improves app performance
Answer: B) It disables security patches and updates
Explanation: Jailbreaking prevents iOS from receiving automatic updates, making devices vulnerable to unpatched security flaws.
27. What is one common way attackers gain control over jailbroken/rooted devices?
A) Sending fake system update notifications
B) Exploiting SSH access with default passwords
C) Slowing down the device until the user resets it
D) Forcing the device to overheat
Answer: B) Exploiting SSH access with default passwords
Explanation: Many users install OpenSSH on jailbroken devices but fail to change the default root password, allowing attackers to remotely control the device.
28. How does rooting affect Google’s Play Protect security mechanism?
A) It enhances Play Protect’s malware scanning
B) It disables or bypasses Play Protect, allowing unauthorized apps to run
C) It makes Play Protect detect malware more accurately
D) It increases Play Store app compatibility
Answer: B) It disables or bypasses Play Protect, allowing unauthorized apps to run
Explanation: Rooting often disables Play Protect, Google’s built-in malware scanning, making it easier for harmful apps to operate undetected.
29. Which security feature is often bypassed when an Android device is rooted?
A) Google Play Store
B) SELinux (Security-Enhanced Linux)
C) Android Battery Optimizer
D) Do Not Disturb Mode
Answer: B) SELinux (Security-Enhanced Linux)
Explanation: Rooting can disable SELinux, a security module that enforces access controls, making the device vulnerable to privilege escalation attacks.
30. What is a major legal risk of jailbreaking or rooting a device?
A) It is illegal in all countries
B) It may violate terms of service, leading to legal consequences
C) It improves software licensing
D) It reduces privacy concerns
Answer: B) It may violate terms of service, leading to legal consequences
Explanation: While jailbreaking/rooting is legal in some places, it often violates manufacturer terms of service, which could lead to warranty loss or legal action.
31. How can users unroot an Android device safely?
A) By factory resetting the device
B) By using Magisk or SuperSU’s unroot option
C) By installing more root apps
D) By disabling developer mode
Answer: B) By using Magisk or SuperSU’s unroot option
Explanation: Magisk and SuperSU provide an unroot feature that safely removes root access without damaging system files.
32. Why do some mobile antivirus apps detect jailbroken or rooted devices as insecure?
A) Rooting/jailbreaking removes system-level protections
B) Jailbreaking makes the phone immune to viruses
C) Rooted devices cannot install antivirus apps
D) Jailbroken phones have fewer apps
Answer: A) Rooting/jailbreaking removes system-level protections
Explanation: Antivirus apps flag jailbroken/rooted devices because they lack essential security restrictions that prevent malware and exploits.
33. What is a kernel exploit in the context of rooting or jailbreaking?
A) A vulnerability allowing deep system modifications
B) A tool for improving battery efficiency
C) A method for automatically unrooting a device
D) A way to increase device performance
Answer: A) A vulnerability allowing deep system modifications
Explanation: Kernel exploits allow attackers to gain root access by bypassing system-level security restrictions.
34. What happens if a device is bricked after a failed jailbreak attempt?
A) The device shuts down permanently and cannot be recovered
B) The device loses wireless connectivity
C) The device may become unresponsive and require manual recovery
D) The device enters safe mode
Answer: C) The device may become unresponsive and require manual recovery
Explanation: Bricking occurs when a modification corrupts system files, rendering the device inoperable. Recovery is possible through DFU Mode (iOS) or Fastboot (Android).
35. What is a “root cloak” app used for?
A) To disguise root access from detection by apps
B) To improve device performance
C) To enhance battery life
D) To increase Wi-Fi signal strength
Answer: A) To disguise root access from detection by apps
Explanation: Root cloak apps attempt to hide root status so that apps (like banking apps) won’t block functionality on a rooted device.
36. Why do app developers implement root/jailbreak detection methods?
A) To prevent security bypasses and app manipulation
B) To make apps run slower
C) To encourage users to install more apps
D) To increase battery drain
Answer: A) To prevent security bypasses and app manipulation
Explanation: Many apps (especially financial or DRM-protected apps) detect and block rooted or jailbroken devices to prevent tampering.
37. How does rooting affect Android’s Verified Boot security feature?
A) It strengthens Verified Boot
B) It disables Verified Boot, allowing untrusted software to run
C) It makes the bootloader more secure
D) It forces more frequent system updates
Answer: B) It disables Verified Boot, allowing untrusted software to run
Explanation: Verified Boot ensures the device runs only trusted firmware. Rooting often disables this, increasing security risks.
38. What is one common use of jailbreaking for malicious purposes?
A) Installing unauthorized spyware
B) Increasing device speed
C) Improving battery life
D) Enhancing biometric security
Answer: A) Installing unauthorized spyware
Explanation: Attackers can use jailbreaking to install hidden spyware that monitors user activity and steals sensitive data.
39. What is an alternative to jailbreaking/rooting for customization?
A) Using third-party keyboards
B) Enabling developer mode and using official tools
C) Disabling security updates
D) Removing all system apps
Answer: B) Enabling developer mode and using official tools
Explanation: Android and iOS offer developer options that allow some customization without compromising security.
40. What is a primary reason why organizations prohibit jailbroken or rooted devices on corporate networks?
A) Increased cybersecurity risks
B) Increased employee productivity
C) Improved software compatibility
D) Faster network speed
Answer: A) Increased cybersecurity risks
Explanation: Rooted/jailbroken devices lack security controls, making them a major risk for corporate data breaches.
41. What is one major reason Apple and Google discourage jailbreaking and rooting?
A) It enhances user experience
B) It violates their software policies and weakens security
C) It reduces device performance
D) It makes updates faster
Answer: B) It violates their software policies and weakens security
Explanation: Jailbreaking/rooting bypasses built-in security controls, increasing exposure to malware and unauthorized modifications, which is why manufacturers discourage it.
42. What security feature is commonly disabled when an Android device is rooted?
A) Google Assistant
B) Secure Boot
C) Bluetooth functionality
D) Screen timeout
Answer: B) Secure Boot
Explanation: Secure Boot ensures that only trusted firmware and OS components are loaded. Rooting can disable this, allowing potentially malicious code to run.
43. What is a bootloader, and how does unlocking it relate to rooting?
A) A bootloader manages the initial startup process and is often unlocked to enable rooting
B) A bootloader controls network connectivity
C) A bootloader is an alternative to the Android Play Store
D) A bootloader improves app performance
Answer: A) A bootloader manages the initial startup process and is often unlocked to enable rooting
Explanation: Unlocking the bootloader is often the first step in rooting because it removes restrictions on modifying the operating system.
44. Which of the following is a common risk of installing custom ROMs on a rooted device?
A) The device may become more secure
B) The device may lose manufacturer support and updates
C) The device battery life will improve significantly
D) The device will stop overheating
Answer: B) The device may lose manufacturer support and updates
Explanation: Installing a custom ROM often means no official security patches, leaving the device vulnerable to exploits.
45. What type of malware can persist even after a factory reset on a jailbroken/rooted device?
A) Adware
B) Ransomware
C) Firmware-level rootkits
D) Trojans
Answer: C) Firmware-level rootkits
Explanation: Rootkits embedded in firmware can survive factory resets by reloading themselves during system boot.
46. Why does Google Pay and Apple Pay often block transactions on rooted/jailbroken devices?
A) To prevent fraud and unauthorized financial transactions
B) To improve transaction speed
C) To reduce battery usage
D) To enhance user experience
Answer: A) To prevent fraud and unauthorized financial transactions
Explanation: Rooted/jailbroken devices are more vulnerable to keyloggers and unauthorized transactions, making them unsafe for mobile payments.
47. What is an APT (Advanced Persistent Threat) and how can jailbreaking/rooting increase exposure to it?
A) APTs are sophisticated cyberattacks that exploit security weaknesses in rooted/jailbroken devices
B) APTs improve device performance
C) APTs help install software updates
D) APTs enhance network speed
Answer: A) APTs are sophisticated cyberattacks that exploit security weaknesses in rooted/jailbroken devices
Explanation: APTs target vulnerabilities in rooted/jailbroken devices to maintain long-term, stealthy access for cyber espionage.
48. How does rooting affect a device’s ability to use VPNs securely?
A) VPNs become more secure
B) Rooting can allow VPN bypassing, exposing unencrypted traffic
C) VPNs stop working entirely
D) Rooting increases VPN encryption
Answer: B) Rooting can allow VPN bypassing, exposing unencrypted traffic
Explanation: Some malware on rooted devices can intercept and bypass VPN encryption, exposing sensitive data.
49. Which of the following is a sign that a jailbroken or rooted device has been compromised?
A) Faster app performance
B) Unauthorized network activity and apps behaving abnormally
C) Longer battery life
D) Increased system stability
Answer: B) Unauthorized network activity and apps behaving abnormally
Explanation: If a rooted/jailbroken device is compromised, users may notice data leaks, unusual network connections, or apps running without permission.
50. What does “sandboxing” mean in mobile security, and how does jailbreaking affect it?
A) Sandboxing isolates apps to prevent unauthorized access, but jailbreaking removes these restrictions
B) Sandboxing slows down the device
C) Sandboxing prevents overcharging
D) Sandboxing increases battery life
Answer: A) Sandboxing isolates apps to prevent unauthorized access, but jailbreaking removes these restrictions
Explanation: App sandboxing ensures apps cannot access each other’s data. Jailbreaking removes this, making the device vulnerable.
51. What role does SELinux play in Android security, and what happens when it’s disabled?
A) SELinux enforces security policies, and disabling it increases malware risk
B) SELinux improves battery efficiency
C) SELinux blocks Bluetooth connections
D) SELinux reduces screen resolution
Answer: A) SELinux enforces security policies, and disabling it increases malware risk
Explanation: SELinux (Security-Enhanced Linux) restricts what apps can access. Rooting often disables SELinux, making the device vulnerable.
52. What security risk does enabling ADB (Android Debug Bridge) in root mode introduce?
A) It makes the phone run faster
B) It allows unauthorized remote access to the device
C) It extends battery life
D) It improves mobile network connectivity
Answer: B) It allows unauthorized remote access to the device
Explanation: ADB in root mode lets attackers remotely execute commands on the device if it is improperly secured.
53. Why do enterprise IT teams restrict jailbroken/rooted devices from accessing corporate networks?
A) They don’t like user customization
B) Jailbroken/rooted devices introduce security risks such as data breaches and malware infections
C) They want to limit device speed
D) They reduce app installation
Answer: B) Jailbroken/rooted devices introduce security risks such as data breaches and malware infections
Explanation: Compromised devices can lead to data leaks, unauthorized access, and malware spreading within a corporate network.
54. What is a major drawback of installing apps from third-party sources on a rooted/jailbroken device?
A) They may contain malware or spyware
B) They improve system stability
C) They enhance battery life
D) They speed up system updates
Answer: A) They may contain malware or spyware
Explanation: Third-party apps bypass security checks, increasing the risk of malware infections.
55. What is one way attackers can install malware on a jailbroken/rooted device without user interaction?
A) Exploiting vulnerabilities in system processes
B) Increasing device RAM
C) Running device diagnostics
D) Reducing screen brightness
Answer: A) Exploiting vulnerabilities in system processes
Explanation: Attackers can use privilege escalation exploits to install malware without user consent on jailbroken/rooted devices.
56. What is a common misconception about rooting or jailbreaking a device?
A) It improves security
B) It makes the device immune to malware
C) It reduces device vulnerability
D) It makes devices more susceptible to security threats
Answer: D) It makes devices more susceptible to security threats
Explanation: Rooting/jailbreaking removes built-in security protections, making devices more vulnerable to attacks.
57. How does rooting impact OTA (Over-The-Air) software updates?
A) It enhances OTA updates
B) It blocks OTA updates or requires manual installation
C) It makes updates install faster
D) It reduces update sizes
Answer: B) It blocks OTA updates or requires manual installation
Explanation: Rooted devices cannot receive automatic updates due to modified system partitions.
58. What security measure should users take before jailbreaking/rooting a device?
A) Create a full device backup
B) Disable airplane mode
C) Delete all installed apps
D) Reduce brightness
Answer: A) Create a full device backup
Explanation: Rooting/jailbreaking can lead to device bricking or data loss, making backups essential.
59. Why do jailbreakers/root users often install custom recovery software like TWRP?
A) To manage system files and create backups
B) To improve battery performance
C) To install more games
D) To reduce lag
Answer: A) To manage system files and create backups
Explanation: Custom recoveries (like TWRP) allow users to install custom ROMs, flash updates, and create full backups.
60. What is a safer alternative to rooting for customization?
A) Using Developer Mode and ADB commands
B) Unlocking the bootloader
C) Disabling security features
D) Sideloading unverified apps
Answer: A) Using Developer Mode and ADB commands
Explanation: Developer Mode and ADB commands allow advanced tweaks without the security risks of rooting.
61. What happens if a root-enabled malicious app is granted superuser (SU) access?
A) The app gains full control over the device
B) The device runs faster
C) The app is automatically deleted
D) The device becomes more secure
Answer: A) The app gains full control over the device
Explanation: SU (Superuser) access allows apps to execute system-level commands, which can lead to data theft, system modifications, or complete device control.
62. What is the purpose of Google’s “SafetyNet Attestation” in detecting rooted devices?
A) To prevent unauthorized apps from modifying system settings
B) To improve app speed
C) To increase battery performance
D) To stop device overheating
Answer: A) To prevent unauthorized apps from modifying system settings
Explanation: SafetyNet Attestation detects system integrity violations, preventing rooted devices from accessing secure apps like banking and payment services.
63. Which of the following is a potential risk of bypassing root detection in financial applications?
A) Increased app performance
B) Exposure to banking malware and fraud
C) Improved security encryption
D) Faster login times
Answer: B) Exposure to banking malware and fraud
Explanation: Root bypass techniques allow malware to run undetected in banking apps, leading to fraud, credential theft, and unauthorized transactions.
64. What is “root hiding,” and why is it used?
A) A technique to prevent apps from detecting root access
B) A way to improve device battery life
C) A method to increase device storage
D) A feature that stops malware from executing
Answer: A) A technique to prevent apps from detecting root access
Explanation: Root hiding tools trick apps into thinking a device is not rooted, allowing bypassing security restrictions in apps like Google Pay, Netflix, and banking apps.
65. Why do jailbroken iOS devices often require alternative app stores like Cydia?
A) The official App Store is blocked for jailbroken devices
B) Cydia offers more secure apps
C) Jailbroken devices cannot install official apps
D) Apple restricts app sideloading
Answer: A) The official App Store is blocked for jailbroken devices
Explanation: Apple prevents jailbroken devices from using the App Store, leading users to rely on third-party app stores like Cydia.
66. What is the risk of installing cracked or pirated apps on a jailbroken/rooted device?
A) They may contain malware, spyware, or ransomware
B) They improve device speed
C) They increase security updates
D) They extend battery life
Answer: A) They may contain malware, spyware, or ransomware
Explanation: Cracked apps are often infected with malware, as they bypass security verifications and digital signatures.
67. What happens when a jailbroken iOS device is updated with an official iOS update?
A) The device loses jailbreak status
B) The update enhances jailbreak stability
C) The device becomes permanently bricked
D) The update improves system security while keeping jailbreak intact
Answer: A) The device loses jailbreak status
Explanation: Official iOS updates patch jailbreak vulnerabilities, causing the jailbreak to be removed upon updating.
68. What is the risk of enabling SSH access on a jailbroken/rooted device without a strong password?
A) Attackers can remotely access and control the device
B) The device runs faster
C) The battery drains slower
D) The device automatically updates itself
Answer: A) Attackers can remotely access and control the device
Explanation: SSH access with default credentials allows hackers to take control of a jailbroken device and install malicious scripts or steal data.
69. Why is “Magisk” preferred over traditional rooting methods like SuperSU?
A) Magisk allows root access while keeping system integrity intact
B) Magisk makes the phone faster
C) Magisk increases screen brightness
D) Magisk blocks all malware
Answer: A) Magisk allows root access while keeping system integrity intact
Explanation: Magisk offers “systemless root”, allowing modifications without altering system partitions, making it easier to bypass root detection.
70. What is “Jailbreak Detection Bypass” and why is it risky?
A) A technique to bypass security checks in sensitive applications
B) A way to improve app loading speed
C) A feature that increases battery life
D) A tool for securing root access
Answer: A) A technique to bypass security checks in sensitive applications
Explanation: Bypassing jailbreak detection tricks security-sensitive apps (like banking apps), making them vulnerable to exploits.
71. What security feature does iOS use to prevent unauthorized modifications to system files?
A) Secure Enclave
B) Play Protect
C) FileVault
D) iCloud Backup
Answer: A) Secure Enclave
Explanation: Secure Enclave is a hardware-based security feature that prevents unauthorized access to encryption keys and system data.
72. How does rooting affect Android’s app permissions model?
A) Rooting allows apps to bypass permission requests
B) Rooting increases security updates
C) Rooting improves network speed
D) Rooting disables background services
Answer: A) Rooting allows apps to bypass permission requests
Explanation: Rooted apps can bypass Android’s permission model, granting themselves access to sensitive user data.
73. Why do some Android manufacturers implement hardware-based security (e.g., Knox)?
A) To detect and block rooted devices
B) To improve battery life
C) To enable sideloading of apps
D) To enhance Bluetooth performance
Answer: A) To detect and block rooted devices
Explanation: Knox (Samsung) and similar technologies detect rooting/jailbreaking and block certain apps or features to maintain security.
74. What is a major risk of modifying the “build.prop” file on a rooted Android device?
A) It can lead to system instability or boot loops
B) It improves device security
C) It speeds up network connectivity
D) It enhances fingerprint recognition
Answer: A) It can lead to system instability or boot loops
Explanation: The build.prop file contains critical system settings, and incorrect modifications can cause boot failures.
75. Why do some online gaming apps detect and ban jailbroken/rooted devices?
A) To prevent cheating and game modifications
B) To improve game graphics
C) To enable offline mode
D) To increase in-game rewards
Answer: A) To prevent cheating and game modifications
Explanation: Game developers ban rooted/jailbroken devices to stop players from using cheat tools or modifying game data.
76. What is the risk of granting root access to automation apps (e.g., Tasker, Xposed)?
A) They may unintentionally expose sensitive data or override security settings
B) They speed up device performance
C) They improve app compatibility
D) They increase storage capacity
Answer: A) They may unintentionally expose sensitive data or override security settings
Explanation: Automation apps with root access can modify security settings or expose personal data to other apps.
77. How does rooting impact device encryption?
A) Rooting can disable full-disk encryption
B) Rooting improves encryption algorithms
C) Rooting enhances network security
D) Rooting automatically backs up encrypted files
Answer: A) Rooting can disable full-disk encryption
Explanation: Many rooting methods disable encryption, leaving sensitive user data exposed.
78. What is the “dirty cow” vulnerability, and how does it relate to rooting?
A) It is a privilege escalation exploit used to gain root access
B) It improves file storage efficiency
C) It speeds up app performance
D) It enhances network security
Answer: A) It is a privilege escalation exploit used to gain root access
Explanation: Dirty COW (Copy-On-Write) is a Linux kernel vulnerability that hackers use to gain root privileges on Android devices.
79. What is the primary risk of using a tethered jailbreak?
A) The device requires a computer to reboot properly
B) The device battery drains faster
C) The device becomes permanently rooted
D) The device stops detecting SIM cards
Answer: A) The device requires a computer to reboot properly
Explanation: Tethered jailbreaks need a computer connection after every reboot, making them inconvenient.
80. What is an alternative security feature that iOS users can use instead of jailbreaking?
A) Use iOS Shortcuts and Configuration Profiles
B) Disable software updates
C) Install third-party firmware
D) Modify system files manually
Answer: A) Use iOS Shortcuts and Configuration Profiles
Explanation: iOS Shortcuts and Configuration Profiles allow customization without the security risks of jailbreaking.
81. Why do rooted Android devices have a higher risk of credential theft?
A) Malware can access stored passwords and authentication tokens
B) Rooted devices block unauthorized access
C) Rooted devices have stronger encryption
D) Rooted devices automatically log out of accounts
Answer: A) Malware can access stored passwords and authentication tokens
Explanation: Rooted devices allow malware to access sensitive credentials, bypassing app-level encryption and stealing authentication tokens.
82. What happens if a user tries to re-lock the bootloader after rooting their Android device?
A) The device may enter a boot loop or become bricked
B) The device will run faster
C) The device will gain additional security features
D) The device’s performance will improve
Answer: A) The device may enter a boot loop or become bricked
Explanation: Re-locking the bootloader after modifications can cause boot failures, as the system detects unauthorized changes.
83. Why is malware more effective on jailbroken or rooted devices?
A) It can gain elevated privileges without user consent
B) It cannot run on rooted devices
C) It automatically uninstalls itself
D) It slows down device speed
Answer: A) It can gain elevated privileges without user consent
Explanation: Malware on a rooted/jailbroken device can execute high-privilege commands without triggering security prompts.
84. What is a “soft brick” in the context of jailbreaking or rooting?
A) A partially damaged system that can be recovered
B) A device that no longer powers on
C) A device with extended battery life
D) A security feature that prevents hacking
Answer: A) A partially damaged system that can be recovered
Explanation: A soft-bricked device is one that fails to boot properly but can be restored using recovery tools.
85. What is the risk of using root access to modify kernel parameters?
A) System instability and crashes
B) Improved device performance
C) Enhanced app security
D) Faster OS updates
Answer: A) System instability and crashes
Explanation: Modifying kernel parameters incorrectly can lead to random crashes, overheating, or even hardware damage.
86. Why do security professionals recommend against rooting or jailbreaking a primary device?
A) It introduces security vulnerabilities and removes system integrity protections
B) It prevents app crashes
C) It improves software stability
D) It speeds up network performance
Answer: A) It introduces security vulnerabilities and removes system integrity protections
Explanation: Rooting/jailbreaking weakens system security, making it easier for attackers to exploit vulnerabilities.
87. How can jailbreaking affect the warranty of an Apple device?
A) Apple may void the warranty due to unauthorized modifications
B) Apple extends the warranty for jailbroken devices
C) Jailbreaking improves software support
D) Jailbreaking enables free AppleCare+
Answer: A) Apple may void the warranty due to unauthorized modifications
Explanation: Apple considers jailbreaking a violation of its terms of service, which can void the warranty.
88. What is the risk of using “one-click root” applications?
A) They may install malware or steal personal data
B) They increase device encryption
C) They improve mobile signal reception
D) They speed up software updates
Answer: A) They may install malware or steal personal data
Explanation: Many one-click root apps exploit vulnerabilities to root devices but may also install spyware or steal data.
89. Why do government agencies discourage rooting and jailbreaking?
A) It weakens device security, increasing the risk of cyber espionage
B) It slows down the device
C) It improves data encryption
D) It allows only approved applications
Answer: A) It weakens device security, increasing the risk of cyber espionage
Explanation: Jailbroken/rooted devices lack security controls, making them vulnerable to cyberattacks and surveillance.
90. How does rooting/jailbreaking affect digital forensics investigations?
A) It allows forensic analysts to extract more data
B) It encrypts all forensic logs
C) It makes data recovery impossible
D) It improves device security
Answer: A) It allows forensic analysts to extract more data
Explanation: Rooting/jailbreaking removes system security barriers, allowing forensic tools to access hidden files, logs, and sensitive data.
91. What is a “semi-untethered” jailbreak?
A) A jailbreak that persists until the device is rebooted but can be reactivated without a computer
B) A jailbreak that completely disables security features
C) A jailbreak that cannot be removed
D) A jailbreak that increases device performance
Answer: A) A jailbreak that persists until the device is rebooted but can be reactivated without a computer
Explanation: Semi-untethered jailbreaks require a jailbreak tool to reactivate modifications after a reboot.
92. What is the impact of rooting on biometric authentication (e.g., Face ID, fingerprint sensors)?
A) Rooting may disable or compromise biometric security
B) Rooting enhances biometric accuracy
C) Rooting speeds up authentication
D) Rooting adds extra biometric sensors
Answer: A) Rooting may disable or compromise biometric security
Explanation: Some rooting methods interfere with secure authentication, making fingerprint and Face ID less reliable.
93. Why do certain job roles (e.g., law enforcement, cybersecurity) prohibit jailbreaking or rooting?
A) Rooted/jailbroken devices increase the risk of security breaches and unauthorized access
B) Rooted devices consume more battery
C) Rooted devices improve security updates
D) Rooting improves performance
Answer: A) Rooted/jailbroken devices increase the risk of security breaches and unauthorized access
Explanation: Sensitive job roles require high-security standards, and jailbreaking/rooting removes protections that prevent data leaks.
94. What security feature is commonly disabled on jailbroken iPhones, making them more vulnerable?
A) Code signing enforcement
B) Bluetooth connectivity
C) Battery optimization
D) Wi-Fi settings
Answer: A) Code signing enforcement
Explanation: Code signing ensures that only trusted apps run on iOS, but jailbreaking disables this, allowing unverified apps to execute.
95. How can users check if their device has been unknowingly rooted?
A) Use a root checker app or security analysis tool
B) Reduce screen brightness
C) Install more apps
D) Increase volume settings
Answer: A) Use a root checker app or security analysis tool
Explanation: Root checker apps and security tools can detect unauthorized modifications or exploits.
96. What is a security risk associated with running root-access terminal commands?
A) Incorrect commands can damage the operating system
B) The device will run slower
C) The battery will drain faster
D) The screen resolution will decrease
Answer: A) Incorrect commands can damage the operating system
Explanation: Executing incorrect root-level commands can delete system files, corrupt data, or cause boot failures.
97. Why do some root methods use bootloader exploits?
A) To bypass manufacturer restrictions and gain deep system access
B) To improve device battery life
C) To enable app updates
D) To increase Wi-Fi speed
Answer: A) To bypass manufacturer restrictions and gain deep system access
Explanation: Bootloader exploits are used to override security mechanisms and grant root access.
98. Why do enterprise mobile device management (MDM) solutions block jailbroken/rooted devices?
A) To prevent security risks and unauthorized access
B) To increase device performance
C) To enhance screen resolution
D) To allow more app installations
Answer: A) To prevent security risks and unauthorized access
Explanation: MDM solutions ensure devices comply with corporate security policies and block rooted/jailbroken devices to prevent data breaches.
99. How can a user unroot their device securely?
A) Use Magisk’s unroot feature or reflash stock firmware
B) Increase brightness settings
C) Disable Wi-Fi
D) Reduce app storage
Answer: A) Use Magisk’s unroot feature or reflash stock firmware
Explanation: The safest way to remove root access is by using Magisk’s unroot tool or flashing stock firmware.
100. What is the primary motivation behind jailbreaking/rooting, despite the risks?
A) To gain full control over device functionality and customization
B) To improve manufacturer security
C) To limit device usage
D) To block security patches
Answer: A) To gain full control over device functionality and customization
Explanation: Many users jailbreak/root their devices to install custom ROMs, remove bloatware, and modify system settings.
101. How does rooting a device affect the risk of phishing attacks?
A) Rooted devices are more vulnerable as malware can intercept and manipulate browser traffic
B) Rooted devices become immune to phishing attacks
C) Rooting improves security against phishing
D) Rooting disables the internet, preventing phishing attacks
Answer: A) Rooted devices are more vulnerable as malware can intercept and manipulate browser traffic
Explanation: Rooted devices allow malicious apps to bypass security restrictions, making it easier for phishing malware to manipulate network traffic and steal credentials.
102. What is a potential risk of installing modified system frameworks on a rooted device?
A) Increased exposure to privilege escalation attacks
B) Enhanced battery performance
C) Faster app installation
D) Improved security against malware
Answer: A) Increased exposure to privilege escalation attacks
Explanation: Modified system frameworks may introduce vulnerabilities, allowing attackers to escalate privileges and gain full device control.
103. What kind of attack can exploit a rooted device with an exposed ADB (Android Debug Bridge) port?
A) Remote code execution (RCE)
B) Battery draining attack
C) SIM card cloning
D) Bluetooth jamming
Answer: A) Remote code execution (RCE)
Explanation: If ADB is enabled and unsecured, attackers can remotely execute commands on a rooted device, leading to data theft or system compromise.
104. How does jailbreaking impact Apple’s automatic system integrity protections?
A) Jailbreaking disables system integrity protection, exposing the device to security threats
B) Jailbreaking strengthens system integrity protections
C) Jailbreaking speeds up system updates
D) Jailbreaking allows users to enable additional security features
Answer: A) Jailbreaking disables system integrity protection, exposing the device to security threats
Explanation: System Integrity Protection (SIP) prevents unauthorized modifications to system files, but jailbreaking disables this, increasing security risks.
105. What happens if a malicious app with root access modifies the “hosts” file?
A) It can redirect traffic to phishing sites or block security updates
B) It increases the speed of the internet
C) It improves DNS resolution
D) It enhances network security
Answer: A) It can redirect traffic to phishing sites or block security updates
Explanation: The hosts file controls domain resolution, and modifying it with root access can redirect users to malicious websites or block security updates.
106. Why is it dangerous to grant root access to an unknown app?
A) It can execute privileged operations without user consent
B) It improves app stability
C) It increases battery efficiency
D) It speeds up internet browsing
Answer: A) It can execute privileged operations without user consent
Explanation: Root access gives apps unrestricted control, allowing them to modify system files, steal data, or install hidden malware.
107. What type of security risk arises from jailbreaking/rooting and using public Wi-Fi?
A) Increased risk of Man-in-the-Middle (MITM) attacks
B) Improved network speed
C) Stronger firewall protections
D) Enhanced Bluetooth connectivity
Answer: A) Increased risk of Man-in-the-Middle (MITM) attacks
Explanation: Rooted/jailbroken devices lack security protections, making it easier for attackers to intercept unencrypted traffic on public Wi-Fi.
108. Why do companies discourage employees from using jailbroken or rooted devices for work?
A) Jailbroken/rooted devices can compromise corporate data security
B) They reduce employee productivity
C) They consume more bandwidth
D) They limit app installations
Answer: A) Jailbroken/rooted devices can compromise corporate data security
Explanation: Rooted/jailbroken devices bypass security policies, making them high-risk for corporate networks due to data leaks and malware threats.
109. How does a custom kernel on a rooted device pose a security risk?
A) It can introduce security flaws or backdoors
B) It enhances firewall protections
C) It prevents unauthorized app installations
D) It improves biometric security
Answer: A) It can introduce security flaws or backdoors
Explanation: Custom kernels may not be regularly updated, leaving them vulnerable to exploits and backdoor attacks.
110. What security feature prevents jailbroken iOS devices from accessing sensitive corporate apps?
A) Mobile Device Management (MDM) policies
B) Bluetooth encryption
C) Faster fingerprint recognition
D) Increased battery optimization
Answer: A) Mobile Device Management (MDM) policies
Explanation: MDM solutions detect jailbroken/rooted devices and block them from accessing corporate resources to prevent security breaches.
111. What risk does a “Frankenstein Firmware” pose when installed on a jailbroken/rooted device?
A) It may contain hidden malware or vulnerabilities
B) It improves device encryption
C) It speeds up app installations
D) It enhances system stability
Answer: A) It may contain hidden malware or vulnerabilities
Explanation: Frankenstein firmware is a mix of official and unofficial firmware that may contain malware, security flaws, or backdoors.
112. Why is a factory reset often ineffective at fully removing malware from a rooted device?
A) Malware can persist in system partitions or bootloader
B) Factory resets improve device security
C) Factory resets remove all malware permanently
D) Factory resets increase performance
Answer: A) Malware can persist in system partitions or bootloader
Explanation: Some malware on rooted devices embeds itself in system partitions, allowing it to survive a factory reset.
113. What risk does a rooted device pose when connected to a compromised USB charging station?
A) It may allow attackers to install malware via USB Debugging
B) It speeds up charging
C) It improves wireless connectivity
D) It enhances app permissions
Answer: A) It may allow attackers to install malware via USB Debugging
Explanation: Rooted devices with USB Debugging enabled can be exploited through malicious charging stations (Juice Jacking).
114. What risk arises from enabling insecure file permissions on a rooted device?
A) Unauthorized apps can modify system files
B) It improves system security
C) It speeds up app launching
D) It prevents malware infections
Answer: A) Unauthorized apps can modify system files
Explanation: Insecure file permissions allow malicious apps to modify or delete critical system files, leading to potential device compromise.
115. Why do banking apps check for root/jailbreak status before launching?
A) To prevent fraud and unauthorized financial transactions
B) To improve app loading times
C) To block non-official payment gateways
D) To reduce battery usage
Answer: A) To prevent fraud and unauthorized financial transactions
Explanation: Rooted/jailbroken devices can bypass security restrictions, allowing malware to steal banking credentials.
116. How can a malicious app leverage root access to bypass Android’s permission model?
A) It can grant itself any permission without user approval
B) It improves app security
C) It increases internet speed
D) It speeds up boot time
Answer: A) It can grant itself any permission without user approval
Explanation: Root access allows apps to override security prompts, granting themselves permissions without user consent.
117. What is the risk of using an outdated jailbreak tool?
A) It may contain unpatched security vulnerabilities
B) It improves security patches
C) It speeds up device performance
D) It enhances fingerprint recognition
Answer: A) It may contain unpatched security vulnerabilities
Explanation: Outdated jailbreak tools may exploit old vulnerabilities, leaving devices open to further attacks.
118. Why do developers of custom ROMs often advise against using unofficial root methods?
A) Unofficial root methods may introduce security vulnerabilities
B) They reduce device performance
C) They limit app compatibility
D) They increase battery drain
Answer: A) Unofficial root methods may introduce security vulnerabilities
Explanation: Unofficial root methods may be insecure, poorly maintained, or contain hidden malware.
119. What security risk is introduced by modifying the system SELinux policy on a rooted device?
A) It weakens Android’s security enforcement
B) It improves network speed
C) It enhances app compatibility
D) It extends device battery life
Answer: A) It weakens Android’s security enforcement
Explanation: Disabling SELinux allows malicious apps to access system files and execute unauthorized commands.
120. Why do manufacturers use bootloader locking to prevent rooting?
A) To protect device integrity and prevent unauthorized modifications
B) To slow down the device
C) To disable Wi-Fi connectivity
D) To block app updates
Answer: A) To protect device integrity and prevent unauthorized modifications
Explanation: Bootloader locking prevents unauthorized firmware modifications, protecting users from security risks associated with rooting.
121. What happens if a jailbroken device is infected with a worm that exploits SSH with default credentials?
A) The worm can spread to other jailbroken devices on the same network
B) The device will self-repair
C) The device will run faster
D) The worm will automatically remove itself
Answer: A) The worm can spread to other jailbroken devices on the same network
Explanation: SSH worms target jailbroken devices with default passwords, allowing them to spread across networks and compromise other devices.
122. How does a jailbroken iPhone increase the risk of spyware infections?
A) Spyware can bypass app sandboxing and access sensitive data
B) Jailbreaking removes all security risks
C) Jailbroken devices are immune to spyware
D) Jailbreaking enhances Apple’s security updates
Answer: A) Spyware can bypass app sandboxing and access sensitive data
Explanation: Jailbreaking removes iOS’s sandboxing, allowing spyware to steal personal information like messages, call logs, and location data.
123. What is the purpose of Google’s Verified Boot feature?
A) To detect and prevent unauthorized modifications to the OS
B) To increase battery life
C) To improve Wi-Fi speed
D) To enhance display resolution
Answer: A) To detect and prevent unauthorized modifications to the OS
Explanation: Verified Boot ensures that only trusted software runs, protecting against malware and unauthorized OS modifications.
124. What is one common method attackers use to gain persistent access to a jailbroken/rooted device?
A) Installing a rootkit or backdoor
B) Using a strong passcode
C) Disabling Bluetooth
D) Keeping the battery fully charged
Answer: A) Installing a rootkit or backdoor
Explanation: Rootkits on jailbroken/rooted devices hide deep in the system, allowing attackers to maintain long-term control.
125. What happens if a rooted device’s system partition is modified incorrectly?
A) The device may enter a boot loop or become bricked
B) The device will speed up
C) The device will update automatically
D) The device will become more secure
Answer: A) The device may enter a boot loop or become bricked
Explanation: Incorrect modifications to the system partition can make the OS fail to load properly, causing boot loops or permanent damage.
126. How does rooting impact SELinux (Security-Enhanced Linux) on Android?
A) Rooting often disables or weakens SELinux, reducing security protections
B) Rooting enhances SELinux security
C) Rooting makes SELinux mandatory
D) Rooting does not affect SELinux
Answer: A) Rooting often disables or weakens SELinux, reducing security protections
Explanation: SELinux enforces strict access controls, but rooting weakens or disables these protections, making exploitation easier.
127. Why do jailbreakers/root users sometimes install firewall apps?
A) To block unauthorized network access to insecure apps
B) To disable internet connectivity
C) To increase CPU performance
D) To bypass app restrictions
Answer: A) To block unauthorized network access to insecure apps
Explanation: Firewall apps on rooted/jailbroken devices help restrict data access for potentially malicious apps.
128. Why do root permissions make Android devices more vulnerable to keyloggers?
A) Keyloggers can run in the background with full system access
B) Rooted devices block keyloggers automatically
C) Root access improves keyboard encryption
D) Rooted devices disable logging
Answer: A) Keyloggers can run in the background with full system access
Explanation: Rooted devices allow keyloggers to monitor keystrokes, including passwords and sensitive information, without detection.
129. How can a user prevent unauthorized root access on their device?
A) Use a root management app like Magisk Manager
B) Disable all apps
C) Remove the SIM card
D) Turn off Wi-Fi
Answer: A) Use a root management app like Magisk Manager
Explanation: Root management apps like Magisk Manager allow users to control which apps receive root access, reducing security risks.
130. What is a potential risk of flashing an unverified custom ROM?
A) The ROM may contain pre-installed malware or spyware
B) The device will become unhackable
C) The device will run faster than stock firmware
D) The device will become waterproof
Answer: A) The ROM may contain pre-installed malware or spyware
Explanation: Unverified custom ROMs may include hidden malware, keyloggers, or backdoors that steal personal data.
131. What is the impact of jailbreaking on iOS app security?
A) It allows sideloaded apps to bypass Apple’s app review process
B) It improves app security
C) It makes all apps run in sandbox mode
D) It increases Apple’s security updates
Answer: A) It allows sideloaded apps to bypass Apple’s app review process
Explanation: Jailbreaking lets users install unverified apps, which bypass Apple’s security checks, increasing malware risks.
132. Why do some companies block access to their apps on rooted/jailbroken devices?
A) To prevent app tampering, reverse engineering, or cheating
B) To slow down performance
C) To reduce app installations
D) To encourage users to buy premium versions
Answer: A) To prevent app tampering, reverse engineering, or cheating
Explanation: Rooted/jailbroken devices allow users to modify app behavior, leading to cheating, piracy, or unauthorized modifications.
133. What can a hacker do if they gain root access to an Android device?
A) Modify system files, steal data, and install hidden malware
B) Improve device security
C) Speed up app loading times
D) Increase device battery life
Answer: A) Modify system files, steal data, and install hidden malware
Explanation: Root access gives hackers full control, allowing them to alter system settings, extract personal data, and deploy persistent malware.
134. What happens if a rooted device is factory reset but the custom recovery remains?
A) The device can still be exploited using the custom recovery
B) The device will become more secure
C) The device will automatically unroot itself
D) The device will stop running apps
Answer: A) The device can still be exploited using the custom recovery
Explanation: A factory reset does not remove a custom recovery, allowing attackers to reinstall root access or malware.
135. Why do government agencies ban the use of jailbroken/rooted devices?
A) They pose a high risk of cyber espionage and data leaks
B) They improve productivity
C) They increase battery efficiency
D) They disable mobile connectivity
Answer: A) They pose a high risk of cyber espionage and data leaks
Explanation: Government agencies prohibit jailbroken/rooted devices to protect classified information from cyber threats.
136. What is the impact of disabling Secure Boot on a rooted device?
A) It allows the execution of untrusted software, increasing malware risks
B) It improves device security
C) It enhances system updates
D) It blocks unauthorized internet access
Answer: A) It allows the execution of untrusted software, increasing malware risks
Explanation: Secure Boot prevents unauthorized modifications, and disabling it allows unverified firmware to run, increasing security threats.
137. What is a major risk of using third-party root access management tools?
A) They may be malicious and steal root-level data
B) They improve device security
C) They prevent all malware infections
D) They automatically update the device
Answer: A) They may be malicious and steal root-level data
Explanation: Unverified root management tools may silently grant root access to malware, exposing personal data.
138. What is a key risk of rooting/jailbreaking and enabling remote access tools?
A) Hackers can take full control of the device remotely
B) The device will update faster
C) The device will improve internet speed
D) The device will stop charging
Answer: A) Hackers can take full control of the device remotely
Explanation: Remote access tools combined with root access allow attackers to execute commands, steal files, or monitor activity.
139. Why is a “root cloak” app potentially dangerous?
A) It may be exploited by malware to hide from security tools
B) It increases device security
C) It improves battery performance
D) It enables faster boot times
Answer: A) It may be exploited by malware to hide from security tools
Explanation: Malware can use root cloaking techniques to hide from security apps, making detection more difficult.
140. What security risk arises from modifying a device’s DNS settings with root access?
A) It allows attackers to redirect traffic to malicious sites
B) It increases Wi-Fi speed
C) It improves app performance
D) It blocks internet access
Answer: A) It allows attackers to redirect traffic to malicious sites
Explanation: Malicious DNS changes can reroute traffic to phishing sites, steal login credentials, or block security updates.
141. Why do attackers target jailbroken/rooted devices for botnet infections?
A) Rooted devices have fewer security restrictions, allowing malware to run silently in the background
B) Rooted devices block all malware infections
C) Jailbreaking improves botnet security
D) Jailbroken devices automatically detect and remove botnets
Answer: A) Rooted devices have fewer security restrictions, allowing malware to run silently in the background
Explanation: Jailbroken/rooted devices remove system protections, making it easier for attackers to install botnet malware and control devices remotely.
142. What is a “malicious module” in a custom ROM, and why is it dangerous?
A) It is a hidden component that can steal user data or inject spyware into the system
B) It enhances security updates
C) It improves battery life
D) It boosts internet speed
Answer: A) It is a hidden component that can steal user data or inject spyware into the system
Explanation: Some modified ROMs contain hidden malicious modules, which can track user activity, steal passwords, or create backdoors for attackers.
143. Why are “root-exclusive” apps a potential security risk?
A) They often require excessive permissions and may contain hidden malware
B) They improve device encryption
C) They automatically update themselves
D) They prevent unauthorized app installations
Answer: A) They often require excessive permissions and may contain hidden malware
Explanation: Some root-exclusive apps require deep system access, and if unverified, they may contain spyware or backdoors.
144. What happens if a jailbroken device is connected to an untrusted public charging station?
A) Attackers can exploit vulnerabilities and install malware via USB (Juice Jacking)
B) The device battery will charge faster
C) The device will automatically detect malware
D) Jailbreaking improves USB security
Answer: A) Attackers can exploit vulnerabilities and install malware via USB (Juice Jacking)
Explanation: Jailbroken/rooted devices lack security measures, making them vulnerable to malware injections via malicious charging stations.
145. How does disabling Android Verified Boot (AVB) increase security risks?
A) It allows unverified software and potentially malicious code to execute
B) It blocks unauthorized malware installations
C) It increases Google Play Store protection
D) It improves app sandboxing
Answer: A) It allows unverified software and potentially malicious code to execute
Explanation: Disabling AVB removes integrity checks, allowing attackers to modify system files and install persistent malware.
146. What is a “FakeRoot” attack, and how does it work?
A) An attack where malware tricks an app into believing it has root access to bypass security restrictions
B) A method of making a device immune to root-related malware
C) A way to improve security patches
D) A technique to boost network speed
Answer: A) An attack where malware tricks an app into believing it has root access to bypass security restrictions
Explanation: FakeRoot attacks allow malware to gain unauthorized access to apps, stealing data or injecting malicious code.
147. What is the risk of installing unofficial root certificate authorities (CA) on a jailbroken device?
A) It can allow attackers to intercept encrypted communications (MITM attacks)
B) It enhances encryption strength
C) It speeds up internet browsing
D) It blocks phishing attacks
Answer: A) It can allow attackers to intercept encrypted communications (MITM attacks)
Explanation: Malicious CA certificates can allow attackers to decrypt and intercept HTTPS traffic, exposing sensitive data.
148. How can a malware-infected root app escalate privileges to take full control of a device?
A) By exploiting vulnerabilities in system processes
B) By improving app performance
C) By optimizing battery life
D) By increasing screen resolution
Answer: A) By exploiting vulnerabilities in system processes
Explanation: Malware can use privilege escalation exploits to gain system-level access, compromising the entire device.
149. Why does rooting disable Google Play Protect by default?
A) Rooting modifies system files, causing Play Protect to be bypassed or disabled
B) Rooting enhances Play Protect security
C) Rooted devices don’t need malware protection
D) Play Protect increases the risk of rooting failures
Answer: A) Rooting modifies system files, causing Play Protect to be bypassed or disabled
Explanation: Google Play Protect scans for malware, but rooting disables it, allowing malicious apps to install without detection.
150. What is the primary security risk of using outdated jailbreak or root exploits?
A) They may contain unpatched vulnerabilities that attackers can use
B) They improve security features
C) They increase system speed
D) They enhance Wi-Fi performance
Answer: A) They may contain unpatched vulnerabilities that attackers can use
Explanation: Older jailbreak/root exploits may have known vulnerabilities that attackers can use to install malware.
151. What is a hidden risk of overclocking a rooted Android device?
A) Increased risk of hardware damage and overheating
B) Improved encryption security
C) Faster wireless connectivity
D) Stronger malware protection
Answer: A) Increased risk of hardware damage and overheating
Explanation: Overclocking can stress the CPU/GPU, causing overheating, battery drain, or permanent hardware failure.
152. What is the risk of enabling Android’s “Install Unknown Apps” feature on a rooted device?
A) It increases the chance of installing malware from unverified sources
B) It blocks all unauthorized app installations
C) It enhances Google Play Store security
D) It improves device encryption
Answer: A) It increases the chance of installing malware from unverified sources
Explanation: Enabling this feature allows apps from unknown sources, increasing the risk of installing infected or malicious software.
153. What is an “evil twin” attack, and why are jailbroken devices more vulnerable to it?
A) Attackers create a fake Wi-Fi hotspot to steal data, and jailbroken devices lack proper security checks
B) It is a method to improve Wi-Fi performance
C) It is an attack that enhances network security
D) It speeds up internet browsing
Answer: A) Attackers create a fake Wi-Fi hotspot to steal data, and jailbroken devices lack proper security checks
Explanation: Jailbroken devices bypass security measures, making them easier targets for fake Wi-Fi networks used in MITM attacks.
154. How does disabling Secure Enclave on an iPhone affect security?
A) It weakens encryption for Face ID, Touch ID, and passwords
B) It improves biometric authentication
C) It speeds up app loading times
D) It enhances firewall protection
Answer: A) It weakens encryption for Face ID, Touch ID, and passwords
Explanation: Secure Enclave manages secure data encryption, and disabling it through jailbreaking exposes sensitive data.
155. Why should users avoid using “pre-rooted” or “pre-jailbroken” devices sold online?
A) They may come with pre-installed malware or spyware
B) They increase system performance
C) They improve encryption security
D) They make devices untraceable
Answer: A) They may come with pre-installed malware or spyware
Explanation: Pre-rooted/jailbroken devices may be backdoored, giving attackers remote access to sensitive data.
156. What type of attack can manipulate web sessions on a jailbroken/rooted device?
A) Session hijacking
B) Bluetooth pairing attacks
C) Battery draining exploits
D) Overclocking threats
Answer: A) Session hijacking
Explanation: Session hijacking attacks allow attackers to steal authentication cookies and take control of logged-in user sessions.
157. What is the risk of modifying Android’s system partition with root access?
A) It can prevent future OTA updates from installing properly
B) It enhances system stability
C) It speeds up software downloads
D) It prevents malware infections
Answer: A) It can prevent future OTA updates from installing properly
Explanation: Modifying system partitions interferes with OTA updates, requiring users to manually install firmware updates.
158. How do attackers exploit jailbroken devices with malicious configuration profiles?
A) They can redirect internet traffic or install unauthorized certificates
B) They improve battery efficiency
C) They block all malware infections
D) They enhance encryption
Answer: A) They can redirect internet traffic or install unauthorized certificates
Explanation: Malicious configuration profiles can modify DNS settings, redirect traffic, or install untrusted certificates for MITM attacks.
159. Why do financial institutions warn against using jailbroken devices?
A) They increase fraud risks by exposing financial data to malware
B) They block all banking transactions
C) They improve transaction speed
D) They disable biometric authentication
Answer: A) They increase fraud risks by exposing financial data to malware
Explanation: Jailbroken devices allow malware to intercept sensitive banking transactions, leading to fraud and identity theft.
160. What is a key risk of installing an unverified Xposed module on a rooted device?
A) It may introduce security vulnerabilities or backdoors
B) It speeds up app performance
C) It improves Wi-Fi range
D) It enhances Google Play Store protection
Answer: A) It may introduce security vulnerabilities or backdoors
Explanation: Unverified Xposed modules can inject malicious code, leading to data leaks or device compromise.
161. Why do some malware strains specifically check for root access before executing their payload?
A) Root access allows malware to bypass security restrictions and execute privileged commands
B) Rooted devices block malware infections
C) Malware cannot run on rooted devices
D) Root access increases battery life
Answer: A) Root access allows malware to bypass security restrictions and execute privileged commands
Explanation: Malware exploits root privileges to execute unauthorized actions, such as modifying system files, stealing data, and disabling security software.
162. How does rooting a device impact end-to-end encryption for messaging apps?
A) Rooting may allow unauthorized apps to access encrypted messages
B) Rooting strengthens encryption algorithms
C) Rooting improves the speed of encryption
D) Rooting blocks all unauthorized app installations
Answer: A) Rooting may allow unauthorized apps to access encrypted messages
Explanation: Rooted devices lack strict sandboxing, which means malware or malicious apps can bypass encryption protections and access sensitive conversations.
163. What risk does a rooted device face when connected to a corporate VPN?
A) The device can introduce security threats into the corporate network
B) The device will get faster internet speeds
C) The device will block all malware
D) The VPN will automatically prevent unauthorized access
Answer: A) The device can introduce security threats into the corporate network
Explanation: Rooted devices may have malware or security vulnerabilities, which can be exploited to gain access to corporate systems through a VPN.
164. What is one way attackers can use a rooted device to execute a privilege escalation attack?
A) By running malicious scripts with superuser (SU) privileges
B) By improving device encryption
C) By increasing device battery efficiency
D) By blocking all unauthorized app installations
Answer: A) By running malicious scripts with superuser (SU) privileges
Explanation: Privilege escalation attacks exploit vulnerabilities to gain higher-level access, which is easier on rooted devices with unrestricted SU privileges.
165. How does jailbreaking affect security patch installations on iOS?
A) Jailbreaking prevents automatic security updates from being installed
B) Jailbreaking improves patch management
C) Jailbreaking increases the speed of iOS updates
D) Jailbreaking blocks all malware
Answer: A) Jailbreaking prevents automatic security updates from being installed
Explanation: Jailbroken devices do not receive automatic security updates, making them vulnerable to exploited vulnerabilities.
166. Why do malicious apps target rooted devices for cryptojacking attacks?
A) Rooted devices allow malware to run resource-intensive mining scripts without restrictions
B) Rooted devices prevent unauthorized apps from running
C) Rooting blocks cryptojacking malware
D) Cryptojacking only works on non-rooted devices
Answer: A) Rooted devices allow malware to run resource-intensive mining scripts without restrictions
Explanation: Cryptojacking malware exploits root access to run cryptocurrency mining operations, draining system resources without user consent.
167. How can a user detect if their rooted device has been infected with a rootkit?
A) Unusual system behavior, overheating, and unauthorized network activity
B) Improved device security
C) Faster app launch times
D) Reduced device temperature
Answer: A) Unusual system behavior, overheating, and unauthorized network activity
Explanation: Rootkits hide their presence but may cause performance issues, network anomalies, and unauthorized background processes.
168. What is a key reason why streaming services like Netflix block rooted/jailbroken devices?
A) To prevent content piracy and DRM bypassing
B) To improve video resolution
C) To reduce streaming latency
D) To block free accounts
Answer: A) To prevent content piracy and DRM bypassing
Explanation: Rooted/jailbroken devices can bypass Digital Rights Management (DRM), enabling illegal content piracy.
169. Why is it dangerous to use an outdated SuperSU binary on a rooted device?
A) It may have unpatched security vulnerabilities that can be exploited
B) It speeds up root commands
C) It improves device encryption
D) It blocks malware infections
Answer: A) It may have unpatched security vulnerabilities that can be exploited
Explanation: Outdated SuperSU binaries can have known security flaws, allowing attackers to escalate privileges and gain control over the device.
170. What risk does a jailbroken device face if it is infected with spyware?
A) Spyware can access personal data, messages, and GPS location
B) The device battery will last longer
C) Jailbreaking prevents spyware from running
D) Spyware cannot function on iOS devices
Answer: A) Spyware can access personal data, messages, and GPS location
Explanation: Spyware on jailbroken devices can access all user data, including messages, call logs, and GPS tracking.
171. What happens if a rooted Android device’s bootloader is permanently unlocked?
A) The device remains vulnerable to persistent security threats
B) The device automatically resets
C) The device runs faster
D) The bootloader will block unauthorized modifications
Answer: A) The device remains vulnerable to persistent security threats
Explanation: An unlocked bootloader allows malware or attackers to install custom firmware, bypassing security protections.
172. What is a major risk of running outdated jailbreaking tools on iOS?
A) They may have security flaws that allow remote exploitation
B) They speed up system updates
C) They improve Touch ID performance
D) They prevent malware from executing
Answer: A) They may have security flaws that allow remote exploitation
Explanation: Older jailbreak tools may contain vulnerabilities, which can be used by attackers to remotely exploit the device.
173. Why do financial institutions restrict access to apps on jailbroken/rooted devices?
A) To prevent unauthorized modifications and financial fraud
B) To increase app loading speeds
C) To block in-app purchases
D) To speed up authentication
Answer: A) To prevent unauthorized modifications and financial fraud
Explanation: Financial institutions block jailbroken/rooted devices because they are vulnerable to fraud, keyloggers, and unauthorized transactions.
174. How can malware maintain persistence on a rooted Android device?
A) By modifying system partitions and startup scripts
B) By running only in user mode
C) By disabling Google Play Store
D) By improving system performance
Answer: A) By modifying system partitions and startup scripts
Explanation: Malware on rooted devices can modify system files, allowing it to survive factory resets and persist indefinitely.
175. What is a risk of using root access to modify SELinux policies?
A) It weakens security enforcement and allows unauthorized access
B) It enhances device encryption
C) It speeds up system boot times
D) It improves firewall protection
Answer: A) It weakens security enforcement and allows unauthorized access
Explanation: Disabling or modifying SELinux policies removes security restrictions, making the device vulnerable to exploits and privilege escalation.
176. How does jailbreaking impact biometric authentication security?
A) It weakens protection for Face ID, Touch ID, and other biometric features
B) It enhances fingerprint scanning accuracy
C) It improves Face ID recognition
D) It increases biometric encryption
Answer: A) It weakens protection for Face ID, Touch ID, and other biometric features
Explanation: Jailbreaking can bypass or disable biometric security measures, making it easier for attackers to spoof authentication.
177. What is a potential danger of sideloading apps on a rooted device?
A) Sideloaded apps may contain malware that exploits root access
B) Sideloading improves app compatibility
C) Sideloading increases battery efficiency
D) Sideloading prevents unauthorized access
Answer: A) Sideloaded apps may contain malware that exploits root access
Explanation: Sideloading apps from untrusted sources increases the risk of installing malware that exploits root privileges.
178. Why do rooted devices make it easier for attackers to disable antivirus software?
A) Malware can gain root access and uninstall security applications
B) Rooting enhances antivirus detection capabilities
C) Rooted devices block all malware infections
D) Rooted devices increase firewall protection
Answer: A) Malware can gain root access and uninstall security applications
Explanation: Malware on rooted devices can bypass security restrictions, allowing it to disable or remove antivirus software.
179. Why is unlocking the bootloader considered a security risk?
A) It allows attackers to install unverified firmware or custom ROMs
B) It speeds up system updates
C) It improves biometric authentication
D) It prevents malware infections
Answer: A) It allows attackers to install unverified firmware or custom ROMs
Explanation: An unlocked bootloader allows unauthorized software installations, increasing the risk of malware infections.
180. What is a common method used to detect rooted or jailbroken devices?
A) Security APIs that check for unauthorized modifications
B) Increasing screen brightness
C) Reducing system volume
D) Changing wallpaper
Answer: A) Security APIs that check for unauthorized modifications
Explanation: Many security-focused applications use APIs to detect system modifications, rooted devices, or jailbroken firmware.
181. Why do some exploit kits target jailbroken or rooted devices specifically?
A) They can bypass security restrictions and execute malicious code more easily
B) Rooted devices block all exploit kits
C) Jailbroken devices receive automatic security patches
D) Exploit kits do not affect jailbroken/rooted devices
Answer: A) They can bypass security restrictions and execute malicious code more easily
Explanation: Exploit kits are designed to take advantage of security weaknesses, and rooted/jailbroken devices lack built-in protections, making them easier targets.
182. What is the risk of granting root access to a file manager app?
A) The app can modify or delete system files, causing instability or security breaches
B) It improves device speed
C) It prevents malware infections
D) It increases RAM efficiency
Answer: A) The app can modify or delete system files, causing instability or security breaches
Explanation: File manager apps with root access can accidentally or maliciously alter critical system files, leading to system corruption or security exploits.
183. Why do some root detection methods check for the presence of the “su” binary?
A) The “su” binary is a key indicator that a device has been rooted
B) The “su” binary improves device security
C) The “su” binary speeds up app installations
D) The “su” binary prevents unauthorized access
Answer: A) The “su” binary is a key indicator that a device has been rooted
Explanation: The “su” binary is used to grant root privileges, making it a common detection point for root-checking applications.
184. What happens if a malicious app gains access to root-level logs?
A) It can extract sensitive user data, including passwords and personal messages
B) It improves device performance
C) It speeds up internet connectivity
D) It enhances encryption security
Answer: A) It can extract sensitive user data, including passwords and personal messages
Explanation: Malicious apps with root access can read system logs that may contain sensitive information, leading to data leaks or identity theft.
185. How does jailbreaking affect Apple’s App Transport Security (ATS) feature?
A) It can disable ATS, making the device vulnerable to insecure data transmissions
B) It enhances ATS encryption
C) It speeds up internet browsing
D) It prevents all network attacks
Answer: A) It can disable ATS, making the device vulnerable to insecure data transmissions
Explanation: App Transport Security (ATS) ensures encrypted data transmissions, but jailbreaking can disable or weaken these protections, making data interception easier.
186. What is a common risk of using custom recovery software on a rooted device?
A) It can allow attackers to install unverified firmware or malware
B) It improves device security
C) It prevents unauthorized root access
D) It increases the device’s lifespan
Answer: A) It can allow attackers to install unverified firmware or malware
Explanation: Custom recoveries can be used to flash unauthorized firmware, potentially including malicious code or spyware.
187. Why do some mobile device management (MDM) solutions enforce jailbroken/rooted device restrictions?
A) To prevent unauthorized modifications that could compromise corporate security
B) To slow down device performance
C) To increase battery life
D) To block app updates
Answer: A) To prevent unauthorized modifications that could compromise corporate security
Explanation: MDM solutions enforce security policies to block rooted or jailbroken devices, preventing data leaks and unauthorized access to enterprise resources.
188. What is a major security concern when modifying the boot.img file on a rooted Android device?
A) It can introduce vulnerabilities that allow boot-level exploits
B) It speeds up system performance
C) It improves encryption security
D) It enhances system stability
Answer: A) It can introduce vulnerabilities that allow boot-level exploits
Explanation: Modifying the boot.img file incorrectly can lead to boot vulnerabilities, making the device more susceptible to exploits and persistent malware.
189. What is the risk of using an unsecured root-enabled terminal emulator?
A) Attackers can execute commands remotely if the device is compromised
B) It improves app loading speed
C) It enhances system protection
D) It blocks malware infections
Answer: A) Attackers can execute commands remotely if the device is compromised
Explanation: Unsecured terminal emulators provide a direct way for attackers to execute root commands, leading to potential system takeover.
190. How does jailbreaking impact iOS’s ability to verify app signatures?
A) Jailbreaking allows the execution of unsigned or malicious apps
B) Jailbreaking strengthens app verification
C) Jailbreaking blocks untrusted applications
D) Jailbreaking increases encryption security
Answer: A) Jailbreaking allows the execution of unsigned or malicious apps
Explanation: iOS verifies app signatures to ensure they are from trusted sources, but jailbreaking can bypass this check, enabling malware installation.
191. Why do attackers use “overlay attacks” on rooted devices?
A) To trick users into entering credentials into fake app interfaces
B) To improve device performance
C) To reduce battery usage
D) To speed up software updates
Answer: A) To trick users into entering credentials into fake app interfaces
Explanation: Overlay attacks display fake interfaces over legitimate apps, tricking users into entering sensitive information like passwords or credit card details.
192. What is the risk of running outdated Magisk modules on a rooted device?
A) They may contain security vulnerabilities that hackers can exploit
B) They improve app compatibility
C) They enhance Wi-Fi speed
D) They block malware infections
Answer: A) They may contain security vulnerabilities that hackers can exploit
Explanation: Outdated Magisk modules can have unpatched security flaws, making them a target for privilege escalation attacks.
193. What happens if an attacker modifies the /system partition on a rooted Android device?
A) They can implant persistent malware that survives reboots
B) The device becomes faster
C) The device prevents future infections
D) The battery life is extended
Answer: A) They can implant persistent malware that survives reboots
Explanation: Modifying the /system partition allows attackers to embed malware deep within the OS, making it difficult to remove.
194. Why do jailbreak/root detection tools scan for unusual system binaries?
A) Jailbreaking/rooting often installs non-standard system binaries
B) It improves device performance
C) It enhances encryption security
D) It speeds up boot times
Answer: A) Jailbreaking/rooting often installs non-standard system binaries
Explanation: Detection tools look for unusual binaries like “su” or modified system files, which indicate a jailbroken/rooted environment.
195. What is a potential danger of modifying build.prop on a rooted device?
A) The device may become unstable or fail to boot
B) The device will become unhackable
C) The device will have better encryption
D) The device will get faster OTA updates
Answer: A) The device may become unstable or fail to boot
Explanation: Modifying build.prop incorrectly can cause system crashes, boot loops, or permanent software corruption.
196. What is a risk of running a malicious Xposed module on a rooted device?
A) The module may inject spyware or steal sensitive data
B) The device will run faster
C) The module will improve encryption
D) The module will block all malware
Answer: A) The module may inject spyware or steal sensitive data
Explanation: Unverified Xposed modules can act as Trojans, injecting malware, keyloggers, or spyware into the system.
197. Why do manufacturers include rollback protection in bootloaders?
A) To prevent users from installing vulnerable older firmware versions
B) To increase battery life
C) To improve app performance
D) To speed up software updates
Answer: A) To prevent users from installing vulnerable older firmware versions
Explanation: Rollback protection ensures that users cannot downgrade to older, exploitable firmware, preventing attackers from using known vulnerabilities.
198. How does rooting impact Google’s SafetyNet API?
A) It triggers a failure, preventing access to secure applications
B) It enhances app security
C) It speeds up biometric authentication
D) It improves mobile payments
Answer: A) It triggers a failure, preventing access to secure applications
Explanation: SafetyNet detects rooted devices, blocking access to secure apps like banking, Google Pay, and DRM-protected content.
199. What is a risk of using an unsecured SSH server on a jailbroken device?
A) Attackers can remotely take control of the device
B) It improves app security
C) It prevents unauthorized logins
D) It blocks malware infections
Answer: A) Attackers can remotely take control of the device
Explanation: An unsecured SSH server with default credentials allows attackers to remotely execute commands and steal data.
200. What is the main purpose of root hiding techniques like Magisk Hide?
A) To prevent apps from detecting root access
B) To enhance device security
C) To block malware infections
D) To improve biometric authentication
Answer: A) To prevent apps from detecting root access
Explanation: Root hiding tools like Magisk Hide allow users to bypass root detection in apps like banking or Netflix, but they do not improve security.