1. What is the primary purpose of jailbreaking an iOS device?

A) To increase security and privacy
B) To bypass manufacturer restrictions and gain full control
C) To improve battery life
D) To enhance device speed

Answer: B) To bypass manufacturer restrictions and gain full control

Explanation: Jailbreaking removes software restrictions imposed by Apple, allowing users to install unauthorized apps, modify system settings, and access restricted files.


2. Which of the following is a major risk of rooting an Android device?

A) Improved battery optimization
B) Reduced app performance
C) Increased vulnerability to malware and exploits
D) Automatic updates from Google

Answer: C) Increased vulnerability to malware and exploits

Explanation: Rooting bypasses Android’s built-in security measures, making the device more susceptible to malicious apps and unauthorized access.


3. What security mechanism does jailbreaking often disable in iOS devices?

A) Secure Boot
B) App Store Verification
C) Data Encryption
D) Mandatory Software Updates

Answer: A) Secure Boot

Explanation: Secure Boot ensures that only trusted, signed code runs on the device. Jailbreaking disables this, allowing untrusted code to execute, increasing security risks.


4. Why do official banking apps often block access on jailbroken or rooted devices?

A) To improve user experience
B) To prevent account synchronization issues
C) To protect against keyloggers and financial fraud
D) To save battery life

Answer: C) To protect against keyloggers and financial fraud

Explanation: Rooted or jailbroken devices can run malicious apps that intercept sensitive information, making them a security risk for financial applications.


5. Which type of malware is commonly associated with jailbroken and rooted devices?

A) Ransomware
B) Adware
C) Spyware
D) Rootkits

Answer: D) Rootkits

Explanation: Rootkits exploit system-level privileges to hide malicious activities, often found on rooted or jailbroken devices where system security is compromised.


6. What is a major consequence of jailbreaking or rooting in terms of device warranty?

A) Extended warranty coverage
B) Manufacturer may void the warranty
C) Faster replacement services
D) More frequent software updates

Answer: B) Manufacturer may void the warranty

Explanation: Most manufacturers consider jailbreaking or rooting as unauthorized modifications, which voids warranty and support agreements.


7. Which security feature does Android use to prevent unauthorized root access?

A) iBoot
B) SafetyNet
C) Secure Enclave
D) BitLocker

Answer: B) SafetyNet

Explanation: Google’s SafetyNet detects modifications like rooting and prevents access to certain apps (e.g., banking apps, Google Pay) for security reasons.


8. What is the primary reason app developers implement jailbreak/root detection?

A) To limit user customization
B) To prevent software piracy and security threats
C) To improve user interface
D) To optimize battery performance

Answer: B) To prevent software piracy and security threats

Explanation: Rooted or jailbroken devices allow users to bypass app security mechanisms, making it easier to manipulate or pirate software.


9. What can a malicious app do if installed on a rooted device?

A) Access and modify system files
B) Improve device security
C) Extend battery life
D) Improve Wi-Fi speed

Answer: A) Access and modify system files

Explanation: With root access, malware can manipulate system files, steal data, and grant hackers full control over the device.


10. Which of the following is a method attackers use to gain root access to a device?

A) Drive-by downloads
B) Keylogging
C) Phishing emails
D) Privilege escalation

Answer: D) Privilege escalation

Explanation: Privilege escalation exploits vulnerabilities to gain administrative control over the device, often used in rooting or jailbreaking attacks.


11. Which of the following is a common security risk when sideloading apps on a jailbroken/rooted device?

A) Poor user experience
B) App crashes
C) Unauthorized data access and malware infections
D) Slow network speed

Answer: C) Unauthorized data access and malware infections

Explanation: Sideloaded apps from third-party sources are often unverified and may contain malware that exploits root privileges.


12. How can a user detect if their device has been jailbroken or rooted without their knowledge?

A) Slower device performance
B) Use of root detection apps or security tools
C) Increased battery life
D) Improved app compatibility

Answer: B) Use of root detection apps or security tools

Explanation: Security tools like Root Checker (Android) or Jailbreak Detection SDKs can verify if a device has been compromised.


13. What type of attack can occur due to weak security in a jailbroken/rooted device?

A) Denial of Service (DoS)
B) Man-in-the-Middle (MITM) attacks
C) Phishing
D) SQL Injection

Answer: B) Man-in-the-Middle (MITM) attacks

Explanation: Compromised security in a jailbroken/rooted device allows attackers to intercept and manipulate network traffic.


14. What is one of the biggest risks of granting root access to a third-party app?

A) Longer app loading times
B) App may delete itself
C) Complete device compromise
D) Increased app permissions

Answer: C) Complete device compromise

Explanation: Apps with root access can modify system files, install persistent malware, and completely control the device.


15. Why do some users still jailbreak or root their devices despite the risks?

A) To improve security
B) To bypass restrictions and install unauthorized apps
C) To increase battery life
D) To make the device more resistant to malware

Answer: B) To bypass restrictions and install unauthorized apps

Explanation: Many users jailbreak/root their devices to access custom ROMs, third-party apps, and modify system settings.


16. How does jailbreaking/rooting affect automatic system updates?

A) Updates occur more frequently
B) Updates are blocked or need manual installation
C) Updates improve security automatically
D) Updates enhance warranty coverage

Answer: B) Updates are blocked or need manual installation

Explanation: Jailbreaking/rooting often disables OTA (Over-the-Air) updates, requiring manual updates that may not be secure.


17. What is a “tethered jailbreak”?

A) A jailbreak that works only when connected to a computer
B) A jailbreak that allows only partial root access
C) A jailbreak that cannot be reversed
D) A jailbreak that increases battery life

Answer: A) A jailbreak that works only when connected to a computer

Explanation: Tethered jailbreaks require the device to be connected to a PC for every reboot; otherwise, it won’t function correctly.


18. What is the risk of using a custom ROM on a rooted Android device?

A) Faster performance
B) Improved security features
C) Potential security vulnerabilities and instability
D) Increased app compatibility

Answer: C) Potential security vulnerabilities and instability

Explanation: Custom ROMs may lack security updates, making them vulnerable to exploits and malware.


19. What should be done before jailbreaking or rooting a device to minimize risk?

A) Disable internet connection
B) Create a full device backup
C) Use a weak password
D) Increase screen brightness

Answer: B) Create a full device backup

Explanation: Rooting/jailbreaking can brick a device or cause data loss, so backups ensure recovery if anything goes wrong.


20. What is a safer alternative to jailbreaking or rooting for customization?

A) Using third-party app stores
B) Installing security updates manually
C) Using developer options and official APIs
D) Disabling device encryption

Answer: C) Using developer options and official APIs

Explanation: Official customization tools like Android Developer Options or iOS Shortcuts offer some flexibility without bypassing security protections.


21. What happens if a user installs an untrusted root management app on a rooted Android device?

A) The device becomes immune to malware
B) The app could grant root access to malicious applications
C) The device will automatically unroot itself
D) The battery life will improve

Answer: B) The app could grant root access to malicious applications

Explanation: Root management apps control which apps get root access. A malicious or untrusted root management app can allow unauthorized apps to execute dangerous commands.


22. Why do some malware strains specifically target rooted or jailbroken devices?

A) They can exploit root privileges to execute commands without user consent
B) They increase device performance
C) They can only infect devices with low battery
D) They improve network security

Answer: A) They can exploit root privileges to execute commands without user consent

Explanation: Malware on rooted/jailbroken devices can bypass normal app sandboxing and escalate privileges to steal data or execute malicious commands.


23. How does jailbreaking affect iOS sandboxing?

A) It strengthens sandboxing security
B) It removes app sandboxing, allowing unrestricted app access
C) It improves app compatibility
D) It limits unauthorized app installations

Answer: B) It removes app sandboxing, allowing unrestricted app access

Explanation: iOS sandboxing isolates apps from one another. Jailbreaking removes this restriction, allowing apps to access system files and sensitive data.


24. What is the impact of jailbreaking on Apple’s Secure Enclave?

A) It enhances Secure Enclave’s encryption
B) It bypasses Secure Enclave, potentially exposing sensitive data
C) It speeds up fingerprint recognition
D) It prevents unauthorized access

Answer: B) It bypasses Secure Enclave, potentially exposing sensitive data

Explanation: Secure Enclave is responsible for encryption and secure key storage. Jailbreaking may weaken its security, increasing data theft risks.


25. What is a “semi-tethered jailbreak”?

A) A jailbreak that persists but requires a tool to re-enable full functionality after a reboot
B) A jailbreak that only works when connected to Wi-Fi
C) A jailbreak that permanently unlocks the bootloader
D) A jailbreak that improves iOS updates

Answer: A) A jailbreak that persists but requires a tool to re-enable full functionality after a reboot

Explanation: Semi-tethered jailbreaks allow partial functionality after a reboot but require a tool to restore full jailbreak access.


26. Why does jailbreaking make a device more susceptible to zero-day vulnerabilities?

A) It removes the ability to detect malware
B) It disables security patches and updates
C) It automatically uninstalls security apps
D) It improves app performance

Answer: B) It disables security patches and updates

Explanation: Jailbreaking prevents iOS from receiving automatic updates, making devices vulnerable to unpatched security flaws.


27. What is one common way attackers gain control over jailbroken/rooted devices?

A) Sending fake system update notifications
B) Exploiting SSH access with default passwords
C) Slowing down the device until the user resets it
D) Forcing the device to overheat

Answer: B) Exploiting SSH access with default passwords

Explanation: Many users install OpenSSH on jailbroken devices but fail to change the default root password, allowing attackers to remotely control the device.


28. How does rooting affect Google’s Play Protect security mechanism?

A) It enhances Play Protect’s malware scanning
B) It disables or bypasses Play Protect, allowing unauthorized apps to run
C) It makes Play Protect detect malware more accurately
D) It increases Play Store app compatibility

Answer: B) It disables or bypasses Play Protect, allowing unauthorized apps to run

Explanation: Rooting often disables Play Protect, Google’s built-in malware scanning, making it easier for harmful apps to operate undetected.


29. Which security feature is often bypassed when an Android device is rooted?

A) Google Play Store
B) SELinux (Security-Enhanced Linux)
C) Android Battery Optimizer
D) Do Not Disturb Mode

Answer: B) SELinux (Security-Enhanced Linux)

Explanation: Rooting can disable SELinux, a security module that enforces access controls, making the device vulnerable to privilege escalation attacks.


30. What is a major legal risk of jailbreaking or rooting a device?

A) It is illegal in all countries
B) It may violate terms of service, leading to legal consequences
C) It improves software licensing
D) It reduces privacy concerns

Answer: B) It may violate terms of service, leading to legal consequences

Explanation: While jailbreaking/rooting is legal in some places, it often violates manufacturer terms of service, which could lead to warranty loss or legal action.


31. How can users unroot an Android device safely?

A) By factory resetting the device
B) By using Magisk or SuperSU’s unroot option
C) By installing more root apps
D) By disabling developer mode

Answer: B) By using Magisk or SuperSU’s unroot option

Explanation: Magisk and SuperSU provide an unroot feature that safely removes root access without damaging system files.


32. Why do some mobile antivirus apps detect jailbroken or rooted devices as insecure?

A) Rooting/jailbreaking removes system-level protections
B) Jailbreaking makes the phone immune to viruses
C) Rooted devices cannot install antivirus apps
D) Jailbroken phones have fewer apps

Answer: A) Rooting/jailbreaking removes system-level protections

Explanation: Antivirus apps flag jailbroken/rooted devices because they lack essential security restrictions that prevent malware and exploits.


33. What is a kernel exploit in the context of rooting or jailbreaking?

A) A vulnerability allowing deep system modifications
B) A tool for improving battery efficiency
C) A method for automatically unrooting a device
D) A way to increase device performance

Answer: A) A vulnerability allowing deep system modifications

Explanation: Kernel exploits allow attackers to gain root access by bypassing system-level security restrictions.


34. What happens if a device is bricked after a failed jailbreak attempt?

A) The device shuts down permanently and cannot be recovered
B) The device loses wireless connectivity
C) The device may become unresponsive and require manual recovery
D) The device enters safe mode

Answer: C) The device may become unresponsive and require manual recovery

Explanation: Bricking occurs when a modification corrupts system files, rendering the device inoperable. Recovery is possible through DFU Mode (iOS) or Fastboot (Android).


35. What is a “root cloak” app used for?

A) To disguise root access from detection by apps
B) To improve device performance
C) To enhance battery life
D) To increase Wi-Fi signal strength

Answer: A) To disguise root access from detection by apps

Explanation: Root cloak apps attempt to hide root status so that apps (like banking apps) won’t block functionality on a rooted device.


36. Why do app developers implement root/jailbreak detection methods?

A) To prevent security bypasses and app manipulation
B) To make apps run slower
C) To encourage users to install more apps
D) To increase battery drain

Answer: A) To prevent security bypasses and app manipulation

Explanation: Many apps (especially financial or DRM-protected apps) detect and block rooted or jailbroken devices to prevent tampering.


37. How does rooting affect Android’s Verified Boot security feature?

A) It strengthens Verified Boot
B) It disables Verified Boot, allowing untrusted software to run
C) It makes the bootloader more secure
D) It forces more frequent system updates

Answer: B) It disables Verified Boot, allowing untrusted software to run

Explanation: Verified Boot ensures the device runs only trusted firmware. Rooting often disables this, increasing security risks.


38. What is one common use of jailbreaking for malicious purposes?

A) Installing unauthorized spyware
B) Increasing device speed
C) Improving battery life
D) Enhancing biometric security

Answer: A) Installing unauthorized spyware

Explanation: Attackers can use jailbreaking to install hidden spyware that monitors user activity and steals sensitive data.


39. What is an alternative to jailbreaking/rooting for customization?

A) Using third-party keyboards
B) Enabling developer mode and using official tools
C) Disabling security updates
D) Removing all system apps

Answer: B) Enabling developer mode and using official tools

Explanation: Android and iOS offer developer options that allow some customization without compromising security.


40. What is a primary reason why organizations prohibit jailbroken or rooted devices on corporate networks?

A) Increased cybersecurity risks
B) Increased employee productivity
C) Improved software compatibility
D) Faster network speed

Answer: A) Increased cybersecurity risks

Explanation: Rooted/jailbroken devices lack security controls, making them a major risk for corporate data breaches.

41. What is one major reason Apple and Google discourage jailbreaking and rooting?

A) It enhances user experience
B) It violates their software policies and weakens security
C) It reduces device performance
D) It makes updates faster

Answer: B) It violates their software policies and weakens security

Explanation: Jailbreaking/rooting bypasses built-in security controls, increasing exposure to malware and unauthorized modifications, which is why manufacturers discourage it.


42. What security feature is commonly disabled when an Android device is rooted?

A) Google Assistant
B) Secure Boot
C) Bluetooth functionality
D) Screen timeout

Answer: B) Secure Boot

Explanation: Secure Boot ensures that only trusted firmware and OS components are loaded. Rooting can disable this, allowing potentially malicious code to run.


43. What is a bootloader, and how does unlocking it relate to rooting?

A) A bootloader manages the initial startup process and is often unlocked to enable rooting
B) A bootloader controls network connectivity
C) A bootloader is an alternative to the Android Play Store
D) A bootloader improves app performance

Answer: A) A bootloader manages the initial startup process and is often unlocked to enable rooting

Explanation: Unlocking the bootloader is often the first step in rooting because it removes restrictions on modifying the operating system.


44. Which of the following is a common risk of installing custom ROMs on a rooted device?

A) The device may become more secure
B) The device may lose manufacturer support and updates
C) The device battery life will improve significantly
D) The device will stop overheating

Answer: B) The device may lose manufacturer support and updates

Explanation: Installing a custom ROM often means no official security patches, leaving the device vulnerable to exploits.


45. What type of malware can persist even after a factory reset on a jailbroken/rooted device?

A) Adware
B) Ransomware
C) Firmware-level rootkits
D) Trojans

Answer: C) Firmware-level rootkits

Explanation: Rootkits embedded in firmware can survive factory resets by reloading themselves during system boot.


46. Why does Google Pay and Apple Pay often block transactions on rooted/jailbroken devices?

A) To prevent fraud and unauthorized financial transactions
B) To improve transaction speed
C) To reduce battery usage
D) To enhance user experience

Answer: A) To prevent fraud and unauthorized financial transactions

Explanation: Rooted/jailbroken devices are more vulnerable to keyloggers and unauthorized transactions, making them unsafe for mobile payments.


47. What is an APT (Advanced Persistent Threat) and how can jailbreaking/rooting increase exposure to it?

A) APTs are sophisticated cyberattacks that exploit security weaknesses in rooted/jailbroken devices
B) APTs improve device performance
C) APTs help install software updates
D) APTs enhance network speed

Answer: A) APTs are sophisticated cyberattacks that exploit security weaknesses in rooted/jailbroken devices

Explanation: APTs target vulnerabilities in rooted/jailbroken devices to maintain long-term, stealthy access for cyber espionage.


48. How does rooting affect a device’s ability to use VPNs securely?

A) VPNs become more secure
B) Rooting can allow VPN bypassing, exposing unencrypted traffic
C) VPNs stop working entirely
D) Rooting increases VPN encryption

Answer: B) Rooting can allow VPN bypassing, exposing unencrypted traffic

Explanation: Some malware on rooted devices can intercept and bypass VPN encryption, exposing sensitive data.


49. Which of the following is a sign that a jailbroken or rooted device has been compromised?

A) Faster app performance
B) Unauthorized network activity and apps behaving abnormally
C) Longer battery life
D) Increased system stability

Answer: B) Unauthorized network activity and apps behaving abnormally

Explanation: If a rooted/jailbroken device is compromised, users may notice data leaks, unusual network connections, or apps running without permission.


50. What does “sandboxing” mean in mobile security, and how does jailbreaking affect it?

A) Sandboxing isolates apps to prevent unauthorized access, but jailbreaking removes these restrictions
B) Sandboxing slows down the device
C) Sandboxing prevents overcharging
D) Sandboxing increases battery life

Answer: A) Sandboxing isolates apps to prevent unauthorized access, but jailbreaking removes these restrictions

Explanation: App sandboxing ensures apps cannot access each other’s data. Jailbreaking removes this, making the device vulnerable.


51. What role does SELinux play in Android security, and what happens when it’s disabled?

A) SELinux enforces security policies, and disabling it increases malware risk
B) SELinux improves battery efficiency
C) SELinux blocks Bluetooth connections
D) SELinux reduces screen resolution

Answer: A) SELinux enforces security policies, and disabling it increases malware risk

Explanation: SELinux (Security-Enhanced Linux) restricts what apps can access. Rooting often disables SELinux, making the device vulnerable.


52. What security risk does enabling ADB (Android Debug Bridge) in root mode introduce?

A) It makes the phone run faster
B) It allows unauthorized remote access to the device
C) It extends battery life
D) It improves mobile network connectivity

Answer: B) It allows unauthorized remote access to the device

Explanation: ADB in root mode lets attackers remotely execute commands on the device if it is improperly secured.


53. Why do enterprise IT teams restrict jailbroken/rooted devices from accessing corporate networks?

A) They don’t like user customization
B) Jailbroken/rooted devices introduce security risks such as data breaches and malware infections
C) They want to limit device speed
D) They reduce app installation

Answer: B) Jailbroken/rooted devices introduce security risks such as data breaches and malware infections

Explanation: Compromised devices can lead to data leaks, unauthorized access, and malware spreading within a corporate network.


54. What is a major drawback of installing apps from third-party sources on a rooted/jailbroken device?

A) They may contain malware or spyware
B) They improve system stability
C) They enhance battery life
D) They speed up system updates

Answer: A) They may contain malware or spyware

Explanation: Third-party apps bypass security checks, increasing the risk of malware infections.


55. What is one way attackers can install malware on a jailbroken/rooted device without user interaction?

A) Exploiting vulnerabilities in system processes
B) Increasing device RAM
C) Running device diagnostics
D) Reducing screen brightness

Answer: A) Exploiting vulnerabilities in system processes

Explanation: Attackers can use privilege escalation exploits to install malware without user consent on jailbroken/rooted devices.


56. What is a common misconception about rooting or jailbreaking a device?

A) It improves security
B) It makes the device immune to malware
C) It reduces device vulnerability
D) It makes devices more susceptible to security threats

Answer: D) It makes devices more susceptible to security threats

Explanation: Rooting/jailbreaking removes built-in security protections, making devices more vulnerable to attacks.


57. How does rooting impact OTA (Over-The-Air) software updates?

A) It enhances OTA updates
B) It blocks OTA updates or requires manual installation
C) It makes updates install faster
D) It reduces update sizes

Answer: B) It blocks OTA updates or requires manual installation

Explanation: Rooted devices cannot receive automatic updates due to modified system partitions.


58. What security measure should users take before jailbreaking/rooting a device?

A) Create a full device backup
B) Disable airplane mode
C) Delete all installed apps
D) Reduce brightness

Answer: A) Create a full device backup

Explanation: Rooting/jailbreaking can lead to device bricking or data loss, making backups essential.


59. Why do jailbreakers/root users often install custom recovery software like TWRP?

A) To manage system files and create backups
B) To improve battery performance
C) To install more games
D) To reduce lag

Answer: A) To manage system files and create backups

Explanation: Custom recoveries (like TWRP) allow users to install custom ROMs, flash updates, and create full backups.


60. What is a safer alternative to rooting for customization?

A) Using Developer Mode and ADB commands
B) Unlocking the bootloader
C) Disabling security features
D) Sideloading unverified apps

Answer: A) Using Developer Mode and ADB commands

Explanation: Developer Mode and ADB commands allow advanced tweaks without the security risks of rooting.

61. What happens if a root-enabled malicious app is granted superuser (SU) access?

A) The app gains full control over the device
B) The device runs faster
C) The app is automatically deleted
D) The device becomes more secure

Answer: A) The app gains full control over the device

Explanation: SU (Superuser) access allows apps to execute system-level commands, which can lead to data theft, system modifications, or complete device control.


62. What is the purpose of Google’s “SafetyNet Attestation” in detecting rooted devices?

A) To prevent unauthorized apps from modifying system settings
B) To improve app speed
C) To increase battery performance
D) To stop device overheating

Answer: A) To prevent unauthorized apps from modifying system settings

Explanation: SafetyNet Attestation detects system integrity violations, preventing rooted devices from accessing secure apps like banking and payment services.


63. Which of the following is a potential risk of bypassing root detection in financial applications?

A) Increased app performance
B) Exposure to banking malware and fraud
C) Improved security encryption
D) Faster login times

Answer: B) Exposure to banking malware and fraud

Explanation: Root bypass techniques allow malware to run undetected in banking apps, leading to fraud, credential theft, and unauthorized transactions.


64. What is “root hiding,” and why is it used?

A) A technique to prevent apps from detecting root access
B) A way to improve device battery life
C) A method to increase device storage
D) A feature that stops malware from executing

Answer: A) A technique to prevent apps from detecting root access

Explanation: Root hiding tools trick apps into thinking a device is not rooted, allowing bypassing security restrictions in apps like Google Pay, Netflix, and banking apps.


65. Why do jailbroken iOS devices often require alternative app stores like Cydia?

A) The official App Store is blocked for jailbroken devices
B) Cydia offers more secure apps
C) Jailbroken devices cannot install official apps
D) Apple restricts app sideloading

Answer: A) The official App Store is blocked for jailbroken devices

Explanation: Apple prevents jailbroken devices from using the App Store, leading users to rely on third-party app stores like Cydia.


66. What is the risk of installing cracked or pirated apps on a jailbroken/rooted device?

A) They may contain malware, spyware, or ransomware
B) They improve device speed
C) They increase security updates
D) They extend battery life

Answer: A) They may contain malware, spyware, or ransomware

Explanation: Cracked apps are often infected with malware, as they bypass security verifications and digital signatures.


67. What happens when a jailbroken iOS device is updated with an official iOS update?

A) The device loses jailbreak status
B) The update enhances jailbreak stability
C) The device becomes permanently bricked
D) The update improves system security while keeping jailbreak intact

Answer: A) The device loses jailbreak status

Explanation: Official iOS updates patch jailbreak vulnerabilities, causing the jailbreak to be removed upon updating.


68. What is the risk of enabling SSH access on a jailbroken/rooted device without a strong password?

A) Attackers can remotely access and control the device
B) The device runs faster
C) The battery drains slower
D) The device automatically updates itself

Answer: A) Attackers can remotely access and control the device

Explanation: SSH access with default credentials allows hackers to take control of a jailbroken device and install malicious scripts or steal data.


69. Why is “Magisk” preferred over traditional rooting methods like SuperSU?

A) Magisk allows root access while keeping system integrity intact
B) Magisk makes the phone faster
C) Magisk increases screen brightness
D) Magisk blocks all malware

Answer: A) Magisk allows root access while keeping system integrity intact

Explanation: Magisk offers “systemless root”, allowing modifications without altering system partitions, making it easier to bypass root detection.


70. What is “Jailbreak Detection Bypass” and why is it risky?

A) A technique to bypass security checks in sensitive applications
B) A way to improve app loading speed
C) A feature that increases battery life
D) A tool for securing root access

Answer: A) A technique to bypass security checks in sensitive applications

Explanation: Bypassing jailbreak detection tricks security-sensitive apps (like banking apps), making them vulnerable to exploits.


71. What security feature does iOS use to prevent unauthorized modifications to system files?

A) Secure Enclave
B) Play Protect
C) FileVault
D) iCloud Backup

Answer: A) Secure Enclave

Explanation: Secure Enclave is a hardware-based security feature that prevents unauthorized access to encryption keys and system data.


72. How does rooting affect Android’s app permissions model?

A) Rooting allows apps to bypass permission requests
B) Rooting increases security updates
C) Rooting improves network speed
D) Rooting disables background services

Answer: A) Rooting allows apps to bypass permission requests

Explanation: Rooted apps can bypass Android’s permission model, granting themselves access to sensitive user data.


73. Why do some Android manufacturers implement hardware-based security (e.g., Knox)?

A) To detect and block rooted devices
B) To improve battery life
C) To enable sideloading of apps
D) To enhance Bluetooth performance

Answer: A) To detect and block rooted devices

Explanation: Knox (Samsung) and similar technologies detect rooting/jailbreaking and block certain apps or features to maintain security.


74. What is a major risk of modifying the “build.prop” file on a rooted Android device?

A) It can lead to system instability or boot loops
B) It improves device security
C) It speeds up network connectivity
D) It enhances fingerprint recognition

Answer: A) It can lead to system instability or boot loops

Explanation: The build.prop file contains critical system settings, and incorrect modifications can cause boot failures.


75. Why do some online gaming apps detect and ban jailbroken/rooted devices?

A) To prevent cheating and game modifications
B) To improve game graphics
C) To enable offline mode
D) To increase in-game rewards

Answer: A) To prevent cheating and game modifications

Explanation: Game developers ban rooted/jailbroken devices to stop players from using cheat tools or modifying game data.


76. What is the risk of granting root access to automation apps (e.g., Tasker, Xposed)?

A) They may unintentionally expose sensitive data or override security settings
B) They speed up device performance
C) They improve app compatibility
D) They increase storage capacity

Answer: A) They may unintentionally expose sensitive data or override security settings

Explanation: Automation apps with root access can modify security settings or expose personal data to other apps.


77. How does rooting impact device encryption?

A) Rooting can disable full-disk encryption
B) Rooting improves encryption algorithms
C) Rooting enhances network security
D) Rooting automatically backs up encrypted files

Answer: A) Rooting can disable full-disk encryption

Explanation: Many rooting methods disable encryption, leaving sensitive user data exposed.


78. What is the “dirty cow” vulnerability, and how does it relate to rooting?

A) It is a privilege escalation exploit used to gain root access
B) It improves file storage efficiency
C) It speeds up app performance
D) It enhances network security

Answer: A) It is a privilege escalation exploit used to gain root access

Explanation: Dirty COW (Copy-On-Write) is a Linux kernel vulnerability that hackers use to gain root privileges on Android devices.


79. What is the primary risk of using a tethered jailbreak?

A) The device requires a computer to reboot properly
B) The device battery drains faster
C) The device becomes permanently rooted
D) The device stops detecting SIM cards

Answer: A) The device requires a computer to reboot properly

Explanation: Tethered jailbreaks need a computer connection after every reboot, making them inconvenient.


80. What is an alternative security feature that iOS users can use instead of jailbreaking?

A) Use iOS Shortcuts and Configuration Profiles
B) Disable software updates
C) Install third-party firmware
D) Modify system files manually

Answer: A) Use iOS Shortcuts and Configuration Profiles

Explanation: iOS Shortcuts and Configuration Profiles allow customization without the security risks of jailbreaking.

81. Why do rooted Android devices have a higher risk of credential theft?

A) Malware can access stored passwords and authentication tokens
B) Rooted devices block unauthorized access
C) Rooted devices have stronger encryption
D) Rooted devices automatically log out of accounts

Answer: A) Malware can access stored passwords and authentication tokens

Explanation: Rooted devices allow malware to access sensitive credentials, bypassing app-level encryption and stealing authentication tokens.


82. What happens if a user tries to re-lock the bootloader after rooting their Android device?

A) The device may enter a boot loop or become bricked
B) The device will run faster
C) The device will gain additional security features
D) The device’s performance will improve

Answer: A) The device may enter a boot loop or become bricked

Explanation: Re-locking the bootloader after modifications can cause boot failures, as the system detects unauthorized changes.


83. Why is malware more effective on jailbroken or rooted devices?

A) It can gain elevated privileges without user consent
B) It cannot run on rooted devices
C) It automatically uninstalls itself
D) It slows down device speed

Answer: A) It can gain elevated privileges without user consent

Explanation: Malware on a rooted/jailbroken device can execute high-privilege commands without triggering security prompts.


84. What is a “soft brick” in the context of jailbreaking or rooting?

A) A partially damaged system that can be recovered
B) A device that no longer powers on
C) A device with extended battery life
D) A security feature that prevents hacking

Answer: A) A partially damaged system that can be recovered

Explanation: A soft-bricked device is one that fails to boot properly but can be restored using recovery tools.


85. What is the risk of using root access to modify kernel parameters?

A) System instability and crashes
B) Improved device performance
C) Enhanced app security
D) Faster OS updates

Answer: A) System instability and crashes

Explanation: Modifying kernel parameters incorrectly can lead to random crashes, overheating, or even hardware damage.


86. Why do security professionals recommend against rooting or jailbreaking a primary device?

A) It introduces security vulnerabilities and removes system integrity protections
B) It prevents app crashes
C) It improves software stability
D) It speeds up network performance

Answer: A) It introduces security vulnerabilities and removes system integrity protections

Explanation: Rooting/jailbreaking weakens system security, making it easier for attackers to exploit vulnerabilities.


87. How can jailbreaking affect the warranty of an Apple device?

A) Apple may void the warranty due to unauthorized modifications
B) Apple extends the warranty for jailbroken devices
C) Jailbreaking improves software support
D) Jailbreaking enables free AppleCare+

Answer: A) Apple may void the warranty due to unauthorized modifications

Explanation: Apple considers jailbreaking a violation of its terms of service, which can void the warranty.


88. What is the risk of using “one-click root” applications?

A) They may install malware or steal personal data
B) They increase device encryption
C) They improve mobile signal reception
D) They speed up software updates

Answer: A) They may install malware or steal personal data

Explanation: Many one-click root apps exploit vulnerabilities to root devices but may also install spyware or steal data.


89. Why do government agencies discourage rooting and jailbreaking?

A) It weakens device security, increasing the risk of cyber espionage
B) It slows down the device
C) It improves data encryption
D) It allows only approved applications

Answer: A) It weakens device security, increasing the risk of cyber espionage

Explanation: Jailbroken/rooted devices lack security controls, making them vulnerable to cyberattacks and surveillance.


90. How does rooting/jailbreaking affect digital forensics investigations?

A) It allows forensic analysts to extract more data
B) It encrypts all forensic logs
C) It makes data recovery impossible
D) It improves device security

Answer: A) It allows forensic analysts to extract more data

Explanation: Rooting/jailbreaking removes system security barriers, allowing forensic tools to access hidden files, logs, and sensitive data.


91. What is a “semi-untethered” jailbreak?

A) A jailbreak that persists until the device is rebooted but can be reactivated without a computer
B) A jailbreak that completely disables security features
C) A jailbreak that cannot be removed
D) A jailbreak that increases device performance

Answer: A) A jailbreak that persists until the device is rebooted but can be reactivated without a computer

Explanation: Semi-untethered jailbreaks require a jailbreak tool to reactivate modifications after a reboot.


92. What is the impact of rooting on biometric authentication (e.g., Face ID, fingerprint sensors)?

A) Rooting may disable or compromise biometric security
B) Rooting enhances biometric accuracy
C) Rooting speeds up authentication
D) Rooting adds extra biometric sensors

Answer: A) Rooting may disable or compromise biometric security

Explanation: Some rooting methods interfere with secure authentication, making fingerprint and Face ID less reliable.


93. Why do certain job roles (e.g., law enforcement, cybersecurity) prohibit jailbreaking or rooting?

A) Rooted/jailbroken devices increase the risk of security breaches and unauthorized access
B) Rooted devices consume more battery
C) Rooted devices improve security updates
D) Rooting improves performance

Answer: A) Rooted/jailbroken devices increase the risk of security breaches and unauthorized access

Explanation: Sensitive job roles require high-security standards, and jailbreaking/rooting removes protections that prevent data leaks.


94. What security feature is commonly disabled on jailbroken iPhones, making them more vulnerable?

A) Code signing enforcement
B) Bluetooth connectivity
C) Battery optimization
D) Wi-Fi settings

Answer: A) Code signing enforcement

Explanation: Code signing ensures that only trusted apps run on iOS, but jailbreaking disables this, allowing unverified apps to execute.


95. How can users check if their device has been unknowingly rooted?

A) Use a root checker app or security analysis tool
B) Reduce screen brightness
C) Install more apps
D) Increase volume settings

Answer: A) Use a root checker app or security analysis tool

Explanation: Root checker apps and security tools can detect unauthorized modifications or exploits.


96. What is a security risk associated with running root-access terminal commands?

A) Incorrect commands can damage the operating system
B) The device will run slower
C) The battery will drain faster
D) The screen resolution will decrease

Answer: A) Incorrect commands can damage the operating system

Explanation: Executing incorrect root-level commands can delete system files, corrupt data, or cause boot failures.


97. Why do some root methods use bootloader exploits?

A) To bypass manufacturer restrictions and gain deep system access
B) To improve device battery life
C) To enable app updates
D) To increase Wi-Fi speed

Answer: A) To bypass manufacturer restrictions and gain deep system access

Explanation: Bootloader exploits are used to override security mechanisms and grant root access.


98. Why do enterprise mobile device management (MDM) solutions block jailbroken/rooted devices?

A) To prevent security risks and unauthorized access
B) To increase device performance
C) To enhance screen resolution
D) To allow more app installations

Answer: A) To prevent security risks and unauthorized access

Explanation: MDM solutions ensure devices comply with corporate security policies and block rooted/jailbroken devices to prevent data breaches.


99. How can a user unroot their device securely?

A) Use Magisk’s unroot feature or reflash stock firmware
B) Increase brightness settings
C) Disable Wi-Fi
D) Reduce app storage

Answer: A) Use Magisk’s unroot feature or reflash stock firmware

Explanation: The safest way to remove root access is by using Magisk’s unroot tool or flashing stock firmware.


100. What is the primary motivation behind jailbreaking/rooting, despite the risks?

A) To gain full control over device functionality and customization
B) To improve manufacturer security
C) To limit device usage
D) To block security patches

Answer: A) To gain full control over device functionality and customization

Explanation: Many users jailbreak/root their devices to install custom ROMs, remove bloatware, and modify system settings.

101. How does rooting a device affect the risk of phishing attacks?

A) Rooted devices are more vulnerable as malware can intercept and manipulate browser traffic
B) Rooted devices become immune to phishing attacks
C) Rooting improves security against phishing
D) Rooting disables the internet, preventing phishing attacks

Answer: A) Rooted devices are more vulnerable as malware can intercept and manipulate browser traffic

Explanation: Rooted devices allow malicious apps to bypass security restrictions, making it easier for phishing malware to manipulate network traffic and steal credentials.


102. What is a potential risk of installing modified system frameworks on a rooted device?

A) Increased exposure to privilege escalation attacks
B) Enhanced battery performance
C) Faster app installation
D) Improved security against malware

Answer: A) Increased exposure to privilege escalation attacks

Explanation: Modified system frameworks may introduce vulnerabilities, allowing attackers to escalate privileges and gain full device control.


103. What kind of attack can exploit a rooted device with an exposed ADB (Android Debug Bridge) port?

A) Remote code execution (RCE)
B) Battery draining attack
C) SIM card cloning
D) Bluetooth jamming

Answer: A) Remote code execution (RCE)

Explanation: If ADB is enabled and unsecured, attackers can remotely execute commands on a rooted device, leading to data theft or system compromise.


104. How does jailbreaking impact Apple’s automatic system integrity protections?

A) Jailbreaking disables system integrity protection, exposing the device to security threats
B) Jailbreaking strengthens system integrity protections
C) Jailbreaking speeds up system updates
D) Jailbreaking allows users to enable additional security features

Answer: A) Jailbreaking disables system integrity protection, exposing the device to security threats

Explanation: System Integrity Protection (SIP) prevents unauthorized modifications to system files, but jailbreaking disables this, increasing security risks.


105. What happens if a malicious app with root access modifies the “hosts” file?

A) It can redirect traffic to phishing sites or block security updates
B) It increases the speed of the internet
C) It improves DNS resolution
D) It enhances network security

Answer: A) It can redirect traffic to phishing sites or block security updates

Explanation: The hosts file controls domain resolution, and modifying it with root access can redirect users to malicious websites or block security updates.


106. Why is it dangerous to grant root access to an unknown app?

A) It can execute privileged operations without user consent
B) It improves app stability
C) It increases battery efficiency
D) It speeds up internet browsing

Answer: A) It can execute privileged operations without user consent

Explanation: Root access gives apps unrestricted control, allowing them to modify system files, steal data, or install hidden malware.


107. What type of security risk arises from jailbreaking/rooting and using public Wi-Fi?

A) Increased risk of Man-in-the-Middle (MITM) attacks
B) Improved network speed
C) Stronger firewall protections
D) Enhanced Bluetooth connectivity

Answer: A) Increased risk of Man-in-the-Middle (MITM) attacks

Explanation: Rooted/jailbroken devices lack security protections, making it easier for attackers to intercept unencrypted traffic on public Wi-Fi.


108. Why do companies discourage employees from using jailbroken or rooted devices for work?

A) Jailbroken/rooted devices can compromise corporate data security
B) They reduce employee productivity
C) They consume more bandwidth
D) They limit app installations

Answer: A) Jailbroken/rooted devices can compromise corporate data security

Explanation: Rooted/jailbroken devices bypass security policies, making them high-risk for corporate networks due to data leaks and malware threats.


109. How does a custom kernel on a rooted device pose a security risk?

A) It can introduce security flaws or backdoors
B) It enhances firewall protections
C) It prevents unauthorized app installations
D) It improves biometric security

Answer: A) It can introduce security flaws or backdoors

Explanation: Custom kernels may not be regularly updated, leaving them vulnerable to exploits and backdoor attacks.


110. What security feature prevents jailbroken iOS devices from accessing sensitive corporate apps?

A) Mobile Device Management (MDM) policies
B) Bluetooth encryption
C) Faster fingerprint recognition
D) Increased battery optimization

Answer: A) Mobile Device Management (MDM) policies

Explanation: MDM solutions detect jailbroken/rooted devices and block them from accessing corporate resources to prevent security breaches.


111. What risk does a “Frankenstein Firmware” pose when installed on a jailbroken/rooted device?

A) It may contain hidden malware or vulnerabilities
B) It improves device encryption
C) It speeds up app installations
D) It enhances system stability

Answer: A) It may contain hidden malware or vulnerabilities

Explanation: Frankenstein firmware is a mix of official and unofficial firmware that may contain malware, security flaws, or backdoors.


112. Why is a factory reset often ineffective at fully removing malware from a rooted device?

A) Malware can persist in system partitions or bootloader
B) Factory resets improve device security
C) Factory resets remove all malware permanently
D) Factory resets increase performance

Answer: A) Malware can persist in system partitions or bootloader

Explanation: Some malware on rooted devices embeds itself in system partitions, allowing it to survive a factory reset.


113. What risk does a rooted device pose when connected to a compromised USB charging station?

A) It may allow attackers to install malware via USB Debugging
B) It speeds up charging
C) It improves wireless connectivity
D) It enhances app permissions

Answer: A) It may allow attackers to install malware via USB Debugging

Explanation: Rooted devices with USB Debugging enabled can be exploited through malicious charging stations (Juice Jacking).


114. What risk arises from enabling insecure file permissions on a rooted device?

A) Unauthorized apps can modify system files
B) It improves system security
C) It speeds up app launching
D) It prevents malware infections

Answer: A) Unauthorized apps can modify system files

Explanation: Insecure file permissions allow malicious apps to modify or delete critical system files, leading to potential device compromise.


115. Why do banking apps check for root/jailbreak status before launching?

A) To prevent fraud and unauthorized financial transactions
B) To improve app loading times
C) To block non-official payment gateways
D) To reduce battery usage

Answer: A) To prevent fraud and unauthorized financial transactions

Explanation: Rooted/jailbroken devices can bypass security restrictions, allowing malware to steal banking credentials.


116. How can a malicious app leverage root access to bypass Android’s permission model?

A) It can grant itself any permission without user approval
B) It improves app security
C) It increases internet speed
D) It speeds up boot time

Answer: A) It can grant itself any permission without user approval

Explanation: Root access allows apps to override security prompts, granting themselves permissions without user consent.


117. What is the risk of using an outdated jailbreak tool?

A) It may contain unpatched security vulnerabilities
B) It improves security patches
C) It speeds up device performance
D) It enhances fingerprint recognition

Answer: A) It may contain unpatched security vulnerabilities

Explanation: Outdated jailbreak tools may exploit old vulnerabilities, leaving devices open to further attacks.


118. Why do developers of custom ROMs often advise against using unofficial root methods?

A) Unofficial root methods may introduce security vulnerabilities
B) They reduce device performance
C) They limit app compatibility
D) They increase battery drain

Answer: A) Unofficial root methods may introduce security vulnerabilities

Explanation: Unofficial root methods may be insecure, poorly maintained, or contain hidden malware.


119. What security risk is introduced by modifying the system SELinux policy on a rooted device?

A) It weakens Android’s security enforcement
B) It improves network speed
C) It enhances app compatibility
D) It extends device battery life

Answer: A) It weakens Android’s security enforcement

Explanation: Disabling SELinux allows malicious apps to access system files and execute unauthorized commands.


120. Why do manufacturers use bootloader locking to prevent rooting?

A) To protect device integrity and prevent unauthorized modifications
B) To slow down the device
C) To disable Wi-Fi connectivity
D) To block app updates

Answer: A) To protect device integrity and prevent unauthorized modifications

Explanation: Bootloader locking prevents unauthorized firmware modifications, protecting users from security risks associated with rooting.

121. What happens if a jailbroken device is infected with a worm that exploits SSH with default credentials?

A) The worm can spread to other jailbroken devices on the same network
B) The device will self-repair
C) The device will run faster
D) The worm will automatically remove itself

Answer: A) The worm can spread to other jailbroken devices on the same network

Explanation: SSH worms target jailbroken devices with default passwords, allowing them to spread across networks and compromise other devices.


122. How does a jailbroken iPhone increase the risk of spyware infections?

A) Spyware can bypass app sandboxing and access sensitive data
B) Jailbreaking removes all security risks
C) Jailbroken devices are immune to spyware
D) Jailbreaking enhances Apple’s security updates

Answer: A) Spyware can bypass app sandboxing and access sensitive data

Explanation: Jailbreaking removes iOS’s sandboxing, allowing spyware to steal personal information like messages, call logs, and location data.


123. What is the purpose of Google’s Verified Boot feature?

A) To detect and prevent unauthorized modifications to the OS
B) To increase battery life
C) To improve Wi-Fi speed
D) To enhance display resolution

Answer: A) To detect and prevent unauthorized modifications to the OS

Explanation: Verified Boot ensures that only trusted software runs, protecting against malware and unauthorized OS modifications.


124. What is one common method attackers use to gain persistent access to a jailbroken/rooted device?

A) Installing a rootkit or backdoor
B) Using a strong passcode
C) Disabling Bluetooth
D) Keeping the battery fully charged

Answer: A) Installing a rootkit or backdoor

Explanation: Rootkits on jailbroken/rooted devices hide deep in the system, allowing attackers to maintain long-term control.


125. What happens if a rooted device’s system partition is modified incorrectly?

A) The device may enter a boot loop or become bricked
B) The device will speed up
C) The device will update automatically
D) The device will become more secure

Answer: A) The device may enter a boot loop or become bricked

Explanation: Incorrect modifications to the system partition can make the OS fail to load properly, causing boot loops or permanent damage.


126. How does rooting impact SELinux (Security-Enhanced Linux) on Android?

A) Rooting often disables or weakens SELinux, reducing security protections
B) Rooting enhances SELinux security
C) Rooting makes SELinux mandatory
D) Rooting does not affect SELinux

Answer: A) Rooting often disables or weakens SELinux, reducing security protections

Explanation: SELinux enforces strict access controls, but rooting weakens or disables these protections, making exploitation easier.


127. Why do jailbreakers/root users sometimes install firewall apps?

A) To block unauthorized network access to insecure apps
B) To disable internet connectivity
C) To increase CPU performance
D) To bypass app restrictions

Answer: A) To block unauthorized network access to insecure apps

Explanation: Firewall apps on rooted/jailbroken devices help restrict data access for potentially malicious apps.


128. Why do root permissions make Android devices more vulnerable to keyloggers?

A) Keyloggers can run in the background with full system access
B) Rooted devices block keyloggers automatically
C) Root access improves keyboard encryption
D) Rooted devices disable logging

Answer: A) Keyloggers can run in the background with full system access

Explanation: Rooted devices allow keyloggers to monitor keystrokes, including passwords and sensitive information, without detection.


129. How can a user prevent unauthorized root access on their device?

A) Use a root management app like Magisk Manager
B) Disable all apps
C) Remove the SIM card
D) Turn off Wi-Fi

Answer: A) Use a root management app like Magisk Manager

Explanation: Root management apps like Magisk Manager allow users to control which apps receive root access, reducing security risks.


130. What is a potential risk of flashing an unverified custom ROM?

A) The ROM may contain pre-installed malware or spyware
B) The device will become unhackable
C) The device will run faster than stock firmware
D) The device will become waterproof

Answer: A) The ROM may contain pre-installed malware or spyware

Explanation: Unverified custom ROMs may include hidden malware, keyloggers, or backdoors that steal personal data.


131. What is the impact of jailbreaking on iOS app security?

A) It allows sideloaded apps to bypass Apple’s app review process
B) It improves app security
C) It makes all apps run in sandbox mode
D) It increases Apple’s security updates

Answer: A) It allows sideloaded apps to bypass Apple’s app review process

Explanation: Jailbreaking lets users install unverified apps, which bypass Apple’s security checks, increasing malware risks.


132. Why do some companies block access to their apps on rooted/jailbroken devices?

A) To prevent app tampering, reverse engineering, or cheating
B) To slow down performance
C) To reduce app installations
D) To encourage users to buy premium versions

Answer: A) To prevent app tampering, reverse engineering, or cheating

Explanation: Rooted/jailbroken devices allow users to modify app behavior, leading to cheating, piracy, or unauthorized modifications.


133. What can a hacker do if they gain root access to an Android device?

A) Modify system files, steal data, and install hidden malware
B) Improve device security
C) Speed up app loading times
D) Increase device battery life

Answer: A) Modify system files, steal data, and install hidden malware

Explanation: Root access gives hackers full control, allowing them to alter system settings, extract personal data, and deploy persistent malware.


134. What happens if a rooted device is factory reset but the custom recovery remains?

A) The device can still be exploited using the custom recovery
B) The device will become more secure
C) The device will automatically unroot itself
D) The device will stop running apps

Answer: A) The device can still be exploited using the custom recovery

Explanation: A factory reset does not remove a custom recovery, allowing attackers to reinstall root access or malware.


135. Why do government agencies ban the use of jailbroken/rooted devices?

A) They pose a high risk of cyber espionage and data leaks
B) They improve productivity
C) They increase battery efficiency
D) They disable mobile connectivity

Answer: A) They pose a high risk of cyber espionage and data leaks

Explanation: Government agencies prohibit jailbroken/rooted devices to protect classified information from cyber threats.


136. What is the impact of disabling Secure Boot on a rooted device?

A) It allows the execution of untrusted software, increasing malware risks
B) It improves device security
C) It enhances system updates
D) It blocks unauthorized internet access

Answer: A) It allows the execution of untrusted software, increasing malware risks

Explanation: Secure Boot prevents unauthorized modifications, and disabling it allows unverified firmware to run, increasing security threats.


137. What is a major risk of using third-party root access management tools?

A) They may be malicious and steal root-level data
B) They improve device security
C) They prevent all malware infections
D) They automatically update the device

Answer: A) They may be malicious and steal root-level data

Explanation: Unverified root management tools may silently grant root access to malware, exposing personal data.


138. What is a key risk of rooting/jailbreaking and enabling remote access tools?

A) Hackers can take full control of the device remotely
B) The device will update faster
C) The device will improve internet speed
D) The device will stop charging

Answer: A) Hackers can take full control of the device remotely

Explanation: Remote access tools combined with root access allow attackers to execute commands, steal files, or monitor activity.


139. Why is a “root cloak” app potentially dangerous?

A) It may be exploited by malware to hide from security tools
B) It increases device security
C) It improves battery performance
D) It enables faster boot times

Answer: A) It may be exploited by malware to hide from security tools

Explanation: Malware can use root cloaking techniques to hide from security apps, making detection more difficult.


140. What security risk arises from modifying a device’s DNS settings with root access?

A) It allows attackers to redirect traffic to malicious sites
B) It increases Wi-Fi speed
C) It improves app performance
D) It blocks internet access

Answer: A) It allows attackers to redirect traffic to malicious sites

Explanation: Malicious DNS changes can reroute traffic to phishing sites, steal login credentials, or block security updates.

141. Why do attackers target jailbroken/rooted devices for botnet infections?

A) Rooted devices have fewer security restrictions, allowing malware to run silently in the background
B) Rooted devices block all malware infections
C) Jailbreaking improves botnet security
D) Jailbroken devices automatically detect and remove botnets

Answer: A) Rooted devices have fewer security restrictions, allowing malware to run silently in the background

Explanation: Jailbroken/rooted devices remove system protections, making it easier for attackers to install botnet malware and control devices remotely.


142. What is a “malicious module” in a custom ROM, and why is it dangerous?

A) It is a hidden component that can steal user data or inject spyware into the system
B) It enhances security updates
C) It improves battery life
D) It boosts internet speed

Answer: A) It is a hidden component that can steal user data or inject spyware into the system

Explanation: Some modified ROMs contain hidden malicious modules, which can track user activity, steal passwords, or create backdoors for attackers.


143. Why are “root-exclusive” apps a potential security risk?

A) They often require excessive permissions and may contain hidden malware
B) They improve device encryption
C) They automatically update themselves
D) They prevent unauthorized app installations

Answer: A) They often require excessive permissions and may contain hidden malware

Explanation: Some root-exclusive apps require deep system access, and if unverified, they may contain spyware or backdoors.


144. What happens if a jailbroken device is connected to an untrusted public charging station?

A) Attackers can exploit vulnerabilities and install malware via USB (Juice Jacking)
B) The device battery will charge faster
C) The device will automatically detect malware
D) Jailbreaking improves USB security

Answer: A) Attackers can exploit vulnerabilities and install malware via USB (Juice Jacking)

Explanation: Jailbroken/rooted devices lack security measures, making them vulnerable to malware injections via malicious charging stations.


145. How does disabling Android Verified Boot (AVB) increase security risks?

A) It allows unverified software and potentially malicious code to execute
B) It blocks unauthorized malware installations
C) It increases Google Play Store protection
D) It improves app sandboxing

Answer: A) It allows unverified software and potentially malicious code to execute

Explanation: Disabling AVB removes integrity checks, allowing attackers to modify system files and install persistent malware.


146. What is a “FakeRoot” attack, and how does it work?

A) An attack where malware tricks an app into believing it has root access to bypass security restrictions
B) A method of making a device immune to root-related malware
C) A way to improve security patches
D) A technique to boost network speed

Answer: A) An attack where malware tricks an app into believing it has root access to bypass security restrictions

Explanation: FakeRoot attacks allow malware to gain unauthorized access to apps, stealing data or injecting malicious code.


147. What is the risk of installing unofficial root certificate authorities (CA) on a jailbroken device?

A) It can allow attackers to intercept encrypted communications (MITM attacks)
B) It enhances encryption strength
C) It speeds up internet browsing
D) It blocks phishing attacks

Answer: A) It can allow attackers to intercept encrypted communications (MITM attacks)

Explanation: Malicious CA certificates can allow attackers to decrypt and intercept HTTPS traffic, exposing sensitive data.


148. How can a malware-infected root app escalate privileges to take full control of a device?

A) By exploiting vulnerabilities in system processes
B) By improving app performance
C) By optimizing battery life
D) By increasing screen resolution

Answer: A) By exploiting vulnerabilities in system processes

Explanation: Malware can use privilege escalation exploits to gain system-level access, compromising the entire device.


149. Why does rooting disable Google Play Protect by default?

A) Rooting modifies system files, causing Play Protect to be bypassed or disabled
B) Rooting enhances Play Protect security
C) Rooted devices don’t need malware protection
D) Play Protect increases the risk of rooting failures

Answer: A) Rooting modifies system files, causing Play Protect to be bypassed or disabled

Explanation: Google Play Protect scans for malware, but rooting disables it, allowing malicious apps to install without detection.


150. What is the primary security risk of using outdated jailbreak or root exploits?

A) They may contain unpatched vulnerabilities that attackers can use
B) They improve security features
C) They increase system speed
D) They enhance Wi-Fi performance

Answer: A) They may contain unpatched vulnerabilities that attackers can use

Explanation: Older jailbreak/root exploits may have known vulnerabilities that attackers can use to install malware.


151. What is a hidden risk of overclocking a rooted Android device?

A) Increased risk of hardware damage and overheating
B) Improved encryption security
C) Faster wireless connectivity
D) Stronger malware protection

Answer: A) Increased risk of hardware damage and overheating

Explanation: Overclocking can stress the CPU/GPU, causing overheating, battery drain, or permanent hardware failure.


152. What is the risk of enabling Android’s “Install Unknown Apps” feature on a rooted device?

A) It increases the chance of installing malware from unverified sources
B) It blocks all unauthorized app installations
C) It enhances Google Play Store security
D) It improves device encryption

Answer: A) It increases the chance of installing malware from unverified sources

Explanation: Enabling this feature allows apps from unknown sources, increasing the risk of installing infected or malicious software.


153. What is an “evil twin” attack, and why are jailbroken devices more vulnerable to it?

A) Attackers create a fake Wi-Fi hotspot to steal data, and jailbroken devices lack proper security checks
B) It is a method to improve Wi-Fi performance
C) It is an attack that enhances network security
D) It speeds up internet browsing

Answer: A) Attackers create a fake Wi-Fi hotspot to steal data, and jailbroken devices lack proper security checks

Explanation: Jailbroken devices bypass security measures, making them easier targets for fake Wi-Fi networks used in MITM attacks.


154. How does disabling Secure Enclave on an iPhone affect security?

A) It weakens encryption for Face ID, Touch ID, and passwords
B) It improves biometric authentication
C) It speeds up app loading times
D) It enhances firewall protection

Answer: A) It weakens encryption for Face ID, Touch ID, and passwords

Explanation: Secure Enclave manages secure data encryption, and disabling it through jailbreaking exposes sensitive data.


155. Why should users avoid using “pre-rooted” or “pre-jailbroken” devices sold online?

A) They may come with pre-installed malware or spyware
B) They increase system performance
C) They improve encryption security
D) They make devices untraceable

Answer: A) They may come with pre-installed malware or spyware

Explanation: Pre-rooted/jailbroken devices may be backdoored, giving attackers remote access to sensitive data.


156. What type of attack can manipulate web sessions on a jailbroken/rooted device?

A) Session hijacking
B) Bluetooth pairing attacks
C) Battery draining exploits
D) Overclocking threats

Answer: A) Session hijacking

Explanation: Session hijacking attacks allow attackers to steal authentication cookies and take control of logged-in user sessions.


157. What is the risk of modifying Android’s system partition with root access?

A) It can prevent future OTA updates from installing properly
B) It enhances system stability
C) It speeds up software downloads
D) It prevents malware infections

Answer: A) It can prevent future OTA updates from installing properly

Explanation: Modifying system partitions interferes with OTA updates, requiring users to manually install firmware updates.


158. How do attackers exploit jailbroken devices with malicious configuration profiles?

A) They can redirect internet traffic or install unauthorized certificates
B) They improve battery efficiency
C) They block all malware infections
D) They enhance encryption

Answer: A) They can redirect internet traffic or install unauthorized certificates

Explanation: Malicious configuration profiles can modify DNS settings, redirect traffic, or install untrusted certificates for MITM attacks.


159. Why do financial institutions warn against using jailbroken devices?

A) They increase fraud risks by exposing financial data to malware
B) They block all banking transactions
C) They improve transaction speed
D) They disable biometric authentication

Answer: A) They increase fraud risks by exposing financial data to malware

Explanation: Jailbroken devices allow malware to intercept sensitive banking transactions, leading to fraud and identity theft.


160. What is a key risk of installing an unverified Xposed module on a rooted device?

A) It may introduce security vulnerabilities or backdoors
B) It speeds up app performance
C) It improves Wi-Fi range
D) It enhances Google Play Store protection

Answer: A) It may introduce security vulnerabilities or backdoors

Explanation: Unverified Xposed modules can inject malicious code, leading to data leaks or device compromise.

161. Why do some malware strains specifically check for root access before executing their payload?

A) Root access allows malware to bypass security restrictions and execute privileged commands
B) Rooted devices block malware infections
C) Malware cannot run on rooted devices
D) Root access increases battery life

Answer: A) Root access allows malware to bypass security restrictions and execute privileged commands

Explanation: Malware exploits root privileges to execute unauthorized actions, such as modifying system files, stealing data, and disabling security software.


162. How does rooting a device impact end-to-end encryption for messaging apps?

A) Rooting may allow unauthorized apps to access encrypted messages
B) Rooting strengthens encryption algorithms
C) Rooting improves the speed of encryption
D) Rooting blocks all unauthorized app installations

Answer: A) Rooting may allow unauthorized apps to access encrypted messages

Explanation: Rooted devices lack strict sandboxing, which means malware or malicious apps can bypass encryption protections and access sensitive conversations.


163. What risk does a rooted device face when connected to a corporate VPN?

A) The device can introduce security threats into the corporate network
B) The device will get faster internet speeds
C) The device will block all malware
D) The VPN will automatically prevent unauthorized access

Answer: A) The device can introduce security threats into the corporate network

Explanation: Rooted devices may have malware or security vulnerabilities, which can be exploited to gain access to corporate systems through a VPN.


164. What is one way attackers can use a rooted device to execute a privilege escalation attack?

A) By running malicious scripts with superuser (SU) privileges
B) By improving device encryption
C) By increasing device battery efficiency
D) By blocking all unauthorized app installations

Answer: A) By running malicious scripts with superuser (SU) privileges

Explanation: Privilege escalation attacks exploit vulnerabilities to gain higher-level access, which is easier on rooted devices with unrestricted SU privileges.


165. How does jailbreaking affect security patch installations on iOS?

A) Jailbreaking prevents automatic security updates from being installed
B) Jailbreaking improves patch management
C) Jailbreaking increases the speed of iOS updates
D) Jailbreaking blocks all malware

Answer: A) Jailbreaking prevents automatic security updates from being installed

Explanation: Jailbroken devices do not receive automatic security updates, making them vulnerable to exploited vulnerabilities.


166. Why do malicious apps target rooted devices for cryptojacking attacks?

A) Rooted devices allow malware to run resource-intensive mining scripts without restrictions
B) Rooted devices prevent unauthorized apps from running
C) Rooting blocks cryptojacking malware
D) Cryptojacking only works on non-rooted devices

Answer: A) Rooted devices allow malware to run resource-intensive mining scripts without restrictions

Explanation: Cryptojacking malware exploits root access to run cryptocurrency mining operations, draining system resources without user consent.


167. How can a user detect if their rooted device has been infected with a rootkit?

A) Unusual system behavior, overheating, and unauthorized network activity
B) Improved device security
C) Faster app launch times
D) Reduced device temperature

Answer: A) Unusual system behavior, overheating, and unauthorized network activity

Explanation: Rootkits hide their presence but may cause performance issues, network anomalies, and unauthorized background processes.


168. What is a key reason why streaming services like Netflix block rooted/jailbroken devices?

A) To prevent content piracy and DRM bypassing
B) To improve video resolution
C) To reduce streaming latency
D) To block free accounts

Answer: A) To prevent content piracy and DRM bypassing

Explanation: Rooted/jailbroken devices can bypass Digital Rights Management (DRM), enabling illegal content piracy.


169. Why is it dangerous to use an outdated SuperSU binary on a rooted device?

A) It may have unpatched security vulnerabilities that can be exploited
B) It speeds up root commands
C) It improves device encryption
D) It blocks malware infections

Answer: A) It may have unpatched security vulnerabilities that can be exploited

Explanation: Outdated SuperSU binaries can have known security flaws, allowing attackers to escalate privileges and gain control over the device.


170. What risk does a jailbroken device face if it is infected with spyware?

A) Spyware can access personal data, messages, and GPS location
B) The device battery will last longer
C) Jailbreaking prevents spyware from running
D) Spyware cannot function on iOS devices

Answer: A) Spyware can access personal data, messages, and GPS location

Explanation: Spyware on jailbroken devices can access all user data, including messages, call logs, and GPS tracking.


171. What happens if a rooted Android device’s bootloader is permanently unlocked?

A) The device remains vulnerable to persistent security threats
B) The device automatically resets
C) The device runs faster
D) The bootloader will block unauthorized modifications

Answer: A) The device remains vulnerable to persistent security threats

Explanation: An unlocked bootloader allows malware or attackers to install custom firmware, bypassing security protections.


172. What is a major risk of running outdated jailbreaking tools on iOS?

A) They may have security flaws that allow remote exploitation
B) They speed up system updates
C) They improve Touch ID performance
D) They prevent malware from executing

Answer: A) They may have security flaws that allow remote exploitation

Explanation: Older jailbreak tools may contain vulnerabilities, which can be used by attackers to remotely exploit the device.


173. Why do financial institutions restrict access to apps on jailbroken/rooted devices?

A) To prevent unauthorized modifications and financial fraud
B) To increase app loading speeds
C) To block in-app purchases
D) To speed up authentication

Answer: A) To prevent unauthorized modifications and financial fraud

Explanation: Financial institutions block jailbroken/rooted devices because they are vulnerable to fraud, keyloggers, and unauthorized transactions.


174. How can malware maintain persistence on a rooted Android device?

A) By modifying system partitions and startup scripts
B) By running only in user mode
C) By disabling Google Play Store
D) By improving system performance

Answer: A) By modifying system partitions and startup scripts

Explanation: Malware on rooted devices can modify system files, allowing it to survive factory resets and persist indefinitely.


175. What is a risk of using root access to modify SELinux policies?

A) It weakens security enforcement and allows unauthorized access
B) It enhances device encryption
C) It speeds up system boot times
D) It improves firewall protection

Answer: A) It weakens security enforcement and allows unauthorized access

Explanation: Disabling or modifying SELinux policies removes security restrictions, making the device vulnerable to exploits and privilege escalation.


176. How does jailbreaking impact biometric authentication security?

A) It weakens protection for Face ID, Touch ID, and other biometric features
B) It enhances fingerprint scanning accuracy
C) It improves Face ID recognition
D) It increases biometric encryption

Answer: A) It weakens protection for Face ID, Touch ID, and other biometric features

Explanation: Jailbreaking can bypass or disable biometric security measures, making it easier for attackers to spoof authentication.


177. What is a potential danger of sideloading apps on a rooted device?

A) Sideloaded apps may contain malware that exploits root access
B) Sideloading improves app compatibility
C) Sideloading increases battery efficiency
D) Sideloading prevents unauthorized access

Answer: A) Sideloaded apps may contain malware that exploits root access

Explanation: Sideloading apps from untrusted sources increases the risk of installing malware that exploits root privileges.


178. Why do rooted devices make it easier for attackers to disable antivirus software?

A) Malware can gain root access and uninstall security applications
B) Rooting enhances antivirus detection capabilities
C) Rooted devices block all malware infections
D) Rooted devices increase firewall protection

Answer: A) Malware can gain root access and uninstall security applications

Explanation: Malware on rooted devices can bypass security restrictions, allowing it to disable or remove antivirus software.


179. Why is unlocking the bootloader considered a security risk?

A) It allows attackers to install unverified firmware or custom ROMs
B) It speeds up system updates
C) It improves biometric authentication
D) It prevents malware infections

Answer: A) It allows attackers to install unverified firmware or custom ROMs

Explanation: An unlocked bootloader allows unauthorized software installations, increasing the risk of malware infections.


180. What is a common method used to detect rooted or jailbroken devices?

A) Security APIs that check for unauthorized modifications
B) Increasing screen brightness
C) Reducing system volume
D) Changing wallpaper

Answer: A) Security APIs that check for unauthorized modifications

Explanation: Many security-focused applications use APIs to detect system modifications, rooted devices, or jailbroken firmware.

181. Why do some exploit kits target jailbroken or rooted devices specifically?

A) They can bypass security restrictions and execute malicious code more easily
B) Rooted devices block all exploit kits
C) Jailbroken devices receive automatic security patches
D) Exploit kits do not affect jailbroken/rooted devices

Answer: A) They can bypass security restrictions and execute malicious code more easily

Explanation: Exploit kits are designed to take advantage of security weaknesses, and rooted/jailbroken devices lack built-in protections, making them easier targets.


182. What is the risk of granting root access to a file manager app?

A) The app can modify or delete system files, causing instability or security breaches
B) It improves device speed
C) It prevents malware infections
D) It increases RAM efficiency

Answer: A) The app can modify or delete system files, causing instability or security breaches

Explanation: File manager apps with root access can accidentally or maliciously alter critical system files, leading to system corruption or security exploits.


183. Why do some root detection methods check for the presence of the “su” binary?

A) The “su” binary is a key indicator that a device has been rooted
B) The “su” binary improves device security
C) The “su” binary speeds up app installations
D) The “su” binary prevents unauthorized access

Answer: A) The “su” binary is a key indicator that a device has been rooted

Explanation: The “su” binary is used to grant root privileges, making it a common detection point for root-checking applications.


184. What happens if a malicious app gains access to root-level logs?

A) It can extract sensitive user data, including passwords and personal messages
B) It improves device performance
C) It speeds up internet connectivity
D) It enhances encryption security

Answer: A) It can extract sensitive user data, including passwords and personal messages

Explanation: Malicious apps with root access can read system logs that may contain sensitive information, leading to data leaks or identity theft.


185. How does jailbreaking affect Apple’s App Transport Security (ATS) feature?

A) It can disable ATS, making the device vulnerable to insecure data transmissions
B) It enhances ATS encryption
C) It speeds up internet browsing
D) It prevents all network attacks

Answer: A) It can disable ATS, making the device vulnerable to insecure data transmissions

Explanation: App Transport Security (ATS) ensures encrypted data transmissions, but jailbreaking can disable or weaken these protections, making data interception easier.


186. What is a common risk of using custom recovery software on a rooted device?

A) It can allow attackers to install unverified firmware or malware
B) It improves device security
C) It prevents unauthorized root access
D) It increases the device’s lifespan

Answer: A) It can allow attackers to install unverified firmware or malware

Explanation: Custom recoveries can be used to flash unauthorized firmware, potentially including malicious code or spyware.


187. Why do some mobile device management (MDM) solutions enforce jailbroken/rooted device restrictions?

A) To prevent unauthorized modifications that could compromise corporate security
B) To slow down device performance
C) To increase battery life
D) To block app updates

Answer: A) To prevent unauthorized modifications that could compromise corporate security

Explanation: MDM solutions enforce security policies to block rooted or jailbroken devices, preventing data leaks and unauthorized access to enterprise resources.


188. What is a major security concern when modifying the boot.img file on a rooted Android device?

A) It can introduce vulnerabilities that allow boot-level exploits
B) It speeds up system performance
C) It improves encryption security
D) It enhances system stability

Answer: A) It can introduce vulnerabilities that allow boot-level exploits

Explanation: Modifying the boot.img file incorrectly can lead to boot vulnerabilities, making the device more susceptible to exploits and persistent malware.


189. What is the risk of using an unsecured root-enabled terminal emulator?

A) Attackers can execute commands remotely if the device is compromised
B) It improves app loading speed
C) It enhances system protection
D) It blocks malware infections

Answer: A) Attackers can execute commands remotely if the device is compromised

Explanation: Unsecured terminal emulators provide a direct way for attackers to execute root commands, leading to potential system takeover.


190. How does jailbreaking impact iOS’s ability to verify app signatures?

A) Jailbreaking allows the execution of unsigned or malicious apps
B) Jailbreaking strengthens app verification
C) Jailbreaking blocks untrusted applications
D) Jailbreaking increases encryption security

Answer: A) Jailbreaking allows the execution of unsigned or malicious apps

Explanation: iOS verifies app signatures to ensure they are from trusted sources, but jailbreaking can bypass this check, enabling malware installation.


191. Why do attackers use “overlay attacks” on rooted devices?

A) To trick users into entering credentials into fake app interfaces
B) To improve device performance
C) To reduce battery usage
D) To speed up software updates

Answer: A) To trick users into entering credentials into fake app interfaces

Explanation: Overlay attacks display fake interfaces over legitimate apps, tricking users into entering sensitive information like passwords or credit card details.


192. What is the risk of running outdated Magisk modules on a rooted device?

A) They may contain security vulnerabilities that hackers can exploit
B) They improve app compatibility
C) They enhance Wi-Fi speed
D) They block malware infections

Answer: A) They may contain security vulnerabilities that hackers can exploit

Explanation: Outdated Magisk modules can have unpatched security flaws, making them a target for privilege escalation attacks.


193. What happens if an attacker modifies the /system partition on a rooted Android device?

A) They can implant persistent malware that survives reboots
B) The device becomes faster
C) The device prevents future infections
D) The battery life is extended

Answer: A) They can implant persistent malware that survives reboots

Explanation: Modifying the /system partition allows attackers to embed malware deep within the OS, making it difficult to remove.


194. Why do jailbreak/root detection tools scan for unusual system binaries?

A) Jailbreaking/rooting often installs non-standard system binaries
B) It improves device performance
C) It enhances encryption security
D) It speeds up boot times

Answer: A) Jailbreaking/rooting often installs non-standard system binaries

Explanation: Detection tools look for unusual binaries like “su” or modified system files, which indicate a jailbroken/rooted environment.


195. What is a potential danger of modifying build.prop on a rooted device?

A) The device may become unstable or fail to boot
B) The device will become unhackable
C) The device will have better encryption
D) The device will get faster OTA updates

Answer: A) The device may become unstable or fail to boot

Explanation: Modifying build.prop incorrectly can cause system crashes, boot loops, or permanent software corruption.


196. What is a risk of running a malicious Xposed module on a rooted device?

A) The module may inject spyware or steal sensitive data
B) The device will run faster
C) The module will improve encryption
D) The module will block all malware

Answer: A) The module may inject spyware or steal sensitive data

Explanation: Unverified Xposed modules can act as Trojans, injecting malware, keyloggers, or spyware into the system.


197. Why do manufacturers include rollback protection in bootloaders?

A) To prevent users from installing vulnerable older firmware versions
B) To increase battery life
C) To improve app performance
D) To speed up software updates

Answer: A) To prevent users from installing vulnerable older firmware versions

Explanation: Rollback protection ensures that users cannot downgrade to older, exploitable firmware, preventing attackers from using known vulnerabilities.


198. How does rooting impact Google’s SafetyNet API?

A) It triggers a failure, preventing access to secure applications
B) It enhances app security
C) It speeds up biometric authentication
D) It improves mobile payments

Answer: A) It triggers a failure, preventing access to secure applications

Explanation: SafetyNet detects rooted devices, blocking access to secure apps like banking, Google Pay, and DRM-protected content.


199. What is a risk of using an unsecured SSH server on a jailbroken device?

A) Attackers can remotely take control of the device
B) It improves app security
C) It prevents unauthorized logins
D) It blocks malware infections

Answer: A) Attackers can remotely take control of the device

Explanation: An unsecured SSH server with default credentials allows attackers to remotely execute commands and steal data.


200. What is the main purpose of root hiding techniques like Magisk Hide?

A) To prevent apps from detecting root access
B) To enhance device security
C) To block malware infections
D) To improve biometric authentication

Answer: A) To prevent apps from detecting root access

Explanation: Root hiding tools like Magisk Hide allow users to bypass root detection in apps like banking or Netflix, but they do not improve security.