5 mobile security questions to answer