Chapter #11

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a mobile security challenge NOT caused by end users?

Open source operating system

Which mobile phone vulnerability is used for eavesdropping and potential extortion?

SMS redirection

Which of the following has replaced Dalvik Virtual Machine in Android OS?

Android Runtime

Which of the following is the official Android development tool?

Android SDK

Which of the following is true of potentially unwanted applications (PUAs)?

Are created by developers to monetize their applications

Which of the following is NOT a feature of Apple iOS architecture?

BitLocker disk encryption

What does NOT pose a significant security risk to users of Android smartphones?

Downloading apps from Google Play

Which tool used on Android devices can check for password hashes, check files for read/write data, and record incoming and outgoing communications (SMS messages and phone calls)?

DroidBox

Apple iOS has no security vulnerabilities.

False

From a security perspective, managing a single version of a mobile operating system (OS) is typically more difficult than managing multiple versions.

False

Google does not have an approval process for apps available in Google Play.

False

Whereas Apple iOS and Windows Phone use a sandbox architecture approach, Google Android does not.

False

Because Android is an open source platform, every application created for Android devices consists of essential building blocks. Therefore, every application can be decompiled and reviewed as blocks of source code.

True

Extortion via ransomware is a mobile phone vulnerability in which malware is placed on a phone that prevents the phone from being used until a ransom is received.

True

Matching the URL of a link to the name presented in the text of an e-mail message before clicking on it can reduce the success rate of phishing attacks.

True

The Android operating system (OS) is built on the Linux kernel.

True

The small size of mobile device screens makes users vulnerable to phishing attacks.

True

There are two opposing models of source code management for mobile operating systems. One is the open source model, which developers can freely alter. The Android operating system follows this model. Apple's operating system iOS follows the other model. Which of the following best characterizes the Apple iOS philosophy?

Walled garden

Which Android security platform control or feature identifies application authors and deters or prevents malware?

digital signing of applications

Which of the following is NOT a feature of Windows Phone architecture?

iMessage, FaceTime, and Siri Internet services


Conjuntos de estudio relacionados

Fundamentals Nursing Prep U Chapter 45 Spirituality

View Set

Psychology Chapter 13 Mastery Quiz

View Set

PrepU Questions of Neurological Disorder

View Set

Chapter 13 Inquizitive Texas Government

View Set

SIE Exam Lesson 12: Tax Advantaged Accounts & Products

View Set