Chapter #11
Which of the following is a mobile security challenge NOT caused by end users?
Open source operating system
Which mobile phone vulnerability is used for eavesdropping and potential extortion?
SMS redirection
Which of the following has replaced Dalvik Virtual Machine in Android OS?
Android Runtime
Which of the following is the official Android development tool?
Android SDK
Which of the following is true of potentially unwanted applications (PUAs)?
Are created by developers to monetize their applications
Which of the following is NOT a feature of Apple iOS architecture?
BitLocker disk encryption
What does NOT pose a significant security risk to users of Android smartphones?
Downloading apps from Google Play
Which tool used on Android devices can check for password hashes, check files for read/write data, and record incoming and outgoing communications (SMS messages and phone calls)?
DroidBox
Apple iOS has no security vulnerabilities.
False
From a security perspective, managing a single version of a mobile operating system (OS) is typically more difficult than managing multiple versions.
False
Google does not have an approval process for apps available in Google Play.
False
Whereas Apple iOS and Windows Phone use a sandbox architecture approach, Google Android does not.
False
Because Android is an open source platform, every application created for Android devices consists of essential building blocks. Therefore, every application can be decompiled and reviewed as blocks of source code.
True
Extortion via ransomware is a mobile phone vulnerability in which malware is placed on a phone that prevents the phone from being used until a ransom is received.
True
Matching the URL of a link to the name presented in the text of an e-mail message before clicking on it can reduce the success rate of phishing attacks.
True
The Android operating system (OS) is built on the Linux kernel.
True
The small size of mobile device screens makes users vulnerable to phishing attacks.
True
There are two opposing models of source code management for mobile operating systems. One is the open source model, which developers can freely alter. The Android operating system follows this model. Apple's operating system iOS follows the other model. Which of the following best characterizes the Apple iOS philosophy?
Walled garden
Which Android security platform control or feature identifies application authors and deters or prevents malware?
digital signing of applications
Which of the following is NOT a feature of Windows Phone architecture?
iMessage, FaceTime, and Siri Internet services