12
As Google and Apple have released operating system version updates over the years, which of the following has occurred?
NOT A. Less access for third-party app developers NOT A. More features but less user control
If Microsoft and Google implement their own versions of Handoff-like technology, what is a likely outcome?
NOT B. All users will have root privileges. NOT C. Apps can be safely installed from any source.
In Android, only trusted applications can access protected application programming interfaces (APIs), such as those associated with such as the camera and location data. Trusted APIs are protected by permissions. Which of the following is not true of permissions?
NOT B. An application must receive the permission of the device's owner. NOT D. The application will retain granted permissions for as long as the application remains installed.
What is true of mobile device management (MDM) and mobile application management (MAM)?
A. MDM handles device activation, enrollment, and provisioning, whereas MAM assists in delivering software.
Rooting, or overriding Android operating system (OS) security, gives the user root (super-user) permissions on an Android device. Which subset or section of the Android operating system is rooted?
C. The OS kernel
Which of the following is a characteristic of the Android sandbox?
B. The application kernel is within the operating system (OS) kernel.
Which of the following is not true of enterprise mobility management (EMM)?
C. It is designed only for Windows Phone.
Which of the following provides a distribution platform for apps with application lifestyle management and handles software licensing, configuration, and usage tracking?
C. Mobile application management (MAM)
What makes the Apple iPhone with iOS ideal for Bring Your Own Device (BYOD)?
D. It has one operating system and only one or two models of each version of the device.
Susan is a developer. She wants to create a mobile application for either an Android device or an Apple iOS device. Because Susan is security conscious, her goal is to ensure hackers cannot modify an application after it is released. What platform(s) can she release the application on, and why?
D. iOS, kept secure by application provenance