iOS don\'t have the capabilities to control access to Location Services and user
ID: 3706379 • Letter: I
Question
iOS don't have the capabilities to control access to Location Services and user data in iOS devices.
Question 1 options:
True
False
Save
Question 2 (1 point)
Which of the following statement is NOT true in term of the security advantage of iOS?
Question 2 options:
iOS device is easier to path and update comparing to other mobile devices
iOS is an open system
Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure
iOS devices are difficult to hack
Save
Question 3 (1 point)
Which of following is (are) considered as secrutiy challenges to iOS devices?
Question 3 options:
Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X
Apple also patches their own software flaws on different schedules for different platforms
Both A and B
Neither A nor B
Save
Question 4 (1 point)
______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.
Question 4 options:
AndroRAT
Android SDK
Android framewrok for exploitation
none of above
Save
Question 5 (1 point)
____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.
Question 5 options:
Application installation control
Containerization
Blacklisting
Whitelisting
Save
Question 6 (1 point)
Which of the following is the biggest security challenge for Android system?
Question 6 options:
Fragmentation
Malware
User behavior
Compartmentalization
Save
Question 7 (1 point)
Android provides an open source platform and application environment for mobile devices
Question 7 options:
True
False
Save
Question 8 (1 point)
The Android security program that begins early in the development lifecycle with the creation of a rich and configurable security model and design is called ________.
Question 8 options:
penetration testing and code review
design review
open source and community review
incident response
Save
Question 9 (1 point)
Blacklising is a more effective security measure than the whitelisting for BYOD
Question 9 options:
True
False
Save
Question 10 (1 point)
Apple uses integrated and secure software and hardware platform for iOS devices.
Question 10 options:
True
False
Save
True
False
Explanation / Answer
1.false
because IOS device have the capabilities to control access to location services and user data .before that you'll get a notification asking for permission to access in IOS device.
2.IOS is an open system
is NOT true in term of the security advantages of IOS.
3.Both A and B
5.containerization.
It is a method by which a portion of a device can virtually be separate into its own protected bubble,protected by separate password and regulated by a separate set of policies from the remainder of the applications and content on the device.
7. true
8.design review
because,each majoe feature of the platform is reviewed by engineer and security resource,with appropriate security controls integrated into the architecture of the system.
9.false
because , application blacklisting and whitelisting for Android.
10.true
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.