Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

iOS don\'t have the capabilities to control access to Location Services and user

ID: 3706379 • Letter: I

Question

iOS don't have the capabilities to control access to Location Services and user data in iOS devices.

Question 1 options:

True

False

Save

Question 2 (1 point)

Which of the following statement is NOT true in term of the security advantage of iOS?

Question 2 options:

iOS device is easier to path and update comparing to other mobile devices

iOS is an open system

Greater market share and public scrutiny means that Apple faces considerable public pressure to keep the platform secure

iOS devices are difficult to hack

Save

Question 3 (1 point)

Which of following is (are) considered as secrutiy challenges to iOS devices?

Question 3 options:

Apple is historically slow to offer patches for known vulnerabilities fixed in the open source components used in OS X

Apple also patches their own software flaws on different schedules for different platforms

Both A and B

Neither A nor B

Save

Question 4 (1 point)

______________ is an open source project which aim is to demonstrate the existence of security holes in the popular mobile operating system.

Question 4 options:

AndroRAT

Android SDK

Android framewrok for exploitation

none of above

Save

Question 5 (1 point)

____________ is a method by which a portion of a device can essentially be segregated into its own protected bubble, protected by a separate password and regulated by a separate set of policies, from the remainder of the applications and content on the device.

Question 5 options:

Application installation control

Containerization

Blacklisting

Whitelisting

Save

Question 6 (1 point)

Which of the following is the biggest security challenge for Android system?

Question 6 options:

Fragmentation

Malware

User behavior

Compartmentalization

Save

Question 7 (1 point)

Android provides an open source platform and application environment for mobile devices

Question 7 options:

True

False

Save

Question 8 (1 point)

The Android security program that begins early in the development lifecycle with the creation of a rich and configurable security model and design is called ________.

Question 8 options:

penetration testing and code review

design review

open source and community review

incident response

Save

Question 9 (1 point)

Blacklising is a more effective security measure than the whitelisting for BYOD

Question 9 options:

True

False

Save

Question 10 (1 point)

Apple uses integrated and secure software and hardware platform for iOS devices.

Question 10 options:

True

False

Save

True

False

Explanation / Answer

1.false

because IOS device have the capabilities to control access to location services and user data .before that you'll get a notification asking for permission to access in IOS device.

2.IOS is an open system

is NOT true in term of the security advantages of IOS.

3.Both A and B

5.containerization.

It is a method by which a portion of a device can virtually be separate into its own protected bubble,protected by separate password and regulated by a separate set of policies from the remainder of the applications and content on the device.

7. true

8.design review

because,each majoe feature of the platform is reviewed by engineer and security resource,with appropriate security controls integrated into the architecture of the system.

9.false

because , application blacklisting and whitelisting for Android.

10.true