Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 11 ASSESSMENT

  1. The Android OS is less susceptible to attacks than Apple iOS and Windows Phone because it is based on an open source model.
    1. True
    2. False
  2. Compared to PCs, mobile devices have which of the following?
    1. Less risk, because they are moving targets
    2. More risk, because they are subject to all the same exploits and many of their own issues
    3. The same amount of risk as nonmobile devices
    4. Less risk, because they are newer
  3. Potentially unwanted applications (PUAs) are used for which of the following purposes?
    1. To create competition in Google Play
    2. To monetize applications through connections to aggressive third-party advertising networks
    3. As a category for low-rated applications
    4. To clean up memory on phones
  4. The open source nature of Android ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733