Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 12 ASSESSMENT

  1. Android permissions are the key to ensuring that one application cannot access other applications or application resources.
    1. True
    2. False
  2. In what way does Android take advantage of Linux’s multiuser environment?
    1. By growing its social media applications
    2. By sharing resources between applications
    3. By adapting the multiuser-based protection of isolating Android applications
    4. By developing open source code
  3. Which of the following best describes application provenance?
    1. It helps ensure that users can trust the authenticity and integrity of the applications in the App Store.
    2. It prevents applications from accessing common resources.
    3. It guarantees that applications are safe and are free from malware.
    4. All of the above.
  4. In what way does ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733