Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER 15 ASSESSMENT

  1. Malware tends to be evenly distributed across Android and Apple iOS devices.
    1. True
    2. False
  2. Which of the following describes Android-targeted malware?
    1. It exists because of a weakness in Android code.
    2. It is easy to get through Google Play.
    3. It mostly exists due to software fragmentation.
    4. It is not that big a problem.
  3. In what way are the top categories of mobile device malware financially focused?
    1. They target financial and banking apps.
    2. They target banks directly.
    3. They extract data or services that are easily monetized.
    4. All of the above.
  4. Madware often tracks people illegally by pulling data from a device without the owner’s knowledge or consent.
    1. True
    2. False
  5. Mobile malware tends to focus on which of the following?
    1. Gaining ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733