Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 3 7 1 pts True or False? An asset is anything of value, such as people, physical property, intellectual property, or information. Group of

Question 371 pts
True or False? An asset is anything of value, such as people, physical property, intellectual property, or information.
Group of answer choices
True
False
Flag question: Question 38
Question 381 pts
True or False? Theft of data is a common risk on a wireless business network.
Group of answer choices
True
False
Flag question: Question 39
Question 391 pts
True or False? A vulnerability is anything that can damage or compromise an asset.
Group of answer choices
True
False
Flag question: Question 40
Question 401 pts
During which stage of a risk assessment does the security team determine the value of assets and identify associated risks?
Group of answer choices
Risk analysis
Identifying and implementing controls
Monitoring
Planning
Flag question: Question 41
Question 411 pts
Which of the following is not a feature of Apple iOS architecture?
Group of answer choices
BitLocker disk encryption
Siri
A secure boot-chain
Transport Layer Security (TLS) network security
Flag question: Question 42
Question 421 pts
True or False? Because Android is an open source platform, every application can be decompiled and reviewed as blocks of source code.
Group of answer choices
True
False
Flag question: Question 43
Question 431 pts
Which of the following is true of Windows Phone in general?
Group of answer choices
Low programming complexity
Low market share
Is more likely to be jailbroken than Apple iOS due to the diversity of devices on which it runs
Experiences a high rate of successful malware attacks
Flag question: Question 44
Question 441 pts
What is the purpose of rooting an Android device?
Group of answer choices
To be able to encrypt the device
To give users privileged control and install applications from any source
To be able to run applications in isolation
To be able to digitally sign applications
Flag question: Question 45
Question 451 pts
Why are Android operating system (OS) phones difficult to support in a Bring Your Own Device (BYOD) environment?
Group of answer choices
Lack of sandbox
Walled garden approach to security
Lack of strong app permissions
Fragmented OS
Flag question: Question 46
Question 461 pts
In Android, only trusted applications can access protected application programming interfaces (APIs), such as those associated with such as the camera and location data. Trusted APIs are protected by permissions. Which of the following is not true of permissions?
Group of answer choices
The application will retain granted permissions for as long as the application remains installed.
An application must receive the permission of the device's owner.
The owner can revoke an installed application's individual permissions at any time.
Permission requests are listed in the application manifest and are supplied to the user for inspection
prior to installing the application.
Flag question: Question 47
Question 471 pts
True or False? The Windows Phone OS has been discontinued.
Group of answer choices
True
False
Flag question: Question 48
Question 481 pts
True or False? The application provenance approach employed by Apple guarantees that applications in the App Store are safe.
Group of answer choices
True
False
Flag question: Question 49
Question 491 pts
True or False? A mobile attack that uses social engineering to gather information is relatively easy to remediate.
Group of answer choices
True
False
Flag question: Question 50
Question 501 pts
True or False? After a network scan, locating and eliminating unknown wireless access points is challenging because they could be owned by legitimate sources, such as neighbors or vendors.
Group of answer choices
True
False
Flag question: Question 51
Question 511 pts
True or False? Binary protection is a software security technique in which binary files are analyzed and modified to protect against common exploits.
Group of answer choices
True
False
Flag question: Question 52
Question 521 pts
True or False? A certificate authority is an international foundation and open community dedicated to enabling organizations to develop secure applications.
Group of answer choices
True
False
Flag question: Question 53
Question 531 pts
An alternative way to identify a device when the UDID and IEMI are not available to the application is to create data sets, and then use the information contained in each set to create a unique fingerprint for the device. What is the problem with this method?
Group of answer choices
The data set is considered stable for only 24 hours.
The data set results in a fingerprint that is only 50 percent unique.
It lacks diversity-based uniqueness.
It takes too long to create a data set.
Flag question: Question 54
Question 541 pts
What is a spy cell?
Group of answer choices
A legitimate d

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 19 21 2012 Proceedings Part 3 Lnai 7198

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284922, 978-3642284922

More Books

Students also viewed these Databases questions