University of Maryland, University College CMIT 321 quiz 7
University of Maryland, University College CMIT 321 quiz 7
SPAM can include (choose
... [Show More] three):
Question 1 options:
TLS
MMS
SMS
IM
Rooting risks include(choose all that apply):
Question 2 options:
voiding the warranty
malware
bricking
poor performance
Which of the following are secure coding techniques (choose all that apply):
Question 3 options:
Jail-Break Detection
Checksum
Certificate Pinning
Debugger Detection
Save
Previous PageNext Page
The Android Runtime includes (choose two):
Question 5 options:
core libraries
Flash memory driver
Dalvik Virtual Machine
Bind IPC driver
A network of many hacked smartphones is called (choose one):
Question 6 options:
phone_net
botnet
4g-hacked
3gees
Phone based SMS attacks include (choose three):
Question 7 options:
RF
Baseband Attacks
SMiShing
Phreaking
According to the text, this is a form of MITM Attack:
Question 8 options:
SSL Strip
API Hooking
Packet Sniffing
Checksum Evasion
According to the text, the following is will protect by limiting the ability to access resources:
Question 9 options:
app sandboxing
Jail Breaking
Jail break detection
Android Rooting
Android includes media support for the following (choose three):
Question 10 options:
AAC
ARM
H.323
H.264
Save
Previous PageNext Page
Fake Defender deleted apk files from all of the following location (choose two):
Question 11 options:
/users/Download
/home/Download
/mnt/external_sd/Download
/mnt/extSdCard/Download
App stores include (choose three):
Question 12 options:
Google Play
ITunes Store
BlackBerry App World
Fanddago
According to OWASP, strong encryption channels, such as there should be used (choose two):
Question 13 options:
RC4
DES
AES
3DES
This is the 3D Graphics Library of Android (choose one):
Question 14 options:
Media Framework
SGL
OpenGL
SSL
Sophos mobile security features include (choose two):
Question 15 options:
antivirus anti-malware
Loss and Theft Protection
Spam Protection
Privacy Protection and security
Bluetooth devices in these modes are at greater risk (choose two):
Question 17 options:
promiscuous
open
discovery
monitor
Save
Previous PageNext Page [Show Less]