4.7.2 Quiz – Mobile Operating Systems and Security Answers

Operating Systems Basics – 4.7.2 Quiz – Mobile Operating Systems and Security

1. Which component uses the greatest amount of power on most mobile devices?

  • LCD screen
  • Camera
  • CPU
  • Media player

Explanation: The LCD screen consumes the most power on most mobile devices. The CPU, camera, and media player use power, but less extensively than the LCD screen does.

2. Which feature of an Android or iOS mobile device helps prevent malicious programs from infecting the device?

  • The phone carrier prevents the mobile device app from accessing some smartphone features and programs.
  • The passcode restricts the mobile device app from access to other programs.
  • Mobile device apps are run in a sandbox that isolates them from other resources.
  • The remote lock feature prevents malicious programs from infecting the device.

Explanation: Because mobile device apps do run in a sandbox (an isolated location) it is difficult for malicious programs to infect the device. The passcode and remote lock features secure the device against unauthorized use. The carrier may disable access to some features and programs based on the service contract, but this a commercial, not a security, function.

3. Which cloud-based storage service does Microsoft provide for backups?

  • iCloud
  • Dropbox
  • OneDrive
  • Google Sync

Explanation: Data on mobile devices must be backed up periodically to ensure that it can be recovered if needed. Most mobile operating systems come with a user account linked to the cloud services of the vendor, such as iClould for iOS, Google Sync for Android, and OneDrive for Microsoft.

4. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)

  • The user interface can be extensively customized.
  • The operating system can be fine-tuned to improve the speed of the device.
  • The root directory of the device is blocked.
  • The operation of the carrier cellular network may be affected.

Explanation: Rooting or jailbreaking a mobile device usually enables extensive customization of the user interface and can enable performance enhancement. The three incorrect options are all considered potential risks to the user, the device, and the network that may result from rooting or jailbreaking a mobile device.

5. Which two methods are commonly used to remove the default restrictions and protections added to mobile operating systems? (Choose two.)

  • rooting
  • jailbreaking
  • rootkit execution
  • device update
  • system backup

Explanation: Mobile operating systems are usually protected by a number of software restrictions. Rooting and jailbreaking are two methods for removing restrictions and protections added to mobile operating systems. They are a means of circumventing the usual operation of the device operating system to gain superuser or root administrator permissions.

6. Which three methods can be used to unlock a smartphone? (Choose three.)

  • NFC
  • Passcode
  • Encryption
  • Swipe pattern
  • QR code scan
  • Biometric information

Explanation: A smartphone should use the screen lock feature to protect sensitive information. To unlock the device, a password or passcode is required. Smartphones also support pattern locks, or swipe locks. Pattern locks eliminate the time it takes to type passwords or pin numbers. You just need to join the dots (numbers) on the keypad in a specific pattern and the phone is unlocked. Many modern mobile devices come with biometric authentication capability such as fingerprint sensors and face recognition for unlocking the device.

7. What is a good source for safely downloading Android apps?

  • iTunes
  • Google Play
  • freeware sites
  • the Apple App Store

Explanation: Google Play ensures that the app is compatible with the mobile device and is a trusted source for apps.

8. What is Wi-Fi calling?

  • a method used to push apps to smartphones
  • a convenient way to securely and digitally make payments with mobile devices
  • a government emergency alert service for smartphones
  • a way to make mobile phone calls over a wireless data network
  • a method for sharing data between two mobile devices

Explanation: Wi-Fi calling is a way that a mobile phone can use a wireless data network to make phone calls as if it were connected to a cellular network. In cases where cell phone coverage is inadequate, calls can be placed from places that have open Wi-Fi networks.

9. A user presses the Recent Apps icon on an Android-based smartphone to see a list of recently used apps. What should the user do to remove an app from the list?

  • Swipe the app up.
  • Double tap on the app.
  • Swipe the app down.
  • Swipe the app to either side.

Explanation: By pressing the Recent Apps icon on the system bar, a list of recently used apps will display. A user can remove an app by swiping it to either side.

10. Which two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)

  • The device must be powered on.
  • The device must be connected to a network.
  • The passcode must be disabled.
  • The passcode must be disabled.
  • Sandboxing must be enabled.

Explanation: Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default.

11. A user downloads a widget onto his Android phone but is puzzled to see that when the widget is touched an app is launched. What is a possible cause?

  • The user has downloaded a virus.
  • The widget is corrupt.
  • The security settings of the Android OS have been compromised.
  • The widget is associated with the app and this is the normal behavior.

Explanation: Widgets are programs that when installed associate with the application they were built for. This will cause the application to launch when the widget icon is touched on the touchscreen of the Android device.

12. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)

  • to help prevent theft of private information
  • to prevent unauthorized use of the device
  • to erase all personal data from the device
  • to return the device to the default factory state
  • to restore and re-synchronize the device
  • to remotely lock the device if it is stolen

Explanation: The passcode lock feature on mobile devices helps prevent theft of private information and places the device into a power saving state. Personal data will not usually be erased from some mobile devices unless the number of failed passcode login attempts exceeds a threshold. Remote lock allows the device to be locked from a remote location. A factory reset returns the device to the original operation state when the device was first purchased. Various applications such as email or cloud storage can provide synchronization capabilities to be able to restore and re-synchronize information such as user data, contacts, and email on a mobile device.y other device features and actions.

13. Which model does Apple use to provide iOS apps to customers?

  • iCloud
  • Xcode
  • sandbox
  • walled garden

Explanation: Apple uses a walled garden model for the iOS apps. The apps must be submitted to and approved by Apple before they are released to users.

14. What are two types of cloud-enabled services for mobile devices? (Choose two.)

  • locator apps
  • remote backup
  • passcode configuration
  • screen calibration
  • screen app locking

Explanation: Locator apps and remote backup are two types of cloud-enabled services for mobile devices. Passcode configuration, screen calibration and screen app locking are performed on the device directly by the user, not as a cloud-enabled service.

15. Which two location data sources can locator apps use to determine the position of a mobile device? (Choose two.)

  • Cellular towers
  • WiFi hotspots
  • The sandbox
  • Remote lock
  • An app source

Explanation: In addition to GPS, mobile device locator apps can use cellular towers and WiFi hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an app source (Play Store or iTunes) are other features and functions related to security and app downloading.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x