IT Essentials v8 Chapter 12 Check Your Understanding Answers

1. What are three features of the iOS mobile device operating system? (Choose three.)

  • Linux based operating system
  • closed source operating system
  • developed by Open Handset Alliance
  • source code not released to the public
  • uses walled garden model for apps
  • third-party apps are installed directly using an .apk file

Explanation: The iOS mobile device operating system is a closed source OS developed by Apple which uses a walled garden model for apps and its source code is not released to the public. Android is an open source operating system developed by the Open Handset Alliance.

2. For each scenario, select the screen lock method that is described.

  • This screen lock requires that a four or six-digit numeric code be entered to unlock the mobile device. The best choice is a passcode lock.
    – This is the most common method to lock mobile devices. Passcode options can also include setting a custom numeric code or alphanumeric password.
  • This screen lock requires the user simply swipe the device screen in a pre-defined direction to unlock the device. The best choice is a swipe lock.
    – Also called Slide to unlock on many Android devices. Although convenient, this less secure method should only be used if security is unimportant.
  • This screen lock requires the user to join four or more dots in a specific pattern to unlock the device. The best choice is a pattern lock.
    – Available on many Android devices. The screen unlocks using a pattern you draw with your finger.
  • This biometric screen lock can unlock a device by scanning the user’s fingerprint. The best choice is a fingerprint lock.
    – This iOS and Android feature converts the user’s fingerprint scan into a unique hash. When a user touches the fingerprint sensor, the device re-computes the hash. The device unlocks if the hash values match.
  • This biometric screen lock can unlock a device by simply looking at it. The best choice is a face lock.
    – This iOS and Android feature computes a hash using a picture of the user’s face. Nice try, but that’s not the correct answer.

3. Which two mobile device screen lock security features use biometric data? (Choose two.)

  • face lock
  • fingerprint lock
  • pattern lock
  • swipe lock
  • passcode lock

Explanation: Face and fingerprint lock are examples of biometric security features.

4. Match the action with the mobile device security feature.

IT Essentials v8 Chapter 12 Check Your Understanding Answers 4

Explanation: Place the options in the following order:

Locator App Find a mobile device that has been lost or stolen.
Remote backup Store mobile device data in the cloud.
Erase Delete all data on an Android device and return it to factory state.
Lock Remotely lock an Android device using a passcode.
Lost mode Remotely lock an iOS device using a passcode.
None Store iOS backups on local PC.

5. Which statement is correct regarding mobile device security?

  • Running apps in a sandbox helps mitigate damage to mobile devices by malicious software.
  • Rooting is a method of removing restrictions on modifying code on an iOS device.
  • Jailbreaking exploits vulnerabilities on Android devices.
  • Updates and patches for Android devices are released as one package for all devices.
  • Jailbreaking exploits vulnerabilities on iOS devices.

6. What are two features of the Linux and macOS operating systems? (Choose two.)

  • Linux and macOS are open-source and independently developed operating systems.
  • Linux can be customized by the user installing and removing software components.
  • macOS includes a Disk Utility to backup and perform image recovery.
  • macOS supports the Gnome-terminal terminal emulator.
  • Linux and macOS use the Grub boot manager.

Explanation: Linux can be customized by the user installing and removing software components and macOS includes a Disk Utility to backup and perform image recovery to disk from image files.

7. Match the Linux or macOS feature to the description.

IT Essentials v8 Chapter 12 Check Your Understanding Answers 5

Explanation: Place the options in the following order:

Gnome keying The security credentials manager for Linux.
Keychain The security credentials manager for macOS.
Signature Contains sample of code used by viruses and malware.
Firmware Software providing low-level functionality for a device.
Patches OS updates released periodically by OS vendors to address new know vulnerabilities.
Cron A service that can be used to schedule tasks on Linux and macOS.

8. Which four Linux commands would be used to create a new directory under the current directory, copy files to that new directory, make that directory the current directory, and displays the files in that directory? (Choose four.)

  • mkdir
  • cp
  • cd
  • ls
  • mv
  • rm
  • pwd

Explanation: The Linux commands mkdir , cp , cd , and ls will create a new directory under the current directory, copy files into that directory, change the current directory, and display the files in that directory.

9. Which Linux file permission should be applied to a file that only the file owner can read, change, and execute, but allows all other users to read and execute the file?

  • rwxr-xr-x
  • rwxtwxrwx
  • rw-r–r–
  • rw-rw-rw

Explanation: Permission 666 octal allows all users to read and change the file, but no users can execute it.

10. Match the file or administrative Linux command to the description.

IT Essentials v8 Chapter 12 Check Your Understanding Answers 6

Explanation: Place the options in the following order:

Modify file and directory permissions. chmod
Simulates a login as another user or to become a super user. su
Displays or configures network card related information. ifconfig
Shuts down the system. shutdown
Lists the processes currently running in the system. ps

 

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x