Day 5 Flashcards
_______ is used to install applications from third party websites or app stores onto an Android device.
Sideloading
The _____ section of the Android settings is used to create and manage user profiles.
Users
________ utilizes Android applications that are fully compiled at installation.
Android Runtime (ART)
(Choose all that apply) Smart phones use a proprietary operating system known as \_\_\_\_\_\_\_. Real Time Operating System General Purpose Operating System Distributed Operating System Single Task Operating System
RTOS
GPOS
______ provides an open source platform and application environment for mobile devices?
Android
SELinux, used in Android, enforces ______ access controls over all processes.
Mandatory
To speed the startup of apps in Android, developers would partially compile the application in a file with a(n) _____ extension.
Odex
The ____ command is used to change Linux file and directory permissions.
Chmod
Installing or reverting back to a previous version of iOS is prevented by a process called _____
Downgrading
_________ was a process virtual machine used in Android that compiled applications at runtime.
Dalvik
In Android specialized software can be used for _______, that will allow access to the devices subsystem.
Rooting
The Linux file permission ______ is the numeric equivalent of u=rwx, g=rx, o=r.
754
Upgrades to iOS can be accomplished via a standard Mac or PC computer running ______.
iTunes
________ is the process of removing or bypassing the limitations placed by a manufacturer on an iOS device .
Jailbreaking
To symbolically add the white permission to a file for the others group, ____ should be used in conjunction with the chmod command.
o+x
__________ is responsible for processing fingerprint data from Touch ID, reducing the need for long, complex passwords.
The Secure Enclave
Google offers the __________ to backup persistent data on a user’a device to the cloud.
Android Backup Service
(Choose all that apply) What risks are associated with jailbreaking iOS?
Violating Apple’s End User License Agreement
Bricking the device
Changing the default browser
Installing custom themes
Installing third party applications
Installing malicious code
Violates Apple’s End User License Agreement
Installing malicious code
Bricking the device