Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Android AND-802 - Android Security Essentials

Page: 1 / 2
Total 45 questions

You must use permissions to prevent unauthorized access to your application data.

A.

False

B.

True

The Logcat window in Android Studio displays system messages, such as when a garbage collection occurs, and messages that you added to your app with the Log class. It displays messages in real time and keeps a history so that you can view older messages.

A.

True

B.

False

Content providers can help an application manage access to data stored by it or by other apps. They also provide a way to share data with other apps.

A.

True

B.

False

Any Android application can protect itself by declaring permissions that can be accessed by other applications. This can be achieved using the tag in the activity_main.xml file of the Android applications providing the permission.

A.

True

B.

False

The following image includes a code of permission group. Where this code will be written in the Android app?

A.

MainActivity.java or MainActivity.kt

B.

AndroidManifest.xml

C.

activity_main.xml

D.

string.xml

Android stores cache files in the filesystem and sandboxes along with the application. Cache files are created under directory ……………………………………..

A.

/data/data//cache/

B.

/data/files//cache/

C.

/data/personal//cache/

D.

/data/cache//cache/

The following image includes some components which you must be aware of to learn about the complexity of the security issue and the fact that software developers can only deal with security issues within their own applications. These components belong to ………………….

A.

Mobile Environment.

B.

Android Development.

C.

Telephone Land Lines Network.

D.

Internet.

A permission group is the concept of creating a group of all similar types of permissions, which will be presented together to the user during the installation time for approval.

A.

False

B.

True

The tag of a manifest file is a declaration for the whole application and each application component is declared in a sub-tag inside it.

A.

True

B.

False

Permissions required for an application to perform its operations are called application level permissions. Which are the types of application level permissions a developer can use? (Select two)

A.

System-defined permissions.

B.

Application-defined permissions.

C.

GPS - defined permissions.

D.

Payment - defined permissions.