All right. So I hope those questions weren't too hard for you. I know you've been working on those case studies, So you've got a lot of information flowing around in your brainy Just pick up the stuff that you want when it comes to mobile. Now, analysis. Right?
Right. Okay, so question one. Where does the IOS store keys and certificates? So if you remember, this is a question from module one.
Right? So which one is it? Security
security and Cleave. Yup. That's right
And these don't exist, Right?
Okay, So which of the items below are risks to mobile devices? Okay, well, we've got here. Insecure passwords, incorrect user permissions,
unpatched os or all of them. I'm sorry. All nor none of them. Well, if you think about it insecure passwords, that is a threat.
Incorrect user permissions also a threat.
That would be none of them.
They're none of these air risks to mobile devices. They're all threats.
Okay, Next, what is the main I p c r p c. System in an drone? So when we talk about I p c and R B c were talk about messaging, right? The inter process communication the remote procedure calls
Well, yes, it happens with intense, but no, because that doesn't facilitate it.
It would be the limits binder that actually facilitates the intense.
Okay, Next, what component of android allows data to be shared between applications facilitated by the binder?
So that would be the content provider.
Remember, the content provider moves data back and forth between applications facilitated by the binder
SC Olynyk stuff permissions, user permissions and the android run Time does not.
Okay. Last question. What is the command to retrieve a file from an android phone? 80 b route will know that. What's for her route? Correct.
ADP says me. Definitely not. That opens doors right now That doesn't open doors.
80 be analyzed. Doesn't work.
Yeah, that's right. A T B. Pull Pyle bath.