Chapter 18 review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Updates are found in the app store

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Rooting

A popular activity for some users with their mobile devices is to create an environment where any applications can be installed from any source. Which of the following is a reference to an Android device that is able to have applications from any source installed?

macOS Recovery

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.Which of the following tools will the technician use to perform this task?

Pin code

As mobile devices continue to evolve and to be able to accomplish organization objectives, their use continues to grow in all situations. Knowing how to control access to those devices is an important tool for administrators to be able to work with. Which of the following is a method for controlling access to the mobile device?

Charging the device with 100% battery life

Brandon is assisting an internal employee with their mobile device. Upon further diagnosing, Brandon can see that the mobile device is currently not opening one of the company's applications. To further assist Brandon will begin to do some troubleshooting. Which of the following choices is not a form of troubleshooting?

File-Level Backup

Daniel assists an internal employee with their corporate-owned mobile device. Upon further troubleshooting, Daniel notices the employees' phone contacts are currently missing and their corporate account has been logged out. Once logged back into the user's account, Daniel would like to further assist by preventing any data from being lost. Which of the following would synchronize the user's data using their online corporate account?

SDK

Developing new applications and apps for mobile devices and many other categories of devices is a growing field of expertise for many application developers. As such, there are application development tools that have been created to help to standardize development projects across various languages and ecosystems. Which tool is used to create a new application for various hardware devices?

Trusted sources

It can provide a great amount of benefit for any organization to be aware of the types of origins of applications and be able to verify that they are legitimate. A type of site has evolved for mobile devices to download and use verified applications. This gives an organization confidence that the applications, their devices are employing, are safe. Which of the following is a safe site for downloading apps to use on a company or personal device?

Remote Backup Application

Michael is going through onboarding for his new position as a supervisor. While setting up his new corporate-owned device, he would like to make sure that all his data is not only backed up through Google, but also through the company's cloud storage. Which of the following would allow him to back up the device's data to the company's cloud storage?

MDM policy

Mobile policies are extremely important for organizations as using personal devices for work activities is a growing trend. As a result, categories of applications have developed to help enforce these mobile policies. Which of the following policies would ensure the installation of software on servers and mobile devices to enforce an organization's various mobile device policies?

Mobile Device Management (MDM)

Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications. Which of the following is the process in which she can set up her secure corporate data and apps?

System > Advanced > Reset options > Erase all data

Scott has been asked to factory reset his old corporate-owned Android device. Upon opening the settings application, Scott is greeted with several options and paths. Which of the following paths would he need to take in order to erase all the data from his device?

Malware

Seeing various issues with a device, an administrator becomes more knowledgeable about common problems and solutions. As such, when certain conditions are met, the likelihood that a problem is something that has been seen before becomes greater. Being able to quickly and efficiently diagnose and resolve those issues is important. Which of the following has symptoms of short battery life or power drain?

Remote Wipe

Steve just got back from a business trip and noticed that his corporate mobile device was missing. Using My Device, Android's built-in locator application, Steve was able to locate his device in another state. Feeling worried that the device may be compromised, Steve would like to take the next step and erase the device. Which of the following would allow him to erase the device from the My Device application?

Baseband Update

Troubleshooting is of the process of applying logic and skills to quickly narrow down the solution to a particular issue or problem. Which of the following is a set of issues revolving around dropped or network connections due to a weak signal?

Firewalls

Understanding the tools and techniques for protecting a device or a network is an important knowledge base for any administrator. There are a number of security measures that can be employed to accomplish device and data protection. Which of the following is a tool that controls which apps or services can use network connections?

End-of-life

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

Locator

When devices are lost or stolen, it is important that administrators have setup tools to help find and secure the devices to ensure that company assets are protected. Which of the following helps to find and secure company mobile devices?

Full device

With mobile devices being used so much in society, the difference between work and personal activities and devices can sometimes be difficult to completely distinguish. Protecting those devices becomes an important activity for any organization. What is a style of encryption that encrypts all of the data stored on a device?

File Level Backup

Working with backups and the assurance that information is protected and kept so that the organization's assets are safe, is a mission critical IT activity. There are a number of backup types and as such, it is important for an administrator or technician to be aware of what each type does so that they are backing up in an efficient and effective manner. What would be a tool used to process the syncing of emails, contacts, calendars, photos, and other data through online accounts?


Conjuntos de estudio relacionados

KIN 5725 Organization and Management of Sport Part 2

View Set

HA Ch. 10 - Gallbladder and Biliary system Exercises 4 - 7

View Set

جميع دول العالم وعواصمها حسب القارات

View Set

Self Incrimination - 5th Amendment

View Set

Resistance to social influence + Social change

View Set

BIS 2A- Cell Cycle (Mitosis and Meiosis)

View Set