CIS276 Ch9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of these network connections would allow your smartphone to sync your photos to your online account? Choose all that apply. a. Wi-Fi b. Bluetooth c. GPS d. Cellular

A and D. A wi-fi or cellular network can be used to conned with the internet, which allows synchronization of the photos on the phone with the online account

Congratulations! You just bought a new-to-you car, and it comes with a media system that can sync with your iPhone. You're concerned about data usage on your cell phone, so before you go pick up your car, you decide to download the necessary app at home while you're connected to Wi-Fi. What app do you need to download?

Apple CarPlay

You're trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although you tested it successfully yesterday, today the connection is not cooperating. You've closed apps you're not using, and you've checked that the projector and the tablet are working otherwise. Of the following troubleshooting steps, which should you try first? Second? a. Restart the projector. b. Restart the tablet. c. Reinstall the presentation app. d. Verify that you have Internet access on the tablet.

B then A. Since both the tablet and projectors are working, there might be some issue while establishing the connection. The tablet should be restarted first and then if there is still a problem, the projector should be restarted.

While visiting a coffee shop, you see a poster advertising a concert for a music group you'd love to see. You notice there's an NFC tag at the bottom with additional information about the concert. Which of the following devices would likely be able to read the NFC tag? a. GPS b. Smartphone c. E-reader d. VR headset

B, Smartphone

Which of the following mobile device OSs are open source? Choose all that apply. a. iOS b. Windows 10 Mobile c. Chrome OS d. Android

C and D, Chrome OS and Android

Place the following information in the correct fields in Figure 9-65 to add an email account to a smartphone using port 143 for the incoming mail server and port 25 for the outgoing mail server (not all information will be used): imap-mail.sample.com p@ssw0rd pop-mail.sample.com [email protected] smtp-mail.sample.com Mary Jones

In order, Email, Password, Incoming Mail Server, Outgoing Mail server [email protected] p@ssw0rd imap-mail.sample.com smtp-mail.sample.com

You're traveling across the country for a much-anticipated vacation. When you get there, your smartphone seems to be having trouble connecting to the local cellular network. You call the provider, and the technician suggests you update the PRL. Why might this help? Where would you find this option on your Android smartphone to perform the update?

It will update the list of roaming service providers in the area and can be found in settings.

John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cable for his Android smartphone, though it is not quite the same. What type of cable will John need to purchase to replace the iPad's charger cable? a. Lightning b. USB C c. Micro USB d. Mini HDMI

Lightning The lightning cable and lightning port are used to power iPads, iPods, and iPhones. This cable was replaced by USB 3.0 for the iPhone 7 in 2016.

Dillion's company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories. What should Dylan recommend to his company to help track the inventories? a. NFC tags b. Bluetooth receivers c. RFID tags d. 4G tracking receivers

RFID tags use a passive or active tag. This technology is used by many companies as a way to track inventory.

A manager in your company wants to standardize all mobile device applications across different operating systems. Some users have Android mobile devices, some users have iOS devices, and some users have Windows Mobile devices. How can you best answer the manager in regard to his request? a. Some apps will work on different OS platforms, but many will not. b. All mobile apps will run on all mobile operating systems. c. No apps will run on all operating systems. d. The manager must settle on using a single mobile operating system.

Some apps can be used on any OS; however, most will work only on the specific OS they were written for.

Spencer would like to purchase a wearable device that allows him to make phone calls and send text messages. Which type of wearable device should Spencer purchase? a. E-reader b. AR headset c. Fitness monitor d. Smart watch

Spencer should purchase a smart watch. A smart watch will enable Spencer to make phone calls and send text messages.

Which Chromebook security feature ensures that malware can't change the OS's system files? a. Quick updates b. Power washing c. Sandboxing d. Verified boot

Verified boot which checks to see if the files belong to a trusted brand

Your company has recently been hired to install a smart security system for a large office building. The system will include security cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation? a. Wi-Fi because it is always encrypted b. Zigbee because it is always encrypted c. Z-Wave because it is the fastest wireless standard d. Bluetooth because it is easiest to configure

Zigbee because of it is always encrypted

You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this? a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps. b. Buy the apps a second time from your tablet. c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps. d. Call Google support and ask them to merge the two Google accounts into one.

a

Which encryption protocols might be used to secure a VPN connection? Choose all that apply. a. L2TP b. SSH c. PPTP d. IPsec

a, c and d. VPN use PPTP (point-to-point tunneling protocol) and L2TP/IPsec (layer 2 tunneling protocol with IP security) to create a secure and private tunnel to transmit data and often in private networks.

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device? a. Data transmission over limit b. Dim display c. Frozen system d. Touch screen non-responsive

a. Data transmission over limit The leaking of files on a mobile device typically happens in the background, unknown to the user, which can result in excessive data usage

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device. Which of the following is the first step a technician should take in resolving this issue? a. Determine if any other devices are experiencing the same issue. b. Reset the network settings on the wireless router. c. Reset the network settings on the mobile device. d. Back up the data on the device and perform a factory reset.

a. Determine if any other devices are experiencing the same issue.

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware. What should you do? a. Disregard the message and check for a compromised app. b. Go ahead and install the app to clean the device. c. Follow the instructions in the message and verify the app site is legitimate. d. Back up all user data and perform a factory reset.

a. Disregard the message and check for a compromised app. The message is likely trying to get you to install a compromised app.

Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC. What can Bryson synchronize from his iPad to his PC? (Select all that apply.) a. E-books b. Contacts c. Photos d. Music e. Calendar f. Notes g. Location Data

a. E-books b. Contacts c. Photos d. Music e. Calendar f. Notes

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device. What is the next step in the Bluetooth connection process? a. Enter the pin code. b. Discover the device. c. Test the connection. d.Sign in to Bluetooth.

a. Enter the pin code. The next step is to enter the pin. A pin is used so that only the user with the pin can set up the Bluetooth connection.

Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device. What else does Jackson need in order for the thermostat to be considered an IoT? a. IP address b. IoT controller c. IoT bridge d. App to control it over the Internet

a. IP address d. App to control it over the Internet

A customer has several mobile device users who have a habit of misplacing their devices during the workday. Which of the following security methods will most benefit these users? a. Locator applications b. OS updates c. Trusted sources d. Firewalls

a. Locator applications A locator application is used to find a misplaced device, on a map for instance.

You are preparing to give a presentation at a client's location using your mobile device and a large screen TV. You have successfully connected to the company's guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV. Which of the following is the most likely reason for this behavior? a. The mobile device is on a different Wi-Fi network than the TV. b. The large screen TV is connected to the wrong network segment. c. The mobile device does not support display mirroring. d. The brightness control on the large screen TV has been set too low.

a. The mobile device is on a different Wi-Fi network than the TV. Correct. Most likely, the mobile device is on a different network subnet than the TV.

A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next to the desired app launches instead. When the user types a text message, every word in the message is misspelled. What is the most likely cause for this behavior? a. The screen protector is interfering with touch response. b. The device is overheating and causing touch screen failure. c. The device is experiencing high resource usage. d. The device has an unintended Wi-Fi connection.

a. The screen protector is interfering with touch response. A screen protector sheet can interfere with touch response as can a dirty or damp touch screen surface.

Randy is concerned about his company's data security on the Internet. Because cellular signals are not encrypted, he is concerned that the new smartphones given to the sales department will allow a breach. Randy has decided the company needs a more secure way to allow the sales department to connect to the company network over the Internet. What should Randy deploy to allow the sales department to connect to the company network securely over a cellular data signal? a. VPN b. POP3 c. SSH d. IMEI

a. VPN A VPN creates an encrypted path or tunnel between two devices, making it appear to the computers that they are on the same network.

Sally has just purchased a new iPad. She wants to save all the pictures and files that she creates with her new iPad on the Internet. What service should Sally use to save her pictures and files seamlessly on the Internet? a. iCloud b. Google c. OneDrive d. Yahoo

a. iCloud

A smart speaker has no screen or keypad for changing its settings. Order three steps to configure the speaker. a. Connect the smartphone to the speaker's Wi-Fi hotspot. b. Download the speaker's app to a smartphone. c. Enter the password to the home Wi-Fi network. d. Enter the password to the speaker's Wi-Fi hotspot.

b, a, d

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone. What setting can Tracy use on her phone to make sure she is not interrupted during the meeting? a. Silent mode. b. Airplane mode. c. Vibrate mode. d. No setting will prevent interruptions while Tracy is in the meeting.

b. Airplane mode.

A user is complaining that her mobile device is too dim to read when in a dimly lit room. Which of the following actions should you take first? a. Remove the display protector. b. Disable the auto-brightness option. c. Replace the battery. d. Disable unused apps.

b. Disable the auto-brightness option. The auto-brightness control adjusts the display brightness based on ambient light conditions. Turn off this feature to gain more control over the screen's brightness

You work for a company that provides dozens of the same smartphone model for its employees. While troubleshooting one smartphone that won't connect to the cellular network, you call the provider's tech support number for some assistance. The technician asks for the device's IMEI. What is she trying to determine? a. The OS version on the phone b. The specific device you're calling about c. The SIM card installed in the device d. The IP address of the phone on the cellular provider's data network

b. Each IMEI number is unique

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet. ​ What can Dennis do that will allow the children to watch a video on the Internet while in the car? a. Set the tablet to airplane mode. b. Enable a hotspot on his smartphone. c. Enable wireless sharing. d. Tether his phone to the tablet.

b. Enable a hotspot on his smartphone. Correct. Dennis can create a hotspot on his smartphone. The hotspot will establish a wireless network that the tablet can join, which will enable the children to watch the video on the Internet.

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone. Which commercial email provider should Angela use for her new Android phone? a. Microsoft Exchange Online b. Gmail c. iCloud d. Yahoo! Mail

b. Gmail For an Android phone, Angela must set up a Gmail account. All Android phones require a Gmail account in order to use Google apps on the phone and to update Android devices.

Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his needs. He wants it to be connected to his Google account. Which smart speaker would you recommend? a. Echo b. Cortana b. Home d. HomePod

b. Home Home will use Henry's Google account.

A mobile device user is having problems keeping malware off his device. The user is continuously removing offending apps and regularly running a check for OS updates. After a short period of relief, the malware continues to be a problem. Which of the following are the best actions for the user to take? (Select TWO.) a. Jailbreak or root the device. b. Install an anti-malware app. c. Remove unused apps. d. Disable full device encryption. e. Perform a factory reset.

b. Install an anti-malware app. d. Perform a factory reset. Installing an anti-malware app can help to mitigate malware. The most surefire way to eliminate malware is to back up user data and perform a factory reset.

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode. What solution does Apple provide that will help Jennifer recover the passcode for her iOS device? a. Go to iTunes and reset the password. b. Reset the device and restore the data from iCloud or iTunes. c. Answer the two security questions when asked by Siri. d. Call Apple support to reset the password.

b. Reset the device and restore the data from iCloud or iTunes. Because this is a hardware-specific passcode, Jennifer will have to reset her iOS device and restore the device from a backup. Unfortunately, unless Jennifer backed up her data on iCloud, she will have lost all the data that was stored on the iPod.

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files. How can James select what to synchronize from his phone to Google storage? a. Sync app b. Settings app c. Device maintenance d. Connections

b. Settings app In the Settings app, James can navigate to the Google section. There he will navigate to Backups, where he can change what he wants to back up to Google.

Your mobile device appears to be contacting a remote server to upload your personal data. Which of the following should be performed first to protect your personal data? a. Perform a factory reset. b. Switch to airplane mode. c. Install anti-malware software. d. Verify you are on the correct Wi-Fi network.

b. Switch to airplane mode.

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist. Which of the following is the most likely cause for this behavior? a. The firmware is out of date. b. The battery is going bad. c. The charger is defective. d. The AC power outlet is faulty.

b. The battery is going bad. A battery that is going bad will cause its charge to be depleted much quicker than normal. Many times, a failed or failing battery can cause the device to feel hotter than usual.

Is it true or false that most smartphone devices have radio firmware that allows listening to FM radio frequencies? a. False b. True

b. True Most smartphones have radio firmware that allows listening to FM radio frequencies.

Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz RF band. The company also wants the device to be at least 50 meters away from the base station. What type of device should the company purchase? a. Bluetooth b. Z-Wave c. NFC d. Zigbee

b. Z-Wave

An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app? a. Go to backup storage and perform a restore to recover the lost app. b. Purchase the app again. c. Go to the Play Store where you bought the app and install it again. d. Go to the Settings app and perform an application restore.

c

You're at the store to buy a car charger for your dad's iPhone. There are several options with many different types of connectors. Which of these connectors should you choose? a. USB-C b. microUSB c. Lightning d. VGA

c, lightening

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video? a. Wi-Fi connection b. GPS c. Accelerometer d. Internet browser

c. Accelerometer The accelerometer measures movement of a smartphone to allow apps to orient the screen for best viewing options.

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication. Which of the following will best assist you in meeting this requirement? a. Untrusted sources b. Failed login attempts c. Authenticator apps d. Locator applications

c. Authenticator apps An authenticator app can be installed on a mobile device to provide two-factor authentication. The most effective apps utilize TOTP (Time-Based One-Time Password) technology in which a PIN or passcode is provided to the user as the second method of authentication. The PIN has a very short lifespan and becomes invalid if not used within that lifespan.

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks. Which of the following steps should the user take next to resolve this issue? a. Return the device to the manufacturer. b. Delete all user data. c. Check for OS updates. d. Factory reset the device.

c. Check for OS updates. The next step is to check for updates to the OS. If this does not resolve the issue, a data backup and factory reset may be required.

Of the 10 devices shown earlier in Figure 9-46, how many of them are assigned IP addresses? a. Four: two phones, a web server, and a router b. Three: two phones and a web server c. Seven: a thermostat, a router, two phones, two bridges, and a web server d. All 10 are assigned IP addresses.

c. Each device is assigned an IP address, except the Bluetooth door lock and the 2 ZigBee light bulbs. The Bluetooth door lock used Bluetooth to communicate with the mobile. The light bulbs use ZigBee to communicate with the bridges. Therefore, 7 devices out of the 10 shown are assigned with IP addresses.

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls. Which of the following is the most likely reason for the dropped calls? a. The user has exceeded the limit on her data plan. b. The user is connected to an unauthorized Wi-Fi network. c. Malware is interfering with the calls. d. Cellular service is weak in the office building.

c. Malware is interfering with the calls. The device most likely infected with malware while the user was checking her email, and the malware is attempting to eavesdrop on the phone calls.

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets. Which of the following is the first step you will take to resolve this issue? a. Forget all Wi-Fi networks on the mobile device. b. Replace the Bluetooth headset with a new pair. c. Reset the network settings in the mobile device Settings app. d. Update the radio firmware in the mobile device.

c. Reset the network settings in the mobile device Settings app.

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data. Which of the following is the most likely cause for this behavior? a. The anti-malware software is detecting and deleting infected apps. b. The device is performing an OS update. c. The mobile device has malware on it. d.The company has pushed these apps to the device.

c. The mobile device has malware on it. Unexplained apps and notifications are indicators of a malware infection.

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device's cellular service is active and functioning. What is the first thing the user should check? a. The user should contact her cellular provider and ask for an update. c. The user should verify location services is enabled on the smartphone. d. The user should check the smartphone for a weak or dropped Wi-Fi signal. d. The user should check the smartphone's battery for a low charge condition.

c. The user should verify location services is enabled on the smartphone. Location-aware apps rely on location services. This setting should be checked first.

The touch screen on a mobile device is not responding to input. Which of the following is the best step to take to resolve this issue? a. Perform a factory reset on the device. b. Remove and replace the screen. c. Use the Settings app to recalibrate the touch screen. d. Close all unresponsive apps.

c. Use the Settings app to recalibrate the touch screen.

Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange? a. Copy the files to an SD card and move the SD card to each device. b. Drop the files in OneDrive and share notebooks with each other. c. Send a text to each other with the files attached. d. Transfer the files through an AirDrop connection.

d

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset. Which of the following actions should the technician take before starting the reset process? a.Wipe all confidential user data. b. Clear the screen lock properties. c. Disable all unused apps. d. Back up all user data.

d. A factory reset will erase all user data and user-installed apps.

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades. Which of the following is the best action to take to resolve this issue? a. Update the mobile device firmware. b. Adjust the brightness control. c. Reset the device to factory defaults. d. Close or disable all unused running apps.

d. Close or disable all unused running apps. All running apps consume resources, and closing unused apps will free resources and increase performance.

Derek is planning a camping trip and wants to be able to listen to music at the campsite. Derek currently has a smartphone but does not like the sound coming from the speakers. What will help Derek improve the sound coming from his smartphone's speakers while he is at the campsite? a. Create a hot spot. b. Tether to his laptop. c. Use his smartphone speakers; this is the only way Derek can listen to music on his smartphone. d. Connect to a Bluetooth speaker.

d. Connect to a Bluetooth speaker. Derek can connect using a Bluetooth speaker. Most Bluetooth headsets and headphones are common Class 2 devices with a range of 10 meters, or 33 feet.

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device? a. Touch screen nonresponsive b. Dim display c. Frozen system d. Data transmission over limit

d. Data transmission over limit Data transmission exceeding a device's data limit can be the result of unsuspected leaked data. Many times, these leaks occur in the background and eventually lead to reaching your data limit.

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly. What technology is set up on the marketing team's phones? a. Bluetooth b. Hotspot c. Tethering d. NFC

d. NFC Near field communication (NFC) allows a phone to transmit encrypted information for making payments at checkout counters and to share files. The NFC range is around 10 cm, or around 3 inches.

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. What should Sara be concerned about when setting up her IoT lights? a. Short lifespan b. Availability c. Accessibility d. Security

d. Security Security of IoT devices is a concern in terms of hacking of systems and data being used by companies. This is a concern with most IoT devices.

Jordan likes to use his smartphone in his car. He uses it as a navigation device and connects it via Bluetooth to listen to music. He has purchased accessories that allow him to see his smartphone while he is driving. On a very cold day, and after driving for several minutes, Jordan receives a warning from his smartphone that it is overheating and needs to shut down. When he touches his smartphone, it is hot. What might cause Jordan's smartphone to overheat? a. The GPS receiver is causing the smartphone to overheat. b. The screen has been active too long. c. Bluetooth receiver is causing the smartphone to overheat. d. The smartphone is located too close to the car's heat vent.

d. The smartphone is located too close to the car's heat vent. In this scenario, the smartphone is located too close to the heat vent, which is the most common problem. When Jordan's smartphone overheated during normal use, he first needed to check the car's source of heat.

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don't remember sending any of the messages. Which of the following is the reason for this behavior? a. Your device is malfunctioning and sending these messages. b. Someone else is sending text messages and signing your name. c. Your device's touch screen is nonresponsive d. Your device is sending spam messages to your contacts.

d. Your device is sending spam messages to your contacts. Your device is infected with malware that is sending spam messages via your contact list.


Conjuntos de estudio relacionados

Pneumonia Practice NCLEX Questions

View Set

Sparsh Gupta cellular adaptation ,intracellular accumulation

View Set

BIOLOGY: CH. 7 PHOTOSYNTHESIS: USING LIGHT TO MAKE FOOD

View Set