12.5.11 Practice Questions
While traveling in a car, a user who has an unlimited data plan on a smartphone opens a wireless connection to share the internet with other passengers. Which of the following connection types is the user MOST likely using?
> Hotspot Explanation: A mobile device, such as a smartphone, can work as a wireless hotspot to allow others access to the internet. A Near Field Communication (NFC) connection works by bringing two devices within 10 cm (3.9 in) of each other. NFC is impractical for connecting multiple devices. A microUSB connection can connect two devices with a physical cable. A lightning connection requires a physical cable.
A landscaping company's employees receive payment for their services using a credit card reader that physically attaches to an Apple mobile device. Which of the following connection types is being used?
> Lightning Explanation: A lightning connection is used to connect an Apple mobile device to another device using a physical cable or by plugging the second device directly into the lightning connection. A credit card reader can be plugged into a lightning connection to make retail payments. A credit card reader could be wirelessly connected using a Bluetooth connection, but a credit card reader doesn't require a physical connection. A credit card reader could be wirelessly connected using an infrared (IR) connection, but a credit card reader doesn't require a physical connection. Near Field Communication (NFC) enables two electronic devices, one of which is typically a mobile device such as a smartphone, to establish communication by bringing them within 10 cm (3.9 in) of each other. NFC doesn't require a physical connection.
You have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the data to be synchronized, this service uses a process where the cloud service and the client on the mobile device verify each other's security certificates. What is this process called?
> Mutual authentication Explanation: Mutual authentication is a security feature in which a client process must prove its identity to a server, and the server must prove its identity to the client before any application traffic is sent over the client-to-server connection. A hotspot is a physical location where you can obtain wireless internet access using a wireless local area network (WLAN) over a router that is connected to an internet service provider. A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network (when the devices connect using other wireless or wired networks). Tethering is connecting one device to another. In the context of mobile phones and tablet computers, tethering allows the sharing of the internet connection from a phone or tablet with other devices, like laptops.
You currently use the Exchange email client on your desktop PC. You use the Exchange email client to connect to an email server, which utilizes the IMAP and SMTP protocols. You recently purchased an iPad, and you want to configure its Mail app to connect to your email server. Which of the following BEST describes whether you can accomplish this task?
> You can configure the Mail app on an iPad to connect to an email server using the IMAP and SMTP protocols. Explanation: You can configure the Mail app on an iPad to connect to any email server that is reachable over the network using the IMAP, POP3, and SMTP protocols. An iPad also supports server connections that are secured using Secure Sockets Layer (SSL) security. An iPad can also connect to email accounts that are hosted by large service providers, such as Gmail.
Mobile devices can connect to the internet and other devices using a variety of connection types. Drag each connection type on the left to the appropriate description on the right.
Used to obtain wireless internet access using a WLAN. > Hotspot Used to emulate cryptographic smart card functionalities. > NFC Provides mobile devices with access to network resources and software applications on a home network. > Mobile VPN Allows you to share a phone's internet connection with a laptop. > Tethering A wireless technology standard for exchanging data over short distances. > Bluetooth Explanation: The following are the listed mobile device connection types with their appropriate descriptions: - Hotspot - a physical location where you can obtain wireless internet access using a wireless local area network (WLAN) over a router that is connected to an internet service provider. - Tethering - a means for connecting one device to another. In the context of mobile phones and tablet computers, tethering allows the sharing of the internet connection from a phone or tablet with other devices, like laptops. - Mobile VPN - a mechanism that provides mobile devices with access to network resources and software applications on their home network (when the devices connect using other wireless or wired networks). - NFC - a type of connector that is used to emulate cryptographic smart card functionalities for RFID tags or memory cards. - Bluetooth - a wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs). Bluetooth can connect several devices, overcoming the problems of synchronization.
A technician is tasked with adding a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is best for the technician to use?
> S/MIME Explanation: S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that is used to encrypt emails. S/MIME allows the sender to digitally sign and encrypt emails. An encrypted email server encrypts emails between the server and an email client, but the encrypted email server stores the emails in an unencrypted form. A proper certificate must be used to encrypt and decrypt S/MIME emails. POP3 (Post Office Protocol 3) is an email protocol that downloads and deletes emails from an email server. IMAP (Internet Message Access Protocol) is an email protocol that can synchronize emails between multiple email clients on multiple devices. IMEI (International Mobile Equipment Identity) is a number that a manufacturer assigns to a mobile device.
Which of the following protocols can encrypt emails on a mobile device?
> SSL Explanation: SSL, or Secure Sockets Layer, can encrypt emails on a mobile device. IMAP and POP3 are email retrieval protocols. SMTP is the protocol that is used to route emails through the internetwork.
A company is considering providing smartphones to their employees and is investigating the interaction of the phones with iTunes, Google Drive, Dropbox, and OneDrive. Which of the following data synchronization methods is the company considering?
> Synchronization to the cloud Explanation: iTunes, iCloud, Google Drive, Dropbox, and OneDrive can synchronize mobile device data to the cloud. Mutual authentication for multiple services is a way to permit a user to use one set of credentials to authentication to multiple applications and services. There are several connection types that refer to the different connections that support synchronization, including hardwired Ethernet, Wi-Fi, USB, and Cellular. The best connections for synchronization are high-speed and reliable.
You just purchased an iPad tablet device. You want to synchronize your photos, music, email, and contacts from your Windows 11 PC to the device. Which of the following can you use to connect the device to your PC? (Select two.)
> USB cable > Wi-Fi wireless connection Explanation: You can connect an iPad to a Windows 11 PC in the following three ways: - USB cable - Wi-Fi wireless connection - Bluetooth wireless connection An iPad does not support wired Ethernet connections, serial connections, or FireWire connections.
A technician is tasked with configuring a mobile device to connect securely to the company network when the device is used at off-site locations where only internet connectivity is available. Which of the following should the technician configure?
> VPN Explanation: A VPN (virtual private network) creates an encrypted connection over a less secure network, such as the internet. Sometimes called a tunnel, a VPN allows users to access corporate applications and resources. IMAP (Internet Message Access Protocol) is an email protocol that can be used to synchronize email between multiple email clients on multiple devices. Bluetooth is a technology that wirelessly connects two devices in close proximity to each other. Bluetooth is most often used to connect peripheral devices (such as headphones, speakers, mice, and keyboards) to a computing device. A hotspot is created on a mobile phone to supply internet connectivity to multiple devices through the phone's cellular connection.
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter. Which of the following technologies is being used in these phones?
> NFC chips Explanation: Near Field Communication (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments. For example, many point-of-sale devices can read information from NFC chips. NFC chips can also be used in passports. Bluetooth and infrared transmitters are used for exchanging data over short distances, but Bluetooth and infrared transmitters are not focused on making payments using encryption or reading RFID tags. A VPN (virtual private network) focuses on providing mobile devices with access to network resources and software application on a home network.