Chapter 26
3. What are the first two things you should try with a device that has an unresponsive touchscreen? (Select two.)
1. Wipe the screen down with a microfiber cloth to remove any fingerprints, dust, dirt, or grease 2. Make sure you aren't accidentally triggering the touch sensor
12. What can cause a device to be unable to decrypt e-mail? (Select two.)
1.The device doesn't have the other user's key to decrypt the e-mail with 2. The e-mail application doesn't support the encryption method used or is misconfigured
9. Which of the following authentication schemes uses three factors?
A door lock requiring a fingerprint scan, a PIN code, and an ID badge
18. Why might you run into connectivity problems at large public gatherings?
An overloaded network
11. What do app scanners do?
Analyze the permissions used by installed applications to highlight security risks
3. In Android, where would you go to force stop an app?
Application manager
9. What hidden menu might exist to help with device calibration?
Calibration menu
13. If used regularly, which of the following gives you the best chance of realizing a Stingray or similar device has been deployed near your company's headquarters?
Cell tower analyzer
10. What is the first step towards preventing unintended wireless connections?
Configure devices not to automatically connect.
11. A mobile device overheats for seemingly no reason. What is the most likely cause?
Defective battery
17. What is one major indicator of a weak cellular signal?
Dropped connections
15. What is the most accurate way to get a device's location?
GPS
30. What is the process in which an organization tracks when its employees enter or exit a predefined area?
Geofencing
4. What is it called when you hold a system's power button for several seconds until it turns completely off?
Hard reboot
8. A client calls and is upset that he's misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail addresses, phone numbers, and, in some cases, credit card information. What is the first thing he should do?
He should access his iCloud account and reset his iPad to erase all personal data
7. What is a good reason to avoid saving user names and passwords for services like corporate e-mail or VPN?
If the device is lost or stolen, whoever holds it can use the device to access and abuse these services.
7. Why is a hard reset the most disruptive reset option?
It removes all of a user's data and settings
13. Modern mobile devices use what type of battery?
Li-Ion
5. What is the first step to managing battery life well?
Make sure the device's battery life exceeds the user's needs to start with.
16. When should you attempt to repair a battery?
Never
After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What's the best next step?
Perform a soft reset and see if the app runs smoothly afterwards.
21. Which term refers to a collection of configuration and security settings that an administrator has created?
Profile
23. What is a last resort you can do if your device is stolen?
Remote wipe
24. What type of authentication is a username and a password?
Single-factor authentication
5. What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device?
Soft reset
1. Because mobile device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issues?
Software
14. Which of the following is not a risk when you root, jailbreak, or unlock a mobile device?
System lockout
19. What might be the result of too many failed login attempts?
System lockout
20. PGP and S/MIME are examples of _______________.
encryption standards
26. Generally, mobile devices do not include a _______________ because they do not have a lot of services listening on open ports.
firewall
6. Factory reset, or reset to factory default, is also known as a _______________.
hard reset
28. Removing OS restrictions on an Apple device is known as _______________.
jailbreaking
10. Most mobile devices have a few _______________ stickers that change color when exposed to water.
liquid contact indicator
29. Removing OS restrictions on an Android device is known as _________________.
rooting
22. Most mobile devices allow the user to set a(n) _______________ by using a password, PIN, pattern, fingerprint, and/or facial recognition to block strangers from accessing the device.
screen lock
6. When a device is exhibiting strange symptoms such as creaks, pops, heat, gaps between the frame and screen, and wobbling when laid on a flat surface, which should you urgently confirm or rule out?
swollen battery
25. Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) _______________ factor.
temporal
12. A hot, sluggish device might use _______________ to protect the device's CPU from heat damage?
thermal throttling
27. Setting up equipment to spoof a carrier's tower and infrastructure is known as _______________.
tower spoofing
4. Your long-lost cousin Eric called to tell you he'd be in the Macy's Thanksgiving Day Parade and asked you to text when his float was on TV. You did, but he didn't get the message until hours later. You ask if his signal was okay, thinking the tall buildings might have interfered, but he insists his phone had three or more bars every time he checked. What might have happened?
The huge crowd may have overloaded the nearby cell towers.
8. What might a dim display mean?
There is a problem with the display panel.
15. What is geofencing used for?
Track smartphones that enter or exit an area
2. When a mobile app is shut down, what might the user lose?
Unsaved data
14. Besides the display, what is a very large battery drain for a mobile device?
Wireless communication