IT110 Chapter 25
A mobile device overheats for seemingly no reason. What is the most likely cause? A. Defective battery B. Auto-dimming screen C. HD video recording D. Low battery
A. Defective battery
What hidden menu might exist to help with device calibration? A. Diagnostics menu B. Device menu C. Touch menu D. Information menu
A. Diagnostics menu
Modern mobile devices use what type of battery? A. Li-Ion B. Ni-CD C. Ni-MH D. Ni-Ion
A. Li-Ion
Because mobile device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issues? A. Software B. Battery C. Memory D. Hardware
A. Software
When a mobile app is shut down, what might the user lose? A. Unsaved data B. Saved data C. Persistent data D. System settings
A. Unsaved data
Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) ________ factor. A. temporal B. ownership C. knowledge D. possession
A. temporal
What is the process in which an organization tracks when its employees enter or exit a predefined area? A. Geoconnecting B. Geofencing C. Geospoofing D. Geotagging
B. Geofencing
What is a last resort you can do if your device is stolen? A. Remote email B. Remote wipe C. Remote restore D. Remote update
B. Remote wipe
Generally, mobile devices do not include a(n) ________ because they do not have a lot of services listening on open ports. A. trusted source B. firewall C. application menu D. settings tab
B. firewall
What is it called when you hold a system's power button for several seconds until it turns completely off? A. Soft reset B. Force quit C. Hard reboot D. Force stop
C. Hard reboot
Why is a hard reset the most disruptive reset option? A. It frees up more internal space. B. It closes applications. C. It removes all of a user's data and settings. D. It causes battery drain.
C. It removes all of a user's data and settings.
Removing OS restrictions on an Apple device is known as ________. A. device spoofing B. rooting C. jailbreaking D. access injection
C. jailbreaking
Which term refers to a collection of configuration and security settings that an administrator has created? A. System group B. eXtensible markup C. BYOD D. Profile
D. Profile
What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device? A. App reset B. Hard reset C. Reboot D. Soft reset
D. Soft reset
What might be the result of too many failed login attempts? A. System reboot B. Application notifications C. Device reconfiguration D. System lockout
D. System lockout