ITSP 134 Chapter 18 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Smartphones have become items that people carry everywhere, all the time, so it has become necessary for organizations to address them as it relates to organizational security and data protection. Which term refers to users using one's own devices for work activities?

BYOD

Troubleshooting is of the process of applying logic and skills to quickly narrow down the solution to a particular issue or problem. Which of the following is a set of issues revolving around dropped or network connections due to a weak signal?

Baseband update

Brandon is assisting an internal employee with their mobile device. Upon further diagnosing, Brandon can see that the mobile device is currently not opening one of the company's applications. To further assist Brandon will begin to do some troubleshooting. Which of the following choices is not a form of troubleshooting?

Charging the device with 100% battery life

Hardware and software are supported for long periods of time by the creating organization. However, vendors may eventually discontinue modifications or replacement parts. Which of the following refers to a device aging out of the vendor's updates?

EOL

Understanding the capabilities of any device is an important component of an administrator's duties and knowledge base. When creating applications for any mobile device, testing them ahead of time is important. Which of the following is a tool for using a virtual device to test a mobile app?

Emulator

Samuel is using an older Android device for his advisor role. Upon being requested to update his Android OS to the latest model, Samuel notices there is no option to update under System Update in the Settings application. Which of the following would his device be labeled as?

End-Of-Life (EOL)

Devices malfunction on a regular basis and can require some level of intervention to return to working order. Administrators need to understand the various types of potential fixes that can be put in place to ensure devices are back in working order as soon as possible. Which of the following is a last resort solution to return a device to working order and involves erasing all data and resetting the device to its default state?

Factory reset

Understanding the tools and techniques for protecting a device or a network is an important knowledge base for any administrator. There are a number of security measures that can be employed to accomplish device and data protection. Which of the following is a tool that controls which apps or services can use network connections?

Firewalls

With mobile devices being used so much in society, the difference between work and personal activities and devices can sometimes be difficult to completely distinguish. Protecting those devices becomes an important activity for any organization. What is a style of encryption that encrypts all of the data stored on a device?

Full device

Diagnosis of various malware on a system is important because the sooner that the offending application can be identified, the more that any damage or continuing effects on an organization can be limited. Which of the following is a symptom of malware at work on a device?

High number of ads

Luis is troubleshooting a BYOD (bring your own device) for an internal employee. On further review within their iOS device, Luis notices a bootlegged application has been installed onto the device causing software harm to the employee's device. Which of the following has allowed the user to install the illegal application onto their iOS device and has now violated BYOD policies?

Jailbreaking

A system administrator is selecting an operating system for use by the company's research and development team. The team requires an OS that can be easily modified and changed to meet its requirements. Which of the following operating systems will be the best choice for the users?

Linux

Seeing various issues with a device, an administrator becomes more knowledgeable about common problems and solutions. As such, when certain conditions are met, the likelihood that a problem is something that has been seen before becomes greater. Being able to quickly and efficiently diagnose and resolve those issues is important. Which of the following has symptoms of short battery life or power drain?

Malware

Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications. Which of the following is the process in which she can set up her secure corporate data and apps?

Mobile Device Management (MDM)

As mobile devices continue to evolve and to be able to accomplish organization objectives, their use continues to grow in all situations. Knowing how to control access to those devices is an important tool for administrators to be able to work with. Which of the following is a method for controlling access to the mobile device?

Pin code

Michael is going through onboarding for his new position as a supervisor. While setting up his new corporate-owned device, he would like to make sure that all his data is not only backed up through Google, but also through the company's cloud storage. Which of the following would allow him to back up the device's data to the company's cloud storage?

Remote Backup Application

Developing new applications and apps for mobile devices and many other categories of devices is a growing field of expertise for many application developers. As such, there are application development tools that have been created to help to standardize development projects across various languages and ecosystems. Which tool is used to create a new application for various hardware devices?

SDK

Organizations play an important role in setting the rules and procedures for how their devices and data will be used by employees, vendors, customers, and leadership. This ensures that company resources are protected from theft but that they are also protected legally. Which of the following is a set of policies and procedures that restrict how a user can access, create and edit the organization's resources?

Security profile

Scott has been asked to factory reset his old corporate-owned Android device. Upon opening the settings application, Scott is greeted with several options and paths. Which of the following paths would he need to take in order to erase all the data from his device?

System > Advanced > Reset options > Erase all data

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a "Permission denied" message is displayed. What is the most likely reason for this message?

The command needs to be preceded by sudo.

It can provide a great amount of benefit for any organization to be aware of the types of origins of applications and be able to verify that they are legitimate. A type of site has evolved for mobile devices to download and use verified applications. This gives an organization confidence that the applications, their devices are employing, are safe. Which of the following is a safe site for downloading apps to use on a company or personal device?

Trusted sources

A Mac user wants to update macOS and is searching Apple.com to locate update files. How are macOS updates typically obtained?

Updates are found in the App Store.

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac. Which of the following tools will the technician use to perform this task?

macOS Recovery


Set pelajaran terkait

Accounting 3 chapter 13 True or False

View Set

Vocabulary -- What is Psychology?

View Set

Ch. 20: Assessment of the Normal Newborn

View Set

Physical Science Chapter 4, 5, 6, 7 Review

View Set