Exam #9
SMTP uses TCP port __________.
25
What is the screen size for a typical tablet?
7 to 12.9 inches
Mobile devices connect to the outside world through the cellular networks or through various _____________ WiFi standards
802.11
Secure IMAP4 uses TCP port _______________.
993
Which identifier represents the unique 15-digit number of a mobile device?
IMEI
A(n) ____________ number can be used to unlock a phone.
IMSI
Which term refers to a collection of configuration and security settings that an administrator has created?
Profile
What is the name of Apple's virtual assistant?
Siri
What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device?
Soft reset
Tablets generally lack _______.
cellular data connection
The ________ feature enables smartphones to receive broadcasts from national emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States.
emergency notification
Factory reset, or reset to factory default, is also known as a(n) ________________.
hard reset
Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) _______________ factor.
temporal
POP3 uses TCP port _________
110
IMAP4 uses TCP port _______________.
143
Secure SMTP uses TCP port _______________.
465
What is the screen size for a typical smartphone?
5 inches
Generally, mobile devices have two types of radios: _______________.
802.11 and Bluetooth
What hidden menu might exist to help with device calibration?
Diagnostics menu
What is one major indicator of a weak cellular signal?
Dropped connections
What type of screen technology does the Apple iPad use?
In-Plane Switching (IPS)
What is it called when you hold a system's power button down for several seconds until it turns completely off?
Hard reboot
Which identifier is a number that is tied to the user's account with the carrier and is included with a mobile device's SIM?
IMSI
Why is a hard reset the most disruptive reset option?
It removes all of a user's data and settings.
Modern mobile devices use what type of battery?
Li-Ion
The ________________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot locate it's home carrier's network.
Preferred Roaming List (PRL)
What is a last resort you can do if your device is stolen?
Remote wipe
Which standard is used to configure digital signature settings for e-mail and contacts from the corporate address book, depending on how the corporate e-mail server is set up?
S/MIME
The most common way to connect to a Wi-Fi network is through the ____________ app.
Settings
What type of authentication is a username and a password?
Single-factor authentication
Generally, mobile devices do not include a(n) _______________ because they do not have a lot of services listening on open ports.
firewall
Swiping and pinching are graphical user interface (GUI) _____________.
gestures
The stereotypical e-reader uses a low-power _______________ screen technology called e-paper.
grayscale
Removing OS restrictions on an Apple device is known as _______________.
jailbreaking
Infrared Data Association (IrDA) requires ____________, meaning that devices have to be directly facing each other, requires very short distances (sometimes inches) between devices, and has very slow data rates.
line of sight
Most mobile devices have a few __________ stickers that change color when exposed to water.
liquid contact indicator
Users rely on _______________ to conveniently find things near them, such as stores and restaurants, or to determine when your Uber driver will show up.
location services
Removing OS restrictions on an Android device is known as _______________.
rooting
Most mobile devices allow the user to set a(n) _______________ by using a password, PIN, pattern, fingerprint, and/or facial recognition to block strangers from accessing the device.
screen lock
What term refers to the process of using an active authenticated session to log in to other accounts such as Google, Apple ID, Facebook, and Twitter?
single sign-on (SSO)
A hot, sluggish device might use ________ to protect the device's CPU from heat damage?
thermal throttling
Setting up equipment to spoof a carrier's tower and infrastructure is known as ______________.
tower spoofing
In Android, where would you go to force stop an app?
Application manager
What is the name of Microsoft's virtual assistant?
Cortana
A mobile device overheats for seemingly no reason. What is most likely the cause?
Defective battery
Why might you run into connectivity problems at large public gatherings?
An overloaded network
What is a Microsoft protocol used to synchronize Microsoft Exchange e-mail, contacts, and calendars that has become widely used across a range of mobile OS platforms and hardware vendors, including Apple and Android devices?
Exchange ActiveSync (EAS)
What is the most accurate way to get a device's location?
GPS
What is the process in which an organization tracks when it's employees enter or exit a predefined area?
Geofencing
When should you attempt to repair a battery?
Never
Because mobile device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issues?
Software
What might be the result of too many failed login attempts?
System lockout
An SSL-based VPN uses the standard SSL port, _______________.
TCP 443
What was one of the earliest types of mobile devices?
The personal digital assistant (PDA)
What might a dim display mean?
There is a problem with the display panel.
What type of screen technology do the less expensive portable devices and desktop monitors use?
Twisted nematic (TN)
When a mobile app is shut down, what might the user lose?
Unsaved data
Besides the display, what is a very large battery drain for a mobile device?
Wireless communication
One of the most common fitness tracker features is counting your steps using a(n) ____________________.
accelerometer
PGP an S/MIME are examples of ______________.
encryption standards