Exam #9

Ace your homework & exams now with Quizwiz!

SMTP uses TCP port __________.

25

What is the screen size for a typical tablet?

7 to 12.9 inches

Mobile devices connect to the outside world through the cellular networks or through various _____________ WiFi standards

802.11

Secure IMAP4 uses TCP port _______________.

993

Which identifier represents the unique 15-digit number of a mobile device?

IMEI

A(n) ____________ number can be used to unlock a phone.

IMSI

Which term refers to a collection of configuration and security settings that an administrator has created?

Profile

What is the name of Apple's virtual assistant?

Siri

What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device?

Soft reset

Tablets generally lack _______.

cellular data connection

The ________ feature enables smartphones to receive broadcasts from national emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States.

emergency notification

Factory reset, or reset to factory default, is also known as a(n) ________________.

hard reset

Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) _______________ factor.

temporal

POP3 uses TCP port _________

110

IMAP4 uses TCP port _______________.

143

Secure SMTP uses TCP port _______________.

465

What is the screen size for a typical smartphone?

5 inches

Generally, mobile devices have two types of radios: _______________.

802.11 and Bluetooth

What hidden menu might exist to help with device calibration?

Diagnostics menu

What is one major indicator of a weak cellular signal?

Dropped connections

What type of screen technology does the Apple iPad use?

In-Plane Switching (IPS)

What is it called when you hold a system's power button down for several seconds until it turns completely off?

Hard reboot

Which identifier is a number that is tied to the user's account with the carrier and is included with a mobile device's SIM?

IMSI

Why is a hard reset the most disruptive reset option?

It removes all of a user's data and settings.

Modern mobile devices use what type of battery?

Li-Ion

The ________________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot locate it's home carrier's network.

Preferred Roaming List (PRL)

What is a last resort you can do if your device is stolen?

Remote wipe

Which standard is used to configure digital signature settings for e-mail and contacts from the corporate address book, depending on how the corporate e-mail server is set up?

S/MIME

The most common way to connect to a Wi-Fi network is through the ____________ app.

Settings

What type of authentication is a username and a password?

Single-factor authentication

Generally, mobile devices do not include a(n) _______________ because they do not have a lot of services listening on open ports.

firewall

Swiping and pinching are graphical user interface (GUI) _____________.

gestures

The stereotypical e-reader uses a low-power _______________ screen technology called e-paper.

grayscale

Removing OS restrictions on an Apple device is known as _______________.

jailbreaking

Infrared Data Association (IrDA) requires ____________, meaning that devices have to be directly facing each other, requires very short distances (sometimes inches) between devices, and has very slow data rates.

line of sight

Most mobile devices have a few __________ stickers that change color when exposed to water.

liquid contact indicator

Users rely on _______________ to conveniently find things near them, such as stores and restaurants, or to determine when your Uber driver will show up.

location services

Removing OS restrictions on an Android device is known as _______________.

rooting

Most mobile devices allow the user to set a(n) _______________ by using a password, PIN, pattern, fingerprint, and/or facial recognition to block strangers from accessing the device.

screen lock

What term refers to the process of using an active authenticated session to log in to other accounts such as Google, Apple ID, Facebook, and Twitter?

single sign-on (SSO)

A hot, sluggish device might use ________ to protect the device's CPU from heat damage?

thermal throttling

Setting up equipment to spoof a carrier's tower and infrastructure is known as ______________.

tower spoofing

In Android, where would you go to force stop an app?

Application manager

What is the name of Microsoft's virtual assistant?

Cortana

A mobile device overheats for seemingly no reason. What is most likely the cause?

Defective battery

Why might you run into connectivity problems at large public gatherings?

An overloaded network

What is a Microsoft protocol used to synchronize Microsoft Exchange e-mail, contacts, and calendars that has become widely used across a range of mobile OS platforms and hardware vendors, including Apple and Android devices?

Exchange ActiveSync (EAS)

What is the most accurate way to get a device's location?

GPS

What is the process in which an organization tracks when it's employees enter or exit a predefined area?

Geofencing

When should you attempt to repair a battery?

Never

Because mobile device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issues?

Software

What might be the result of too many failed login attempts?

System lockout

An SSL-based VPN uses the standard SSL port, _______________.

TCP 443

What was one of the earliest types of mobile devices?

The personal digital assistant (PDA)

What might a dim display mean?

There is a problem with the display panel.

What type of screen technology do the less expensive portable devices and desktop monitors use?

Twisted nematic (TN)

When a mobile app is shut down, what might the user lose?

Unsaved data

Besides the display, what is a very large battery drain for a mobile device?

Wireless communication

One of the most common fitness tracker features is counting your steps using a(n) ____________________.

accelerometer

PGP an S/MIME are examples of ______________.

encryption standards


Related study sets

Final Exam- Dr. Joey Choi LSUS- FIN701

View Set

Chapter 2 Chemistry Comes to Life

View Set

FN - Unit 2 - Chapter 17: Outcome Identification and Planning

View Set

Week 3: Chapter 4: Hazards, Risk & Control

View Set