1.6 Mobile Networks / Mobile Wireless Configurations Flashcards

Given a scenario, configure basic mobile device network connectivity and application support.

1
Q

How can you disable a phones wireless network?

A

By enabling airplane mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a hot spot?

A

A mobile hotspot is a small device that shares access to cellular technologies such as 3G, 4G, and 4G LTE via Wi-Fi. Most of these devices can be purchased from wireless providers such as Verizon, Sprint, AT&T, T-Mobile, or other carriers, and are usually specific to their type of broadband network. A mobile hotspot is basically a wireless router that routes traffic between Wi-Fi devices and broadband technologies, providing wireless access for up to five to ten devices at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is tethering?

A

Cell phones and tablets can act as portable hot spots. When used in this manner, it is called tethering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is POP3?

A

This is an email configuration. POP 3 is the “Post Office Protocol”. When you check email here, your computer cuts off connection to the server. POP 3 deletes emails on the server as soon as your computer downloads them by DEFAULT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IMAP?

A

This is an email configuration. By default when you check your email here, it copies it to your computer. IMAP keeps the email files so you can see them across multiple devices as the DEFAULT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is airplane mode?

A

A mode for mobile devices that disables all wireless and cellular communication for use on airplanes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you enable Bluetooth on a device?

A

Some devices always have Bluetooth enables because it is their sole communication method. Others, like a computer, may be enabled or disabled in the Network and Sharing center. Mobile devices usually enable Bluetooth within their settings app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you enable pairing?

A

To pair a Bluetooth keyboard with a tablet, enable Bluetooth on the tablet, turn on the Bluetooth device, find the Bluetooth device in the tablet’s settings screen, then enter a PIN code or finalize the pairing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you find a device for pairing?

A

First, enable Bluetooth on your mobile device. Second, power on Bluetooth device to pair. Return to the mobile device to “discover” the Bluetooth device, and then enter the PIN code. Not all Bluetooth pairings require a PIN code, but there is always some kind of pairing action to perform on both devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why a PIN code is needed in Bluetooth device pairing.

A

A PIN code is a pairing action used to pair new devices with your mobile device. A Bluetooth PIN is usually a 4 digit number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the final step in pairing a Bluetooth device?

A

Always remember to test the connectivity between a mobile device and a newly added Bluetooth accessory. If you’ve added a keyboard, open a note taking app and start typing to make sure it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the most commonly used application protocols?

A

World Wide Web (HTTP and HTTPS), E-Mail (POP3, IMAP, and SMTP), Telnet, SSH, FTP/SFTP, Remote Desktop Protocol (RDP), and VoIP (SIP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of IMAP?

A

Incoming e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of POP3?

A

Incoming e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of SMTP?

A

Outgoing e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port does POP3 use?

A

TCP port 110

17
Q

What port does IMAP4 use?

A

TCP port 143

18
Q

What port does SMTP use?

A

TCP port 25

19
Q

What is the SECURE port for POP3?

A

TCP port 995

20
Q

What is the SECURE port for IMAP4?

A

TCP port 993

21
Q

What is the SECURE port for SMTP?

A

TCP port 465 or 587

22
Q

What does S/MIME stand for?

A

S/MIME = Secure/Multipurpose Internet Mail Extensions

23
Q

What is S/MIME used for?

A

S/MIME is used to configure digital signature settings for e-mail, and contacts from the corporate address book, depending on how the corporate e-mail server is set up.

24
Q

Integrated Commercial Provider Email Configuration: iCloud

A

IMAP information for the incoming mail server
Server name: imap.mail.me.com
SSL Required: Yes
If you see an error message when using SSL, try using TLS instead.
Port: 993
Username: This is usually the name part of your iCloud email address (for example, emilyparker, not emilyparker@icloud.com). If your email client can’t connect to iCloud using just the name part of your iCloud email address, try using the full address.
Password: Generate an app-specific password.
SMTP information for the outgoing mail server
Server name: smtp.mail.me.com
SSL Required: Yes
If you see an error message when using SSL, try using TLS or STARTTLS instead.
Port: 587
SMTP Authentication Required: Yes
Username: Your full iCloud email address (for example, emilyparker@icloud.com, not emilyparker)
Password: Use the app-specific password that you generated when you set up the incoming mail server.

25
Q

Integrated Commercial Provider Email Configuration: Google

A
Incoming Mail (IMAP) Server	
imap.gmail.com

Requires SSL: Yes

Port: 993

Outgoing Mail (SMTP) Server	
smtp.gmail.com

Requires SSL: Yes

Requires TLS: Yes (if available)

Requires Authentication: Yes

Port for SSL: 465

Port for TLS/STARTTLS: 587

Full Name or Display Name Your name
Account Name, User name, or Email address Your full email address
Password Your Gmail password

26
Q

Integrated Commercial Provider Email Configuration: Exchange Online

A

Server Settings for Outlook.com

Use eas.outlook.com for incoming server settings.

Note: For Outlook.com IMAP or POP accounts, use imap-mail.outlook.com for IMAP and pop-mail.outlook.com for POP.

Use smtp-mail.outlook.com for outgoing SMTP server settings.

Incoming Port 993 for IMAP or 995 for POP.

Outgoing Port Number 587.

Server Settings for Microsoft 365 for business

Use outlook.office365.com for incoming server settings.

Use smtp.office365.com for outgoing SMTP server settings.

Incoming Port 993 for IMAP or 995 for POP.

Outgoing Port Number 587.

27
Q

Integrated Commercial Provider Email Configuration: Yahoo

A

Incoming Mail (IMAP) Server

Server - imap.mail.yahoo.com
Port - 993
Requires SSL - Yes
Outgoing Mail (SMTP) Server

Server - smtp.mail.yahoo.com
Port - 465 or 587
Requires SSL - Yes
Requires authentication - Yes
Your login info

Email address - Your full email address (name@domain.com)
Password - Your account’s password
Requires authentication - Yes

28
Q

What does PRI and PRL stand for? What do they do?

A

Product Release Instruction (PRI) - Carrier-made updates that modify many complex settings for CDMA devices to ready them for deployment on the
carrier’s network.

Preferred Roaming List (PRL) - A list that is occasionally and automatically updated to a phone’s firmware by the carrier so that the phone will be configured with a particular carrier’s networks and frequencies, in a
priority order, that it should search for when it can’t locate its home carrier network.

29
Q

What is a base-band update?

A

Your phone’s firmware will receive occasional automatic updates to its Preferred Roaming List (PRL) from the carrier; the PRL is a priority-ordered list of the other carrier networks and frequencies it should search for when it can’t locate its home carrier’s network. Updates to this list are sent via your phone’s cellular connection (called base-band updates, or over-the-air
updates) or, in some cases, through firmware updates during normal operating system and firmware upgrades via synchronization.

30
Q

Explain Radio Firmware.

A

Mobile devices use a wide variety of radio technologies to access the Internet, e-mail, and corporate infrastructures. Generally, mobile devices
have two types of radios: 802.11 and Bluetooth. If the device can make calls, it also has some form of cellular radio.

31
Q

Explain the difference between IMEI and IMSI.

A

The International Mobile Equipment Identity (IMEI) number is a 15-digit number used to uniquely identify a mobile device. IMEI numbers are unique to devices using the Global System for Mobile Communications
(GSM) family of technologies, including its present-day descendants: 4G, LTE and LTE-Advanced.

International Mobile Subscriber Identity (IMSI)
number. It is also included on the SIM, but represents the actual user associated with the SIM. This number is not normally accessible from the phone, but is usually available from the carrier, to ensure that stolen phones
are not misused. The IMSI number can also be used to unlock a phone.

32
Q

Explain a VPN.

A

VPNs establish secure connections between a remote client and the corporate infrastructure, or between two
different sites, such as a branch office and the corporate office.

VPNs can use a variety of technologies and protocols. The most popular ways to create a VPN are to use either a combination of the Layer 2 Tunneling Protocol (L2TP) and IPsec or Secure Sockets Layer (SSL)/Transport Layer Security (TLS). When using the L2TP/IPsec method, UDP port 1701 is used and must be opened on packet-filtering devices. In this form of VPN, users connect to the corporate network and can use all of their typical applications, such as their e-mail client, and can map shares and drives as they would if they were actually connected onsite to the corporate infrastructure.