19 Flashcards
Installing mobile apps from websites and app stores other than the official marketplaces is referred to as:
** Sideloading **
The process of installing applications on a device without the use of official software distribution channels
Allowing “Unknown Sources” in Android Security Settings enables:
** Sideloading **
The process of installing applications on a device without the use of official software distribution channels
Which of the following terms refers to a modified mobile device equipped with software features that were not originally designed by the device manufacturer?
Custom firmware
The practice of modifying a mobile device’s operation in such a way that it can be used with any service provider is called:
Carrier unlocking
Mobile device updates delivered over a wireless connection are known as:
** OTA **
Mobile device updates delivered over a wireless connection are typically referred to as “Over-the-Air” (OTA) updates.
Which of the following answers refers to a technology designated as a successor to SMS and MMS?
** RCS **
The technology designated as a successor to SMS and MMS is RCS, which stands for Rich Communication Services. RCS is designed to provide a more feature-rich and interactive messaging experience compared to traditional SMS and MMS messaging.
Which technology enables establishing direct communication links between two USB devices?
** OTG **
OTG, which stands for USB On-The-Go
Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?
Weak passwords
Which technology enables establishing direct communication links between two wireless devices without an intermediary Wireless Access Point (WAP)?
WiFi Direct
A mobile device’s capability to share its Internet connection with other devices is referred to as
Tethering
The term “Mobile hotspot” refers to a type of WLAN that enables network access through a mobile device that acts as a portable WAP.
True
A mobile device deployment model that allows employees to use private mobile devices for accessing company’s restricted data and applications is known as:
** BOYD **
Bring Your Own Device (BYOD)
In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?
** COPE **
corporate-owned, personally-enabled
A mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list is known as:
** CYOD **
choose your own device
In which of the mobile device deployment models a mobile device acts as a terminal for accessing data and applications hosted on a remote server?
** VDI **
Virtual desktop infrastructure (VDI)