8-B Flashcards

1
Q

What is an app in the context of mobile devices?

A

An installable program that extends the functionality of the mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why must apps be written and compiled for specific mobile operating systems?

A

Because an app written for Apple iOS cannot be directly installed on Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are iOS apps distributed?

A

Via Apple’s App Store, which requires submission and approval by Apple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the ‘walled garden model’ in iOS app distribution?

A

A model designed to prevent the spread of malware or code that could cause faults or crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What programming language is primarily used for developing iOS apps?

A

Swift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What IDE is used for developing Android apps?

A

Android Studio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where can Android apps be downloaded from?

A

Google Play and third-party sites such as Amazon’s app store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of app permissions on mobile devices?

A

To grant apps only the privileges specified by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What account is required to set up an iOS device?

A

An Apple ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of account is required for Android devices?

A

A Google Account or a similar vendor account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is mobile device synchronization?

A

Copying data back and forth between different devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are common types of data that users might synchronize?

A
  • Contacts
  • Calendar items
  • Mail
  • Pictures
  • Music
  • Video
  • Documents
  • Apps
  • Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a contact?

A

A record with fields for name, address, email address(es), phone numbers, notes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What format is widely used for exchanging calendar records?

A

iCalendar format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main sync issue with media files such as photos?

A

The amount of space they take up on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do mobile devices typically connect to email services?

A

Using autodiscover connection settings provided by the email service.

17
Q

What is the difference between IMAP and POP3?

A
  • IMAP: Allows viewing and accessing mail from multiple devices.
  • POP3: Downloads mail to the device, removing it from the server.
18
Q

What is TLS in the context of email configuration?

A

Transport Layer Security, which protects confidential information like account passwords.

19
Q

What does Enterprise Mobility Management (EMM) aim to do?

A

Apply security policies to the use of mobile devices and apps in the enterprise.

20
Q

What are the two main functions of an EMM product suite?

A
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
21
Q

What is the purpose of Mobile Device Management (MDM)?

A

Set device policies for authentication, feature use, and connectivity.

22
Q

What is two-factor authentication (2FA)?

A

A security process that requires two different kinds of credentials to authenticate.

23
Q

Fill in the blank: An app must be written and compiled for a specific _______.

A

[mobile operating system].

24
Q

True or False: Android apps can only be downloaded from the Google Play Store.

25
Q

Which account is typically linked for verification and recovery on mobile devices?

A

A cellphone number or alternative email address.

26
Q

What technology allows a smartphone to interface with a car’s entertainment system?

A

Apple CarPlay and Android Auto.

27
Q

What is the primary use of cached passwords on mobile devices?

A

To securely save passwords for apps and websites.

28
Q

What is required for two-factor authentication (2FA)?

A

Two different kinds of credential, such as a fingerprint and a PIN

Alternatively, an authenticator device or app, a trusted email account, or a registered phone number can be used.

29
Q

What happens after a user authenticates normally in a 2FA process?

A

An email, text, or phone call notification is generated on the trusted authenticator app or device

This message may include a one-time password code for confirmation.

30
Q

What is geolocation?

A

The use of network attributes to identify (or estimate) the physical position of a device

31
Q

What are the two systems that a mobile device location service can use?

A
  • Global Positioning System (GPS)
  • Indoor Positioning System (IPS)
32
Q

How does the Global Positioning System (GPS) determine a device’s location?

A

By determining the device’s latitude and longitude based on information received from orbital satellites via a GPS sensor

33
Q

What does the Indoor Positioning System (IPS) use to determine a device’s location?

A

Triangulating its proximity to other radio sources, such as cellular radio towers, Wi-Fi access points, and Bluetooth/RFID beacons

34
Q

Who can access the location service data stored by a mobile device?

A

Only apps where the user has granted specific permission to use it

35
Q

What additional sensor might some mobile devices be fitted with for accuracy?

A

Magnetometer sensor

36
Q

Why must a vendor account usually be configured on a smartphone?

A

To enable access to vendor-specific applications and services

37
Q

What types of data might require mapping between fields when syncing between applications?

A

User data, application settings, and configuration profiles

38
Q

How do you configure an autodiscover-enabled email provider on a smartphone?

A

By entering the email address and password in the email setup settings

39
Q

What technology can be deployed to prevent policy breaches involving emailing sensitive documents to a smartphone?

A

Mobile Device Management (MDM) solutions