A+1002: CH25 Review Flashcards
Modern mobile devices use what type of Battery?
Ni-Ion
Li-Ion
Ni-CD
Ni-MH
Li-Ion
Removing OS restrictions on an Android device is known as ________?
rooting
unlocking
device spoofing
jailbreaking
rooting
In Android, where would you go to force stop an app?
Application Manager
Battery Settings
Task Manager
Home Screen
Application Manager
What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device?
Soft Reset
Hard Reset
Reboot
App Reset
Soft Reset
A Mobile Device overheats for seemingly no reason. What is the most likely cause?
Low Battery
Defective Battery
HD Video Recording
Auto-Dimming Screen
Defective Battery
When should you attempt to repair a battery?
Never
After the battery is removed
When the device is cool to the touch
When the device is off
Never
Most Mobile devices allow the user to set a _______ by using a Password, PIN, Pattern, Fingerprint, and/or Facial Recognition to block strangers from accessing the device?
Screen Lock
Permissions Policy
Device Reset
Data Cleanup
Screen Lock
Wis one major indicator of a Weak Cellular Signal?
Constant Reboots
High Transfer Speeds
Dropped Connections
Apps Freezing
Dropped Connections
Why is a Hard Reset the most disruptive reset option?
It frees up more internal space
It removes all of a user’s data and settings
It causes battery drain
It closes applications
It removes all of a user’s data and settings
What is a last resort you can do if your device is stolen?
Remote update
Remote email
Remote wipe
Remote restore
Remote wipe
Because Mobile Device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issue?
Battery
Memory
Software
Hardware
Software
Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a ______ factor?
knowledge
ownership
temporal
possession
temporal
Removing OS restrictions on an Apple device is known as _______?
access injection
jailbreaking
device spoofing
rooting
jailbreaking
Setting up equipment to spoof a carrier’s tower and infrastructure is known as _______?
cell tower control
network analysis
tower spoofing
network ghosting
tower spoofing
When mobile app is shut down, what might the user lose?
Saved Data
Unsaved Data
System Settings
Persistent Data
Unsaved Data