Basic Mobile Device Network Connectivity and Application Support Flashcards

1.4 Given a scenario, configure basic mobile-device network connectivity and application support.

1
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does POP stand for?

A

Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IMAP stand for?

A

Internet Mail Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A technician is configuring a mobile client to use email through an ISP. Which port number should they configure to use SMTP?
A. 25 
B. 110
C. 143
D. 995
A

A. 25; SMTP sends mail to the server on TCP port 25. POP3 uses port 110. IMAP4 uses port 143. POP3 uses port 995 securely over SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You need to configure email for a mobile client. Their device has a setting referring to port 587. Which mail protocol is likely using this protocol?
A. SMTP with SSL
B. SMTP with TLS
C. IMAP4 with SSL/TLS 
D. POP3 with SSL/TLS
A

B. SMTP with TLS; SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
An administrator needs to be able to control which apps are installed on the corporate net- work’s mobile devices, and update or delete them and their data as necessary. Which type of service do they need?
A. MAM
B. MDM
C. Location services
D. Device synchronization
A

A. MAM; Mobile application management (MAM) is a service that allows administrators to control corporate software on mobile devices, including updating and wiping apps. Mobile device management (MDM) controls which devices are on the network and can wipe entire devices. Location services does not manage software. Synchronization can back up apps and data but does not help with updates or deleting apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MDM stand for?

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does MAM stand for?

A

Mobile Application Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
You need to synchronize Windows desktop settings between two laptop computers. Which service is designed to do this?
A. Microsoft 365 
B. MAM
C. MDM
D. ActiveSync
A

A. Microsoft 365; Microsoft 365 is able to sync desktop settings between multiple Windows-based computers. ActiveSync is for syncing mobile devices with an Exchange email server. Mobile application management (MAM) and mobile device management (MDM) are for managing apps and network access for mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
You are pairing a Bluetooth headset to a mobile device. On the mobile device, after finding the device for pairing, what is the next step to take?
A. Enable Bluetooth
B. Test connectivity
C. Enter the appropriate PIN code
D. Enable pairing
A

C. Enter the appropriate PIN code; The next step is to enter the PIN code. The steps, in order, are as follows: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the general step for pairing devices via Bluetooth?

A
  1. Enable Bluetooth.
  2. Enable pairing.
  3. Find a device for pairing.
  4. Enter the appropriate PIN code.
  5. Test connectivity.

For purposes of the exam, it’s best to memorize these steps. However, you might have noticed that in the exercises in this chapter (or in real life if you’ve paired your own devices), there are some slight nuances to understand:

  • Usually, the ability to pair is enabled if Bluetooth is enabled.Therefore, step 2 might not be needed, but you might need to initiate pairing.
  • It used to be that one device generated a PIN and you entered it into the other.Today, it’s more common to have both devices display a PIN, and you confirm on both devices that the PIN matches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When configuring an email client, Yahoo recommends IMAP for the the incoming mail. Why would IMAP be preferred?

A

IMAP is a clear choice because of its extensive interaction with the server, allowing the client to change the state or location of a mail item on the server without the need to download and delete it from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What tool replaced ActiveSync?
A. iSync
B. MS Mobile Wizard
C. Windows Mobile Device Center
D. Office 365
A

C. Windows Mobile Device Center; starting with Windows Vista, ActiveSync has been replaced with the Windows Mobile Device Center, which is included as part of the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following makes it possible for a mobile device to use a time-based one-time password (TOTP) algorithm with a site or system that requires such authentication?
A. Hardware security modules
B. Non-transitive trust
C. Authenticator applications
D. In-plane switching
A

C. Authenticator applications; authenticator applications, such as Google Authenticator, make it possible for a mobile device to use a time-based one-time password (TOTP) algorithm with a site or system that requires such authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following will you not need to set up corporate email?
A. FQDN of your SMTP server
B. IP address of your SMTP server
C. FQDN of your POP3 server or IMAP server
D. Port numbers used for both server types

A

B. IP address of your SMTP server;

You will need the following information to complete this setup:

• The FQDN of your POP3 server or IMAP server (this server receives the emails sent to you,
so it’s sometimes called incoming)

  • The FQDN of your SMTP server (this server sends your email to the recipient’s email server, so it’s sometimes called outgoing)
  • The port numbers used for both server types
  • The security type used (if any)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is not an example of two-factor authentication?
A. Smartcard and password
B. Smartcard and iris scan
C. Password and PIN
D. Voice recognition and password
A

C. Password and PIN; it is important to understand that using two or more of the same type of factors (such as a password and a PIN, both something you know) is not multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following uses satellite information to plot the global location of an object and
uses that information to plot the route to a second location?
A. GPS
B. Geofencing
C. Remote wipe
D. Local wipe

A

A. GPS; A global positioning system (GPS) uses satellite information to plot the global location of an object and uses that information to plot the route to a second location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does GPS stand for?

A

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following provides centralized device management for company-issued and
personal mobile devices? 
A. MDM
B. DFS
C. PCM
D. PS/2
A

A. MDM; Mobile device management (MDM) policies can be created in Active Directory, or they can be implemented through MDM software. This software allows you to exert control over the mobile devices, even those you do not own if they have the software installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which is the most common PIN code when selecting discovered Bluetooth devices? 
A. 0000
B. 5555 
C. 1111 
D. 0135
A

A. 0000; Many external devices will ask for a PIN when you select the external device from the list of discovered devices. In many cases, the PIN is 0000, but you should check the manual for the external device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
When setting up POP3, which of the following port numbers should you enter? 
A. 25
B. 53 
C. 110 
D. 443
A

C. 110; POP3 uses port 110 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which of the following is the use of physical factors of authentication?
A. Mutual authentication
B. SSO
C. Multifactor authentication
D. Biometrics
A

D. Biometrics; Most mobile devices now offer the option to incorporate biometrics as an authentication mechanism. The two most common implementations of this use fingerprint or facial scans or facial recognition technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
You have enabled the GPS service in your tablet. What is the minimum number of GPS satellites your tablet needs to be in contact with to determine its location? 
A. One
B. Two
C. Three
D. Four
A

D. Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose all that apply.)
A. Office documents
B. Contacts
C. Operating system files
D. Calendar
E. Configuration settings
F. Apps
A

A,B,D,E,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
Which of the following location services typically provides the best accuracy when detecting a user’s location? 
A. Cellular
B. GPS
C. MAM
D. MDM
A

B. GPS; GPS is generally more accurate than cellular when determining location. MAM and MDM are mobile device management concepts, not location services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following statements about configuring email access on a mobile device is true?
A. Most Internet mail services offer an Exchange option.
B. The TCP ports used for configuring access are usually standard port numbers.
C. Most ports used for access are UDP ports.
D. You must download third-party apps for connecting to email services.

A

B. The TCP ports used for configuring access are usually standard port numbers; Mail access uses standard secure or unsecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following are disabled on an Android device when airplane mode is switched
on? (Choose all that apply.)
A. Cellular
B. Wi-Fi
C. Bluetooth
D. Settings app
E. Lock screen
A

A,B,C; On an Android phone, airplane mode disables all radio communications, including cellular, Wi-Fi, and Bluetooth (and NFC as well). It does not affect the opening of any other apps or the lock screen. In recent versions of iOS, Bluetooth is not affected by airplane mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.)
A. Cellular 
B. Bluetooth 
C. Wi-Fi
D. USB
E. Tethering
A

A, C, D; Three common connection types for synchronization to a desktop (or laptop) are cellular, Wi-Fi, and USB. Bluetooth is not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
You connect two Bluetooth devices together that have been previously connected. What is the process called that each device uses to verify the other’s identity?
A. MAM
B. Synchronization
C. Mutual authentication
D. Pairing
A

C. Mutual Authentication; The devices verify each other’s identity via mutual authentication. Pairing is done for the initial connection. MAM is mobile application management. Synchronization is used between a mobile device and a desktop/laptop or the cloud.

30
Q

Which of the following most accurately describes what a PRL is?
A. The list of cell phone towers a mobile device should connect with while roaming
B. The description of the user and mobile network
C. The mobile carrier code
D. The configuration settings of the network the mobile device is on

A

A. The list of cell phone towers a mobile device should connect with while roaming; The preferred roaming list (PRL) is the list of cell towers a mobile device should connect to while roaming. It is not a description of the user and network, a carrier code, or the con- figuration settings of the network.

31
Q

What does PRL stand for?

A

Preferred Roaming List

32
Q

A network administrator wants to be able to remotely wipe everything off of corporate
smartphones if they are lost or stolen. What type of service do they need?
A. MAM
B. MDM
C. Two-factor authentication
D. Location services

A

B. MDM; Mobile device management (MDM) is a type of service that allows network administra- tors to specify which mobile devices can join the network. It also gives administrators the ability to remotely lock and completely wipe mobile devices. Mobile application management (MAM) lets an administrator control the corporate apps on a mobile device. Two-factor authentication is a security concept. Location services can help find a mobile device, but not remotely wipe it.

33
Q

A user needs to synchronize their iPhone to another platform. Which two options are the
default ones for them to choose? (Choose two.)
A. Google Drive
B. SharePoint
C. iCloud
D. iTunes

A

C, D; Apple devices natively sync with iCloud and iTunes. Android devices sync with Google Drive. SharePoint is a Microsoft service that can be used to share files.

34
Q
A mobile user is having cellular connectivity problems when roaming but not when near their home. They are told by their carrier that they need to update their settings. Which of the following settings do they most likely need to update?
A. PRI
B. PRL
C. Baseband 
D. IMEI
A

B. PRL; When roaming, the mobile device uses the preferred roaming list (PRL) to connect to the proper cell phone tower. The product release instruction (PRI) contains settings for configu- ration items on the device that are specific to the network that it’s on. Baseband refers to all wireless communications. The international mobile equipment identity (IMEI) is a 15-digit serial number that is unique to each phone and is not relevant to this issue.

35
Q

Explain how to establish Wi-Fi connectivity on an Apple iPhone.

A
36
Q

Which are the four prevalent commercial email servers?

A
  • iCloud
  • Google/Inbox (Gmail)
  • Exchange Online
  • Yahoo Mail
37
Q
A mobile device is having intermittent communications issues. Which software component of a mobile phone is most likely responsible for these issues?
A. Either iOS or Android OS
B. SIM OS
C. Baseband OS
D. Wireless OS
A

C. Baseband OS; Each mobile phone has a separate processor that manages wireless communications, also known as radio communications or baseband communications. There is a baseband OS that manages this, and it works with the primary OS on the phone. A SIM OS is for managing data transfers between the phone and the SIM chip. There is no wireless OS.

38
Q
Which type of network connection is least likely to be found on a tablet computer?
A. Wi-Fi
B. Bluetooth 
C. RJ-45
D. Cellular
A

C. RJ-45

39
Q
After enabling your device for communication using the IEEE 802.15.1 standard, what is the next step?
A. Enter the PIN code
B. Find a device for pairing
C. Enable pairing
D. Open port 802.15.1.
A

C. Enable pairing

40
Q

You’ve enabled Bluetooth on your new headset and your laptop and enabled pairing on both. They have discovered each other, so what is the typical next step?
A. Pressing and holding a Bluetooth button
B. Entering the Bluetooth password
C. Entering the Bluetooth PIN code
D. Exiting out of any running Bluetooth applications

A

C. Entering the Bluetooth PIN code;

41
Q
You’re configuring private email on a coworker’s cell phone. They want to make sure all of their mail will be only on their phone. Which mail protocol keeps all emails stored on a single device and can only be accessed from one device?
A. IMAP 
B. SMTP 
C. POP3 
D. S/MIME
A

D. S/MIME

42
Q
You’re configuring company email on a coworker’s phone. The company needs to keep a copy of every email on their server, even after it’s accessed by the user. Which mail protocol keeps all emails stored on the server, allowing messages to be synchronized between mul- tiple devices?
A. IMAP 
B. SMTP 
C. POP3 
D. S/MIME
A

A. IMAP;

43
Q

What service is built into Apple-developed devices and permits users and subscribers to store
documents, media, and contact information off their devices?
A. iStore
B. OneDrive
C. iCloud
D. CloudOnline

A

C. iCloud;

44
Q
What is the hosted messaging version of Microsoft’s Exchange mail server that saves cus-
tomers email off-site?
A. Google Inbox
B. Exchange Online
C. iExchange
D. On-Prem Exchange
A

B. Exchange Online

45
Q
What configuration settings are commonly used when setting up email from an online pro-
vider on a device?
A. Active Directory domain name
B. Port and TLS settings
C. Email server name
D. Username and password
A

D. Username and password

46
Q
Which number that is a part of the GSM system is hard-coded into the phone and identifies your physical phone hardware to the cellular tower?
A. PRI 
B. IMSI 
C. IMEI 
D. MAC
A

C. IMEI

47
Q
A user is traveling to a country that employs content blocking technology on the cellular net- work. What would you suggest setting up to bypass the content blocking as well as keep the user’s mobile browsing more private?
A. S/MIME 
B. PRL
C. Baseband 
D. VPN
A

D. VPN

48
Q
What best practice can save someone from losing the data such as calendar entries and con- tacts on their mobile device if the device is lost?
A. Synchronization 
B. VPN
C. Encryption
D. Updating
A

A. Synchronization

49
Q

A user wants a list of favorite websites to be readily available between multiple devices, including their mobile device. What is the best option?
A. Email weblinks to self
B. Send links to a URL shortening service
C. Synchronize bookmarks
D. Print web URLs to carry

A

C. Synchronize bookmarks

50
Q

When two parents wish to share appointment dates and times between devices, what is their
best option?
A. Synchronizing calendars
B. Sharing calendar passwords
C. Texting calendar data to each other
D. Emailing calendar invites to each other

A

A. Synchronizing calendars

51
Q
What Windows app is used to synchronize data between a user’s mobile devices like smart- phones and their desktop computers?
A. MSync
B. ActiveSync 
C. SyncTime 
D. Timewarp
A

B. ActiveSync

52
Q
What technology lets you minimize how often a user must log in for multiple services? 
A. SSO
B. SMTP
C. Synchronization 
D. Nonrepudiation
A

A. SSO;

53
Q
You’re installing Bluetooth speakers in a conference room and just entered the pin to connect
the two devices. What is your next step?
A. Enable pairing
B. Search for the Bluetooth device
C. Enable Bluetooth
D. Test connectivity
A

D. Test connectivity

54
Q
The owner of a company that solely provides transportation from the airport to various hotels wants to employ a software that will tell them where every vehicle is at all times. All of the vehicles use satellite-based navigation systems. What technology is most likely being used to track where they are?
A. Global Positioning System (GPS)
B. Mobile Device Management (MDM)
C. Cellular location services
D. Mobile Application Management (MAM)
A

A. Global Positioning System (GPS)

55
Q
You’re going hiking this weekend in unfamiliar territory and have installed an application on your phone that shows you where you are on the map in relation to the trails and surround- ing areas. What two types of location technology might this app use? (Choose two.)
A. GPS
B. MDM
C. Cellular location services
D. RFID
A

A, C;

56
Q

You’re at home binging on a popular Internet movie service and suddenly notice that the spinning wheel is showing up often, taking more time to download the movie than normal. What is likely the problem?
A. Your router needs to be reset.
B. You have reached your data cap.
C. Your laptop is overheating.
D. The service is overwhelmed with requests.

A

B. You have reached your data cap.

57
Q
The executives at your company are concerned about employees using their personal devices for work. They worry that someone may leave and take proprietary information with them. You calm their fears by telling them that there are settings in place that protect company data that is accessed by employees. What are those settings called? (Choose two.)
A. MDM 
B. MAM 
C. GSM 
D. CDMA
A

A, B

58
Q

Which of the following is not a type of two-factor authentication?
A. Sending an access code via text message
B. Using an authenticator application
C. Needing a password and physical security key
D. Needing a username and password

A

D. Needing a username and password

59
Q
Which cellular communication technology is known as Long-Term Evolution (LTE)? 
A. 2G
B. 3G 
C. 4G 
D. 5G
A

C. 4G

60
Q

Your client is frustrated that their Bluetooth earpiece that was working yesterday is no
longer working, and they’ve asked for your help. What is the likely source of the problem?
A. The earpiece has paired to a different device
B. The earpiece is broken
C. The Wi-Fi signal is weak
D. Bluetooth connectivity was lost

A

D. Bluetooth connectivity was lost;

61
Q

Which type of incoming e-mail server will allow the status of e-mails to be the same across all devices that access the e-mail?

A

IMAP

62
Q

What is the process called where data from a mobile device, that includes pictures, music, and contacts, are uploaded to a computer or online cloud account?

A

Synchronization

63
Q

Which wireless technology allows a computer to communicate with other wireless devices that may include a mouse, keyboard or printer; using the least amount of power consumption?

A

Bluetooth

64
Q

What does the initials MDM denote?

A

Mobile Device Management

65
Q

Which feature of a mobile device allows the physical location of the mobile device to be tracked?

A

The Global Positioning Systems (GPS) feature

66
Q

Which type of mobile device synchronization must be manually initiated?

A

pull synchronization

67
Q

What does the initials MAM denote, in regards to mobile devices?

A

Mobile Application Management

68
Q

Which type of mobile device synchronization occurs automatically?

A

push synchronization

69
Q

What does the initials BYOD denote?

A

Bring Your Own Device

70
Q

In relation to mobile networks, what does CDMA denote?

A

Code-division Multiple Access