Basic Mobile Device Network Connectivity and Application Support Flashcards
1.4 Given a scenario, configure basic mobile-device network connectivity and application support.
What does SMTP stand for?
Simple Mail Transfer Protocol
What does POP stand for?
Post Office Protocol
What does IMAP stand for?
Internet Mail Access Protocol
A technician is configuring a mobile client to use email through an ISP. Which port number should they configure to use SMTP? A. 25 B. 110 C. 143 D. 995
A. 25; SMTP sends mail to the server on TCP port 25. POP3 uses port 110. IMAP4 uses port 143. POP3 uses port 995 securely over SSL or TLS.
You need to configure email for a mobile client. Their device has a setting referring to port 587. Which mail protocol is likely using this protocol? A. SMTP with SSL B. SMTP with TLS C. IMAP4 with SSL/TLS D. POP3 with SSL/TLS
B. SMTP with TLS; SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.
An administrator needs to be able to control which apps are installed on the corporate net- work’s mobile devices, and update or delete them and their data as necessary. Which type of service do they need? A. MAM B. MDM C. Location services D. Device synchronization
A. MAM; Mobile application management (MAM) is a service that allows administrators to control corporate software on mobile devices, including updating and wiping apps. Mobile device management (MDM) controls which devices are on the network and can wipe entire devices. Location services does not manage software. Synchronization can back up apps and data but does not help with updates or deleting apps.
What does MDM stand for?
Mobile Device Management
What does MAM stand for?
Mobile Application Management
You need to synchronize Windows desktop settings between two laptop computers. Which service is designed to do this? A. Microsoft 365 B. MAM C. MDM D. ActiveSync
A. Microsoft 365; Microsoft 365 is able to sync desktop settings between multiple Windows-based computers. ActiveSync is for syncing mobile devices with an Exchange email server. Mobile application management (MAM) and mobile device management (MDM) are for managing apps and network access for mobile devices.
You are pairing a Bluetooth headset to a mobile device. On the mobile device, after finding the device for pairing, what is the next step to take? A. Enable Bluetooth B. Test connectivity C. Enter the appropriate PIN code D. Enable pairing
C. Enter the appropriate PIN code; The next step is to enter the PIN code. The steps, in order, are as follows: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.
What are the general step for pairing devices via Bluetooth?
- Enable Bluetooth.
- Enable pairing.
- Find a device for pairing.
- Enter the appropriate PIN code.
- Test connectivity.
For purposes of the exam, it’s best to memorize these steps. However, you might have noticed that in the exercises in this chapter (or in real life if you’ve paired your own devices), there are some slight nuances to understand:
- Usually, the ability to pair is enabled if Bluetooth is enabled.Therefore, step 2 might not be needed, but you might need to initiate pairing.
- It used to be that one device generated a PIN and you entered it into the other.Today, it’s more common to have both devices display a PIN, and you confirm on both devices that the PIN matches.
When configuring an email client, Yahoo recommends IMAP for the the incoming mail. Why would IMAP be preferred?
IMAP is a clear choice because of its extensive interaction with the server, allowing the client to change the state or location of a mail item on the server without the need to download and delete it from the server.
What tool replaced ActiveSync? A. iSync B. MS Mobile Wizard C. Windows Mobile Device Center D. Office 365
C. Windows Mobile Device Center; starting with Windows Vista, ActiveSync has been replaced with the Windows Mobile Device Center, which is included as part of the operating system.
Which of the following makes it possible for a mobile device to use a time-based one-time password (TOTP) algorithm with a site or system that requires such authentication? A. Hardware security modules B. Non-transitive trust C. Authenticator applications D. In-plane switching
C. Authenticator applications; authenticator applications, such as Google Authenticator, make it possible for a mobile device to use a time-based one-time password (TOTP) algorithm with a site or system that requires such authentication.
Which of the following will you not need to set up corporate email?
A. FQDN of your SMTP server
B. IP address of your SMTP server
C. FQDN of your POP3 server or IMAP server
D. Port numbers used for both server types
B. IP address of your SMTP server;
You will need the following information to complete this setup:
• The FQDN of your POP3 server or IMAP server (this server receives the emails sent to you,
so it’s sometimes called incoming)
- The FQDN of your SMTP server (this server sends your email to the recipient’s email server, so it’s sometimes called outgoing)
- The port numbers used for both server types
- The security type used (if any)
Which of the following is not an example of two-factor authentication? A. Smartcard and password B. Smartcard and iris scan C. Password and PIN D. Voice recognition and password
C. Password and PIN; it is important to understand that using two or more of the same type of factors (such as a password and a PIN, both something you know) is not multi-factor authentication.
Which of the following uses satellite information to plot the global location of an object and
uses that information to plot the route to a second location?
A. GPS
B. Geofencing
C. Remote wipe
D. Local wipe
A. GPS; A global positioning system (GPS) uses satellite information to plot the global location of an object and uses that information to plot the route to a second location.
What does GPS stand for?
Global Positioning System
Which of the following provides centralized device management for company-issued and personal mobile devices? A. MDM B. DFS C. PCM D. PS/2
A. MDM; Mobile device management (MDM) policies can be created in Active Directory, or they can be implemented through MDM software. This software allows you to exert control over the mobile devices, even those you do not own if they have the software installed
Which is the most common PIN code when selecting discovered Bluetooth devices? A. 0000 B. 5555 C. 1111 D. 0135
A. 0000; Many external devices will ask for a PIN when you select the external device from the list of discovered devices. In many cases, the PIN is 0000, but you should check the manual for the external device.
When setting up POP3, which of the following port numbers should you enter? A. 25 B. 53 C. 110 D. 443
C. 110; POP3 uses port 110 by default.
Which of the following is the use of physical factors of authentication? A. Mutual authentication B. SSO C. Multifactor authentication D. Biometrics
D. Biometrics; Most mobile devices now offer the option to incorporate biometrics as an authentication mechanism. The two most common implementations of this use fingerprint or facial scans or facial recognition technology.
You have enabled the GPS service in your tablet. What is the minimum number of GPS satellites your tablet needs to be in contact with to determine its location? A. One B. Two C. Three D. Four
D. Four
Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose all that apply.) A. Office documents B. Contacts C. Operating system files D. Calendar E. Configuration settings F. Apps
A,B,D,E,F
Which of the following location services typically provides the best accuracy when detecting a user’s location? A. Cellular B. GPS C. MAM D. MDM
B. GPS; GPS is generally more accurate than cellular when determining location. MAM and MDM are mobile device management concepts, not location services.
Which of the following statements about configuring email access on a mobile device is true?
A. Most Internet mail services offer an Exchange option.
B. The TCP ports used for configuring access are usually standard port numbers.
C. Most ports used for access are UDP ports.
D. You must download third-party apps for connecting to email services.
B. The TCP ports used for configuring access are usually standard port numbers; Mail access uses standard secure or unsecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.
Which of the following are disabled on an Android device when airplane mode is switched on? (Choose all that apply.) A. Cellular B. Wi-Fi C. Bluetooth D. Settings app E. Lock screen
A,B,C; On an Android phone, airplane mode disables all radio communications, including cellular, Wi-Fi, and Bluetooth (and NFC as well). It does not affect the opening of any other apps or the lock screen. In recent versions of iOS, Bluetooth is not affected by airplane mode.
You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.) A. Cellular B. Bluetooth C. Wi-Fi D. USB E. Tethering
A, C, D; Three common connection types for synchronization to a desktop (or laptop) are cellular, Wi-Fi, and USB. Bluetooth is not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone.