Chapt 10 Flashcards

1
Q

A friend asks you why she would ever disable cellular data networking. Which of the following is not a valid reason to disable cellular data networking?

A) You have a limited amount of data in your monthly plan.
B) You have access to a reliable Wi-Fi signal.
C) You are about to download an update to your phone.
D) Your phone calls are going out over your carrier’s cellular network.

A

Your phone calls are going out over your carrier’s cellular network.
Whenever you have a reliable Wi‐Fi signal available, which you do not pay for “as you go,” you should feel free to disable your cellular access to data networking. The wireless network is often faster and does not cost you anything to use. If data networking works better when you leave the cellular network available as a fallback, you can choose to disable it only for certain large downloads or disable it completely until the download is complete. Phone calls will continue to be sent over the cellular network. This does not imply that your data is not using an available Wi‐Fi connection. Therefore, unless you are particularly sensitive to the situation or know that data is going out over your cell access, you might not need to disable the cellular data‐networking feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to pair two Bluetooth devices with each other. Which of the following is true regarding Bluetooth pairing?

A) Bluetooth connections support wireless device control but not file transfers.
B) Bluetooth is not yet a fully standardized protocol.
C) Bluetooth connections do not reach as far as Wi-Fi connections.
D) You must reboot the paired devices to complete the connection.

A

Bluetooth connections do not reach as far as Wi-Fi connections.
The range of Bluetooth connections is considered short compared to Wi‐Fi connections. Bluetooth is a fully standardized protocol that supports file transfers using FTP. Rebooting, or even restarting, paired devices is not a requirement for Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technician is configuring a mobile client to use email through an ISP. Which port number should they configure to use SMTP?

25, 110, 143, 995

A
  1. SMTP sends mail to the server on TCP port 25.
    POP3 uses port 110.
    IMAP4 uses port 143.
    POP3 uses port 995 securely over SSL or TLS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port number for SMTP with SSL

A

465

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port number for SMTP with TLS

A

587

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

port number for IMAP with SSL/TLS

A

993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port number for POP with SSL/TLS

A

995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to configure email for a mobile client. Their device has a setting referring to port 587. Which mail protocol is likely using this protocol?

A) SMTP with SSL
B) SMTP with TLS
C) IMAP4 with SSL/TLS
D) POP3 with SSL/TLS

A

SMTP with TLS.
SMTP with TLS uses port 587 by default.
With SSL, SMTP uses port 465.
IMAP4 with SSL/TLS uses port 993,
while POP3 with SSL/TLS uses port 995.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port number 465

A

SMTP with SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port number 587

A

SMTP with TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

port number 993

A

IMAP with SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port number 995

A

POP with SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are enabling email on a mobile client. Which of the following is not a standard integrated commercial provider for email?

A) iCloud
B) Hotmail
C) Yahoo Mail
D) Exchange Online

A

Hotmail.
Four commercial email providers to be familiar with are iCloud, Google/Inbox, Exchange Online, and Yahoo Mail. Hotmail used to be a commercial email provider, but it no longer exists; it’s now part of Outlook.com.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a user wanted to disable Location Services on an iPhone, where would they do that?

A) Settings ➢ Location Services
B) Settings ➢ Communications
C) Settings ➢ Privacy
D) Settings ➢ GPS

A

Settings ➢ Privacy.
In iOS (at least through iOS 15.3.1), Location Services are under Settings ➢ Privacy. There are no Location Services, Communications, or GPS sections directly in Settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A mobile device is having intermittent communications issues. Which software component of a mobile phone is most likely responsible for these issues?

A) Either iOS or Android OS
B) SIM OS
C) Baseband OS
D) Wireless OS

A

Baseband OS.
Each mobile phone has a separate processor that manages wireless communications, also known as radio communications or baseband communications. There is a baseband OS that manages this, and it works with the primary OS on the phone. A SIM OS is for managing data transfers between the phone and the SIM chip. There is no wireless OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator needs to be able to control which apps are installed on the corporate network’s mobile devices, and update or delete them and their data as necessary. Which type of service do they need?

A) MAM
B) MDM
C) Location services
D) Device synchronization

A

MAM.
Mobile application management (MAM) is a service that allows administrators to control corporate software on mobile devices, including updating and wiping apps. Mobile device management (MDM) controls which devices are on the network and can wipe entire devices. Location services does not manage software. Synchronization can back up apps and data but does not help with updates or deleting apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You need to synchronize Windows desktop settings between two laptop computers. Which service is designed to do this?

A) Microsoft 365
B) MAM
C) MDM
D) ActiveSync

A

Microsoft 365.
Microsoft 365 is able to sync desktop settings between multiple Windows‐based computers. ActiveSync is for syncing mobile devices with an Exchange email server. Mobile application management (MAM) and mobile device management (MDM) are for managing apps and network access for mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are pairing a Bluetooth headset to a mobile device. On the mobile device, after finding the device for pairing, what is the next step to take?

A) Enable Bluetooth
B) Test connectivity
C) Enter the appropriate PIN code
D) Enable pairing

A

Enter the appropriate PIN code.
The next step is to enter the PIN code. The steps, in order, are as follows: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose all that apply.)

A) Office documents
B) Contacts
C) Operating system files
D) Calendar
E) Configuration settings
F) Apps

A

Contacts, Calendar and Apps
B, D, F. Contacts, calendar, and apps are commonly synchronized, along with pictures, music, videos, email, bookmarks, documents, location data, social media data, e‐books, and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following location services typically provides the best accuracy when detecting a user’s location?

Cellular, GPS, MAM, MDM

A

GPS.
GPS is generally more accurate than cellular when determining location. MAM and MDM are mobile device management concepts, not location services.

21
Q

Which of the following statements about configuring email access on a mobile device is true?

A) Most Internet mail services offer an Exchange option.
B) The TCP ports used for configuring access are usually standard port numbers.
C) Most ports used for access are UDP ports.
D) You must download third-party apps for connecting to email services.

A

B The TCP ports used for configuring access are usually standard port numbers.

Mail access uses standard secure or unsecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.

22
Q

Which of the following are disabled on an Android device when airplane mode is switched on? (Choose all that apply.)

A) Cellular
B) Wi-Fi
C) Bluetooth
D) Settings app
E) Lock screen

A

Cellular, Wi-Fi, Bluetooth
A, B, C. On an Android phone, airplane mode disables all radio communications, including cellular, Wi‐Fi, and Bluetooth (and NFC as well). It does not affect the opening of any other apps or the lock screen. In recent versions of iOS, Bluetooth is not affected by airplane mode.

23
Q

You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.)

A) Cellular
B) Bluetooth
C) Wi-Fi
D) USB
E) Tethering

A

Cellular, Wi-Fi, USB
A, C, D. Three common connection types for synchronization to a desktop (or laptop) are cellular, Wi‐Fi, and USB. Bluetooth is not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone.

24
Q

You connect two Bluetooth devices together that have been previously connected. What is the process called that each device uses to verify the other’s identity?

A) MAM
B) Synchronization
C) Mutual authentication
D) Pairing

A

Mutual authentication.
The devices verify each other’s identity via mutual authentication. Pairing is done for the initial connection. MAM is mobile application management. Synchronization is used between a mobile device and a desktop/laptop or the cloud.

25
Q

Which of the following most accurately describes what a PRL is?

A) The list of cell phone towers a mobile device should connect with while roaming
B) The description of the user and mobile network
C) The mobile carrier code
D) The configuration settings of the network the mobile device is on

A

The list of cell phone towers a mobile device should connect with while roaming.
The preferred roaming list (PRL) is the list of cell towers a mobile device should connect to while roaming. It is not a description of the user and network, a carrier code, or the configuration settings of the network.

26
Q

A network administrator wants to be able to remotely wipe everything off of corporate smartphones if they are lost or stolen. What type of service do they need?

A) MAM
B) MDM
C) Two-factor authentication
D) Location services

A

MDM.
Mobile device management (MDM) is a type of service that allows network administrators to specify which mobile devices can join the network. It also gives administrators the ability to remotely lock and completely wipe mobile devices. Mobile application management (MAM) lets an administrator control the corporate apps on a mobile device. Two‐factor authentication is a security concept. Location services can help find a mobile device, but not remotely wipe it.

27
Q

A user needs to synchronize their iPhone to another platform. Which two options are the default ones for them to choose? (Choose two.)

A) Google Drive
B) SharePoint
C) iCloud
D) iTunes

A

iCloud and iTunes
C, D. Apple devices natively sync with iCloud and iTunes. Android devices sync with Google Drive. SharePoint is a Microsoft service that can be used to share files.

28
Q

A mobile user is having cellular connectivity problems when roaming but not when near their home. They are told by their carrier that they need to update their settings. Which of the following settings do they most likely need to update?

PRI, PRL, Baseband, IMEI

A

PRL.
When roaming, the mobile device uses the preferred roaming list (PRL) to connect to the proper cell phone tower. The product release instruction (PRI) contains settings for configuration items on the device that are specific to the network that it’s on. Baseband refers to all wireless communications. The international mobile equipment identity (IMEI) is a 15‐digit serial number that is unique to each phone and is not relevant to this issue.

29
Q

what technology allows the pairing of mobile devices and, on occasion, the ability to transfer files between them?

A

bluetooth

30
Q

the roaming list on a mobile device is established by what?

A

PRL (preferred roaming list)

31
Q

what is it called when a laptop gets on the internet using a cellular connection?

A

mobile hotspot

32
Q

connecting a device to a mobile hotspot is referred to as what?

A

tethering

33
Q

_____ allows you to turn off cellular and wifi connections at once on a mobile device.

A

airplane mode

34
Q

what does a PRL (preferred roaming list) update do?

A

updates the preferred roaming list, which tells the phone which cell towers to use when roaming

35
Q

copying data, such as calendars, contacts, photos and music, between a computer and a mobile device, is referred to as what?

A

synchronization

36
Q

which TCP (transmission control protocol) ports are used for unsecure and secure IMAP (internet message Access protocol)?

A

unsecure 143
secure 993

37
Q

which TCP (transmission control protocol) ports are most commonly used for unsecure and secure SMTP(simple mail transfer protocol) over SSL?

A

unsecure 25
secure 465

38
Q

when configuring an internet email account on a mobile device, what are the standard pieces of information required?

A

username, password, outbound mail server and port, and inbound mail server and port

39
Q

which service helps manage corporate applications on mobile devices?

A

MAM (mobile application management)

40
Q

name the types of data that get synchronized between a mobile device and a desktop

A

contacts, apps, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, e-books and passwords

41
Q

which TCP (transmission control protocol) ports are used for unsecure and secure POP3?

A

unsecure 110
secure 995

42
Q

what are two locations to which you can sync an iphone?

A

computer(itunes) and cloud

43
Q

what is it called when two bluetooth enabled devices authenticate each others identities?

A

mutual authentication

44
Q

what service allows network admin’s to set system policies and remotely wipe mobile devices on a network?

A

MDM (mobile device management)

45
Q

which service synchronizes mobile device email with a microsoft exchange server?

A

ActiveSync

46
Q

two examples of location services are ?

A

gps and cellular

47
Q

If a user wanted to disable location services on an iphone, where would they do that?

A) settings > Communications
B) settings > privacy
C) settings > GPS
D) settings > location services

A

Settings > privacy

48
Q

You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? Choose all that apply.

A) Wi-Fi
B) USB
C) tethering
D) cellular
E) Bluetooth

A

Wi-Fi
USB
cellular

Bluetooth is not used for desktop synchronization

49
Q

A friend asks you why she would ever disable cellular data networking. Which of the following is not a valid reason to disable cellular data networking?

A) your phone calls are going out over your carriers cellular network
B) you have a limited amount of data in your monthly plan
C) you have access to a reliable Wi-Fi signal
D) you are about to download and update to your phone

A

Your phone calls are going out over your carriers cellular network