Chapter 26 Review: Care and Feeding of Mobile Devices Flashcards
Legitimate app stores run by major vendors are an example of a ______ source
Trusted
Why would you purchase a mobile app instead of download it from a third party?
Less chance of downloading malicious software
What common OS symptom would the following troubleshoot?
Uninstall and reinstall a more recent version of the app
App not loading
What common OS symptom would the following troubleshoot?
Go into the app configuration and allow the app to make use of GPS
GPS service problems
What common OS symptom would the following troubleshoot?
Restart the device to clear RAM
Frozen system
What common OS symptom would the following troubleshoot?
Wiping fingerprints and dust off the screen
Nonresponsive touchscreen
What common OS symptom would the following troubleshoot?
Replace this with a known good battery from the vendor
Swollen battery
What common OS symptom would the following troubleshoot?
Take it to a service center
Hardware issue / overheating
What is a location factor in security?
Somewhere you are, which can be pinpointed by GPS
What is an inherence factor in security?
Something the user is, such as a retinal pattern
What is a knowledge factor in security?
Something you know, such as username or password
What is an ownership factor in security?
Something you possess, like a token or smartcard
What is a temporal factor in security?
A time based factor, such as logging on at a certain time of day
A fingerprint lock is an example of what kind of authentication?
Biometric
Order the following troubleshooting steps from least invasive to most invasive:
a. close/force close running apps
b. uninstall and reinstall apps
c. soft reset
d. hard reset
a. close/force close running apps
c. soft reset
b. uninstall and reinstall apps
d. hard reset
Find my iPhone is an example of a ____ application
Locator
What is the worst case scenario if a phone is overheating?
The battery leaks or explodes
What are two downsides of jailbreaking, rooting, or unlocking a device?
- void warranty
- less protection against malware
A ______ allows you to survey customer environments and identify issues or rogue connectivity threats
Wi-Fi Analyzer
A ______reset is when you restart the device from within the OS or with hardware buttons on the device
soft
One of the first things you should do when you get a new phone is to put it in a ______
Case / protective cover
Using a card at an ATM and entering a pin is an example of what kind of authentication?
Multi factor (knowledge, possession)
When a user wants to remove Apple imposed limitations on their iPhone, they are asking you to ______ it.
Jailbreak
Using applications, screen brightness, location services, and network usage can greatly reduce your phone’s ______
Battery life
OneDrive, iTunes, iCloud, and Google Sync all do what?
Backup a mobile device
Tracking when a user enters and leaves a location by using their cell phone is an example of _____
Geofencing
What does BYOD stand for?
Bring your own device
When employees can bring a personal phone to access corporate data and systems
A device with sensitive data is lost, how do you ensure the data can not be used by the thief?
Remote wipe the phone