Chapter 9 Quiz Flashcards

1
Q

James wants to sync his Android phone to back up his pictures. However, he does not want to sync his data files.

How can James select what to synchronize from his phone to Google storage?

A

IP address
App to control it over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is it true or false that most smartphone devices have radio firmware that allows listening to FM radio frequencies?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jackson is setting up an IoT thermostat in his home. He has set up the IoT controller on his phone to control the device.

What else does Jackson need in order for the thermostat to be considered an IoT?

A

App to control it over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades.

Which of the following is the best action to take to resolve this issue?

A

Close or disable all unused running apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A customer has several mobile device users who have a habit of misplacing their devices during the workday.

Which of the following security methods will most benefit these users?

A

Locator applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user is complaining that her mobile device is too dim to read when in a dimly lit room.

Which of the following actions should you take first?

A

Disable the auto-brightness option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A smartphone user entered an incorrect passcode on his phone several times in a row, which locked the device.

Which of the following steps should the user take first?

A

Wait a few minutes for the phone to automatically unlock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tracy is in a meeting with an important client and wants to know how she can keep her smartphone from interrupting the meeting. She does not want to receive notifications, emails, text messages, or phone calls, but would like to leave her phone on so that she can take notes on the phone.

What setting can Tracy use on her phone to make sure she is not interrupted during the meeting?

A

Airplane mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user is asking her smartphone to recommend a restaurant, but the app cannot seem to find where the user is located. The device’s cellular service is active and functioning.

What is the first thing the user should check?

A

The user should verify location services is enabled on the smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data.

Which of the following is the most likely cause for this behavior?

A

The mobile device has malware on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the device runs hotter than normal and data speeds seem slower than usual.
Which of the following should you consider as a cause for these issues?

A

The device is infected with malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is best practice to minimize the chance of infecting your mobile device with malware?

A

Install apps only from trusted sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are preparing to give a presentation at a client’s location using your mobile device and a large screen TV. You have successfully connected to the company’s guest Wi-Fi network, and you tap the screen mirroring option on your device but cannot locate an available TV, monitor, or projector. The previous presenter finished her presentation a few minutes earlier and had no issues using the TV.

Which of the following is the most likely reason for this behavior?

A

The mobile device is on a different Wi-Fi network than the TV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your mobile device is displaying messages informing you that your device is infected with malware. The instructions tell you to install another app to properly remove the malware.

What should you do?

A

Disregard the message and check for a compromised app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following symptoms is most likely related to leaked personal files/data on a mobile device?

A

Data transmission over limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jerry is in the process of setting up a Bluetooth device. He has enabled Bluetooth, paired the device, and located the correct device.

What is the next step in the Bluetooth connection process?

A

Enter the pin code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The touch screen on a mobile device is not responding to input.

Which of the following is the best step to take to resolve this issue?

A

Perform a factory reset on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account.

Which of the following describes the security method being used?

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT.

What should Sara be concerned about when setting up her IoT lights?

A

Security

20
Q

You want a method of authentication for company-owned mobile devices in which users are required to use two-step authentication.

Which of the following will best assist you in meeting this requirement?

A

Authenticator apps

21
Q

The back cover of a mobile device is warmer than usual, and the battery seems to lose its charge much quicker than normal. The user has scanned for malware, closed unused apps, and decreased the brightness level of the screen, but the symptoms persist.

Which of the following is the most likely cause for this behavior?

A

The battery is going bad.

22
Q

A user is experiencing problems connecting to a SOHO Wi-Fi network via her mobile device.

Which of the following is the first step a technician should take in resolving this issue?

A

Determine if any other devices are experiencing the same issue.

23
Q

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted
access to the account.

Which of the following describes the security method being used?

A

Multifactor

24
Q

Jennifer has an iPod that she has not used for six months. She wants to move the music and pictures from the iPod to her new iPhone. She tries to access the iPod using her four-digit code, but the passcode does not work. She tries to use two other codes, but neither work. Obviously, Jennifer does not remember the passcode.

What solution does Apple provide that will help Jennifer recover the passcode for her iOS device?

A

Reset the device and restore the data from iCloud or iTunes.

25
Q

Benjamin recently issued new mobile phones to the marketing team at his company. Each phone can transmit encrypted information for payments made at a retail checkout counter. The technology also allows the marketing team to share data quickly.

What technology is set up on the marketing team’s phones?

A

NFC

26
Q

Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch a video on the Internet.

What can Dennis do that will allow the children to watch a video on the Internet while in the car?

A

Enable a hotspot on his smartphone.

27
Q

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

A

Accelerator

28
Q

A technician is troubleshooting a mobile device that is experiencing very slow performance, and the decision has been made to perform a factory reset.

Which of the following actions should the technician take before starting the reset process?

A

Back up all user data.

29
Q

A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user powers the device off each evening, and when it is powered on, performance returns to normal. After an hour of operation, performance degrades.

Which of the following is the best action to take to resolve

A

Close or disable all unused running apps.

30
Q

Mark has been asked to set up several smartphones to connect to his company’s email server. The company wants Mark to set them up so they can be synchronized between multiple email clients on multiple devices.

What protocol should Mark use to set up the company smartphones?

A

IMAP

31
Q

Your company has asked you to do research how it can provide smartphones to its employees. The company wants to give employees access to OneDrive in order to synchronize data.

What type of synchronization will you recommend to the company?

A

Synchronization to the cloud

32
Q

Several of the contacts in your mobile device are responding to test messages that you sent them. However, you don’t remember sending any of the messages.

Which of the following is the reason for this behavior?

A

Your device is sending spam messages to your contacts.

33
Q

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks.

Which of the following steps should the user take next to resolve this issue?

A

Check for OS updates.

34
Q

Dillion’s company has decided it wants to find a way to do a better job of tracking clothing inventories. Dillon has been asked to research ways to use the wireless network and IoT devices to help when tracking the clothing inventories.

What should Dylan recommend to his company to help track the inventories?

A

RFID tags

35
Q

The touch screen on a mobile device is not responding to input.

Which of the following is the best step to take to resolve this issue?

A

Perform a factory reset on the device.

36
Q

Sam cannot figure out why he can’t get sound from his tablet’s internal speakers and calls you asking for advice. You ask him to check to see if anything is stuck in the aux port. Sam assures you nothing is in the aux port. He also checks to make sure the sound is not muted.

What might prevent Sam from getting sound from his tablet?

A

The audio output is being directed to a Bluetooth speaker.

37
Q

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.

How can the technician retrieve the requested information from the user’s device?

A

The method for retrieval is dependent on the specific app or device’s operating system.

38
Q

John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the data to be synchronized, this service uses a process in which the cloud service and the client on the smartphone will verify the security of all devices’ security certificates.

What type of security does the cloud-base service employ?

A

Mutual authentication

39
Q

A mobile phone user in your company is experiencing dropped phone calls. While interviewing the user, you determine the problem started after she checked her email this morning. No other mobile devices in the organization are dropping calls.

Which of the following is the most likely reason for the dropped calls?

A

Malware is interfering with the calls.

40
Q

Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a new email account for the phone.

Which commercial email provider should Angela use for her new Android phone?

A

Gmail

41
Q

What smartphone feature allows a user to turn her phone to change from portrait view to landscape view when she is watching a video?

A

Accelerometer

42
Q

You are troubleshooting a mobile device that will not pair with a Bluetooth headset. The device was functioning properly with the headset until a recent corporate-wide OS update. No other mobile devices in the organization are exhibiting this issue with Bluetooth headsets.

Which of the following is the first step you will take to resolve this issue?

A

Reset the network settings in the mobile device Settings app.

43
Q

A customer has several mobile device users who have a habit of misplacing their devices during the workday.

Which of the following security methods will most benefit these users?

A

Locator applications

44
Q

Jerry recently purchased a new iPad. He needs guidance on setting it up and wants to find documentation to help with the setup.

Where can Jerry find detailed steps on how to connect to a network, configure email, update the OS, sync, and back up settings and data, as well as what to do when things go wrong with his iPad or an iPhone?

A

User guide for the device

45
Q

A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text message with a unique PIN that must be entered before she is granted access to the account.

Which of the following describes the security method being used?

A

Multifactor authentication