Mobile Devices (1) Flashcards
On your newly purchased laptop, the speakers are not working, but the headphones work without any problem. How should you correct the problem?
Update device drivers
Set speakers as the default audio device
Unmute the sound on the laptop
Try to play another audio format
Set speakers as the default audio device
You have a several mobile apps that your organization has developed. You have been asked to allow the user to log on to any of then the remaining apps should not prompt for authentication. How should you design the authentication in this scenario?
Configure each application to save user credentials
Disable user authentication on each of the apps
Configure each application with single sign-on
Configure each application with single sign-on
You have been using a Gmail account on your mobile. However, you are no longer able to send E-mails and receive emails. You open Google Chrome and search online for solutions but do not get a proper solution. What method can help you resolve this situation?
Check your password
Turn off the Airplane mode
Check if you are connected to the internet
Enable the mobile data on the mobile
Check your password
If you upload your music from your PC or mobile phone the cloud and then listen to your library from any device online or using a mobile app what benefit do you derive from doing so?
You do not need to buy music
Space on your device is not used
It prevents you from using pirated music
Space on your device is not used
With a line of sight internet connectivity, what is likely to be used as the medium for connectivity to the internet?
Wireless
DSL
Cable
Wireless
You are asked to redesign an existing wireless network within a historically significant building. The access point in a large room sufficient covers three-quarters of the room. However, the far end consistently has limited connectivity. The redesign requires that as little intervene the building’s structure take place as possible. What would be best to use to achieve this?
Wireless switch
Media converter
Wireless range extender
Wireless range extender
Your organization uses Active Directory with Exchange Server 2016 for messaging. The network is protected by a firewall. You need your to be configured with Outlook 2016 using the IMAP protocol. When you attempt to login to the E-mail account using your domain account authentication fails. However, you are able to log in to your laptop. You check with IT support and no other remote user has reported this. What could be the probable cause?
Exchange Server does not support IMAP
The password contains Unicode characters
The Outlook profile is corrupt
The password contains Unicode characters
You have several computers connected to the same multi-port network device. A user accidentally connects two ports of this device directly each other using a single cable. All computers connected to this device lose network connectivity. What device is the most network device?
Firewall
Hub
Router
Hub
A company has purchased a leased line between two of their offices. The circuit is composed of a single pair of voice-grade wire to find a solution where the LANs at each site can communicate with each other over this single pair. Which device do you need to install at each end to fulfil this requirement?
Modern
Bridge
Hub
Modern
You have purchased a new mobile device. You want the contacts to be replicated between the old and new phone. As and when a contact is added or deleted from one phone, it should be updated on the second phone automatically. What should you do?
Export the contacts from one mobile and import in the second mobile
Share contacts from one mobile to another mobile using Bluetooth
Synchronize both the mobiles to a single cloud account
Synchronize both the mobiles to a single cloud account
You have recently joined an organization. When you check the patch panels and wall jacks, you notice there is no marking on them. What should you do to ensure that you are able to distinguish and identify the cables clearly?
Patch panel and network jack labelling
IP address documentation
Switch port tagging
Patch panel and network jack labelling
You manage a network that is protected by a firewall. You want to configure IMAP as the default protocol for the users who are constantly on the move. Since you want to retain a copy of the message on the server, you do not want to allow the users to use POP3. What should you do?
Block the POP3 IP address messaging server firewall
Uninstall the POP3 protocol from the server
Block port 110 on the server
Block port 110 on the server
If you want to hide your physical location and do not want to be tracked through your smartphone, then the best way to do this is.
Turn off your GPS on the mobile device
Close all apps that use location data
You will always get tracked through the service provider
You will always get tracked through the service provider
If you have a 1.8 inches hard drive, where are you likely yo use it? (Choose all that apply)
Sub-notebook laptops
14 inches laptop
Slimline laptops
Desktop
Sub-notebook laptops
Slimline laptops
You need to build a new system. You have purchased the motherboard and need to purchase the memory modules and CPU. Which of the following should you do first?
Buy the latest memory modules
Review the motherboard documentation
Purchase the chassis with the correct form factor
Review the motherboard documentation
You have a laptop with a network adapter, sound card, display adapter, USB 3.0 and two memory modules. Out of these, which of the following is likely to consume maximum power?
USB 3.0
Display adapter
Sound card
Network adapter
Display adapter
Your laptop is connected to an LCD monitor. You notice a few spots on the LCD screen. Even after switching off and on the monitor, the spots are still present on the screen. What could be the probable cause?
Stuck spots
Hollow spots
Fixed pixels
Stuck spots
Your network uses Files and Print Sharing. You need to ensure that you are able to ensure the optimum security on these systems. What should you do? (Choose all that apply)
Use strong passwords
Use the $ (dollar) at the end of share names
Use NetBEUI and unbind File and Print Sharing from TCP/IP
Block ports 135-139 on the firewall
Use strong passwords
Use the $ (dollar) at the end of share names
Use NetBEUI and unbind File and Print Sharing from TCP/IP
Block ports 135-139 on the firewall
Which of the following can be considered as a vendor-specific port?
Serial
Lightning
C-Type USB
SCSI
Lightning
You need to extend the battery life while working on a full battery and not connected to power. Disabling which of the following services will help you achieve this goal (Choose all that apply)
Airplane mode
Wireless
Bluetooth
Volume Control
Wireless
Bluetooth
You need to turn off the following features on a laptop
.Wireless
.Bluetooth
.Cellular
How can you perform this task in the quickest manner?
Disconnect the laptop from a wireless network
Switch off Cellular, Wireless, and Bluetooth individually
Put the laptop in the Airplane mode
Put the laptop in the Airplane mode
You have a lot of pictures on your mobile device. You have also synchronized them to Google drive. You need these pictures to be synchronized to another mobile. You should use a method that is less time consuming and efficient. What should you do?
Log on the Google account on the new mobile device and synchronize photos
Insert the SIM from the old mobile device into the new mobile device and connect it to Google Drive
Use Bluetooth pairing to synchronize photos between both the mobile devices
Log on the Google account on the new mobile device and synchronize photos
If tethering is used to access the internet, what is the requirement of the device address?
All devices should have a private IP address and should be restricted from accessing the internet directly
All devices should have a public IP address to access the internet and should be able to access the internet
Only the device connected to the internet should have a public IP address. Other connected devices by tethering should have a private IP address
Only the device connected to the internet should have a public IP address. Other connected devices by tethering should have a private IP address
If you are designing a contactless payment system, which technology are you likely to use?
Wireless
NFC
Cellular
NFC