Mobile Devices Flashcards

1
Q

Which email client does Yahoo recommend when you are setting up Yahoo Email?

A. SMTP
B. IMAP
C. PoP3
D. S/MIME

A

B. IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which action can invalidate a laptop warranty?

A. Reinstalling the OS
B. Opening the case
C. Flashing the BIOS
D. Performing a remote wipe

A

B. Opening the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What special screwdriver is typically required to work on a notebook?

A. Phillips head
B. T-8 Torx
C. Hex
D. Metric

A

B. T-8 Torx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If you have an email address that ends with @mac.com or @me.com, you already have an equivalent address that’s the same except that it ends with which of the following?

A. @iapple
B. @icloud
C. @iemail
D. @istorage

A

B. @icloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which component if damaged can render the hard drive useless?

A. The caddy
B. The rails
C. The signal pins
D. The chassis

A

C. The signal pins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tool replaced ActiveSync?

A. iSync
B. MS Mobile Wizard
C. Windows Mobile Device Center
D. Office 365

A

C. Windows Mobile Device Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is not an advantage of solid-state drives?

A. Cheaper
B. Not as susceptible to damage
C. Faster
D. No moving parts

A

B. Not as susceptible to damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following makes it possible for a mobile device to use a time-based one-time password (TOTP) algorithm with a site or system that requires such authentication?

A. Hardware security modules
B. Non-transitive trust
C. Authenticator applications
D. In-plane switching

A

C. Authenticator applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which display is a newer technology that solves the issue of poor quality at angles other than straight on?

A. Passive matrix
B. Active matrix
C. Twisted nematic
D. In-plane switching

A

D. In-plane switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following will you not need to set up corporate email?

A. FQDN of your SMTP server

B. IP address of your SMTP server

C. FQDN of your POP3 server or IMAP server

D. Port numbers used for both server types

A

B. IP address of your SMTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In what mode of plug and play must the laptop be turned off and back on for the change to
be recognized?

A. Hot docking
B. Warm docking
C. Cold docking
D. Open docking

A

C. Cold docking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not an example of two-factor authentication?

A. Smartcard and password
B. Smartcard and iris scan
C. Password and PIN
D. Voice recognition and password

A

C. Password and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following uses satellite information to plot the global location of an object & uses that information to plot the route to a second location?

A. GPS
B. Geofencing
C. Remote wipe
D. Local wipe

A

A. GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following provides centralized device management for company-issued and personal mobile devices?

A. MDM
B. DFS
C. PCM
D. PS/2

A

A. MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the most common PIN code when selecting discovered Bluetooth devices?

A. 0000
B. 5555
C. 1111
D. 0135

A

A. 0000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When setting up PoP3, which of the following port numbers should you enter?

A. 25
B. 53
C. 110
D. 443

A

C. 110

17
Q

Which of the following storage system monitors the data being read from the hard drive & caches the most frequently accessed bits to the high-speed flash memory?

A. SSD
B. HDD
C. Hybrid drive
D. Virtual

A

C. Hybrid drive

18
Q

Which of the following is the use of physical factors of authentication?

A. Mutual authentication
B. SSO
C. Multifactor authentication
D. Biometrics

A

D. Biometrics