Module 18 Flashcards
Samuel is using an older Android device for his advisor role. Upon being requested to update his Android OS to the latest model, Samuel notices there is no option to update under System Update in the Settings application.
Which of the following would his device be labeled as?
End-of-Life (EOL)
Diagnosis of various malware on a system is important because the sooner that the offending application can be identified, the more that any damage or continuing effects on an organization can be limited.
Which of the following is a symptom of malware at work on a device?
High number of ads
Devices malfunction on a regular basis and can require some level of intervention to return to working order. Administrators need to understand the various types of potential fixes that can be put in place to ensure devices are back in working order as soon as possible.
Which of the following is a last resort solution to return a device to working order and involves erasing all data and resetting the device to its default state?
Factory reset
Smartphones have become items that people carry everywhere, all the time, so it has become necessary for organizations to address them as it relates to organizational security and data protection.
Which term refers to users using one’s own devices for work activities?
BYOD
Understanding the capabilities of any device is an important component of an administrator’s duties and knowledge base. When creating applications for any mobile device, testing them ahead of time is important.
Which of the following is a tool for using a virtual device to test a mobile app?
Emulator
Brandon is assisting an internal employee with their mobile device. Upon further diagnosing, Brandon can see that the mobile device is currently not opening one of the company’s applications. To further assist Brandon will begin to do some troubleshooting.
Which of the following choices is not a form of troubleshooting?
Charging the device with 100% battery life.
When devices are lost or stolen, it is important that administrators have setup tools to help find and secure the devices to ensure that company assets are protected.
Which of the following helps to find and secure company mobile devices?
Locator
Daniel assists an internal employee with their corporate-owned mobile device. Upon further troubleshooting, Daniel notices the employees’ phone contacts are currently missing and their corporate account has been logged out. Once logged back into the user’s account, Daniel would like to further assist by preventing any data from being lost.
Which of the following would synchronize the user’s data using their online corporate account?
File-Level Backup
Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications.
Which of the following is the process in which she can set up her secure corporate data and apps?
Mobile Device Management (MDM)
A popular activity for some users with their mobile devices is to create an environment where any applications can be installed from any source.
Which of the following is a reference to an Android device that is able to have applications from any source installed?
Rooting
A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.
Which of the following tools will the technician use to perform this task?
macOS Recovery
Developing new applications and apps for mobile devices and many other categories of devices is a growing field of expertise for many application developers. As such, there are application development tools that have been created to help to standardize development projects across various languages and ecosystems.
Which tool is used to create a new application for various hardware devices?
SDK
Organizations play an important role in setting the rules and procedures for how their devices and data will be used by employees, vendors, customers, and leadership. This ensures that company resources are protected from theft but that they are also protected legally.
Which of the following is a set of policies and procedures that restrict how a user can access, create and edit the organization’s resources?
Security profile
Mobile policies are extremely important for organizations as using personal devices for work activities is a growing trend. As a result, categories of applications have developed to help enforce these mobile policies.
Which of the following policies would ensure the installation of software on servers and mobile devices to enforce an organization’s various mobile device policies?
MDM policy
Troubleshooting is of the process of applying logic and skills to quickly narrow down the solution to a particular issue or problem.
Which of the following is a set of issues revolving around dropped or network connections due to a weak signal?
Baseband update