Module 18 Flashcards

1
Q

Samuel is using an older Android device for his advisor role. Upon being requested to update his Android OS to the latest model, Samuel notices there is no option to update under System Update in the Settings application.

Which of the following would his device be labeled as?

A

End-of-Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Diagnosis of various malware on a system is important because the sooner that the offending application can be identified, the more that any damage or continuing effects on an organization can be limited.

Which of the following is a symptom of malware at work on a device?

A

High number of ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Devices malfunction on a regular basis and can require some level of intervention to return to working order. Administrators need to understand the various types of potential fixes that can be put in place to ensure devices are back in working order as soon as possible.

Which of the following is a last resort solution to return a device to working order and involves erasing all data and resetting the device to its default state?

A

Factory reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smartphones have become items that people carry everywhere, all the time, so it has become necessary for organizations to address them as it relates to organizational security and data protection.

Which term refers to users using one’s own devices for work activities?

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Understanding the capabilities of any device is an important component of an administrator’s duties and knowledge base. When creating applications for any mobile device, testing them ahead of time is important.

Which of the following is a tool for using a virtual device to test a mobile app?

A

Emulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brandon is assisting an internal employee with their mobile device. Upon further diagnosing, Brandon can see that the mobile device is currently not opening one of the company’s applications. To further assist Brandon will begin to do some troubleshooting.

Which of the following choices is not a form of troubleshooting?

A

Charging the device with 100% battery life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When devices are lost or stolen, it is important that administrators have setup tools to help find and secure the devices to ensure that company assets are protected.

Which of the following helps to find and secure company mobile devices?

A

Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Daniel assists an internal employee with their corporate-owned mobile device. Upon further troubleshooting, Daniel notices the employees’ phone contacts are currently missing and their corporate account has been logged out. Once logged back into the user’s account, Daniel would like to further assist by preventing any data from being lost.

Which of the following would synchronize the user’s data using their online corporate account?

A

File-Level Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sarah has started her position as a Service Desk Advisor and has been provided with a new mobile device. Sarah must set up her corporate email account and a few other applications.

Which of the following is the process in which she can set up her secure corporate data and apps?

A

Mobile Device Management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A popular activity for some users with their mobile devices is to create an environment where any applications can be installed from any source.

Which of the following is a reference to an Android device that is able to have applications from any source installed?

A

Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technician wants to use a Time Machine backup to install a new copy of the macOS onto a Mac.

Which of the following tools will the technician use to perform this task?

A

macOS Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Developing new applications and apps for mobile devices and many other categories of devices is a growing field of expertise for many application developers. As such, there are application development tools that have been created to help to standardize development projects across various languages and ecosystems.

Which tool is used to create a new application for various hardware devices?

A

SDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organizations play an important role in setting the rules and procedures for how their devices and data will be used by employees, vendors, customers, and leadership. This ensures that company resources are protected from theft but that they are also protected legally.

Which of the following is a set of policies and procedures that restrict how a user can access, create and edit the organization’s resources?

A

Security profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile policies are extremely important for organizations as using personal devices for work activities is a growing trend. As a result, categories of applications have developed to help enforce these mobile policies.

Which of the following policies would ensure the installation of software on servers and mobile devices to enforce an organization’s various mobile device policies?

A

MDM policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Troubleshooting is of the process of applying logic and skills to quickly narrow down the solution to a particular issue or problem.

Which of the following is a set of issues revolving around dropped or network connections due to a weak signal?

A

Baseband update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician is logged in to a Linux system with a user account that has been assigned root privileges. Each time the technician attempts to run a specific terminal command, a “Permission denied” message is displayed.

What is the most likely reason for this message?

A

The command needs to be preceded by sudo.

17
Q

Luis is troubleshooting a BYOD (bring your own device) for an internal employee. On further review within their iOS device, Luis notices a bootlegged application has been installed onto the device causing software harm to the employee’s device.

Which of the following has allowed the user to install the illegal application onto their iOS device and has now violated BYOD policies?

A

Jailbreaking

18
Q

A system administrator is selecting an operating system for use by the company’s research and development team. The team requires an OS that can be easily modified and changed to meet its requirements.

Which of the following operating systems will be the best choice for the users?

A

Linux

19
Q

It can provide a great amount of benefit for any organization to be aware of the types of origins of applications and be able to verify that they are legitimate. A type of site has evolved for mobile devices to download and use verified applications. This gives an organization confidence that the applications, their devices are employing, are safe.

Which of the following is a safe site for downloading apps to use on a company or personal device?

A

Trusted sources

20
Q

Understanding the tools and techniques for protecting a device or a network is an important knowledge base for any administrator. There are a number of security measures that can be employed to accomplish device and data protection.

Which of the following is a tool that controls which apps or services can use network connections?

A

Firewalls

21
Q

A Mac user wants to update macOS and is searching Apple.com to locate update files.

How are macOS updates typically obtained?

A

Updates are found in the App Store

22
Q

Hardware and software are supported for long periods of time by the creating organization. However, vendors may eventually discontinue modifications or replacement parts.

Which of the following refers to a device aging out of the vendor’s updates?

A

EOL

23
Q

Scott has been asked to factory reset his old corporate-owned Android device. Upon opening the settings application, Scott is greeted with several options and paths.

Which of the following paths would he need to take in order to erase all the data from his device?

A

System > Advanced > Reset options > Erase all data

24
Q
A
25
Q
A
26
Q
A
27
Q

Seeing various issues with a device, an administrator becomes more knowledgeable about common problems and solutions. As such, when certain conditions are met, the likelihood that a problem is something that has been seen before becomes greater. Being able to quickly and efficiently diagnose and resolve those issues is important.

Which of the following has symptoms of short battery life or power drain?

A

Malware

27
Q

With mobile devices being used so much in society, the difference between work and personal activities and devices can sometimes be difficult to completely distinguish. Protecting those devices becomes an important activity for any organization.

What is a style of encryption that encrypts all of the data stored on a device?

A

Full device

27
Q

Steve just got back from a business trip and noticed that his corporate mobile device was missing. Using My Device, Android’s built-in locator application, Steve was able to locate his device in another state. Feeling worried that the device may be compromised, Steve would like to take the next step and erase the device.

Which of the following would allow him to erase the device from the My Device application?

A

Remote Wipe

27
Q

Michael is going through onboarding for his new position as a supervisor. While setting up his new corporate-owned device, he would like to make sure that all his data is not only backed up through Google, but also through the company’s cloud storage.

Which of the following would allow him to back up the device’s data to the company’s cloud storage?

A

Remote Backup Application

28
Q

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

A

End-of-life

29
Q

As mobile devices continue to evolve and to be able to accomplish organization objectives, their use continues to grow in all situations. Knowing how to control access to those devices is an important tool for administrators to be able to work with.

Which of the following is a method for controlling access to the mobile device?

A

Pin code