Practice Test 2 Flashcards
What are the 3 USB ports that can be found on mobile devices?
USB-C, Micro-USB and Mini-USB.
What do Docking Stations usually offer?
Addition Ports and Capabilities.
What are Does Proprietary Design mean in terms of Docking Stations?
It means they are designed to work only with a specific laptop make or model.
What laptop component provides the function of a pointing device?
The Track Pad.
What are the 2 (2G/3G) mobile telecommunications standards?
CDMA (Code-division multiple access) and GSM (Global System for Mobile Communications).
What is the LTE (Long-Term Evolution) standard?
LTE improves on cellular network standards’ capacity and speed by using a different radio interface and with core network improvements. The successor of 3G.
What is the LTE-A (Long-Term Evolution Advanced) standard?
This is a later revision of the LTE (< 3G) standard, and is often marketed as 4G.
What is a database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower called?
A PRL (Preferred Roaming List) Database. (This is used to Roam outside of home area, missing or corrupted PRLs can result in loss of roaming Bressingham 8).
Which type of software enables a centralized administration of mobile devices?
MDM (Mobile Device Management) Software. (This is used as a means to enforce a group policy like effect).
What facilitates the enforcement of mobile device policies and procedures?
Mobile Device Management (MDM).
What is a dedicated mobile app management software called?
MAM (Mobile Application Management) Software.
What is the function of FTP
File Exchange, FTP (File Transfer Protocol) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network.
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as what?
SSH (Secure Shell). Secure Shell Protocol is a method of Secure Remote Login and File Transfer across an unsafe network.
What is the Telnet protocol?
Telnet is a Client/Server Application Protocol, similar to SSH but transmits all data without encryption and is therefore insecure.
What is Telnet used for?
Telnet is used for username & password authentication as well as remote login and command executions.