Chapter 26 Review: Care and Feeding of Mobile Devices Flashcards

1
Q

Legitimate app stores run by major vendors are an example of a ______ source

A

Trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why would you purchase a mobile app instead of download it from a third party?

A

Less chance of downloading malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What common OS symptom would the following troubleshoot?

Uninstall and reinstall a more recent version of the app

A

App not loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What common OS symptom would the following troubleshoot?

Go into the app configuration and allow the app to make use of GPS

A

GPS service problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What common OS symptom would the following troubleshoot?

Restart the device to clear RAM

A

Frozen system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What common OS symptom would the following troubleshoot?

Wiping fingerprints and dust off the screen

A

Nonresponsive touchscreen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What common OS symptom would the following troubleshoot?

Replace this with a known good battery from the vendor

A

Swollen battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What common OS symptom would the following troubleshoot?

Take it to a service center

A

Hardware issue / overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a location factor in security?

A

Somewhere you are, which can be pinpointed by GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an inherence factor in security?

A

Something the user is, such as a retinal pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a knowledge factor in security?

A

Something you know, such as username or password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an ownership factor in security?

A

Something you possess, like a token or smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a temporal factor in security?

A

A time based factor, such as logging on at a certain time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A fingerprint lock is an example of what kind of authentication?

A

Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Order the following troubleshooting steps from least invasive to most invasive:

a. close/force close running apps
b. uninstall and reinstall apps
c. soft reset
d. hard reset

A

a. close/force close running apps
c. soft reset
b. uninstall and reinstall apps
d. hard reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Find my iPhone is an example of a ____ application

A

Locator

17
Q

What is the worst case scenario if a phone is overheating?

A

The battery leaks or explodes

18
Q

What are two downsides of jailbreaking, rooting, or unlocking a device?

A
  • void warranty

- less protection against malware

19
Q

A ______ allows you to survey customer environments and identify issues or rogue connectivity threats

A

Wi-Fi Analyzer

20
Q

A ______reset is when you restart the device from within the OS or with hardware buttons on the device

A

soft

21
Q

One of the first things you should do when you get a new phone is to put it in a ______

A

Case / protective cover

22
Q

Using a card at an ATM and entering a pin is an example of what kind of authentication?

A

Multi factor (knowledge, possession)

23
Q

When a user wants to remove Apple imposed limitations on their iPhone, they are asking you to ______ it.

A

Jailbreak

24
Q

Using applications, screen brightness, location services, and network usage can greatly reduce your phone’s ______

A

Battery life

25
Q

OneDrive, iTunes, iCloud, and Google Sync all do what?

A

Backup a mobile device

26
Q

Tracking when a user enters and leaves a location by using their cell phone is an example of _____

A

Geofencing

27
Q

What does BYOD stand for?

A

Bring your own device

When employees can bring a personal phone to access corporate data and systems

28
Q

A device with sensitive data is lost, how do you ensure the data can not be used by the thief?

A

Remote wipe the phone