Mobile and Operating Systems

A local device needs to be connected to the internet in order to access mail. Which of the following servers must have its address configured on the device?
A Web Server
A DNS Server
A Mail Server
An NTP Server
Which of the following is classified as a system software?
Spreadsheet Application
Email Client
Anti-Virus Software
Device Drivers
Which of the following is not a Health and Safety consideration when installing a new server?
Trip Hazards
Manual Handling
Anti-Static Precautions
Personal Protective Equipment (PPE)
During testing, what is the next step after establishing system functionality?
Identifying any problems with the system
Releasing the system to the live environment
Determining the cause of any system problem
Document findings, actions and outcomes
What action will be carried out by the command below in the CLI? Type: cd.. Followed by: dir*.exe
A list will display all executables in the directory immediately below
All directories starting with .exe will be deleted
A list will display all executables in the directory immediately above
The computer will attempt to run any executable it finds in the directory
Which of the following passwords is the most secure?
Pa$$w0rD1
MniJala@37Yo
27/07/1964
1234qwerty
In order to meet an organisation’s Standard Operating Policy (SOP), the finance team must not be allowed to use USB devices. What is the best way to achieve this?
Physically disable the USB port through the BIOS
Disable the USB drivers to prevent access through software
Enforce a group policy that disables access through software
Physically detach the USB sockets to disable access through the hardware
When is the best time for Anti-Malware to run?
Only at start-up
Only in the background
On demand, at reboot
On demand and in the background
When setting up a laptop to connect to a wireless access point, which standard is best to make the connection?
WPS
WPA2
WEP
WPS2 and WPS
Which of the following provides the best authentication when providing remote support?
Username and smartcard on a specified device
Username and complex password on a specified device
Shared username and fingerprint scanner on company device
Shared username and smartcard on company device
Which of the following technologies allows legacy software to work on current hardware?
Virtualisation
Networking
Multitasking
Multireading
Which of the following is the primary consideration before conducting a remote wipe of a mobile device?
Whether authority has been granted
Whether the device will reset to factory settings
Whether the device will be locked with a unique password
Whether the device will be turned off
Which of the following devices are typically based on a mobile platform?
Thin Clients
Tablets
Laptops
Desktops
What is the default port used by Remote Desktop Protocol (RDP)?
90
161
3071
3389
Where is the best place to install firmware?
ROM
RAM
DVD-RW
Internal Hard drive
Which of the following is most likely to be included in a company’s BYOD policy?
We may access a user’s data to monitor all internet activity
We have authority to remote wipe a user’s device
Users can choose the level of password complexity, but are responsible for loss of data
After five failed login attempts, a user’s device will be automatically wiped
What are businesses most likely to restrict when creating a data access policy for mobile devices?
Access to the internet
Access to files and folders
Access to the company’s intranet pages
Access to emails and calendars
Which of the following statements is always true?
Software applications are secure from malicious code
Software application will run on any operating system
Software applications are always backwards compatible
Software applications require services from the operating system
Which of the following does a company need to consider when users access confidential information on a mobile device?
What data needs to be encrypted
The maximum data download cap
The minimum bandwidth requirement
What SSID is set for a wireless access point
Which process should be included when creating an end-to-end testing plan for a mobile device?
Smoke Testing
Integration testing
Regression testing
Business transaction testing
Which of the following needs to be considered when taking corrective action after end-to-end testing of a configured platform?
Access to data
System backup
Availability to resources
Data protection
Which is the best accessibility option for a user who suffers from eyestrain?
High contrast
High resolution
Shadow effect
Speech to text
What is the most common built in tool to change settings on a router?
Cmd.exe
Browser
Sh.exe
Text editor
Which statement best describes when a user is a member of a group?
The user inherits the rights of the group
The user has the same password as the group
The user shares a common home folder
The user has the same home directory as the group
What is the purpose of encryption?
To help file compression
To secure data from viruses
To prevent data being over-written
To protect data from unauthorised access
Which of the following is a crucial step when hardening a device?
Remove unnecessary services
Run an anti-virus check
Remove all external devices
Run a disk check
When configuring a laptop to connect to an encrypted Wi-Fi network, what configuration details are essential?
SSID and Network Address
Network Security Key and Device Name
SSID and Network Security Key
Device Name and Network Address
A legacy device only supports IEEE 802.11g and the wireless access point it is configured to is configured for IEEE 802.11n. What is the most likely outcome?
The devices are incompatible, therefore the legacy device will need to be upgraded
The devices are incompatible, therefore the wireless access point will need to be downgraded
The devices are compatible and the communication speed is likely to be close to the g standard
The devices are compatible and communication speed is likely to be close to the n standard
A sales manager wants to connect securely from any remote location using the internet to access files in the internal company network. What is the most suitable technology to support this request?
VPN
VLAN
HTTPS
TCP/IP
A user can view a folder while working from a remote site, but cannot access the necessary files to work on. The user has requested access to the files. What is the next action to take?
Change the user’s access permissions
Send the file to the user
Seek authorisation for access
Deny the request for access
{"name":"Mobile and Operating Systems", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A local device needs to be connected to the internet in order to access mail. Which of the following servers must have its address configured on the device?, Which of the following is classified as a system software?, Which of the following is not a Health and Safety consideration when installing a new server?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker