What types of connections can be used to synchronize a mobile device to a desktop?

A technician is configuring a mobile client to use email through an ISP. Which port number should he configure to use SMTP?

A. 25

B. 110

C. 143

D. 995

A. 25

SMTP sends mail to the server on TCP port 25. POP3 uses port 110. IMAP4 uses port 143. POP3 uses port 995 securely over SSL or TLS.

Which of the following are disabled when airplane mode is switched on? (Choose all that apply.)

A. Cellular

B. Wi-Fi

C. Bluetooth

D. Settings app

E. Lock screen

A. Cellular

B. Wi-Fi

C. Bluetooth

Airplane mode disables all radio communications, including cellular, Wi-Fi, and Bluetooth (and NFC as well). It does not affect the opening of any other apps or the lock screen.

Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose all that apply.)

A. Office documents

B. Contacts

C. Operating system files

D. Email

E. Configuration settings

F. Apps

B. Contacts

D. Email

F. Apps

You are pairing a Bluetooth headset to a mobile device. On the mobile device, after finding the device for pairing, what is the next step to take?

A. Enable Bluetooth.

B. Test connectivity.

C. Enter the appropriate PIN code.

D. Enable pairing.

C. Enter the appropriate PIN code.

The next step is to enter the PIN code. The steps, in order, are as follows: enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.

In a mobile device, which of the following are examples of RTOSs? (Choose two.)

A. SIM OS

B. Baseband OS

C. iOS

D. Android

A. SIM OS

B. Baseband OS

he two real-time OSs (RTOSs) that mobile phones have are the baseband OS and the SIM OS. iOS and Android are not RTOSs.

You are enabling email on a mobile client. Which of the following is not a standard integrated commercial provider for email?

A. iCloud

B. Hotmail

C. Yahoo Mail

D. Exchange Online

B. Hotmail

Four commercial email providers to be familiar with are iCloud, Google/Inbox, Exchange Online, and Yahoo Mail. Hotmail used to be a commercial email provider, but it no longer exists; it's now part of Outlook.com.

Which of the following is not a requirement for installing iTunes on a Windows machine?

A. A 1 GHz processor or better

B. 1 GB of RAM or higher

C. 400 MB of available disk space

D. Broadband Internet connection

B. 1 GB of RAM or higher

iTunes will run on a computer with 512 MB of RAM. 1 GB is not required unless you want to play 720p high-definition videos. A 1 GHz processor, 400 MB disk space, and broadband Internet are required.

A friend asks you why she would ever disable cellular data networking. Which of the following is not a valid reason to disable cellular data networking?

A. You have a limited amount of data in your monthly plan.

B. You have access to a reliable Wi-Fi signal.

C. You are about to download an update to your phone.

D. Your phone calls are going out over your carrier's cellular network.

D. Your phone calls are going out over your carrier's cellular network.

Whenever you have a reliable Wi-Fi signal available, which you do not pay for “as you go,” you should feel free to disable your cellular access to data networking. The wireless network is often faster and does not cost you anything to use. If data networking works better when you leave the cellular network available as a fallback, you can choose to disable it only for certain large downloads or disable it completely until the download is complete. Phone calls will continue to be sent over the cellular network. This does not imply that your data is not using an available Wi-Fi connection. Therefore, unless you are particularly sensitive to the situation or know that data is going out over your cell access, you might not need to disable the cellular data-networking feature.

You need to enable clients to synchronize their mobile devices to their laptops. Which of the following are common connection types to enable laptop synchronization? (Choose all that apply.)

A. Cellular

B. Bluetooth

C. Wi-Fi

D. USB

E. Tethering

C. Wi-Fi

D. USB

The two most common connection types for synchronization to a desktop (or laptop) are Wi-Fi and USB. Cellular and Bluetooth are not used for desktop synchronization. Tethering is when a laptop or other device is granted cellular network access by connecting to a mobile device, such as a smartphone.

You need to configure email for a mobile client. His device has a setting referring to port 587. Which mail protocol is likely using this protocol?

A. SMTP with SSL

B. SMTP with TLS

C. IMAP4 with SSL/TLS

D. POP3 with SSL/TLS

B. SMTP with TLS

SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.

You need to configure a mobile client to send encrypted emails. Which standard is used to encrypt and decrypt email messages on mobile devices?

A. SSL

B. TLS

C. IMAPS

D. S/MIME

D. S/MIME

Secure/Multipurpose Internet Mail Extensions (S/MIME) is the public key encryption standard used for encrypting and decrypting email. SSL and TLS can encrypt network traffic but not an email message. IMAP is an email protocol, but there is no IMAPS.

Which of the following most accurately describes what an IMEI is?

A. The phone's serial number

B. The description of the user and mobile network

C. The carrier code

D. The code used for NFC pay applications

A. The phone's serial number

The international mobile equipment identity (IMEI) is a 15-digit serial number that is unique to each phone. The international mobile subscriber identity (IMSI) is a unique 15-digit identifier that describes a specific mobile user and their network. The secure element identifier (SEID) is a very long hexadecimal code that uniquely identifies the phone; it is used in security applications, NFC, and features like Apple Pay.

You need to pair two Bluetooth devices with each other. Which of the following is true regarding Bluetooth pairing?

A. Bluetooth connections support wireless device control but not file transfers.

B. Bluetooth is not yet a fully standardized protocol.

C. Bluetooth connections do not reach as far as Wi-Fi connections.

D. You must reboot the paired devices to complete the connection.

C. Bluetooth connections do not reach as far as Wi-Fi connections.

The range of Bluetooth connections is considered short compared to Wi-Fi connections. Bluetooth is a fully standardized protocol that supports file transfers using FTP. Rebooting, or even restarting, paired devices is not a requirement for Bluetooth connection.

A mobile device is having intermittent communications issues. Which software component of a mobile phone is most likely responsible for these issues?

A. Either iOS or Android OS

B. SIM OS

C. Baseband OS

D. Wireless OS

C. Baseband OS

Each mobile phone has a separate processor that manages wireless communications, also known as radio communications or baseband communications. There is a baseband OS that manages this, and it works with the primary OS on the phone. A SIM OS is for managing data transfers between the phone and the SIM chip. There is no wireless OS.

A user needs to synchronize her mobile device to another platform. She wants to be able to access the synchronized data from any location with just her phone. What should she synchronize to?

A. Automobile

B. Email

C. Desktop

D. Cloud

D. Cloud

Synchronizing to the cloud allows the user to access the synched data from anywhere. Syncing to the automobile isn't generally used for data storage—in any case, the user would need to attach to the automobile to get to the data. There is no sync to email option. Syncing to a desktop can happen, but the data is not available unless the user's mobile device is connected to that desktop.

A mobile user is having cellular connectivity problems when roaming but not when near his home. He is told by his carrier that he needs to update his settings. Which of the following settings does he most likely need to update?

A. PRI

B. PRL

C. Baseband

D. IMEI

B. PRL

When roaming, the mobile device will use the Preferred Roaming List (PRL) to connect to the proper cell phone tower. The Product Release Instruction (PRI) contains settings for configuration items on the device that are specific to the network that it's on. Baseband refers to all wireless communications. The international mobile equipment identity (IMEI) is a 15-digit serial number that is unique to each phone, and is not relevant to this issue.

You are looking for configuration information for a smartphone. Which code identifies the specific mobile user and their network?

A. IMEI

B. IMSI

C. ICCID

D. SEID

B. IMSI

The international mobile subscriber identity (IMSI) is a unique 15-digit identifier that describes a specific mobile user and their network. The international mobile equipment identity (IMEI) is a 15-digit serial number that is unique to each phone. The integrated circuit card identifier (ICCID) is the identifier for the SIM card. The secure element identifier (SEID) is a very long hexadecimal code that uniquely identifies the phone; it is used in security applications, NFC, and features like Apple Pay.

Which of the following statements about configuring email access on a mobile device is true?

A. Most Internet mail services offer an Exchange option.

B. The TCP ports used for configuring access are usually standard port numbers.

C. Most ports used for access are UDP ports.

D. You must download third-party apps for connecting to email services.

B. The TCP ports used for configuring access are usually standard port numbers.

Mail access uses standard secure or unsecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.

Which two communications technologies can you use to create a VPN connection? (Choose two.)

A. Bluetooth

B. Wi-Fi

C. Cellular

D. NFC

B. Wi-Fi

C. Cellular

You can create virtual private network (VPN) connections on a mobile device using Wi-Fi or cellular network connections. Bluetooth and NFC are not used to create VPNs.

You connect two Bluetooth devices together that have been previously connected. What is the process called that each device uses to verify the other's identity?

A. S/MIME

B. Synchronization

C. SSO

D. Pairing

C. SSO

The devices verify each other's identity via mutual authentication for multiple services (SSO). Pairing is done for the initial connection. S/MIME is used to send and receive encrypted email. Synchronization is used between a mobile device and a desktop/laptop or the cloud.

What is synchronization connection types?

There are two types of synchronization: data synchronization and process synchronization: Process Synchronization: The simultaneous execution of multiple threads or processes to reach a handshake such that they commit a certain sequence of actions. Lock, mutex, and semaphores are examples of process synchronization.

Which connection types enable synchronization?

Connection types that enable synchronization are often high speed and reliable. These include your home 802.11 Wi-Fi connection as well as USB and FireWire. These connections offer two-way transmission of data over a secure and reliable connection, which is crucial to synchronization.

What are the various types of synchronization in mobile computing?

Types of Data Synchronization in Mobile Computing.
Two-way data synchronization (partial or full copies of data).
Server-alerted synchronization..
One-way server-initiated synchronization..
The client-initiated refresh synchronization..
Client-initiated synchronization..

Which of the following can be synchronized from mobile devices?

The term "Mobile device synchronization" refers to the process of making the same data available on multiple devices. Synchronized data might include contacts, applications, emails, pictures, music, video, calendars, bookmarks, documents, location data, social media data, e-books, or passwords.