Shared Storage and Mobile Devices Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Flashcards based on lecture notes about using shared storage and mobile devices.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

The Network and Sharing Center ___.

Allows you to check the network type.

2
New cards

To change the network type, switch to ___.

Settings > Change connection properties

3
New cards

In Advanced sharing settings, ___.

Check that network discovery and file and printer sharing are enabled.

4
New cards

In the "Network access" dialog, select ___ from the list box then click Add.

Everyone

5
New cards

Leave the permission level set to ___ and click the Share button.

Read

6
New cards

Right-click the C:\Holidays folder and select Share with >___.

Stop sharing.

7
New cards

One objective of Unit 5 is to ___.

Identify the key features of different types of mobile devices and mobile operating systems.

8
New cards

Another objective of Unit 5 is to ___.

Configure network, email, and data transfer settings on mobile devices.

9
New cards

A ___ allows the user to control the OS directly through the screen.

Touchscreen

10
New cards

Modern mobile devices use ___ touchscreens.

Capacitive

11
New cards

___—usually the equivalent of a main button mouse click.

Tap

12
New cards

___—usually the equivalent of a right-button mouse click.

Tap-and-hold

13
New cards

___—typically used to switch between documents or apps.

Swiping

14
New cards

___—typically used to zoom out and zoom in.

Pinch and stretch

15
New cards

___—move objects around the screen.

Sliding

16
New cards

Mobile devices use ___ to detect when the device is moved and change the screen orientation.

Accelerometers and gyroscopes

17
New cards

___ is another important interface for controlling a mobile device.

Speech recognition

18
New cards

Access to a mobile device should always be protected by a ___.

Screen lock

19
New cards

Another possibility is for the phone to support a ___.

Remote wipe or kill switch

20
New cards

All but the early versions of mobile device OS for smartphones and tablets provide ___.

Full device encryption

21
New cards

In Android, you need to enable encryption via ___.

Settings > Security

22
New cards

With the release of Android Nougat, full device encryption is being deprecated in favor of ___.

File-level encryption

23
New cards

___ are installable programs that extend the functionality of the mobile device.

Apps

24
New cards

Third-party developers can create apps for iOS using ___.

Apple's Software Development Kit (SDK)

25
New cards

Apps are supposed to run in a ___.

Sandbox

26
New cards

There are generally two choices for connecting a smartphone or tablet to the Internet: ___.

Mobile data access or Wi-Fi.

27
New cards

In iOS, cellular network options are configured via ___.

Settings > General > Network

28
New cards

In Android, the options are configured via ___.

Settings > Data usage

29
New cards

A device can be put into ___ to comply with flight restrictions.

Airplane mode

30
New cards

In iOS, open ___ to configure email settings.

Settings > Mail, Contacts, Calendars then click Add Account

31
New cards

In Android, the email configuration is performed via ___.

Settings > Accounts

32
New cards

The incoming mail server will either be an ___ server.

Internet Message Access Protocol (IMAP) or a Post Office Protocol (POP)

33
New cards

The outgoing mail server will be a ___ server.

Simple Mail Transfer Protocol (SMTP)

34
New cards

The other important option is to enable ___.

SSL/TLS

35
New cards

Mobile device ___ refers to copying data back and forth between a PC and phone or tablet.

Synchronizing

36
New cards

iOS can synchronize with a PC via the ___ program.

iTunes

37
New cards

Android phones use ___ for file transfer with a Windows PC.

Picture Transfer Protocol (PTP) or Media Transfer Protocol (MTP)

38
New cards

While devices can often store gigabytes of data, improved Internet bandwidth means that it can be feasible to ___ this data.

Remote backup

39
New cards

What is the purpose of an ___, as fitted in a mobile device?

Accelerometer

40
New cards

What feature allows data to be removed from a device if is lost or stolen? ___

Remote wipe

41
New cards

___ LANs are based on switches and cabled media; ___ networks use IEEE 802.11 standards

Ethernet LANs are based on switches and cabled media; wireless networks use IEEE 802.11 standards.

42
New cards

___ transmission uses routers to forward small packets over any available network path, making the network more resilient to link failures

packet

43
New cards

At the networking layer hosts are identified by an ____.

IP Address

44
New cards

___ provides a means for people to use plain names or labels to access resources. DNS maps these labels to IP addresses.

DNS

45
New cards

Home/small office networks are usually configured with a ___ ___ ___, combining the function of switch, access point, WAN modem, and router.

multifunction network device

46
New cards

___ ___ are a means of validating the identity of a web server or software publisher.

Digital certificates

47
New cards

___ are another essential component of a secure system as they restrict network communications to authorized hosts, applications, and protocols.

Firewalls

48
New cards

___ is often based on a user name/password log on but can also use tokens and biometric data.

Authentication

49
New cards

___ underpins many security mechanisms. Understand the differences between symmetric and asymmetric encryption and cryptographic hashes.

Cryptography

50
New cards

Technical security controls are usually insufficient. ___ ___ is important too and must be shaped by written policies and procedures.

Behavioral security