Mobility Plus Certification Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Anouchka
A
Anouchka
Community Contributor
Quizzes Created: 74 | Total Attempts: 402,722
| Attempts: 61 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Use of a fingerprint or retina scan to authenticate to a system instead of typing a password is an example of which of the following authentication methods?

Explanation

The use of a fingerprint or retina scan to authenticate to a system is an example of a biometric authentication method. Biometric authentication relies on unique physical or behavioral characteristics of an individual, such as fingerprints or retina patterns, to verify their identity. This method provides a higher level of security compared to traditional password-based authentication, as it is difficult to replicate or fake these biometric traits.

Submit
Please wait...
About This Quiz
Mobility Plus Certification Trivia Quiz - Quiz

The mobility plus certification allows you to qualify for a job allowing you to become a traditional desktop support technician or even something bigger, like, for instance, or... see morean enterprise management of BYOD devices and applications. Our quiz will test your knowledge on that field. Complete it and see if you can pass. see less

2. Jerome, a user, reports that his wireless Internet connection seems slow, and he suspects it is being used by unauthorized persons. Which of the following should be implemented to help secure the wireless connection?

Explanation

To help secure the wireless connection, implementing WPA2 is the correct answer. WPA2 (Wi-Fi Protected Access 2) is a security protocol that provides stronger encryption and authentication methods compared to its predecessor, WPA. It helps prevent unauthorized access to the wireless network by requiring users to enter a password or passphrase before connecting. WPA2 is considered more secure and recommended for protecting wireless connections against potential threats and unauthorized usage.

Submit
3. Franck, a user, is being blocked from a website on his mobile device that is needed for him to do his job. Which of the following is the BEST course of action for the network administrator to take in order to allow this website?

Explanation

The best course of action for the network administrator is to whitelist the site. Whitelisting the site means allowing access to the specific website that Franck needs for his job, while still maintaining the content filter in place. This ensures that Franck can access the necessary website without compromising the overall security and filtering measures in the network.

Submit
4. Which of the following frequencies is assigned to WiFi?        

Explanation

WiFi is assigned to the frequency of 2.4 GHz. This frequency is commonly used for wireless communication and is specifically allocated for WiFi networks. It allows for high-speed data transmission and is capable of penetrating walls and other obstacles, making it suitable for indoor and short-range wireless connections.

Submit
5. Which of the following layers involves using a CAT5e cable on a LAN?

Explanation

The correct answer is Physical. The physical layer of the OSI model is responsible for the actual transmission and reception of data over a network. It deals with the physical aspects of the network, such as the cables, connectors, and network interface cards. Using a CAT5e cable on a LAN is a physical layer activity as it determines the physical medium through which the data is transmitted.

Submit
6. Mark, a user, contacts the helpdesk stating his keyboard is not functioning on his mobile device. After the technician has fully resolved the issue, which of the following should be completed?

Explanation

After the technician has fully resolved the issue, it is important to document the findings. This is necessary to keep a record of the problem that occurred and how it was resolved. Documenting the findings helps in maintaining a reference for future troubleshooting or if similar issues arise again. It also helps in tracking patterns or trends in technical problems and their solutions.

Submit
7. Betty, an employee, is planning to travel internationally. Which of the following should an administrator perform FIRST to confirm Betty's mobile device will function in the destination country?

Explanation

To ensure that Betty's mobile device will function in the destination country, the administrator should contact the cellular provider first. The cellular provider will be able to provide information on international roaming services, network compatibility, and any necessary settings or configurations that may be required for the device to work in the destination country. By contacting the cellular provider, Betty can avoid any potential issues or disruptions with her mobile device while traveling internationally.

Submit
8. When Mary, a user, moves between locations in a building she loses connectivity. The administrator takes a survey on the building floors and realizes that while moving from one location to the other the signal fades then comes back again. Which of the following is the BEST explanation?

Explanation

The best explanation for Mary losing connectivity while moving between locations in the building is that the issue is related to attenuation. Attenuation refers to the weakening or loss of signal strength as it travels through obstacles or over distance. In this case, as Mary moves from one location to another, the signal fades and then comes back again, indicating that there is a loss of signal strength due to attenuation. This could be caused by physical barriers or distance between Mary and the wireless access point.

Submit
9. A network administrator notices an unusual volume of mobile device traffic going out over FTP to one particular unknown location. Which of the following ports should be blocked?    

Explanation

Port 21 should be blocked because it is the standard port for FTP (File Transfer Protocol). By blocking this port, the network administrator can prevent the mobile devices from establishing FTP connections and sending data to the unknown location, thereby mitigating the unusual volume of traffic.

Submit
10. For this question, decide whether the action makes it likely or unlikely that the trainer Which of the following conditions is MOST likely to place a device out of compliance with a company's policy requirements.

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 22, 2017
    Quiz Created by
    Anouchka
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Use of a fingerprint or retina scan to authenticate to a system...
Jerome, a user, reports that his wireless Internet connection seems...
Franck, a user, is being blocked from a website on his mobile device...
Which of the following frequencies is assigned to WiFi?    ...
Which of the following layers involves using a CAT5e cable on a LAN?
Mark, a user, contacts the helpdesk stating his keyboard is not...
Betty, an employee, is planning to travel internationally. Which of...
When Mary, a user, moves between locations in a building she loses...
A network administrator notices an unusual volume of mobile device...
For this question, decide whether the action makes it likely or...
Alert!

Advertisement