Mobility Plus Certification Trivia Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Anouchka
A
Anouchka
Community Contributor
Quizzes Created: 74 | Total Attempts: 346,537
Questions: 10 | Attempts: 60

SettingsSettingsSettings
Mobility Plus Certification Trivia Quiz - Quiz

The mobility plus certification allows you to qualify for a job allowing you to become a traditional desktop support technician or even something bigger, like, for instance, or an enterprise management of BYOD devices and applications. Our quiz will test your knowledge on that field. Complete it and see if you can pass.


Questions and Answers
  • 1. 

    Which of the following layers involves using a CAT5e cable on a LAN?

    • A.

      Physical

    • B.

      Session

    • C.

      Transport

    • D.

      Application

    Correct Answer
    A. Physical
    Explanation
    The correct answer is Physical. The physical layer of the OSI model is responsible for the actual transmission and reception of data over a network. It deals with the physical aspects of the network, such as the cables, connectors, and network interface cards. Using a CAT5e cable on a LAN is a physical layer activity as it determines the physical medium through which the data is transmitted.

    Rate this question:

  • 2. 

    Use of a fingerprint or retina scan to authenticate to a system instead of typing a password is an example of which of the following authentication methods?

    • A.

      PKI

    • B.

      Poken

    • C.

      Biometric

    • D.

      Multifactor

    Correct Answer
    C. Biometric
    Explanation
    The use of a fingerprint or retina scan to authenticate to a system is an example of a biometric authentication method. Biometric authentication relies on unique physical or behavioral characteristics of an individual, such as fingerprints or retina patterns, to verify their identity. This method provides a higher level of security compared to traditional password-based authentication, as it is difficult to replicate or fake these biometric traits.

    Rate this question:

  • 3. 

    For this question, decide whether the action makes it likely or unlikely that the trainer Which of the following conditions is MOST likely to place a device out of compliance with a company's policy requirements.

    • A.

      End-user has used the same PIN as the debit card

    • B.

      End-user has sent personal email from the device

    • C.

      End-user allowed another employee to use the device

    • D.

      End-user has modified the default OS of the device

    Correct Answer
    D. End-user has modified the default OS of the device
  • 4. 

    Which of the following frequencies is assigned to WiFi?    

    • A.

      850 MHZ

    • B.

      2.4 GHZ

    • C.

      1.2 GHZ

    • D.

      900 MHZ

    Correct Answer
    B. 2.4 GHZ
    Explanation
    WiFi is assigned to the frequency of 2.4 GHz. This frequency is commonly used for wireless communication and is specifically allocated for WiFi networks. It allows for high-speed data transmission and is capable of penetrating walls and other obstacles, making it suitable for indoor and short-range wireless connections.

    Rate this question:

  • 5. 

    Mark, a user, contacts the helpdesk stating his keyboard is not functioning on his mobile device. After the technician has fully resolved the issue, which of the following should be completed?

    • A.

      Create a plan of action

    • B.

      Test the solution

    • C.

      Identify potential effects

    • D.

      Document the findings

    Correct Answer
    D. Document the findings
    Explanation
    After the technician has fully resolved the issue, it is important to document the findings. This is necessary to keep a record of the problem that occurred and how it was resolved. Documenting the findings helps in maintaining a reference for future troubleshooting or if similar issues arise again. It also helps in tracking patterns or trends in technical problems and their solutions.

    Rate this question:

  • 6. 

    Betty, an employee, is planning to travel internationally. Which of the following should an administrator perform FIRST to confirm Betty’s mobile device will function in the destination country?

    • A.

      Contact the cellular provider

    • B.

      Replace the battery and confirm the cellular strength

    • C.

      Install an international travel application

    • D.

      Reset the device to factory settings

    Correct Answer
    A. Contact the cellular provider
    Explanation
    To ensure that Betty's mobile device will function in the destination country, the administrator should contact the cellular provider first. The cellular provider will be able to provide information on international roaming services, network compatibility, and any necessary settings or configurations that may be required for the device to work in the destination country. By contacting the cellular provider, Betty can avoid any potential issues or disruptions with her mobile device while traveling internationally.

    Rate this question:

  • 7. 

    Jerome, a user, reports that his wireless Internet connection seems slow, and he suspects it is being used by unauthorized persons. Which of the following should be implemented to help secure the wireless connection?

    • A.

      802.11g SSID

    • B.

      WPA2

    • C.

      PAN

    • D.

      802.11g

    Correct Answer
    B. WPA2
    Explanation
    To help secure the wireless connection, implementing WPA2 is the correct answer. WPA2 (Wi-Fi Protected Access 2) is a security protocol that provides stronger encryption and authentication methods compared to its predecessor, WPA. It helps prevent unauthorized access to the wireless network by requiring users to enter a password or passphrase before connecting. WPA2 is considered more secure and recommended for protecting wireless connections against potential threats and unauthorized usage.

    Rate this question:

  • 8. 

    A network administrator notices an unusual volume of mobile device traffic going out over FTP to one particular unknown location. Which of the following ports should be blocked?  

    • A.

      80

    • B.

      990

    • C.

      143

    • D.

      21

    Correct Answer
    D. 21
    Explanation
    Port 21 should be blocked because it is the standard port for FTP (File Transfer Protocol). By blocking this port, the network administrator can prevent the mobile devices from establishing FTP connections and sending data to the unknown location, thereby mitigating the unusual volume of traffic.

    Rate this question:

  • 9. 

    Franck, a user, is being blocked from a website on his mobile device that is needed for him to do his job. Which of the following is the BEST course of action for the network administrator to take in order to allow this website?

    • A.

      Turn off related content filter category

    • B.

      Whitelist the site

    • C.

      Turn off related content filter category

    • D.

      Blacklist the site

    Correct Answer
    B. Whitelist the site
    Explanation
    The best course of action for the network administrator is to whitelist the site. Whitelisting the site means allowing access to the specific website that Franck needs for his job, while still maintaining the content filter in place. This ensures that Franck can access the necessary website without compromising the overall security and filtering measures in the network.

    Rate this question:

  • 10. 

    When Mary, a user, moves between locations in a building she loses connectivity. The administrator takes a survey on the building floors and realizes that while moving from one location to the other the signal fades then comes back again. Which of the following is the BEST explanation?

    • A.

      The IP address is invalid

    • B.

      The mobile devices have weak receivers

    • C.

      The mobile device battery is low

    • D.

      The issue is related to attenuation

    Correct Answer
    D. The issue is related to attenuation
    Explanation
    The best explanation for Mary losing connectivity while moving between locations in the building is that the issue is related to attenuation. Attenuation refers to the weakening or loss of signal strength as it travels through obstacles or over distance. In this case, as Mary moves from one location to another, the signal fades and then comes back again, indicating that there is a loss of signal strength due to attenuation. This could be caused by physical barriers or distance between Mary and the wireless access point.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 22, 2017
    Quiz Created by
    Anouchka
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.