1.
Which of the following can aid a mobile user in finding the nearest coffee shop?(Select the best answer.)
A. 
B. 
C. 
D. 
2.
A user wants to stop his tablet from shifting horizontally when he turns it. Whichof the following should you enable?
A. 
B. 
C. 
D. 
3.
What kind of display would an iPad2 use?
A. 
B. 
C. 
D. 
4.
A user is having difficulty tapping on icons. What should you do to help theuser? (Select the two best answers.)
A. 
B. 
C. 
Install a screen protector.
D. 
E. 
5.
What are two common operating systems used by mobile devices? (Select thetwo best answers.)
A. 
B. 
C. 
D. 
6.
What type of CPU do mobile devices use?
A. 
B. 
C. 
D. 
7.
Which OS is considered to be closed-source?
A. 
B. 
C. 
D. 
8.
What are a couple of differences between a tablet computer and a laptop?(Select the two best answers.)
A. 
Tablets have little or no field serviceable parts.
B. 
C. 
Laptops don’t use touch screens.
D. 
Tablets use flash memory as the hard drive.
E. 
9.
Which of the following are valid Wi-Fi troubleshooting methods? (Select the twobest answers.)
A. 
B. 
C. 
D. 
Make sure the device is within range.
E. 
10.
Which of the following connections requires a username, password, and SMTPserver? (Select the two best answers.)
A. 
B. 
C. 
D. 
E. 
11.
What is the most common connection method when synchronizing data from amobile device to a PC?
A. 
B. 
C. 
D. 
12.
When configuring a Wi-Fi connection what step occurs after successfully enteringthe SSID?
A. 
B. 
Check if the device is within range of the WAP.
C. 
Enter a passcode for the network.
D. 
13.
Which technology would you use if you want to connect a headset to yourmobile phone?
A. 
B. 
C. 
D. 
14.
Which of the following allows other mobile devices to share your mobile device’sInternet connection?
A. 
B. 
C. 
D. 
15.
What would a user need to synchronize contacts from an iPad to a PC?
A. 
Android Synchronization Application
B. 
C. 
D. 
16.
You want to prevent a person from accessing your phone while you step awayfrom your desk. What should you do?
A. 
B. 
Set up a remote wipe program
C. 
D. 
Install a locator application.
17.
What does the iOS Simple Passcode allow a person to enter?
A. 
B. 
C. 
D. 
18.
What do third-party apps such as Find iPhone rely on?
A. 
B. 
Google Apps Device Policy
C. 
D. 
19.
Which of the following can be described as removing limitations on iOS?
A. 
B. 
C. 
D. 
20.
An application won’t close on an Android smartphone. You’ve tried to ForceStop it to no avail. What should you do?
A. 
B. 
Stop the service in Running Services.
C. 
D. 
Bring the device to an authorized service center.
21.
Your organization is concerned about a scenario where a mobile device withconfidential data is stolen. What should you recommend first? (Select the bestanswer.)
A. 
Remote backup application
B. 
C. 
D. 
22.
You are concerned with the possibility of jailbreaks on your organization’siPhones, and viruses on the Android-based devices. What should you implement?
A. 
B. 
C. 
D. 
23.
Which of the following application stores are compatible with iOS?
A. 
B. 
C. 
D. 
24.
A company would like to increase the security on their company’s smart phones. Which of the following should be configured to ensure information stored on a smart phone can be removed if it is lost or stolen?
A. 
B. 
C. 
Strong password complexity
D. 
Failed login attempts restrictions
25.
Which of the following disk defragmentation command line options is used to perform operation on ALL volumes in Windows OS?
A. 
B. 
C. 
D.