CompTIA A+ Exam Cram: Mobile Device Hardware and Operating Systems

Date: Sep 27, 2012

Return to the article

As an A+ technician you need to know the basic hardware of mobile devices. This chapter covers Apple devices and Android-based devices, but also briefly discuss some of the other players in the market. This chapter covers CompTIA A+ 220-802 objectives 3.1 through 3.5.

Mobile devices have simply exploded on to the mainstream scene. Especially since 2010, the amount of mobile devices in use has been growing exponentially. Now, it seems that everywhere you look there is someone tapping away on a tablet computer, smartphone, or other mobile device. As of 2012, half a million Android and Apple devices are activated daily—and that number is increasing! Because of this CompTIA has added an entire mobile devices section to the A+ 220-802 exam. As an A+ technician you need to know the basic hardware of these devices, the differences between the two main mobile operating systems, how to network and synchronize the devices, and how to secure them.

In this chapter we’ll pay the most attention to Apple devices and Android-based devices, but we’ll also briefly discuss some of the other players in the market. For this edition of the book I will refer to an Apple iPad2 tablet computer and an Android HTC Evo smartphone. I do this so that you can see some important configurations on the two most-used platforms in the mobile device market. So enough talk...let’s get mobile!

Mobile Hardware and Operating Systems

Mobile devices are computers, smaller and lighter than desktops and laptops, but computers nonetheless. There are similarities and differences in hardware between the two. You will find there are new players on the software side, and these too have similarities and differences compared to PCs and laptops. But remember that at their core, mobile devices are still computers, and many of the principles and rules that you have learned earlier in this book regarding hardware and software still apply.

Mobile Hardware Examples

A common device as of the writing of this book is the Apple iPad2. It is known as a tablet computer and is manufactured by Foxconn, who also constructs the iPhone, Kindle, Playstation 3, and Xbox 360. Table 17.1 gives a list of the hardware the iPad2 uses.

Table 17.1. Apple iPad2 Hardware

Hardware Component

Description

1 GHz ARM CPU

  • 32-bit Advanced RISC Machine Processor

  • Designed for simplicity and low-power

512 MB DDR2 RAM

  • Similar DDR standard to what PCs use

  • Smaller form factor

16 GB Flash Memory

  • Similar to solid-state flash memory in a USB flash drive

  • Used for permanent storage instead of an SATA or IDE hard drive

Multitouch touchscreen

  • Capacitive touchscreen that responds to fingers and stylus devices

Lithium-ion polymer battery

  • Similar to lithium-ion batteries in laptops

  • Can be made into any shape

  • Lasts for 10 hours on a full charge

As you can see from the table, the basic components of CPU, RAM, and so on are the same as desktop/laptop computers. But the types of components are different. The whole concept of this hardware configuration is based on portability and ease of use. Therefore, tablet computers will be less powerful than desktop computers and laptops; but, the hardware is matched to the type of applications the device will be used for.

Similar tablets (but with different software) include the Motorola Xoom, Samsung Galaxy, and Asus Transformer. These will often be less proprietary than an Apple device; for example, they might use Micro-USB ports for charging and synchronization of data, whereas the Apple iPad2 has a proprietary charging port. You might also see different names for the touch interface of a device. For example, the company HTC developed a user interface called TouchFLO for its smartphones that enabled the user to drag the screen up, left, or right. This has been replaced by HTC Sense, which is a multitouch-enabled touch screen similar to the Apple multitouch technology. As of 2012, most new smartphones and tablets feature multitouch touch screens.

Hardware Differences Between Tablets and Laptops

One of the big distinctions between tablets and laptops is the lack of field serviceable parts. Another difference is that tablets and other similar devices are usually not upgradeable. Some mobile devices, such as smartphones, can have upgraded memory cards and/or batteries, but that’s about it, and these are usually not serviceable in the field because it is difficult to protect yourself from ESD when working on these devices. (But that doesn’t mean it isn’t done.) Many organizations recommend you bring the device back to the lab for upgrades or parts swaps. Other devices such as the iPad2 are not user-serviceable whatsoever; and any attempt at doing so voids the warranty. If repair, upgrade, or replacement is necessary, most organizations utilize the warranties built in to these products, instead of trying to do the work in-house.

A laptop is actually just a smaller, portable version of a desktop computer. Like the desktop computer, it contains a similar processor, similar DDR RAM, and a hard drive that could possibly be solid-state, but regardless will most likely be plugged into an SATA port. It also has a keyboard, and a touchpad similar to a mouse. All this hardware is designed to make the best use of operating systems that you would normally find on a desktop computer. Tablets on the other hand use ARM-based processors and use nonvolatile flash memory hard-wired to the system instead of a magnetic or solid-state hard drive. So, as you can imagine, the tablet has a loss of performance when compared to a laptop. In addition, the tablet utilizes an on-screen keyboard and doesn’t require any type of mouse due to the touchscreen capability. All this hardware is designed to run mobile device software such as Android or iOS.

Mobile Operating Systems

Currently, mobile device software comes in one of two forms: open-source, which is effectively free to download and modify; and closed-source, otherwise known as vendor-specific, which cannot be modified without express permission and licensing. There are benefits and drawbacks to each type of system. Because you will see both in the field, you should know each one equally. Let’s go over these two systems.

Open-Source: Android

Android is an example of open source software. It is a Linux-based operating system used mostly on smartphones and tablet computers and is developed by the Open Handset Alliance, a group directed by Google. Google releases the Android OS code as open-source, allowing developers to modify it, and freely create applications for it. Google also commissioned the Android Open-Source Project (AOSP); its mission is to maintain and further develop Android. You’ll know when you are dealing with the Android open-source OS and related applications when you see the little robot caricature, usually in green.

Android OS versions are dubbed with names such as Cupcake, Gingerbread, and the two latest: Honeycomb (version 3) and Ice Cream Sandwich (version 4). To find out the version you are currently running, start at the Home screen; this is the main screen that boots up by default. Then tap the Menu button, and then tap Settings. (Settings is used often in this chapter as a starting point, so remember how to get there!) Scroll to the bottom and tap the About Phone (or just About) option. Then tap Software Information or similar option. This displays the version of Android. Figure 17.1 shows a smartphone using Android version 2.3.3 (Gingerbread)

Figure 17.1. Typical smartphone using Android version 2.3.3

Say a company wanted to create a custom version of the Android OS for a handheld computer that it was developing. According to the license, the company would be allowed to do this and customize the OS to its specific hardware. Some companies opt to use Android for this purpose, whereas others use Windows CE or Windows Mobile (for a fee), both designed for handheld computers.

Closed-Source: iOS

Apple’s iOS is an example of closed-source software. It is found on iPhones and iPads as well. It is based off Mac OS X (used on Mac desktops and laptops) and is Unix-based.

To find out the version of iOS you are running go to the Home screen, and then tap Settings. Tap General and then tap About. You see the Version number. For example, Figure 17.2 shows an iPad2 running Version 5.0 (9A334). 9A334 is the build number; this was the public release of version 5.0.

Figure 17.2. iPad2 using version 5.0 of iOS

Unlike Android, iOS is not open-source, and is not available for download to developers. Only Apple hardware uses this operating system. This is an example of vendor-specific software. However, if a developer wants to create an application for iOS, they can download the iOS software development kit (SDK). Apple license fees are required when a developer is ready to go live with the application.

Obtaining Applications

Mobile devices are nothing without applications. To this end, both Android and iOS have application sources where you can download free and paid applications (also known as apps).

Android users download applications from the Android Market (also accessible through Google Play.) This can be done directly from the mobile device. Or if a mobile device is connected via USB to a computer, the user can browse apps on the Google Play website while working on the computer and download directly from the site to the phone, passing through the computer.

iOS users download applications from the App Store. This was originally an update to the iTunes store, but on newer iOS mobile devices, it is now a separate icon on the Home screen. Apps can also be downloaded from a Mac or from a PC through the iTunes application.

Regardless of the OS, users would search for the name of the application they want, download it, start the installation process, agree to a license, and then finally make use of the app.

Some applications don’t work unless a person was to hack the OS and gain “superuser” privileges. In the Android world this is known as rooting the phone or other mobile device. In the iOS world it is jailbreaking. Note that performing either of these could be a breach of the user license agreement. It can also be dangerous. These types of hacks often require a person to wipe out the device completely, and install a special application that may or may not be trustworthy. Many phones are rendered useless or are compromised when attempting this procedure. Applications that have anything to do with rooting or jailbreaking should generally be avoided.

Screen Configurations

Mobile device displays rotate by default if the user turns the device, allowing the screen to be viewed vertically or horizontally. This aids when looking at pictures, movies, or viewing websites. But in some cases, a user might want to lock the rotation of the device so that it stays as either vertical or horizontal, without moving. On an Android device this can be done by accessing Settings, then tapping Display, and then deselecting Auto-rotate screen. On an iOS device (version 4 or 5) this can be done by double-tapping the Home button (which brings up the multitasking bar on the bottom) and then swiping the bar all the way to the right. Finally, a circular arrow is shown to the far left; tap this, and rotation will be locked. Some iPads (such as the iPad2) also have a side switch that can be configured to enable/disable rotation lock; this feature can be turned on in Settings > General > Use side switch to: Lock Rotation.

Screen orientation is a simple concept to understand and use. But it can be more complicated when it comes to applications. For example, Apple mobile devices make use of the Accelerometer: a combination of hardware and software that measure velocity; they detect rotation, shaking of the device and so on. It’s the accelerometer that enables a mobile device to automatically adjust from portrait (vertical) to landscape (horizontal) mode using the three axes: the X-axis (left to right), the Y-axis (up and down), and the Z-axis (back to front). These are manipulated by developers for applications and games so that the program can recognize particular movements of the device and translate them to specific application functions. Newer Apple devices include a gyroscope, which adds the measurements of pitch, roll, and yaw, just like in the concept of flight dynamics. You won’t need a pilot’s license to use an iPad, but this additional measurement of movement has a great impact on the development of newer applications and especially games. Of course, if the accelerometers or gyroscope of the mobile device fail and a reset of the device doesn’t fix the problem, it must be repaired at an authorized service center.

Android devices have a screen calibration utility called G-Sensor calibration. It is found in Settings > Display. To make sure that the three axes are calibrated properly, this program is run while the mobile device is laid on a flat surface. You can tell if the surface is level by the horizontal and vertical leveling bubbles on the display. Then press the Calibrate button to reset the G-sensor, as shown in Figure 17.3.

Figure 17.3. G-Sensor calibration on a typical smartphone

Other mobile devices’ calibration programs show a crosshair or similar image in the center of the screen. You need to tap with a stylus as close to the center of the display as possible. If a stylus is not available, use the pointed end of a pen cap.

A reset can also fix problems with calibration (as well as other types of problems). There are two types of resets: soft and hard. A soft reset is usually performed simply by powering the device off and then powering it back on again. This can fix temporary problems quickly and easily. It is similar to rebooting a PC. However, more advanced problems require a hard reset. Warning! A hard reset may remove all data and applications and return the device to its original factory state. Do not perform a hard reset without backing up the contents of the memory card in the mobile device, and any additional settings you require. You can find more information on resets in the section titled “Mobile Security.”

Today’s Apple devices do not offer a calibration utility. Sometimes, issues that appear to be calibration problems are actually something else with an easy fix. For example, cheaper screen protectors can bubble and otherwise cause problems when tapping on the screen. Removing the protector and installing a new one properly can fix this problem. When installing a screen protector, use a long, flat surface to squeeze all the bubbles out; there are shims that can be purchased for just this purpose. Use a decent screen protector such as Ghost Armor or something similar. Good quality screen protectors will not only protect the display, but they will also reduce glare, smudging, and fingerprints, without reducing sensitivity. Dirty screens can also be a culprit when a user is having difficulty tapping on icons or smaller items. Clean the display with a lint-free cloth. If the screen is very dirty, mix 50% isopropyl alcohol and 50% water, apply conservatively to the cloth, and then clean the display with the cloth. Make sure all traces of liquid are removed when you are done. If none of these steps work, the device needs to be brought in to an authorized service center for repair.

GPS and Geotracking

The Global Positioning System (GPS), developed by the U.S. DoD is a worldwide system of satellites that provide location information for anything with a GPS receiver. Any mobile device with a GPS receiver can use this system to identify its location and utilize mapping programs and any other applications that rely on GPS. Some mobile devices do not have a GPS receiver, and instead use cell tower triangulation, or Location Services that uses crowd-sourced Wi-Fi locations to determine the approximate location of the device.

To enable/disable GPS on an Android-based device go to Settings > Location, and select Use GPS satellites. To enable/disable GPS on an Apple device such as an iPad, go to Settings > Location Services.

Geotracking is the practice of tracking and recording the location of a mobile device over time. This location tracking is done by Apple and Google as well as other organizations and governments. Privacy issues aside, this practice is being done, so if a user doesn’t want their location known, simply disable the GPS setting.

Cram Quiz

Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can.

220-802 Questions

  1. A user is having difficulty tapping on icons. What should you do to help the user? (Select the two best answers.)

    A.

    Clean the display.

    B.

    Tap the Home button.

    C.

    Install a screen protector.

    D.

    Initiate a soft reset.

    E.

    Initiate a hard reset.

  2. Which of the following can aid a mobile user in finding the nearest coffee shop? (Select the best answer.)

    A.

    Geotracking

    B.

    iOS

    C.

    GPS

    D.

    GSM

  3. A user wants to stop his tablet from shifting horizontally when he turns it. Which of the following should you enable?

    A.

    Lock Rotation

    B.

    Accelerometer

    C.

    Gyroscope

    D.

    Screen Calibration

  4. What kind of display would an iPad2 use?

    A.

    CRT

    B.

    Multitouch

    C.

    Tap screen

    D.

    Singletouch

  5. What are two common operating systems used by mobile devices? (Select the two best answers.)

    A.

    Blueberry OS

    B.

    iOS

    C.

    Google OS

    D.

    Android OS

  6. What type of CPU do mobile devices use?

    A.

    Core i7

    B.

    Phenom II

    C.

    ARM

    D.

    Pentium

  7. Which OS is considered to be closed-source?

    A.

    Android OS

    B.

    Bluetooth

    C.

    Linux

    D.

    iOS

  8. What are a couple of differences between a tablet computer and a laptop? (Select the two best answers.)

    A.

    Tablets have little or no field serviceable parts.

    B.

    Tablets are upgradeable.

    C.

    Laptops don’t use touch screens.

    D.

    Tablets use flash memory as the hard drive.

    E.

    Tablets use RAM.

Cram Quiz Answers

220-802 Answers

  1. A and D. A dirty display can cause issues when trying to manipulate a multitouch screen. By cleaning it, the user might find that is it easier to use. A soft reset (turning the device off and on) can sometimes fix the problem as well. Tapping the Home button simply brings the person to the Home screen. Screen protectors are a good idea, but if installed incorrectly, they could actually be the reason that a user has issues tapping icons. After the screen is cleaned, a decent quality screen protector should be installed. Hard resets often initiate a complete wipe of the system. Use this only as a last resort.
  2. C. GPS is used to locate the mobile user. From that information, one of several programs can locate that all-important nearest coffee shop. Geotracking is the practice of tracking and recording the location of a mobile device. However, geotracking is done by organizations, whereas GPS is something installed to the mobile device. iOS is the operating system used by Apple mobile devices. GSM is a cellular standard.
  3. A. Enable Lock Rotation on Apple devices. On Android devices disable Auto-rotate. The Accelerometer is a term used by Apple to describe the hardware/software that controls the three axes of movement. The Gyroscope is another term used by Apple to describe the device that measures the additional three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration is used to reset the device that measures the three axes.
  4. B. iPad2 devices use multitouch screens, which allow more than one contact point. Cathode ray tube (CRT) is an older technology monitor used by desktop computers. You would “tap” the screen, but it is known as a touchscreen. Singletouch screens are an older technology; you won’t see much of that in the field.
  5. B and D. Two common operating systems used by mobile devices are iOS and Android OS. Blackberry OS is the OS used on Blackberry devices. Android is effectively controlled by Google. There is a Google Chrome OS designed to work with web applications that is also open-source.
  6. C. Most commonly, mobile devices use ARM (Advanced RISC Machine) CPUs. Core i7, Phenom II and the older Pentium are used by desktop and laptop computers.
  7. D. The Apple iOS is a closed-source vendor specific operating system. Android is a type of Linux that is open-source. Bluetooth is a wireless standard, not an operating system.
  8. A and D. Unlike laptops, tablets are not field-serviceable. They use flash memory instead of an SATA hard drive. Tablets are for the most part not upgradeable. Some laptops do come with touchscreens. Both tablets and laptops use RAM.

Mobile Networking and Synchronization

Now that we’ve discussed mobile hardware and software, let’s go ahead and harness their power through networking and synchronization.

From cellular GSM connections to Wi-Fi and Bluetooth, a mobile device can create connections to computers and networks, download e-mail, and work with headsets and remote printers.

Synchronization is the matching up of files, e-mail, and other types of data between one computer and another. We use synchronization to bring files in line with each other and to force devices to coordinate their data. When dealing with synchronization, a mobile device can connect to a PC via USB (the most common), RS-232 serial connections (less common), Wi-Fi, and Bluetooth.

GSM Cellular Connectivity

Cellular phones use the Global System for Mobile Communications (GSM) to make voice calls, and GSM or the general packet radio service (GPRS) to send data at 2G speeds through the cellular network. Extensions of these standards, 3GPP and EDGE are used to attain 3G speeds. 4G speeds can be attained only if a mobile device complies with the International Mobile Telecommunications Advanced (IMT-Advanced) requirements, has a 4G antenna, and is in range of a 4G transmitter, which as of the writing of this book, are only common in urban areas.

Most devices cannot shut off the cellular antenna by itself (unless shutting down the whole device.) However, every device manufactured now is required to have an “airplane mode,” which turns off any wireless antenna in the device including GSM, Wi-Fi, GPS, and Bluetooth. On a typical Android device, this can be done by going to Settings > Wireless & Networks > and check marking Airplane Mode. You will find that some airlines don’t consider this to be acceptable and will still ask you to turn off your device, either for the duration of the flight or at least during takeoff and landing. Android devices can also access Airplane Mode by pressing and holding the power button. To enable airplane mode on an Apple tablet you would go to Settings > Airplane Mode.

Wi-Fi Network Connectivity

Using a cellular connection can be slow when transmitting data (unless you happen to get a 4G signal). That’s why all mobile devices are equipped with an embedded wireless antenna to connect to wireless LANs. This WLAN antenna (often referred to as a Wi-Fi antenna) can allow access to 802.11a, b, g, and n networks. The wireless configuration works similar to a wireless connection on a PC or laptop. See Chapter 15, “Networking,” for a detailed description of connecting to wireless networks.

In general, the mobile device must first search for wireless networks before connecting. On a typical Android smartphone, this can be done in the following steps:

  1. Go to Settings > Wireless & Networks > Wi-Fi Settings.
  2. From there, most devices usually scan for wireless networks automatically, or you could tap Add Wi-Fi Network to add one manually.
  3. If adding a network manually, enter the SSID of the wireless access point in the Add Wi-Fi Network window, as shown in Figure 17.4.

    Figure 17.4. Android OS Prompting for the user to enter an SSID

  4. Enter the passcode for the network. If the code is correct, then the wireless adapter in the mobile device gets an IP address allowing it to communicate with the network. If a wireless network uses WPA2, and the mobile device isn’t compatible, you should search for an update to the operating system to make it WPA2-compliant.

Follow these steps to access wireless networks on an iPad or similar device:

  1. Go to Settings > Wi-Fi.
  2. The device usually scans for networks automatically. To connect to a network manually, tap Other.
  3. If adding a network manually, type the SSID of the network in the Name field.
  4. Type the passcode for the network. If adding the network manually, you can select the type of security, for example WPA2, as shown in Figure 17.5.

Figure 17.5. iOS Prompting for the user to enter an SSID for a WPA2-secured network

Almost all types of devices display the universal wireless icon when connected to a wireless network, as shown in Figure 17.6. This icon not only let’s you know when you are connected, but also how strong the connection is. The more curved lines you see, the better the connection.

Figure 17.6. Universal wireless symbol

Some mobile devices can also perform Wi-Fi tethering. This is when the mobile device shares its Internet connection with other Wi-Fi capable devices. For example, if one user had a smartphone that could access the Internet through 3G or GPRS networks, then it could be configured to become a portable Wi-Fi hotspot for other mobile devices that are Wi-Fi capable but have no cellular or GPRS option. Another option in Android is USB tethering. When an Android phone is connected to a desktop computer via USB, the desktop (Windows or MAC) can share the phone’s mobile network.

A lot of devices can also be configured for Internet pass-through as well. This means that the phone or other device connects to a PC via USB and accesses the Internet using the PC’s Internet connection.

Wi-Fi Troubleshooting

When troubleshooting mobile device wireless connections, always make sure of the following basic wireless troubleshooting techniques:

If you still have trouble, here are a few more methods that can help to connect, or reconnect to a wireless network:

Figure 17.7. Advanced wireless settings in Android

Figure 17.8. Advanced wireless settings in iOS

One of these methods usually works when troubleshooting a wireless connection but if all else fails; a hard reset can bring the device back to factory settings. (Always back up all data and settings before performing a hard reset.) And if the mobile device still can’t connect to any of several known good wireless networks, bring the device to an authorized service center.

Bluetooth Configuration

Bluetooth is a wireless standard for transmitting data over short distances. It is commonly implemented in the form of a headset or printer connection by mobile users. It is also used to create wireless personal area networks (WPANs) consisting of multiple Bluetooth-enabled mobile devices.

By default, Bluetooth is usually disabled on Android devices but is enabled on devices such as iPads. To connect a Bluetooth device to a mobile device, Bluetooth first needs to be enabled. Then the Bluetooth device needs to be synchronized to the mobile device. This is known as pairing or linking. It sometimes requires a pin code. When synchronized, the device needs to be connected. Finally, the Bluetooth connection should be tested. Following are the steps involved in connecting a Bluetooth headset to a typical Android-based device and to an iPad. Before you begin, make sure the Bluetooth headset is charged.

Steps to Configure a Bluetooth Headset on an Android-based Device

  1. Go to Settings > Wireless & Networks > and check the box for Bluetooth. This enables Bluetooth on the mobile device.
  2. Tap Bluetooth Settings. This displays the Bluetooth Setting screen.
  3. Prepare the headset. This can vary from headset to headset. For example, on a typical Motorola Bluetooth headset, you press and hold the button while opening the microphone. Keep holding the button.
  4. Tap Scan for Devices on the Android device. Keep holding the button on the headset until the Android device finds it.
  5. On the Android device, under the Bluetooth device tap Pair with This Device. Most Android devices pair the Bluetooth headset to the mobile device and then complete the connection automatically, allowing full use of the device.
  6. Enter a pin code if necessary. Many devices come with a default pin of 0000.

When finished, the screen on the Android device will look similar to Figure 17.9. Note the Bluetooth icon at the top of the screen. This icon tells you if Bluetooth is running on the device. It will remain even if you disconnect the Bluetooth device. For this headset device we would test it simply by making a phone call. To disconnect it, simply tap the device on the screen and tap OK. It will remain paired but nonfunctional until a connection is made again.

Figure 17.9. Installed Bluetooth device on an Android phone

Mobile devices can also connect to other Bluetooth-enabled devices (forming a PAN), or to a computer equipped with a Bluetooth dongle. To do this, you must set the mobile device to discoverable (which generally lasts for only 2 minutes). In the same fashion that the headset was discovered by the mobile device in the previous procedure, so can a mobile device be discovered by a computer or other mobile device. When connecting a mobile device to another mobile device or PC, it can be identified by its name. For example, the mobile device in Figure 17.9 is listed as PG06100. You can modify this name if you want. It is authenticated by a pin code chosen at the PC or other mobile device. We would test these types of connections by sending data or by initiating communications.

Steps to Configure a Bluetooth Headset on an iOS-based Device

This exercise refers to an iPad2.

  1. Go to Settings > General > and tap Bluetooth. This displays the Bluetooth screen.
  2. Tap Bluetooth to enable it (if it isn’t enabled already). This automatically starts searching for devices and continues to do so.
  3. Prepare the headset. This can vary from headset to headset. For example, on a typical Motorola Bluetooth headset, you press and hold the button while opening the mic. Keep holding the button. The iPad2 will automatically recognize the device and list it as discoverable.
  4. Tap the device name, and it should automatically connect, as shown in Figure 17.10.

    Figure 17.10. Installed Bluetooth device on an iPad2

  5. Enter a pin code if necessary.

To remove the device, click it, and on the next screen click Forget.

Bluetooth devices can be connected to only one mobile device at a time. If you need to switch the Bluetooth device from one mobile device to another, be sure to disconnect it or “forget” it from the current connection before making a new one.

Bluetooth Troubleshooting

If you have trouble pairing a Bluetooth device, and connecting or reconnecting to Bluetooth devices or PANs, try some of the following methods:

E-Mail Configurations

Though there are many other types of communication available to mobile users, e-mail still accounts for an important percentage. You should know how to configure a mobile device for web-based e-mail services such as Gmail, Yahoo, and so on. You should also know how to configure POP3, IMAP, and connections to Microsoft Exchange Servers.

Web-Based E-Mail for Mobile Devices

Mobile devices can access web-based e-mail through a browser, but this is not necessary nowadays due to the “app.” For example, Android devices come with a Gmail application built in, allowing a user to access Gmail directly without having to use the browser. Apple iOS devices allow connectivity to Gmail, Yahoo, and a host of other e-mail providers as well.

Connecting to these services is simple and works in a similar fashion as when working on a desktop or laptop computer. Choose the type of provider you use, enter a username (the e-mail address) and password (on Apple devices an Apple ID is also required), and the user will have access to web-based e-mail.

When troubleshooting issues with e-mail, make sure that the username and password are typed correctly. Using onscreen keyboards often leads to mistyped passwords. Also make sure that the mobile device is currently connected to the Internet.

POP3, IMAP, and Exchange

If you need to connect your mobile device to a specific organization’s e-mail system, it gets a little bit more complicated. You need to know the server that you want to connect to, the port you need to use, and whether security is employed.

Here’s a step-by step process on how to connect a typical Android smartphone to a POP3 account.

  1. Go to Home and tap the menu button. Then select All apps.
  2. Scroll down until you see the Mail app, and tap it. (This might also be listed as E-mail.)
  3. Select whether you want POP3, IMAP, or Exchange. (For this exercise select POP3.)
  4. Type the e-mail address and the password of the account and tap Next.
  5. Configure the incoming settings. Change the username if desired to something different than the e-mail address. Then type the POP3 server name. By default it will be the domain name portion of the e-mail address, which is usually correct. If security is used select SSL or TLS. This information should be supplied by the network administrator. Type the port number. For POP3 this is 110 by default. If port numbers are different, they will also be supplied to you by the network administrator. Then tap Next.
  6. Configure the outgoing settings. Type the SMTP server. Organizations will often use the same server name as the POP3 server. However, small office and home users might have to use their ISP’s SMTP server. If security is used, select SSL or TLS. Type the port number for SMTP, which is 25. (Again, this is a default.) Then tap Next.
  7. Configure account options. From here you can tell the mobile device how often to check for mail and whether to notify you when it arrives. Tap Next. At this point, new e-mail should start downloading.
  8. Finally, you can give the account an easier name for you to remember it by. Tap Done.

Adding an e-mail account to an iOS-based device works essentially the same, but the navigation will be slightly different. For example, to add an e-mail account to an iPad2, go to Home > Settings > Mail, Contact, Calendars > Add Account > Other > Add Mail Account. Then type the information in the same manner you would in the previous steps.

Now, if you instead have to connect an IMAP account, you have to type the IMAP server (for downloading mail) which uses port 143 by default, and the outgoing SMTP server (for sending mail). If you connect to a Microsoft Exchange mail server, that server name often takes care of both downloading and uploading of e-mail. You might need to know the domain that the Exchange server is a member of. Secure e-mail sessions require the use of SSL or TLS on port 443. Check with the network administrator to find out which protocol to use. POP3 also has a secure derivative known as APOP, a challenge/response protocol which uses a hashing function to prevent replay attacks during an e-mail session. This protocol can be chosen from the Android platform, and is also used by Mozilla Thunderbird, Windows Live Mail and Apple Mail.

Configuring e-mail accounts for other devices, such as the Blackberry, works in a similar fashion to other smartphones. However, you also have the option to connect to a Blackberry Enterprise Server, which is similar to Microsoft Exchange. These Blackberry servers are at the core of “pushed” e-mail, which Blackberry pioneered for users to get their e-mail immediately when it reaches the mail server.

Troubleshooting E-mail Connections

If you have trouble connecting an e-mail account, try some of the following methods:

Synchronizing an Android Device to a PC

If you connect an Android-based mobile device to a PC via USB, Windows will most likely recognize it, and you will have a few options display on the Android screen, as shown in Figure 17.11.

Figure 17.11. PC Connection Options on Android

The first option is Charge Only. Aside from charging the Android device by connecting it to an AC outlet, a PC’s USB port can charge it. (Though it will probably take longer to charge.) This first option is the default, so if you need to charge a device only, you won’t have to change this setting. We’ll skip the second option for now and come back to it later. The third option is Disk Drive. If you want to display the contents of the mobile device’s memory card within Windows you have to select this. Then, the device shows up as a Removable Disk in Windows Explorer. From there, data can be copied back and forth between the PC and the mobile device as you usually would within Windows. Older Android devices required you to tap “mount” to have the phone show as a Removable Disk.

You will also note USB tethering on the list. This allows you to share the mobile device’s cellular network with the PC. The last item on the list is Internet Pass-through, which as mentioned previously allows you to use the PC’s Internet connection on the mobile device.

Now, none of these so far allow you to synchronize information from the mobile device to the PC. Only the second option HTC Sync allows this synchronization, but with a caveat: The PC must have the appropriate synchronization software installed. Keep in mind that this software (and connection name) will be different depending on the manufacturer of the device. This example shows an HTC Evo smartphone.

Most synchronization software requires the PC have Windows XP or higher, 1 GB of RAM or more, USB 2.0 ports minimum, and 300 MB of free space on the hard drive. Syncing software is freely downloadable from the manufacturer’s website.

HTC Sync for example can synchronize music, pictures, the calendar, bookmarks and more. This synchronization can be initiated from the mobile device or from the program on the PC. Documents, music, pictures and video will be synchronized by default to the Windows Libraries of the same names.

If you use the mobile device’s built-in contacts and e-mail programs, the information within those programs will be transferred to the PC’s corresponding programs. For example the Calendar and Contacts will be synchronized with Microsoft Outlook. However, for this mobile device, Gmail or Exchange contacts information will not be synchronized, nor will any other third-party data besides data that originates from, or is destined for, a Microsoft application.

However, not everyone uses synchronization software. Some people exclusively use Gmail on the Android platform. Google automatically synchronizes mail, contacts, and the Calendar so that you can view the information on the mobile device or on the PC (when connected to the Gmail website). However, because the data is stored on a Google server, security can be compromised. If you choose to do this, you should use an extremely strong password, change it every month or so, and use a secure browser when connecting to Gmail from your PC. The same people who use Gmail usually transfer data by simply mounting the mobile device as a disk drive in Windows. This effectively renders the synchronization software unnecessary for those people.

Third-party tools (such as Mark/Space) are available if a person wants to synchronize an Android device with a PC or MAC via Bluetooth or Wi-Fi. Standard Microsoft ActiveSync is not used to synchronize data between Android and Windows. However, Exchange ActiveSync can be used to synchronize e-mail, contacts, and calendars between an Android 2.0 mobile device and higher with an Exchange Server.

Synchronizing an iPad2 to a PC

Before getting into synchronizing, let’s talk about charging. The best way to charge an iPad is by plugging the AC adapter into an outlet. If the iPad is connected to a desktop computer via USB and is turned on, it will not charge. However, if it is connected by USB and it is sleeping or off, it will slowly charge. If the computer is not equipped with a high-power USB port, this could take a long time. Regardless, Apple recommends plugging these devices into the AC outlet to charge.

If you plug an iPad into a PC via USB, Windows should automatically recognize it and install the driver for it. At that point you can move files between the PC and the iPad’s memory card. The iPad shows up in Windows Explorer as Apple iPad directly inside of Computer.

To synchronize data such as contacts, calendars, and so on, PC users need to use iTunes for Windows. From iTunes a user would select Sync Contacts or Sync Calendars, for example. This information can be synchronized to Microsoft Outlook 2003 or higher, Windows Address Book (in Windows XP), and Windows Contacts (in Windows 7/Vista). Mac users benefit from the simplicity of synchronization across all Apple products. They can use iTunes or can use the iCloud to store, backup, and synchronize information across all Apple devices. This can be done by USB or via Wi-Fi if the various Apple devices are on the same wireless network. Calendar items can also be synced from the iPad itself by going to Settings > Mail, Contacts, Calendars. Then scroll down and select Sync, as shown in Figure 17.12.

Figure 17.12. Apple iPad2 synchronization example

Synchronizing Other Devices

The two operating systems the CompTIA objectives are concerned with are Android and iOS. However, these are not the only players on the field! Let’s mention a few other devices.

First of all, the Blackberry deserves some mention. For the longest time, this was the standard device a business person would use. It has lost some momentum, but you still see plenty of them in the field. Blackberry offers Desktop Software. Separate versions for PC and Mac are available at this link:

http://us.blackberry.com/apps-software/desktop/

The software works in a similar fashion to other synchronization software for Android or iOS.

And let’s not forget about Microsoft mobile operating systems. Windows CE and Windows Mobile are commonly found in the transportation, medical, and surveying fields, as well as other niche markets that require rugged, waterproof devices. These devices synchronize to the PC by way of Microsoft ActiveSync (for Windows XP or earlier) and the Windows Mobile Device Center (Windows Vista or newer.) The Windows Mobile Device Center is available at this link:

http://www.microsoft.com/download/en/details.aspx?id=14

These programs can synchronize data between the mobile device and the PC via USB or Bluetooth connections. Microsoft does not allow synchronization over Wi-Fi as it is deemed a security issue.

Cram Quiz

Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can.

220-802 Questions

  1. Which of the following are valid Wi-Fi troubleshooting methods? (Select the two best answers.)

    A.

    Power cycle the device.

    B.

    Restart Bluetooth.

    C.

    Use a static IP.

    D.

    Make sure the device is within range.

    E.

    Rename the SSID.

  2. Which of the following connections requires a username, password, and SMTP server? (Select the two best answers.)

    A.

    Bluetooth connection

    B.

    Wi-Fi connection

    C.

    POP3 connection

    D.

    Exchange connection

    E.

    IMAP connection

  3. What is the most common connection method when synchronizing data from a mobile device to a PC?

    A.

    Wi-Fi

    B.

    Bluetooth

    C.

    USB

    D.

    FireWire

  4. When configuring a Wi-Fi connection what step occurs after successfully entering the SSID?

    A.

    Select POP3.

    B.

    Check if the device is within range of the WAP.

    C.

    Enter a passcode for the network.

    D.

    Scan for networks.

  5. Which technology would you use if you want to connect a headset to your mobile phone?

    A.

    Bluetooth

    B.

    GSM

    C.

    Wi-Fi

    D.

    Exchange

  6. Which of the following allows other mobile devices to share your mobile device’s Internet connection?

    A.

    Internet pass-through

    B.

    Locator application

    C.

    IMAP

    D.

    Wi-Fi tethering

  7. What would a user need to synchronize contacts from an iPad to a PC?

    A.

    Android Synchronization Application

    B.

    Google Play

    C.

    iTunes

    D.

    ActiveSync

Cram Quiz Answers

220-802 Answers

  1. A and D. Valid Wi-Fi troubleshooting methods include power cycling the device and making sure that the mobile device is within range of the wireless access point. Bluetooth could possibly cause a conflict with Wi-Fi. If you suspect this, Bluetooth should simply be turned off. Static IP addresses are one thing you can check for when troubleshooting. Normally, the mobile device should obtain an IP address from a DHCP server. Renaming the SSID of the access point could cause problems for all clients trying to connect. However, you should make sure that the correct SSID was typed (if the connection were made manually.)
  2. C and E. POP3 and IMAP e-mail connections require an incoming mail server (either POP3 or IMAP), and an outgoing mail server (SMTP.) Bluetooth and Wi-Fi connections do not require a username or SMTP server. Exchange connections require a username and password, but no SMTP server. The Exchange server acts as the incoming and outgoing mail server.
  3. C. USB is the most common connection method used when synchronizing data from a mobile device to a PC. Though Wi-Fi and Bluetooth are also possible, they are less common. Few mobile devices have FireWire connections.
  4. C. After you enter the SSID (if it’s correct) you would enter the passcode for the network. POP3 has to do with configuring an e-mail account. If you have already entered the SSID, then you should be within range of the wireless access point (WAP). Scanning for networks is the first thing you do when setting up a Wi-Fi connection.
  5. A. The Bluetooth standard is used to connect a headset and other similar devices over short range to a mobile device. GSM is used to make voice calls over cellular networks. Wi-Fi is used to connect mobile devices to the Internet. Exchange is a Microsoft E-mail server; some mobile devices have the capability to connect to e-mail accounts stored on an Exchange server.
  6. D. Wi-Fi tethering allows a mobile device to share its Internet connection with other Wi-Fi capable devices. Internet pass-through is when the mobile device connects to a PC to share the PC’s Internet connection. Locator applications are used to find lost or stolen mobile devices through GPS. IMAP is another e-mail protocol similar to POP3.
  7. C. PC users need iTunes to synchronize contacts and other data from an iPad to a PC. There are many Android sync programs, but they do not work on Apple devices. Google Play is a place to get applications and other items. ActiveSync is the older Microsoft sync program used to synchronize Windows CE and Mobile to PCs.

Mobile Security

Mobile devices need to be secure just like any other computing devices. But due to their transportable nature, some of the security techniques will be a bit different. I recommend that you prepare for the possibility of a stolen, lost, damaged, or compromised device. The following methods can help you to recover from these problems and also aid you in preventing them from happening.

Stolen and Lost Devices

Because mobile devices are expensive and could contain confidential data, they become a target for thieves. Plus, they are small and easy to conceal, making them easier to steal. But there are some things you can do to protect your data and attempt to get the mobile device back.

The first thing a user should do when receiving a mobile device is to set a passcode, which is a set of numbers. This is one of several types of screenlocks. Locking the device makes it inaccessible to everyone except experienced hackers. The screen lock can be a pattern that is drawn on the display, a PIN (passcode), or a password. A strong password will usually be the strongest form of screenlock.

This can be accessed on an Android device by going to Settings > Security. This screen on a typical Android smartphone is shown in Figure 17.13.

Figure 17.13. Android security screen

You can also select how long the phone will wait after inactivity to lock. Generally this is set to 3 or 5 minutes or so, but in a confidential environment you might set this to Immediate.

The next option on the Security screen is Visible Passwords. If check marked, this shows the current letter of the password being typed by the user. This type of setting is vulnerable to shoulder surfers (people looking over your shoulder to find out your password) and should be deselected. When deselected, only asterisks (*) are shown when the user types a password.

Passcode locking can be accessed on an iPad device by going to Settings > General > and tapping Passcode Lock. This displays the Passcode Lock screen. Tap Turn Passcode On to set a passcode, as shown in Figure 17.14. Be sure that the Auto-Lock on the previous screen is set to an amount of minutes. If it is set to Never, the device never sleeps, negating the security of the passcode, and using valuable battery power. The default setting is 2 minutes. You’ll also note in Figure 17.14 that Simple Passcode is enabled. This allows 4-digit numeric passcodes only. As this is probably not going to be secure enough for an organization, you should turn the Simple Passcode option off; that will allow alphanumeric passwords to be entered.

Figure 17.14. iPad2 passcode lock screen

Aside from the default timeout, devices can also be locked by pressing the power button quickly. If configured, the passcode must be supplied whenever a mobile device comes out of a sleep or lock state and whenever it is first booted.

If a person fails to enter the correct passcode after a certain amount of attempts, the device locks temporarily and the person has to wait a certain amount of time before attempting the passcode again. For example, by default on the Android this is 5 attempts; if they all fail the user has to wait 30 seconds. If the person fails to enter the correct passcode again, the timeout increases on most devices. After a certain amount of attempts, the device either needs to be connected to the computer it was last synced to, or has to be restored to factory condition with a hard reset (which can wipe the data.)

Some devices (such as the iPhone) have a setting where the device will be erased after a certain amount of incorrect password attempts (10 in the case of the iPhone). There are also third-party apps available for download for most mobile devices that can wipe the data after x number of attempts. Some apps configure the device to automatically take a picture after 3 failed attempts and e-mail the picture to the owner.

There’s an app for virtually everything. For example, say the device was lost or stolen. If the user had previously installed a locator application, such as Where’s my Droid, Lookout Mobile Security, or Find iPhone, and the GPS/Location Services was enabled on the device, then the user would track where the device is. At that point, the organization would decide whether to get the police involved.

Now, even if you track your mobile device and find it, it might be too late. A hacker can get past passcodes and other screen locks. It’s just a matter of time before the hacker has access to the data. So, an organization with confidential information should consider a remote wipe program. As long as the mobile device still has access to the Internet, the remote wipe program can be initiated from a desktop computer, which will delete all the contents of the remote mobile device. Examples of software that can accomplish this include: Google Sync, Google Apps Device Policy, Apple’s Data Protection, and third-party apps such as Mobile Defense. In some cases, such as Apple’s Data Protection, the command that starts the remote wipe must be issued from an Exchange server or Mobile Device Management server.

You should also have a backup plan in place as well so that data on the mobile device is backed up to a secure location at regular intervals. This way, if the data needs to be wiped, you are secure in the fact that most of the data can be recovered. The type of remote wipe program, backup program, and policies regarding how these are implemented will vary from one organization to the next. Be sure to read up on your organization’s policies to see exactly what is allowed from a mobile security standpoint.

Compromised and Damaged Devices

Theft and loss aren’t the only risks a mobile device faces. We should protect against the chance that a mobile device is damaged, or if the device’s security is compromised.

Many organizations implement backup and remote backup policies. iOS devices can be backed up to a PC via USB connection and by using iTunes. Also, they can be backed up remotely to the iCloud. In addition, there are other third-party apps for remote backup such as iDrive and Mozy. Information can even be restored to newer, upgraded iOS devices. Android (as of the writing of this book) doesn’t allow a complete backup without rooting the phone (which I don’t recommend.) However, almost all the data and settings can be backed up in a collection of ways. First, the Android Cloud backup can be used to backup e-mail, contacts, and other information. However, if you use Gmail, then e-mail, contacts, and calendars are backed up (and synchronized) to Google servers. If a mobile device is lost, the information can be quickly accessed from a desktop computer or other mobile device. Unlike Apple, Android applications can be backed up, as long as they are not copy-protected, with an app such as Astro. Android settings can be backed up and restored from Settings > Privacy. If you choose not to use the Android cloud to backup files, or the synchronization program that came with the device, then there are plenty of third-party apps (such as iDrive, Mozy, HandyBackup, and so on) that can be used to backup via USB to a PC, or to backup to the cloud.

One way to protect mobile devices from compromise is to patch or update the operating system. By default, you will be notified automatically about available updates on Android and iOS-based devices. However, you should know where to go to manually update these devices as well. For Android go to Settings > System Updates > Software Update (or similar path). From here tap Check Now. If you have a connection to the Internet, you will receive any information concerning system updates; an example is shown in Figure 17.15.

Figure 17.15. Android system update available

As you can see in the figure, the system update has an important new security feature that should be installed right away (which I will do when I finish writing this sentence!) Security patches are a large percentage of system updates because there are a lot of attackers around the world that want to compromise the Android operating system. But let’s be real—attackers will go for any OS if it catches their fancy, be it Android, iOS or even Windows!

Updates for iOS can be located at Settings > General > Software Update. As shown in Figure 17.16, this iOS needs to be updated from 5.0 to 5.1 and should be done as soon as possible to patch up any security flaws, and make the best use of the system.

Figure 17.16. iOS system update available

Updates are great, but they are not created to specifically battle viruses and other malware. So, just like there is antivirus software for PCs, there is also AV software for mobile devices. These are third-party applications that need to be paid for, downloaded, and installed to the mobile device. Some common examples for Android include McAfee’s Virusscan Mobile, AVG, Lookout, Dr. Web, and NetQin.

iOS works a bit differently. iOS is a tightly controlled operating system. One of the benefits of being a closed-source OS is that it can be more difficult to write viruses for, making it somewhat more difficult to compromise. But there is no OS that can’t be compromised. For the longest time there was no antivirus software for iOS. That is until 2011 when a type of jailbreaking software called jailbreakme used a simple PDF to move insecure code to the root of the device causing a jailbreak.

Jailbreakme is used to gain root level access and take control of the device without the user’s consent. Finally, Apple consented to the first antivirus software for iOS, Intego’s VirusBarrier, a paid download through the App Store. Any AV software for Android or iOS should be checked regularly for updates.

For large organizations that have many mobile devices, a Mobile Device Management (MDM) suite can be implemented. McAfee, and many other companies from AirWatch to LANDesk Mobility Manager to Sybase, have Mobile Device Management software suites that can take care of pushing updates and configuring hundreds of mobile devices from a central location. Decent quality MDM software will secure, monitor, manage, and support multiple different types of mobile devices across the enterprise.

Stopping Applications

Applications that are opened on a mobile device will continue to run in the background unless they are specifically turned off within the app or within the OS.

To turn off apps (or services) that are running on an Android-based system, go to Settings > Applications > Running Services. That displays all the currently running services and applications, as shown in Figure 17.17.

Figure 17.17. Services and apps running on an Android

You can see in the figure that there are several apps and services running including the droid VNC server, Calendar, and a GPS program. To see all the services and apps, just scroll down. As with PCs, mobile device apps use RAM. The bottom of the figure shows that 194 MB of RAM is currently being used, and 139 MB of RAM is free. The more RAM that is used by the mobile device, the worse it will perform: it will slow it down, and eat up battery power. So, to close an app, you would simply tap it and tap Stop. You can also stop services or processes in this manner (for example HTC DM in the figure), but this might require a Force Stop. If you are not absolutely sure what the service is, do not initiate a Force Stop, as it can possibly cause system instability.

To force quit an app on an iOS-based device, press and hold the Sleep/Wake button for a few seconds until a red slider appears. Then press and hold the home button until the app quits.

There are third-party apps that can close down all of the apps in one shot if you need to save time. These include Task Manager, TasKiller, and AppControl.

If an application is causing the device to lock up and you can’t stop the app, a soft reset or a hard reset will be necessary.

Initiating Resets

A soft reset is done by simply powering off the mobile device and powering it back on. This resets the drivers and the OS. So, soft resets are similar to shutting down a PC and powering it back up. Some technicians will also call this a power cycle. The soft reset can help when certain applications are not functioning properly, or if network connectivity is failing. If a smartphone is still locked up when it is restarted, try pulling the battery, replacing it, and restarting the phone again. In fact, for Blackberry devices, soft resets require a battery pull.

iOS-based devices can do a variety of more advanced software resets beyond a simple power-cycle, such as Reset All Settings, Erase All Content, Reset Networking settings, and so on. These are available by tapping Settings > General > Reset.

Hard resets should be initiated only when things have gone terribly wrong. For example, if hardware or software has been compromised, or has failed, and a soft reset does not fix the problem. You want to make sure that all data is backed up before performing a hard reset, as some hard resets will reset the mobile device back to the original factory condition.

Hard resets vary from one device to the next. For example, most Android-based systems such as the HTC smartphone mentioned previously use the following steps:

  1. Turn the power off. If the device is locked (frozen), pull the battery out and reinsert it.
  2. Hold the Volume Down button, and press and release the Power button.
  3. This displays a menu that allows for Fastbook, Recovery, Clear Storage, and Simlock. Select Clear Storage by pressing the Volume Down button.
  4. Press and release the Power button.
  5. Confirm by pressing Volume Up for Yes or Volume Down for No.

At this point, the device will be reset and you will have to restore data and settings from backup.

Unlike many other mobile devices, hard resets on iOS-based devices do not delete data. They instead stop all apps, and reset the OS and drivers. This can be accomplished with the following steps:

  1. Make sure that the device has at least 20 percent battery life remaining. (This process could take some time, and you don’t want the battery to discharge completely in the middle of it.)
  2. Press the Sleep/Wake and Home buttons simultaneously for 10 seconds or until the Apple logo appears. (Ignore the red slider).
  3. When the logo appears, the hard reset has been initiated. It may take several minutes to complete.

To fully reset an iOS-based device such as the iPad2 to factory condition, you need to go to Settings > General > Reset > Erase all Content and Settings. Another way to do this is to connect the iOS device to a computer via USB and open iTunes on the computer. Then, select the iPad2 option, Summary, and click Restore. Regardless of the method you choose, next, initiate a hard reset to complete the procedure.

As you have seen with Android and Apple, the types of resets vary from one device to the next, so be sure to go to the manufacturer’s website to find out exactly what the various resets do for your mobile device, and how you can perform them.

Cram Quiz

Answer these questions. The answers follow the last question. If you cannot answer these questions correctly, consider reading this section again until you can.

220-802 Questions

  1. You want to prevent a person from accessing your phone while you step away from your desk. What should you do?

    A.

    Implement remote backup.

    B.

    Set up a remote wipe program.

    C.

    Configure a screen lock.

    D.

    Install a locator application.

  2. What does the iOS Simple Passcode allow a person to enter?

    A.

    4-letter code

    B.

    6-number PIN

    C.

    4-digit passcode

    D.

    Alpha-numeric passcode

  3. What do third-party apps such as Find iPhone rely on?

    A.

    Passcode

    B.

    Google Apps Device Policy

    C.

    Bluetooth

    D.

    GPS

  4. Which of the following can be described as removing limitations on iOS?

    A.

    Rooting

    B.

    Jailbreaking

    C.

    Geotracking

    D.

    AV software

  5. An application won’t close on an Android smartphone. You’ve tried to Force Stop it to no avail. What should you do?

    A.

    Hard reset the device.

    B.

    Stop the service in Running Services.

    C.

    Soft reset the device.

    D.

    Bring the device to an authorized service center.

  6. Your organization is concerned about a scenario where a mobile device with confidential data is stolen. What should you recommend first? (Select the best answer.)

    A.

    Remote backup application

    B.

    Remote wipe program

    C.

    Passcode locks

    D.

    Locator application

  7. You are concerned with the possibility of jailbreaks on your organization’s iPhones, and viruses on the Android-based devices. What should you implement?

    A.

    AV software

    B.

    Firewall

    C.

    Mobile Device Management

    D.

    Device reset

Cram Quiz Answers

220-802 Answers

  1. C. You should configure a screen lock: either a pattern drawn on the screen, a PIN, or a password. Remote backup, remote wipe, and locator applications will not prevent a person from accessing the phone.
  2. C. The iOS Simple Passcode allows only a 4-digit numeric passcode. To enter alpha-numeric passwords, you need to disable Simple Passcode.
  3. D. Third-party locator apps such as Find iPhone and Where’s my Droid rely on GPS to locate the device. Passcodes are used to prevent unauthorized users from accessing the mobile device. Google Apps Device Policy can initiate a remote wipe on a mobile device. Bluetooth is used so the mobile device can communicate with other devices over short range.
  4. B. Jailbreaking is the process of removing the limitations of an iOS-based device so that the user gets superuser abilities. Rooting is a similar technique used on Android mobile devices. Geotracking is the practice of tracking a device over time. AV software is antivirus software, used to combat malware.
  5. C. If you’ve already tried to stop the application within Running Services, attempt a soft reset. Pull the battery if the application is frozen. Hard resets on Android devices should be used only as a last resort as they will return the device to factory condition—wiping all the data. The question said that the application won’t close, not a service, though you could try finding an underlying service that might be the culprit. But try resetting the device before doing this or bringing it to an authorized service center.
  6. B. The remote wipe application is the most important one listed. This will prevent a thief from accessing the data on the device. Afterward, you might recommend a backup program (in case the data needs to be wiped), as well as passcode locks and a locator application.
  7. A. You should implement antivirus (AV) software. This can protect against viruses and other malware as well as jailbreaks on Apple devices. As of the writing of this book, firewalls for mobile devices are not common, but that could change in the future. Mobile Device Management (MDM) is software that runs at a central computer enabling a user to configure and monitor multiple mobile devices. Device resets are used to restart the mobile device, or to reset it to factor condition depending on the type of reset, and the manufacturer of the device.

800 East 96th Street, Indianapolis, Indiana 46240

vceplus-200-125    | boson-200-125    | training-cissp    | actualtests-cissp    | techexams-cissp    | gratisexams-300-075    | pearsonitcertification-210-260    | examsboost-210-260    | examsforall-210-260    | dumps4free-210-260    | reddit-210-260    | cisexams-352-001    | itexamfox-352-001    | passguaranteed-352-001    | passeasily-352-001    | freeccnastudyguide-200-120    | gocertify-200-120    | passcerty-200-120    | certifyguide-70-980    | dumpscollection-70-980    | examcollection-70-534    | cbtnuggets-210-065    | examfiles-400-051    | passitdump-400-051    | pearsonitcertification-70-462    | anderseide-70-347    | thomas-70-533    | research-1V0-605    | topix-102-400    | certdepot-EX200    | pearsonit-640-916    | itproguru-70-533    | reddit-100-105    | channel9-70-346    | anderseide-70-346    | theiia-IIA-CIA-PART3    | certificationHP-hp0-s41    | pearsonitcertification-640-916    | anderMicrosoft-70-534    | cathMicrosoft-70-462    | examcollection-cca-500    | techexams-gcih    | mslearn-70-346    | measureup-70-486    | pass4sure-hp0-s41    | iiba-640-916    | itsecurity-sscp    | cbtnuggets-300-320    | blogged-70-486    | pass4sure-IIA-CIA-PART1    | cbtnuggets-100-101    | developerhandbook-70-486    | lpicisco-101    | mylearn-1V0-605    | tomsitpro-cism    | gnosis-101    | channel9Mic-70-534    | ipass-IIA-CIA-PART1    | forcerts-70-417    | tests-sy0-401    | ipasstheciaexam-IIA-CIA-PART3    | mostcisco-300-135    | buildazure-70-533    | cloudera-cca-500    | pdf4cert-2v0-621    | f5cisco-101    | gocertify-1z0-062    | quora-640-916    | micrcosoft-70-480    | brain2pass-70-417    | examcompass-sy0-401    | global-EX200    | iassc-ICGB    | vceplus-300-115    | quizlet-810-403    | cbtnuggets-70-697    | educationOracle-1Z0-434    | channel9-70-534    | officialcerts-400-051    | examsboost-IIA-CIA-PART1    | networktut-300-135    | teststarter-300-206    | pluralsight-70-486    | coding-70-486    | freeccna-100-101    | digitaltut-300-101    | iiba-CBAP    | virtuallymikebrown-640-916    | isaca-cism    | whizlabs-pmp    | techexams-70-980    | ciscopress-300-115    | techtarget-cism    | pearsonitcertification-300-070    | testking-2v0-621    | isacaNew-cism    | simplilearn-pmi-rmp    | simplilearn-pmp    | educationOracle-1z0-809    | education-1z0-809    | teachertube-1Z0-434    | villanovau-CBAP    | quora-300-206    | certifyguide-300-208    | cbtnuggets-100-105    | flydumps-70-417    | gratisexams-1V0-605    | ituonline-1z0-062    | techexams-cas-002    | simplilearn-70-534    | pluralsight-70-697    | theiia-IIA-CIA-PART1    | itexamtips-400-051    | pearsonitcertification-EX200    | pluralsight-70-480    | learn-hp0-s42    | giac-gpen    | mindhub-102-400    | coursesmsu-CBAP    | examsforall-2v0-621    | developerhandbook-70-487    | root-EX200    | coderanch-1z0-809    | getfreedumps-1z0-062    | comptia-cas-002    | quora-1z0-809    | boson-300-135    | killtest-2v0-621    | learncia-IIA-CIA-PART3    | computer-gcih    | universitycloudera-cca-500    | itexamrun-70-410    | certificationHPv2-hp0-s41    | certskills-100-105    | skipitnow-70-417    | gocertify-sy0-401    | prep4sure-70-417    | simplilearn-cisa    |
http://www.pmsas.pr.gov.br/wp-content/    | http://www.pmsas.pr.gov.br/wp-content/    |