IT Essentials 8 Module 12 Quiz Answers: Mobile, Linux and macOS Operating Systems

IT Essentials 8.0 Module Mobile, Linux and macOS Operating Systems-Quiz Answers

1. Which feature of an Android or iOS mobile device helps prevent malicious programs from infecting the device?​

  • The phone carrier prevents the mobile device app from accessing some smartphone features and programs.
  • The passcode restricts the mobile device app from access to other programs.
  • Mobile device apps are run in a sandbox that isolates them from other resources.
  • The remote lock feature prevents malicious programs from infecting the device.

Explanation: Because mobile device apps do run in a sandbox (an isolated location) it is difficult for malicious programs to infect the device. The passcode and remote lock features secure the device against unauthorized use. The carrier may disable access to some features and programs based on the service contract, but this a commercial, not a security, function.

2. What are two types of cloud-enabled services for mobile devices? (Choose two.)

  • locator apps
  • remote backup
  • passcode configuration
  • screen calibration
  • screen app locking

Explanation: Locator apps and remote backup are two types of cloud-enabled services for mobile devices. Passcode configuration, screen calibration and screen app locking are performed on the device directly by the user, not as a cloud-enabled service.

3. True of False? Android and OS X are based on the Unix operating system.

  • true
  • false

Explanation: Both the OS X and Android operating systems use the Unix operating software as a base.

4. A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?

  • a normal power off
  • a factory reset
  • a full backup to the iCloud
  • a standard reset of the device
  • an operating system update

Explanation: If a problem occurs with an Android device that cannot be solved with a normal power off and on, a user can try a reset of the device. Holding the power button and the volume down keys until the device powers off and then powering it on is one of the ways to reset most Android devices.

5. What two preventive maintenance tasks should be scheduled to occur automatically? (Choose two.)

  • executing a backup
  • scanning the signature files
  • updating the operating system software
  • resetting devices by applying the factory reset feature
  • checking the disks for bad sectors

Explanation: To avoid the loss of irreplaceable information, it is critical that regular backups be executed and that the hard drives be checked regularly. The signature files are scanned constantly by antimalware software. Updating the OS should happen when necessary but should not occur automatically. Because the factory reset of a device deletes all settings and user data, a factory reset should only be done if a major issue requires it.

6. What are two features of the Android operating system? (Choose two.)

  • Android is open source and allows anyone to contribute to its development and evolution.
  • Android has been implemented on devices such as cameras, smart TVs, and e-book readers.
  • All available Android applications have been tested and approved by Google to run on the open source operating system.
  • Each implementation of Android requires a royalty to be paid to Google.
  • Android applications can only be downloaded from Google Play.

Explanation: As an open source operating system, Android allows anyone to contribute to the development and evolution of compatible software. Android has been implemented on a wide range of devices and platforms including cameras, smart TVs, and e-book readers. Royalties are not payable to Google, and Google has not tested and approved all available Android applications. Android applications are available from a range of sources.

7. Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)

  • patching
  • rooting
  • remote wipe
  • sandboxing
  • jailbreaking

Explanation: Rooting and jailbreaking are the terms that describe unlocking Android and iOS mobile devices to grant users full access to the file system and full access to kernel modules. Remote wipe, sandboxing, and patching are examples of mobile operating system features and functions that are related to device security.

8. A user presses the Recent Apps icon on an Android-based smartphone to see a list of recently used apps. What should the user do to remove an app from the list?

  • Swipe the app up.
  • Double tap on the app.
  • Swipe the app down.
  • Swipe the app to either side.

Explanation: By pressing the Recent Apps icon on the system bar, a list of recently used apps will display. A user can remove an app by swiping it to either side.

9. Which two location-specific services can the GPS feature on a mobile device offer? (Choose two.)

  • playing local songs
  • delivering local advertising
  • displaying local weather information
  • planning a route between two locations
  • displaying a map of a destination city while driving

Explanation: GPS services allow app vendors and websites to know the location of a device and offer location-specific services such as local weather and advertising.

10. Which three methods can be used to unlock a smartphone? (Choose three.)

  • NFC
  • passcode
  • encryption
  • swipe pattern
  • QR code scan
  • biometric information

Explanation: A smartphone should use the screen lock feature to protect sensitive information. To unlock the device, a password or passcode is required. Smartphones also support pattern locks, or swipe locks. Pattern locks eliminate the time it takes to type passwords or pin numbers. You just need to join the dots (numbers) on the keypad in a specific pattern and the phone is unlocked. Many modern mobile devices come with biometric authentication capability such as fingerprint sensors and face recognition for unlocking the device.

11. A user has an iOS device. What will happen if the user forgets the passcode to unlock the device?

  • The user must call Apple to reset the passcode.
  • The user can visit the Apple website to initiate a passcode reset request.
  • The user must perform a full restore from a backup saved in iTunes or iCloud.
  • The user can use the Find My iPhone service on the website to reset the passcode.

Explanation: On iOS devices, the passcode is used as part of the encryption key for the entire system. The passcode is not stored anywhere, no one can gain access to the user data on iOS devices, including Apple. A forgotten passcode will render user data unreachable, forcing the user to perform a full restore from a backup saved in iTunes or iCloud.

12. A system administrator is using the crontab command to edit an entry on a Linux server. Which service is the administrator configuring?

  • editing a shell script to run when the server starts
  • installing the new BIOS update when it is available
  • scheduling a task to run at a specific time and date
  • deleting caches and cookies after the web browser closes

Explanation: In Linux and OS X, the cron service is responsible for scheduled tasks. As a service, cron runs in the background and executes tasks at specific dates and times. Cron uses a schedule table called a cron table that can be edited with the crontab command.

13. A company is creating a new website to be hosted on a Linux server. The system administrator creates the group “webteam” and assigns team members to it. The administrator then creates the directory “webpages” for storing files. Later that day, one of the team members reports of being unable to create files in the “webpages” directory or subdirectories. The administrator uses the ls -l command to view the file permissions. The result displayed is drwxr-xr– . What should the administrator do to allow team members to add and edit files?

  • Add the user to the webteam group.
  • Issue the command chmod 775 –R webteam .
  • Issue the command chmod 775 –R webpages .
  • Make the user the owner of the directory and subdirectories.

Explanation: The permission of drwxr-x-r- indicates that the owner of the directory may read, write, and execute the files in the directory, the group members may read and execute the files in the directory but cannot create files, and all users may read files in the directory. By issuing the command chmod 775 –R webpages, the group members can create and modify files in the directory and subdirectories. The user is already a member in the group because the user can navigate in the directory and subdirectories.

14. Which two tasks can be done with the iOS device Home button? (Choose two.)

  • wake the device
  • respond to an alert
  • display the navigation icons
  • return to the home screen
  • place apps into folders

Explanation: The physical Home button on an iOS device can perform many functions depending on how it is used. Pressing the button while the device screen is turned off will wake the device. While an app is in use, pressing the Home button will return the user to the Home screen.

15. Match the Linux CLI commands to their function. (Not all options are used.) Mobile, Linux and macOS Operating Systems-Quiz Mobile, Linux and macOS Operating Systems-Quiz

Notify of

Inline Feedbacks
View all comments