Chapter 23: Portable Computing / Chapter 24: Understanding Mobile Devices / Chapter 25: Care and Feeding of Mobile Devices (A+ Study Notes)


A+
Study Notebook

You can find my complete study notes in Google Docs format below: https://docs.google.com/document/d/1zcKLWfsns1tqzmXtVRJbcd9NqfaEcjifgIo-oJIbEgc/edit?usp=sharing

References:

M. MEYERS, 2019.  CompTIA A+ All-in-One Exam Guide. 10th ed.


Chapter 23: Portable Computing / Chapter 24: Understanding Mobile Devices / Chapter 25: Care and Feeding of Mobile Devices

  • Laptops
  • Mobile Devices
  • Mobile connections:
    • Mini USB 
    • USB C
    • Lightning Cable
    • Thunderbolt
    • Wireless
    • Near Field Communication (NFC) 
    • Bluetooth
    • Infrared (IR)
    • Hotspot /Tethering
    • Airplane Mode
  • Virtual Reality (VR)
  • Augmented Reality
  • CDMA phones (code division multiple access)
    • Firmware updates
      • Baseband updates
      • Broadband updates
      • Wireless updates
      • Preferred roaming List (PRL) - this might need to be updated only when your internet is running slow, connect slowly etc. 
  • GSM (Global System of Mobile Communications)
    • Come with a simcard
  • IMSI (International Mobile Subscriber Identity) - defines critical SIM information
  • IMEI (International Mobile Equipment Identity) - defines the phone
  • Usually when you get a new phone, providers simply connect your new IMEI to your IMSI. 
  • VPN (Virtual Private Network)
  • Email setup:
    • 1. FQDN (Fully Qualified Domain Name) of SMTP server
    • 2. Username & password
    • 3. Port number for an SMTP
    • 4. FQDN (Fully Qualified Domain Name) for IMAP server 
    • 5. Username & password
    • 6. Port Number for IMAP (port 143)
    • Encrypted emails (SSl | STARTTLS) - which enables point to point encryption (P2PE) 
      • POP3 encrypted port: 995 
      • IMAP encrypted port: 993
      • SMTP encrypted port: 465 or 587
    • S/MIME (Secure /Multipurpose Internet Mail Extensions) - attachments in email - takes binary file and its every 8th bit and turns it into ASCII code. 
    • Certain email apps encrypt everything inside of it by default: E.g. Proton mail, Google, Yahoo
  • Mobile synchronization
    • Synchro to desktop
    • Synchro to automobile
    • Synchro to Cloud
    • Android syncs to Google Drive. iOS syncs to iCloud
    • Browser synchronisation
    • We can also sync location services, ebooks, social media and other applications
  • Mobile security:
    • Bring Your Own Device (BYOD) - IT assets belong to the company not the individual
    • Profiles (collection of configuration and security settings that an administrator has created in order to apply hose settings to particular categories of users or devices):
      • MDM (Mobile Device Management) / Apple Configurator 
        • Profiles are usually written in XML (eXtensible Markup Language) 
    • Combat Malware with Antivirus on Android. Patches on iOS.
    • Multifactor Authentication; Biometric Authentication; Authentication Apps;
    • Trusted Apps/ Untrusted Apps
    • Firewalls
    • Network Attacks:
      • Device Security Settings
        • Apply manually or use MDM profile
      • User Training
      • Wi-fi Analyzer
      • Cell tower Analyzer
    • App Security
      • Anti-malware and App Scanners

Comments

Popular Posts