IT Questions and Answers :)

Monday, September 30, 2019

What is the CIDR notation for subnet mask 255.255.255.240 (IPv4)?

What is the CIDR notation for subnet mask 255.255.255.240 (IPv4)?

  • 28
  • 31
  • 34
  • 25 
What is the CIDR notation for subnet mask 255.255.255.240 (IPv4)?

EXPLANATION



AddressesHostsNetmaskAmount of a Class C
/3042255.255.255.2521/64
/2986255.255.255.2481/32
/281614255.255.255.2401/16
/273230255.255.255.2241/8
/266462255.255.255.1921/4
/25128126255.255.255.1281/2
/24256254255.255.255.01
/23512510255.255.254.02
/2210241022255.255.252.04
/2120482046255.255.248.08
/2040964094255.255.240.016
/1981928190255.255.224.032
/181638416382255.255.192.064
/173276832766255.255.128.0128
/166553665534255.255.0.0256

 

Share:

Which of these is NOT a core function of a mobile device management product?

Which of these is NOT a core function of a mobile device management product?

  • Remote wipe of device
  • Application Management
  • Authentication
  • Allow the company to use the same Apple ID on more than ten devices 

Which of these is NOT a core function of a mobile device management product?

EXPLANATION


Following are the core functions of current day’s EMM suite
  • Application Inventory
  • Hardware Inventory
  • Mobile Application Deployment
  • Mobile app configuration
  • Policy Management
  • Mobile application updating and removal
  • Executes Remote Actions
  • Mobile Content Management

Share:

Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

  • GPS tracking
  • Passcode policy
  • Voice encryption
  • Remote wipe 
Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

EXPLANATION

GPS tracking To get real-time results, IMEI & GPS call trackers can be used to track the location of a phone call. Apps like GPS Phone & Locate Any Phone are great with tracking mobile phones, even when the phone is not connected to the internet. You can know the GPS coordinates of a phone number within seconds.

Passcode policy Mobile devices often do not have passwords enabled. Mobile devices often lack passwords to authenticate users and control access to data stored on the devices. Many devices have the technical capability to support passwords, personal identification numbers (PIN), or pattern screen locks for authentication. Some mobile devices also include a biometric reader to scan a fingerprint for authentication. However, anecdotal information indicates that consumers seldom employ these mechanisms. Additionally, if users do use a password or PIN they often choose passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without passwords or PINs to lock the device, there is increased risk that stolen or lost phones' information could be accessed by unauthorized users who could view sensitive information and misuse mobile devices.


 





Share:

In mobile computing, what does MEAP stand for?

In mobile computing, what does MEAP stand for?

  • Must Eat All of the Pizza
  • Mobile Enterprise Application Platform
  • Mobile Extensible Authentication Protocol
  • Mobile Early Access Program 
In mobile computing, what does MEAP stand for?

EXPLANATION

 A mobile enterprise application platform (MEAP) is a comprehensive set of services and products for enabling the development of mobile applications. A mobile enterprise application platform can provide a long-term approach as well as all the related elements while deploying mobility.

Share:

In programming, what does JIT stand for?

In programming, what does JIT stand for?

  • Jira Interoperability Team
  • Just In Time
  • JavaScript InfoVIs Toolkit
  • Java Interpretation and Translation 

In programming, what does JIT stand for?

EXPLANATION

In the Java programming language and environment, a just-in-time (JIT) compiler is a program that turns Java bytecode (a program that contains instructions that must be interpreted) into instructions that can be sent directly to the processor.

Share:

Popular Posts