CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

Which of the following is a characteristic of APNS?


Options are :

  • The connection is not encrypted
  • It is a non-push technology
  • It is considered to be platform independent
  • It is considered to be platform dependent

Answer : It is considered to be platform dependent

Which of the following standards will MOST likely require polling intervals as opposed to push intervals?


Options are :

  • APNS
  • POP
  • SMTP
  • MAPI

Answer : POP

A user is issued a new device. The old device has been turned into the IT department. Which of the following should be considered when de-provisioning the old device?


Options are :

  • Remote wiping
  • Migration needs
  • Batch provisioning
  • Encryption needs

Answer : Migration needs

In WiFi, loss of signal strength over distance is a result of which of the following?


Options are :

  • Refraction
  • Reflection
  • Absorption
  • Attenuation

Answer : Attenuation

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 2

Which of the following MUST be implemented in conjunction with storage encryption to ensure data on a mobile device is secured?


Options are :

  • TLS
  • Hashing
  • Password
  • SSL

Answer : Password

Which of the following protocols can be used to establish a secure terminal session?


Options are :

  • Telnet
  • TLS
  • VPN
  • SSH

Answer : SSH

A technician has been given a task to implement a WiFi network in an office located on the second floor of a shopping mall with many other WiFi access points. The budget is limited so the technician has to use existing public devices to proceed. Which of the following is the BEST security implementation?


Options are :

  • Hide the SSID and implement WEP encryption for mobile device authentication
  • Add additional access points to the infrastructure
  • Create a security group policy and add all required devices
  • Reduce the access points’ power strength and hide the SSID

Answer : Create a security group policy and add all required devices

Which of the following is an application development methodology?


Options are :

  • Native
  • Hybrid
  • SDLC
  • Change management

Answer : SDLC

Which of the following is the name of the messaging service Android developers can use within their applications to send messages to Android devices?


Options are :

  • APNS
  • IMAP
  • POP
  • GCM

Answer : GCM

Users report that while at work they are unable to access an application from the Internet on their personal mobile devices. The administrator has been asked to determine what could be causing the problem. Which of the following is the BEST area to begin troubleshooting?


Options are :

  • Internet router
  • DHCP server
  • Enterprise firewall
  • Wireless LAN controller

Answer : Enterprise firewall

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 1

Joe, a user, wishes to implement a wireless network. The wireless connectivity needs to be available at the maximum distance possible without any additional access points or repeaters. Which of the following technologies provides the maximum native distance?


Options are :

  • 802.11g
  • 802.11b
  • 802.11a
  • 802.11n

Answer : 802.11n

All employees are unable to connect their corporate laptops to the company’s internal WiFi. No configuration changes were made and the corporate laptops can successfully authenticate to the guest network via its captive portal. Which of the following is the MOST likely cause?


Options are :

  • ISP is down
  • Firewall rules
  • Expired certificate
  • Incorrect PSK

Answer : Expired certificate

Joe, a user, reports that his touch enabled mobile device no longer responds to any input on the screen. Which of the following is the MOST likely cause?


Options are :

  • A new screen protector was applied improperly
  • A new application was installed
  • Joe entered an incorrect PIN too many times

Answer : Joe entered an incorrect PIN too many times

When Ann, an employee, connects her personal USB device to the network she is informed the device will be encrypted and all information will no longer be readable outside the corporate network. Which of the following describes the cause of this occurrence?


Options are :

  • The personal device was infected with malware.
  • An attacker has hacked into her machine.
  • The personal device has been quarantined by antivirus software.
  • DLP has been recently implemented.

Answer : DLP has been recently implemented.

Joe, a user, reports that after installing a new application his device no longer boots completely. instead the device shows a vendor splash screen and immediately reboots, repeating the process. Which of the following is MOST likely necessary to resolve the issue?


Options are :

  • Use OTA to restore the phone to a previous state
  • Reset the device to factory default
  • Apply a root kit to help uninstall the application
  • Uninstall the new application causing the errors

Answer : Reset the device to factory default

A company with limited IT resources is planning to implement a BYOD program which will require enrollment of thousands of mobile devices. Which of the following is the BEST enrollment approach?


Options are :

  • Have IT administrators enroll all devices
  • Use mobile application management solution
  • Use self-service enrollment portal
  • Use a captive portal

Answer : Use self-service enrollment portal

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 4

Ann, a user, cannot access the company WiFi. She states that the WiFi signal is present and she has chosen the right SSID; however, each time Ann tries to access the network, she gets rejected. Which of the following is the BEST method to determine whether the mobile device is authorized to connect to the WiFi network?


Options are :

  • Check if Ann is placed in the DMZ location of the company
  • Ensure the firewalls are all activated for that particular SSID
  • Check the ACL for Ann’s device MAC entry
  • Ensure the authentication server is up and running

Answer : Check the ACL for Ann’s device MAC entry

Which of the following protocols is used for dynamic addressing?


Options are :

  • DNS
  • DHCP
  • NAT
  • SMTP

Answer : DHCP

Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements?


Options are :

  • 802.11n AP with MIMO
  • 802.11g AP with omni-directional antennas
  • 802.11a AP with point-multipoint antennas
  • Bluetooth PAN

Answer : 802.11n AP with MIMO

Which of the following should be monitored on mobile devices to mitigate the risk of a keylogger being installed?


Options are :

  • Software firewall false positives
  • Content filtering denials
  • IPS false negatives
  • Malware definition updates

Answer : Malware definition updates

Which of the following will help in restoring data in the event of loss of the mobile device?


Options are :

  • Installing a third-party geo-tracking application
  • Backup of all data to a third-party server
  • Backup of all data to an internal SIM
  • Encryption of all internal data on the device

Answer : Backup of all data to a third-party server

Ann, an administrator, is at a tradeshow and wishes to exchange contact information with a vendor. Which of the following can she use? (Select TWO).


Options are :

  • NFC
  • IR
  • DNS
  • DMZ

Answer : NFC IR

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 1

Users in the corporate office are reporting dropped calls on their wireless VoIP phones. The issues occur most commonly when walking down the hall. The administrator has ensured adequate coverage and capacity throughout the building. Which of the following is the MOST likely cause?


Options are :

  • Network saturation
  • Expired certificates
  • AP roaming configuration
  • Cellular signal strength

Answer : AP roaming configuration

Users are having trouble connecting to the intranet site from one area of the network using mobile devices. Where should the mobile device administrator begin the troubleshooting process?


Options are :

  • Contact the network administrator and ask them to reboot the router
  • Contact an end user and attempt to duplicate the problem
  • Contact the firewall administrator and have them examine the firewall logs
  • Contact the webmaster and ask them to restart services on Intranet web server

Answer : Contact an end user and attempt to duplicate the problem

Which of the following services can be used to locate a lost or stolen device?


Options are :

  • Geo-location
  • Geo-caching
  • Geo-clustering
  • Geo-fencing

Answer : Geo-location

Which of the following BEST describes the network elements for 3G and 4G cellular technologies?


Options are :

  • Antenna, mobile device, WiFi device, and domain server name
  • Mobile base station and mobile switching center
  • Group policy, mobile ACL, wireless controller, and WiFi
  • Mobile device, access point, router, and layer three switch

Answer : Mobile base station and mobile switching center

Which of the following is considered a best practice when maintaining awareness of new technologies?


Options are :

  • Subscribing to multiple sources related to the technology in question
  • Subscribing to operating system vendor sources only
  • Applying all firmware patches released by vendors
  • Continually testing the effects of all new risks and threats

Answer : Subscribing to multiple sources related to the technology in question

The board members of a financial institution have been supplied with tablets to conduct their annual meeting. Information discussed in the board room is sensitive in nature and should not be allowed onto the Internet. The operating system on the tablets has been updated to backup all information to the cloud. Which of the following would allow the administrator to learn about this feature before the meeting takes place in one week?


Options are :

  • The vendor’s daily feature announcement
  • An annual security conference that occurs in two weeks
  • The vendor’s technical weekly review
  • The vendor’s monthly magazine

Answer : The vendor’s daily feature announcement

JK0-802 CompTIA A+ Certification Exam Set 2

Which of the following is the MOST efficient way to immediately notify administrators of telecommunication vendor changes that affect mobile devices?


Options are :

  • Industry publications
  • Certificates
  • POTS
  • RSS feeds

Answer : RSS feeds

Which of the following should be done FIRST after installing a new operating system on a mobile device?


Options are :

  • Incremental backup of all corporate data on the device
  • Full restore of all applications on the device
  • Differential backup of all corporate data on the device
  • Full testing of backups and restores on the device

Answer : Full restore of all applications on the device

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions