CompTIA MB0-001 Mobility+ Certification Practice Exam Set 4

Joe, a user, has problems connecting to the wireless network when he changes locations. Joe has a good signal and enters his credentials correctly, but cannot connect to the wireless network in the new location. Which of the following is the BEST course of action?


Options are :

  • Check if Joe’s password is still valid in the new location
  • Check if Joe is provided with the right IP address at the new location
  • Check if the mobile device can be powered on in any location of the building
  • Check whether new location blocks Joe’s MAC address

Answer : Check whether new location blocks Joe’s MAC address

Joe, a user, states that his email is no longer being delivered on his mobile device. Which of the following is MOST likely the issue?


Options are :

  • The device screen password is incorrect
  • The email account password is locked out
  • The public app store password is incorrect
  • A port is blocked on MDM servers

Answer : The email account password is locked out

An MDM client was recently installed on a device. The user has reported decreased battery life. Which of the following can be edited to increase battery life?


Options are :

  • Speaker settings
  • OS version
  • Email push settings
  • Password requirements

Answer : Email push settings

CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 9

Which of the following is MOST likely to benefit from an MDM solution to support multiple platforms?


Options are :

  • Enterprise application store
  • Onsite support kiosk
  • Self-service portal
  • BYOD

Answer : BYOD

For a device that has corporate data segregated from personal data, if the device is destroyed and replaced, which of the following must be available to ensure the BEST enduser experience on the replacement device? (Select TWO).


Options are :

  • Backup of MDM enrollment certificate
  • Backup of full-disk encryption key
  • Backup of personal data
  • Device PIN
  • Backup of corporate data

Answer : Backup of personal data Backup of corporate data

Ann, a user, states she is not receiving a requested enterprise application. The administrator confirms all other users are able to receive applications without error. Which of the following is the MOST likely cause?


Options are :

  • Private app store settings
  • Public app store settings
  • Directory services group settings
  • DMZ server connections

Answer : Directory services group settings

Joe, a mobile user, claims he is unable to connect to resources on the WiFi network. Joe has a good signal and an IP address assigned to his device. Which of the following is the BEST troubleshooting technique that the administrator can take?


Options are :

  • Check the IP address to ensure it is in the correct range.
  • Verify that Joe is able to connect to the cellular network
  • Verify that Joe is logged on to the network.
  • Check the MAC address of the device.

Answer : Check the IP address to ensure it is in the correct range.

Which of the following is a WiFi topology that occurs when Ann, an end-user, configures her laptop to be a WiFi access point to which another device connects?


Options are :

  • Gateway
  • Ad-hoc
  • DMZ
  • Bluetooth

Answer : Ad-hoc

A user’s device has not checked-in with MDM for a long period of time. Which of the following would be the MOST likely cause?


Options are :

  • Email account was removed
  • PIN was changed
  • MDM profile was removed
  • VPN is turned off

Answer : MDM profile was removed

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 10

Ann, a user, has removed or turned off the MDM solution on her device triggering an alert to the network administrator. The network administrator should respond by performing which of the following?


Options are :

  • Quarantine the device
  • Wipe the device
  • Lock the device
  • Initiate company policy

Answer : Initiate company policy

VPN transmitting data over secure connections is an example of which of the following layers of the OSI model?


Options are :

  • Layer 4
  • Layer 6
  • Layer 1
  • Layer 7

Answer : Layer 4

A potential security breach has occurred that requires a device policy change to mitigate the risk. The default policy sync interval is four hours. Which of the following should occur immediately?


Options are :

  • Mobile administrator should manually push the changed policy to affected devices.
  • Mobile administrator should send a company-wide email alert.
  • Mobile administrator should quarantine any affected devices.
  • Mobile administrator should allow the policy change to occur at the regularly scheduled interval.

Answer : Mobile administrator should manually push the changed policy to affected devices.

Which of the following is the BEST approach when configuring server-based management in mobility?


Options are :

  • Mobile devices should be configured on their own on the server regardless of the requirement.
  • Mobile devices should be treated different than other device as they need more IP addresses.
  • Mobile devices can be configured just like any other device in the network based on requirement.
  • Mobile devices need their own server and should be configured as their own serverclient.

Answer : Mobile devices can be configured just like any other device in the network based on requirement.

Joe, an end-user, files a help ticket stating that after recently downloading an application, all of his corporate data vanished. Which of the following describes this issue?


Options are :

  • Certificate management
  • Restricted data usage
  • Device network connectivity
  • Compliance policies

Answer : Compliance policies

Which of the following technologies allows multiple devices to use a single source of authentication for access to services?


Options are :

  • Trusted platform module
  • Directory services
  • Proxy services
  • VPN concentrator

Answer : Directory services

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 5

Which of the following is required to leverage Kerberos for authentication to internal resources from an external mobile device?


Options are :

  • Firewall
  • MDM
  • SHA
  • Gateway

Answer : Gateway

An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred?


Options are :

  • Content filtering
  • Traffic shaping
  • Latency
  • Roaming

Answer : Roaming

Which of the following are the MOST important benefits of grouping profiles? (Select TWO).


Options are :

  • Enable features tailored to job requirements
  • Improves monitoring of network security
  • Enhances value of social media/collaboration
  • Monitor corporate versus personally owned devices

Answer : Enable features tailored to job requirements Monitor corporate versus personally owned devices

Which of the following is correct while designing/implementing mobility?


Options are :

  • More users require more applications to be loaded in the crowded areas
  • More mobile controllers and antennas are required in the crowded areas
  • More wavelength is required in order to cover all the users in crowded areas
  • More frequencies are required in the crowded areas, one antenna is adequate

Answer : More mobile controllers and antennas are required in the crowded areas

Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution?


Options are :

  • Remove user certificate
  • Re-enroll in MDM
  • SCEP sync with MDM
  • LDAP to MDM

Answer : LDAP to MDM

When addressing BYOD local backups, it is best practice to do which of the following?


Options are :

  • Allow personal backups at regular intervals
  • Restore the device to factory settings
  • Encrypt and password protect backups
  • Save the backup to another source

Answer : Encrypt and password protect backups

CompTIA Security+ Cert. (SY0-501) Practice Tests Set 3

Which of the following is considered best practice for secure backup of enterprise data?


Options are :

  • Use encrypted home network storage
  • Use encrypted SD cards
  • Use full-disk encryption
  • Use encrypted corporate servers

Answer : Use encrypted corporate servers

HTTP is run over which of the following ports? (Select TWO).


Options are :

  • 8080
  • 25
  • 110
  • 80
  • 443

Answer : 8080 80

Joe, a user, is receiving errors from an application service indicating a token has been redeemed and is not available. Which of the following should the administrator check to determine the issue?


Options are :

  • Private application store
  • DMZ server connections
  • Directory service settings
  • MDM application store configuration

Answer : MDM application store configuration

Ann, a user, is unable to login to the network from her mobile device. Which of the following is the FIRST step a help desk administrator should take to resolve this issue?


Options are :

  • Verify password was entered correctly
  • Lock Ann’s device
  • Wipe Ann’s device
  • Reset Ann’s password

Answer : Verify password was entered correctly

Which of the following is the BEST technique to segregate corporate data from personal data on end-user devices?


Options are :

  • Use an application to sandbox device content
  • Require a specific version of TPM
  • Use an application that requires multifactor authentication
  • Force all traffic over a corporate VPN

Answer : Use an application to sandbox device content

Which of the following would help mitigate threats inherent in legacy operating systems?


Options are :

  • Using an OS vendor
  • Using an MDM
  • Using a device hardware provider
  • Using a telecommunications carrier

Answer : Using an MDM

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 12

If a user’s device is compromised, it is best practice to FIRST:


Options are :

  • Lock the device
  • Wipe the device.
  • Document the incident
  • Capture the logs.

Answer : Capture the logs.

An application is installed through the enterprise MDM application store. An upgrade is issued and a single device does not receive the upgrade as expected. Which of the following is the MOST likely cause?


Options are :

  • The application was not signed.
  • The application store is unavailable or has experienced a temporary outage.
  • The user is assigned to the incorrect directory services group.
  • The user does not have a certificate installed.

Answer : The user is assigned to the incorrect directory services group.

Joe, a user, reports that he is no longer receiving email on his device. Joe’s directory services account password was updated earlier that day. Which of the following will resolve this issue?


Options are :

  • Update device account with new password
  • Update directory services information
  • Reboot the phone by pulling the battery
  • Change Joe’s password again and push to device

Answer : Update device account with new password

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions