CompTIA MB0-001 Mobility+ Certification Practice Exam Set 5

A solution which tracks and organizes the usage and cost of voice and data is referred to as:


Options are :

  • MaaS
  • B2B
  • SaaS.
  • TEM

Answer : TEM

A mobile administrator receives a call from Joe, an end user, who finished a successful iOS upgrade while traveling but none of his data was restored. Joe backed up his data before he left his home network. Which of the following would cause this issue?


Options are :

  • Joe’s synchronization software account has not been setup.
  • Joe ran out of signal strength during the restore.
  • The machine does not have Joe’s synchronization software installed.
  • The mobile device backup was corrupt and unable to load.

Answer : The machine does not have Joe’s synchronization software installed.

When an application is assigned to a group profile:


Options are :

  • it is removed from all users in the group
  • it is assigned to all other groups.
  • .it is assigned to all administrative users by default.
  • it is assigned to all users in the group.

Answer : it is assigned to all users in the group.

CompTIA Security+ SY0-501 Questions & Answers Set 2

Which of the following is the BEST approach when installing 802.11 access points in a building to ensure that everyone will get a signal to attach to the WLAN?


Options are :

  • Configure all the access points in the same floor on the same channel but different floors in different channels
  • Configure the adjacent access points to use the same channel
  • Configure the adjacent access points to use channels that do not interfere with each other
  • Configure the adjacent access points in adjacent channel order

Answer : Configure the adjacent access points to use channels that do not interfere with each other

Which of the following technologies allows multiple network devices to have the same public source IPv4 address when communicating with other devices on the Internet?


Options are :

  • DNS
  • NAT
  • DHCP
  • MAC address

Answer : NAT

Ann, a user, reports there is a power outage and she is unable to access the Internet or the company network. Which of the following would MOST likely cause this issue?


Options are :

  • WiFi is unavailable
  • VPN failure
  • Certificate expiration
  • Device battery is low

Answer : WiFi is unavailable

It is possible to switch between which of the following technologies?


Options are :

  • GSM and WiMAX
  • LTE and TDMA
  • EDGE and CSD
  • GPRS and GSM

Answer : GPRS and GSM

Which of the following is the entry point between external resources and internal servers?


Options are :

  • Switch
  • Access point
  • Gateway
  • VPN concentrator

Answer : Gateway

An email password prompt appears on a device after a specific interval. Which of the following is the MOST likely cause?


Options are :

  • A password was reset according to corporate security policy guidelines.
  • The device battery level is low, requiring charging in order to sync password information.
  • The email server was recently upgraded and mailbox configurations changed.
  • The user’s mailbox has exceeded the corporate size limits.

Answer : A password was reset according to corporate security policy guidelines.

CompTIA A+ (220-1002) Test Prep, Exams and Simulations Set 4

Ann, a user, wishes to share an Internet connection via a portable hot-spot. Which of the following needs to be in place for sharing to occur?


Options are :

  • SSID
  • WPA2-PSK
  • Bluetooth
  • Firewall

Answer : SSID

If Android devices are synching email successfully, but iOS devices are not, which of the following is the MOST likely scenario?


Options are :

  • Firewall port blocking 5223-5225
  • Firewall port blocking 25
  • Firewall port blocking 2195-2196
  • Firewall port blocking 5228

Answer : Firewall port blocking 2195-2196

Ann, a user, reports that her calendar is always an hour different than actual time. Which of the following would cause this issue?


Options are :

  • Battery level
  • Connection to mail server
  • Calendar sync
  • Time zone

Answer : Time zone

Which of the following is the BEST way to mitigate risk associated with a BYOD deployment?


Options are :

  • WPA2
  • Virtualization
  • Containerization
  • Content filtering

Answer : Containerization

Which of the following are used to secure data in transit? (Select TWO).


Options are :

  • WPA
  • Block level encryption
  • File level encryption
  • IPsec
  • FTP

Answer : Block level encryption IPsec

Which of the following is a messaging protocol that protects the confidentiality of email content?


Options are :

  • IMAP
  • SFTP
  • POP3
  • SSMTP

Answer : SSMTP

Executive management asks about threats that can affect multiple mobile devices. Which of the following needs to be addressed? (Select TWO).


Options are :

  • Device cloning
  • Travel
  • Data loss
  • DLP

Answer : Device cloning Data loss

Which of the following is the BEST way to ensure Joe, a terminated employee, no longer has access to the company network on his mobile device?


Options are :

  • Disable cellular access
  • Factory reset
  • Revoke certificate
  • Close enterprise mail account

Answer : Revoke certificate

220-902 CompTIA A+ Certification Practice Exam Set 5

When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands?


Options are :

  • 5 GHz
  • 2.4 MHz
  • 6 GHz
  • 5 MHz

Answer : 2.4 MHz

Which of the following items are valid placements for an MDM solution? (Select TWO).


Options are :

  • Cellular tower
  • Access point
  • On-premise
  • SaaS

Answer : On-premise SaaS

Which of the following frequencies fall under the unlicensed spectrum for WiFi network access? (Select TWO).


Options are :

  • 3.5 GHz
  • 3 GHz
  • 2.4 GHz
  • 5 GHz
  • 1 GHz

Answer : 2.4 GHz 5 GHz

Ann, a wireless customer, cannot access her email. A technician found that Ann lost access to her email at the same time an update was pushed to all customers. Which of the following is the NEXT troubleshooting step?


Options are :

  • Verify that other customers cannot access email
  • Reload Ann’s email client
  • Revert to last known good configuration on device
  • Revert back to a previous state on the email server

Answer : Verify that other customers cannot access email

Which of the following layers of the OSI model deals with the use of MAC addresses?


Options are :

  • Application layer
  • Physical layer
  • Datalink layer
  • Transport layer

Answer : Datalink layer

Which of the following is an example of encryption for data at rest?


Options are :

  • AES
  • SSH
  • TLS
  • WPA2

Answer : AES

220-801 CompTIA A+ Certification Practice Exam Set 4

Which of the following is used so that mobile devices can continue to communicate with a mobile device management service if multiple front-end servers are configured?


Options are :

  • Network load-balancer
  • Proxy server
  • Cellular tower
  • Traffic shaper

Answer : Network load-balancer

Which of the following would be used to enforce a policy requiring two-factor authentication on certain mobile devices?


Options are :

  • Facial recognition and PIN
  • Fingerprint and retina scan
  • Username and password
  • Pattern unlock and password

Answer : Facial recognition and PIN

Which of the following secure protocols is used for Microsoft Exchange ActiveSync communications traffic?


Options are :

  • MAPI
  • HTTPS
  • SFTP
  • SMTP

Answer : HTTPS

While connected to the company’s wireless network, users are experiencing connection issues and reporting slow network speeds. Which of the following actions is the BEST method to identify the issue?


Options are :

  • Perform wireless network upgrade to resolve connectivity issues
  • Perform wireless survey for wireless network coverage
  • Perform airspace scanning with a spectrum analyzer for interference
  • Perform firmware updates on all affected wireless devices

Answer : Perform airspace scanning with a spectrum analyzer for interference

Which of the following layers of the OSI model is responsible for routing protocols and IP addresses?


Options are :

  • Session layer
  • Datalink layer
  • Application layer
  • Network layer

Answer : Network layer

Which of the following entities performs the final testing and approval of the mobile device before being publically released?


Options are :

  • IT department
  • Retailer
  • End user
  • Mobile operator/carrier

Answer : Mobile operator/carrier

CompTIA PenTest+ Certified for Cybersecurity Professionals Set 1

Which of the following can be used to secure data at rest? (Select TWO).


Options are :

  • AES
  • VPN
  • 3DES
  • SSL

Answer : AES 3DES

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions