CompTIA MB0-001 Mobility+ Certification Practice Exam Set 6

The mobility team is evaluating new smartphones for deployment from multiple vendors. Which of the following items is a concern for the adherence to IT Policy? (Select TWO).


Options are :

  • Lack of business applications on the vendor application store
  • No API for remote management
  • The ability to set complex passwords
  • The resolution of the display

Answer : No API for remote management The ability to set complex passwords

Which of the following solution features will lower overall support costs for a large scale mobile device deployment?


Options are :

  • Security policy management
  • Self-service portal
  • Compliance management
  • Location-based Services

Answer : Self-service portal

Which of the following is a topology that uses multiple access points to communicate with each other to pass data?


Options are :

  • Modulate
  • Filter
  • Backhaul
  • Mesh

Answer : Mesh

In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?


Options are :

  • Password policy
  • Full-disk encryption
  • Access control list
  • Firewall

Answer : Full-disk encryption

Which of the following capabilities would ensure that employees do not access an application after leaving a specified physical location?


Options are :

  • Near field communication
  • Wide area network
  • Geo-fencing
  • Captive portals

Answer : Captive portals

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 7

An end-user has notified the helpdesk that a tablet was left in a taxi-cab. Which of the following is the order of response?


Options are :

  • Confirm end-user identity, determine policy response, report incident
  • Wipe device, track device, escalate
  • Confirm end-user identity, unlock device, track device
  • Wipe device, confirm end-user identity, escalate

Answer : Confirm end-user identity, determine policy response, report incident

While at a conference, Ann, a user, is attempting to sync data from her device back to the corporate server. Ann has a cellular signal, however the sync will not complete. Which of the following is MOST likely causing the issue?


Options are :

  • .Network saturation
  • Device provisioning
  • Content filtering
  • Device provisioning

Answer : .Network saturation

An organization is going to deploy a BYOD model to allow users to provision their personally owned devices to receive email on their mobile devices. Which of the following should be completed before allowing users to self provision their devices? (Select TWO).


Options are :

  • Administrative permissions
  • .Profile creation
  • Directory service setup
  • Mobile application distribution

Answer : .Profile creation Directory service setup

An organization is concerned with employees using cellular data in excess of the established usage thresholds. Which of the following would be BEST for the organization to implement?


Options are :

  • Data capture
  • Carrier billing
  • Application metering
  • Telecom expense management

Answer : Telecom expense management

Which of the following can be applied to a mobile device to support a corporate mandate which does not allow Internet gambling activities?


Options are :

  • Host IDS
  • Content filtering
  • Network IDS
  • Software antivirus

Answer : Content filtering

Ann, a user, called to report an issue related to authenticating to her mobile device. After resolving the issue, which of the following is the FINAL task that should be completed by the mobility administrator according to troubleshooting best practices?


Options are :

  • Verify full system functionality
  • Establish a theory of probable cause
  • Implement preventative measures
  • Document findings, actions, and outcomes

Answer : Document findings, actions, and outcomes

220-701 A+ Essentials Certification Practice Exam Set 1

Which of the following is a best practice for configuring mobile network access control?


Options are :

  • Device password
  • IPsec VPN
  • ActiveSync
  • .Certificate authentication

Answer : .Certificate authentication

The mobility team has been tasked with placing Wi-Fi access points in a conference room. They have been provided with a floor plan by the building architect. Which of the following are components of a predictive wireless audit? (Select TWO).


Options are :

  • Construction materials used in the walls
  • Distance to nearest cellular tower
  • Oscilloscope
  • Spectrum analysis

Answer : Construction materials used in the walls Spectrum analysis

Which of the following provides information on potential security risks and threats impacting administration of mobile devices?


Options are :

  • Review security incidents within the given industry
  • Document security incident response and escalate
  • Verification of security certificates
  • Recovery of lost mobile devices

Answer : Review security incidents within the given industry

Company employees are reporting wireless network connectivity issues. Which of the following can cause interference for the company wireless network? (Select TWO).


Options are :

  • Vending machines
  • Bluetooth devices
  • Refrigerators
  • Nearby cell phone towers
  • Microwave ovens

Answer : Bluetooth devices Microwave ovens

After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents?


Options are :

  • End-user licensing agreement
  • Service level agreement
  • Content filter policy
  • Acceptable use policy

Answer : Acceptable use policy

An employee reports a network connectivity issue to the helpdesk. Which of the following steps should be taken before escalating the issue?


Options are :

  • Attempt to resolve the network issue by rebooting a server
  • Document resolution outcomes and lessons learned
  • Identify and document the issue, questioning the obvious
  • Ask the user to remote their machine and wait 15 minutes before calling back

Answer : Identify and document the issue, questioning the obvious

220-701 A+ Essentials Certification Practice Exam Set 10

The Chief Information Officer (CIO) has allowed employees to use their personal devices to access the enterprise guest wireless network. The organization has decided to deploy network configurations through a profile. Which of the following should be specified within the profile for the personal devices? (Select TWO).


Options are :

  • Authentication methods
  • IPsec configuration
  • VPN configuration
  • Wireless SSID
  • Password expiration date

Answer : Authentication methods Wireless SSID

Joe, a user, has noticed that his corporate-owned device has been stolen. Which of the following actions should Joe take FIRST?


Options are :

  • Monitor device activity
  • Capture logs
  • Report the incident
  • Revoke the device certificate

Answer : Report the incident

Which of the following device configuration parameters could be used to change how the mobile device data is routed back to a company on a cellular network?


Options are :

  • SSID
  • IMEI
  • APN
  • VLAN ID

Answer : APN

The IT department is contacted by Joe, an end-user, who is unable to connect to the corporate IPsec VPN from outside of his corporate network. Joe confirms he can connect to popular web pages. Which of the following would cause this issue?


Options are :

  • Port 587 is blocked
  • Port 80 is blocked
  • Port 5223 is blocked
  • Port 4200 is blocked

Answer : Port 4200 is blocked

Which of the following sequences is the BEST way to implement a mobile device management solution?


Options are :

  • Pilot test group, receive feedback, make necessary changes, receive sign-off, and go-live
  • Setup server(s), configure, go-live, test, make necessary changes, and on-board devices
  • Gather requirements, setup server(s), management sign-off, and go-live
  • Create certificates, setup server(s), go-live, and on-board devices

Answer : Pilot test group, receive feedback, make necessary changes, receive sign-off, and go-live

Which of the following are ways to minimize the risks associated with allowing mobile devices on an organization’s network? (Select TWO).


Options are :

  • IDS/IPS
  • BYOD
  • ActiveSync
  • Firewal

Answer : IDS/IPS Firewal

220-701 A+ Essentials Certification Practice Exam Set 11

A company wants to deploy a wireless network for their employees and guests. Employee and guest networks should be separated for security and privacy. Which of the following can be implemented to meet these requirements? (Select TWO).


Options are :

  • VLAN
  • UDP
  • TCP
  • APN
  • SSID

Answer : VLAN SSID

A network administration team will not be able to support an MDM project within the requested timeline. Which of the following would be the BEST option for deploying the Mobile Device Management software?


Options are :

  • Multi-Instance on Premise Solution
  • Software as a Service Solution
  • Stand Alone Solution
  • Private cloud hosted externally

Answer : Software as a Service Solution

The IT department has been contacted by Joe, an end-user, reporting he is unable to login to his smart phone. Which of the following would cause this issue?


Options are :

  • The device is not connected to the Internet
  • Passwords must be changed after a certain amount of days
  • Updates are required to the OS
  • The certificate for the Wi-Fi has expired

Answer : Passwords must be changed after a certain amount of days

A technician receives a trouble ticket that Joe, a wireless customer, cannot access his email. As part of the troubleshooting process, the technician gathered information and identified the symptoms. Which of the following is the NEXT logical step in troubleshooting?


Options are :

  • Implement the solution
  • Test the theory
  • Document findings and outcomes
  • Establish a theory to determine the cause

Answer : Establish a theory to determine the cause

A technician receives a ticket that Ann, a wireless customer, cannot access her email. As part of the troubleshooting process, the technician has finished establishing a plan of action to resolve problem. Which of the following is the NEXT logical step the technician should take?


Options are :

  • Document findings
  • Gather information
  • Implement the solution
  • Verify full system functionality

Answer : Implement the solution

Which of the following is a cellular technology that supports data and voice at the same time?


Options are :

  • GSM
  • APN
  • GPRS
  • EDVO

Answer : GSM

220-701 A+ Essentials Certification Practice Exam Set 12

Which of the following tasks can assist to on-board mobile devices into a mobile device management solution? (Select TWO).


Options are :

  • Integrating with LDAP
  • Activation of mobile devices
  • Using self-service portal
  • Compliance reporting

Answer : Integrating with LDAP Using self-service portal

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions