CompTIA MB0-001 Mobility+ Certification Practice Exam Set 7

Which of the following is the BEST method of access control on a mobile device?


Options are :

  • Encryption
  • Screen saver
  • .PIN
  • AES

Answer : .PIN

Which of the following must be used to successfully deploy an in-house developed application?


Options are :

  • Application certificate store
  • LDAP server
  • Content management solution
  • Enterprise application store

Answer : Enterprise application store

A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of the following threats should be taken into account? (Select TWO).


Options are :

  • Warpathing
  • NAT
  • New employee
  • Rogue access point
  • Firewall

Answer : Warpathing Rogue access point

Which of the following can be used to ensure login credentials are secured when in transit from a mobile device’s browser to a web server? (Select THREE).


Options are :

  • HTTPS
  • MD5
  • 3DES
  • TLS
  • SSL
  • DES

Answer : HTTPS TLS SSL

An administrator is tasked with implementing disk encryption for information stored on a mobile device with at least 128-bits of strength. Which of the following should be applied to meet this requirement?


Options are :

  • DES
  • SHA-1
  • SSL
  • AES

Answer : AES

A large organization, with multiple remote locations, is looking for a way to securely provision company-owned mobile devices. Which of the following would be BEST to use for MDM enrollments?


Options are :

  • ICCID
  • SCEP
  • IMEI
  • LDAP

Answer : SCEP

A user is able to view unauthorized websites using a secure MDM browser on a device. Which of the following is BEST used for troubleshooting the issue?


Options are :

  • Certificate authentication
  • Firmware version
  • Firewall port configuration
  • Group membership

Answer : Group membership

CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 4

Which of the following is often used when minimal data degradation does NOT impact the overall quality at the receiver’s end?


Options are :

  • NAT
  • IPv6
  • UDP
  • TCP

Answer : UDP

An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement?


Options are :

  • Key fob and swipe card
  • Finger print and retina scan
  • Pattern swipe and facial scan
  • PIN and complex password

Answer : Pattern swipe and facial scan

An administrator has installed a network based security appliance. The security appliance was placed between the email server and the company’s Internet gateway. Employees are now reporting issues with email synchronization. Which of the following is the MOST likely reason for the issue?


Options are :

  • The email server must be reconfigured to account for the security appliance.
  • A required port is being blocked by the newly installed network device.
  • The SSL certificate on all employees’ mobile devices has expired
  • The employees are reporting what is known to be a false positive.

Answer : A required port is being blocked by the newly installed network device.

An administrator has been tasked with correlating system logs to identify brute force attacks. Which of the following would allow for this as well as a centralized location to review system logs?


Options are :

  • DLP
  • NIPS
  • SIEM
  • NIDS

Answer : SIEM

Which of the following involves a key exchange which introduces the vulnerability of a man-in-the-middle attack?


Options are :

  • Kerberos
  • RSA
  • PKI
  • SSL

Answer : SSL

Joe, a corporate MDM administrator, needs to implement device encryption. Which of the following would provide the BEST encryption?


Options are :

  • Data in transit encryption
  • Folder level device encryption
  • Whole device encryption
  • Block level device encryption

Answer : Whole device encryption

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 22

Joe, an employee, from a company with a BYOD policy synchronizes his mobile device information to his home computer on a weekly basis. After connecting to Joe’s corporate network for the first time, all of his stored files are no longer recognized by his home computer. Which of the following policies is MOST likely causing this issue to occur?


Options are :

  • Remote wipe
  • OS patching on the home computer
  • Encryption of all device information
  • Application and OS patching on the mobile device

Answer : Encryption of all device information

An organization wants to ensure that personnel are automatically alerted and ready to unload merchandise when a shipping container is approaching the warehouse. Which of the following would allow the organization to implement automatic alerting?


Options are :

  • Cloud computing
  • Geo-caching
  • High availability
  • Geo-fencing

Answer : Geo-fencing

Two children have been given new phones by their parents with the GPS tracking feature enabled. Both phones are powered on and have connectivity. Which of the following is the MOST likely cause of why the parents are unable to track their children’s location?


Options are :

  • The GPS on the parent’s phone is not enabled.
  • The phone is only connected to three satellites.
  • The location service is not working properly.
  • The children’s phones did not come with a removable SD card.

Answer : The location service is not working properly.

Which of the following is a BEST practice when selecting corporate cellular hardware devices?


Options are :

  • Choose based on frequency hopping capabilities
  • Choose devices based on user preference
  • Choose devices from the same wireless carrier
  • Choose the AP from one vendor and terminals from others

Answer : Choose devices from the same wireless carrier

Which of the following are the MAIN differences between a lightweight access point and an autonomous access point? (Select THREE).


Options are :

  • Autonomous access points can operate independently once configured
  • Autonomous access points support multiple channels
  • Lightweight access points require a central controller after being configured
  • Multiple lightweight access points take less time to manage
  • Lightweight access points must be preconfigured

Answer : Autonomous access points can operate independently once configured Lightweight access points require a central controller after being configured Multiple lightweight access points take less time to manage

The mobile workforce keeps cached survey data on their mobile devices. Which of the following should the organization implement to ensure minimal data loss due to damaged devices?


Options are :

  • A backup policy should be implemented and enforced on all the devices used by the mobile workforce.
  • Data restoration procedures should be implemented and tested annually
  • Mandatory backup and restoration training should be administered to all members of the mobile workforce.
  • A remote wipe policy should be implemented and employees should report damaged devices immediately.

Answer : A backup policy should be implemented and enforced on all the devices used by the mobile workforce.

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?


Options are :

  • HIPS
  • NIDS
  • Network firewall
  • Software firewall

Answer : Network firewall

Ann, an end-user reports, that she cannot access popular web pages unless she enters the IPv4 address of the site. Which of the following ports is MOST likely blocked for the device?


Options are :

  • 443
  • 53
  • 25
  • 80

Answer : 53

Which of the following allows devices to access an organization’s WiFi network before ensuring that they conform to policy?


Options are :

  • SCEP portal
  • Administrative portal
  • TKIP portal
  • Captive portal

Answer : Captive portal

Which of the following technologies allows secure communication with a previously unverified entity?


Options are :

  • VPN
  • IMAP
  • PKI
  • TKIP

Answer : PKI

Which of the following is a characteristic of 802.11a?


Options are :

  • 802.11a uses 5 GHz.
  • 802.11a uses dual band.
  • 802.11a is unable to stream video.
  • 802.11a uses 2.4 GHz.

Answer : 802.11a uses 5 GHz.

Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company’s sensitive data from the device?


Options are :

  • Encryption should be enabled when company data is transmitted and received.
  • A software container policy should wrap and encrypt both the user and company data.
  • Device lock and remote wipe should be enforced on the personal device.
  • A secure container device policy should separate company data from personal data.

Answer : A secure container device policy should separate company data from personal data.

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 4

Ann, a user, wants to configure the email client on her newly purchased mobile device. Ann wants to ensure that the phone email client and the email server stay synchronized at all times, and that offline changes to the read status of an email will be synchronized once the phone is online. Which of the following should she configure?


Options are :

  • IMAP
  • POP
  • SSMTP
  • SMTP

Answer : IMAP

An administrator wants to configure two-factor authentication on all enterprise-owned mobile devices. Which of the following should the administrator configure?


Options are :

  • Pattern lock and PIN
  • Username and password
  • Face recognition and PIN
  • Face recognition and thumbprint

Answer : Face recognition and PIN

An administrator noticed a number of mobile devices are downloading applications from unauthorized mobile application stores. Which of the following has MOST likely occurred?


Options are :

  • Keylogging
  • Out-of-date virus definitions
  • Jailbreaking
  • Jamming

Answer : Jailbreaking

Which of the following is MOST likely to be used by default for WPA2?


Options are :

  • 3DES
  • WEP
  • TKIP
  • AES

Answer : AES

After Ann, an employee, connects to the corporate network, her mobile device data usage spikes and menu options appear differently than before. Which of the following is MOST likely causing both of these issues to occur?


Options are :

  • VPN connection initialization
  • Device encryption
  • Patching on the mobile device
  • Device backups

Answer : Patching on the mobile device

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions