CompTIA MB0-001 Mobility+ Certification Practice Exam Set 9

Which of the following is the definition of jailbreak?


Options are :

  • Theft of a device and use by an unauthorized user
  • Locking down a device and disabling all applications
  • Wiping personal data and returning the device to factory settings
  • Bypassing OEM OS security controls

Answer : Bypassing OEM OS security controls

A replicated network at another location is used as part of which of the following?


Options are :

  • Network backhauling
  • Disaster recovery
  • RAID 1
  • Incident response

Answer : Disaster recovery

Ann, a user, reports that her touch screen enabled device is activating various icons and randomly calling people. Which of the following is the MOST likely cause of the issue?


Options are :

  • Incomplete backup
  • The screen is dirty
  • Sync issues
  • RF interference

Answer : The screen is dirty

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 2

Which of the following ports are used by APNS? (Select TWO).


Options are :

  • 2195
  • 3389
  • 2175
  • 2196

Answer : 2195 2196

Joe, an employee, is unable to unlock his mobile device and has forgotten the device password. Which of the following is the BEST way to resolve this issue?


Options are :

  • Replace the certificate
  • Perform a hard reset of the device
  • Perform a soft reset of the device
  • Reset the password

Answer : Reset the password

A user on a mobile device is unable to access a video-sharing website. Other network connectivity is working normally. Which of the following actions should the administrator perform to troubleshoot the situation? (Select TWO).


Options are :

  • Check APNS
  • Check MDM policy
  • Check WiFi settings
  • Check MAC address
  • Check user group

Answer : Check MDM policy Check user group

An administrator can control network access to enterprise resources using which of the following?


Options are :

  • .PKI
  • DNS
  • AES encryption
  • SNMP

Answer : .PKI

Roaming between APs takes place in which of the following layers of the OSI model?


Options are :

  • Transport
  • Data Link
  • Presentation
  • Session

Answer : Data Link

Which of the following is the BEST configuration for mission critical applications such as email that require load-balancing?


Options are :

  • Active
  • Active/Passive
  • Active/Active
  • Passive/Passive

Answer : Active/Active

CompTIA JK0-019 E2C Network Media & Topologies Practice Exam Set 4

Corporate policy stipulates user accounts only be granted to employees; however, many departments within the organization use private consultants to assist with various projects. Which of the following allows consultants network access without compromising security? (Select TWO).


Options are :

  • Provide wireless guest network access
  • Provide an internal user account.
  • Provide open wireless access.
  • Provide VPN access

Answer : Provide wireless guest network access Provide VPN access

A company replicates their MDM system to a geographically separate backup site. Which of the following is the BEST option to restore normal operations as soon as possible, in the event the main site goes down?


Options are :

  • Hot site
  • Warm site
  • Cold site
  • Intermediate site

Answer : Hot site

Given an enterprise WLAN deployment, which of the following access point types is BEST to use?


Options are :

  • Lightweight
  • Point-to-multipoint
  • Point-to-point
  • SOHO

Answer : Lightweight

A user┬'s mobile phone will not keep a charge. Which of the following troubleshooting steps should a technician take to assist the user? (Select TWO).


Options are :

  • Check cellular data
  • Check the connector
  • Check the power supply
  • Check operating system
  • Check device backlight

Answer : Check the connector Check the power supply

Which of the following is an example of a faraday cage?


Options are :

  • Secured enterprise datacenter
  • Location that blocks API policies
  • Location that blocks RF signals
  • Area that secures unauthorized individuals from accessing the datacenter

Answer : Location that blocks RF signals

An MDM console works with which of the following layers of the OSI model?


Options are :

  • Session
  • Application
  • Transport
  • Presentation

Answer : Application

An organization needs to configure and deploy dozens of new mobile devices at a central location for use at various off-site locations. Which of the following deployment methods should the organization implement?


Options are :

  • Image and deploy
  • Mandatory Access Control
  • Server push of applications
  • Remote control of devices

Answer : Image and deploy

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 8

Ann, a user, is in another country using her device, but when using the browser to find local restaurants she is seeing the search engine site for her home country. Which of the following is the MOST likely cause?


Options are :

  • Roaming is disabled
  • GPS is disabled
  • Browser cache is full
  • VPN is active

Answer : VPN is active

Which of the following application development methods delivers the BEST performance?


Options are :

  • Java
  • Hybrid
  • Native
  • Web app

Answer : Native

When configuring user groups that use separate applications managed by the MDM solution, it is important that each group has its own:


Options are :

  • APNS
  • High availability
  • AUP
  • Policy

Answer : Policy

A user in a hotel is unable to see the hotel captive WiFi portal. Which of the following is the MOST likely explanation?


Options are :

  • APN issues
  • VPN is active
  • Encryption problem
  • Location services problem

Answer : VPN is active

Which of the following is the BEST model to deploy managed in-house applications?


Options are :

  • Cloud storage service
  • Company web server
  • Email attachments
  • Enterprise application store

Answer : Enterprise application store

Which of the following is the BEST practice to maintain awareness of new technologies?


Options are :

  • Registering for email updates from appropriate vendors, OEMs, and related companies
  • Checking vendor websites and the Internet for updates after encountering issues
  • Periodically checking vendor websites for updated news and software releases
  • Attending a primary industry trade show annually

Answer : Registering for email updates from appropriate vendors, OEMs, and related companies

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 3

Which of the following is a best practice for protecting mobile devices that use RDP to access highly sensitive information? (Select TWO).


Options are :

  • Block firewall traffic
  • Block personal backup
  • Block internal storage
  • Block network connectivity
  • Block SD storage

Answer : Block internal storage Block SD storage

A wireless network administrator finds that many users are unable to achieve a link-speed of more than 130Mbps. Which of the following is the MOST likely cause?


Options are :

  • The device supports only 2.4GHz
  • 802.11b is enabled on the network
  • Switches are set to half-duplex
  • NAC is enabled

Answer : The device supports only 2.4GHz

A company does not wish to provide the WiFi network password to their employees. Which of the following is the BEST option to allow employees to connect to the company┬'s WiFi if devices are managed by MDM?


Options are :

  • Have an administrator configure each employee┬'s mobile device
  • Push encrypted WiFi profile to mobile devices
  • Give IMEI-based access to mobile devices
  • Give MAC-based access to mobile devices

Answer : Push encrypted WiFi profile to mobile devices

Which of the following services can be used to improve streaming traffic across networks?


Options are :

  • SMTP
  • UDP
  • QoS
  • DoS

Answer : QoS

Ann, a user, is unable to access new applications that are assigned to her department in the corporate application store. Which of the following is the MOST likely cause?


Options are :

  • Incorrect user group
  • VPN issues
  • Poor network connectivity
  • Certificate problem

Answer : Incorrect user group

Which of the following protocols is preferred for VoIP communication?


Options are :

  • MAC
  • UDP
  • TCP
  • NAT

Answer : UDP

CompTIA JK0-801 A+ Certification Part - 2 Practice Exam Set 6

Which of the following is the BEST practice to create groups within MDM server?


Options are :

  • Use ACL
  • Manually create groups
  • Use directory services
  • Use VLANS

Answer : Use directory services

Which of the following technologies is considered PAN?


Options are :

  • HSPA+
  • Edge
  • IR
  • Bluetooth

Answer : Bluetooth

Joe, a user, normally has access to internal network resources while in the office. Suddenly, his mobile device is not able to access any of the resources. Which of the following is the FIRST item to check in the troubleshooting process?


Options are :

  • Whether a VPN misconfiguration exists on the device
  • Whether the device is connected to the WiFi network
  • Whether the device is connected to the cellular network
  • Whether a port misconfiguration exists on the device

Answer : Whether the device is connected to the WiFi network

A well-known security organization has released an alert regarding an exploit that could affect a popular mobile device. Which of the following steps should the mobile device administrator take NEXT?


Options are :

  • Update firewall configuration.
  • Monitor the device logs.
  • Alert the user community.
  • Force all users to change their pass codes.

Answer : Alert the user community.

Access points function at which of the following layers of the OSI model?


Options are :

  • 2
  • 4
  • 3
  • 7

Answer : 2

Joe, a user, reports that he does not have connectivity in WLAN. Which of the following is the FIRST approach a mobile technician should take for troubleshooting?


Options are :

  • Check if DHCP server is functioning
  • Check if DNS is providing name resolution
  • Use packet sniffer to investigate
  • Use ICMP echo through ping

Answer : Use ICMP echo through ping

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

BYOD is a concept that combines which of the following aspects of mobility?


Options are :

  • Security and recovery
  • Usability and security
  • Security and performance
  • Usability and carrier agreements

Answer : Usability and security

A user lost access to an internal network resource (e.g. application or intranet site) but is still receiving company email. The administrator should FIRST check for:


Options are :

  • AMAC address conflict.
  • Network connectivity.
  • Group policy misconfiguration.
  • Network saturation.

Answer : Group policy misconfiguration.

An administrator receives a call from Ann, a user, after wiping her device. The server does not allow Ann to re-enroll the device, while other users are able to enroll their devices successfully. The administrator confirms that Ann┬'s account is not the problem. Which of the following can cause this?


Options are :

  • .Policy limits one device per person
  • Group policy is misconfigured
  • The password was entered incorrectly in the self service portal
  • Ann has locked out her directory account

Answer : .Policy limits one device per person

Which of the following ports is used as alternate SMTP?


Options are :

  • 443
  • 587
  • 2175
  • 25

Answer : 587

Which of the following strategies helps mitigate risk of data loss in a BYOD solution?


Options are :

  • Firewalling
  • Content filtering
  • Containerization
  • Antivirus implementation

Answer : Containerization

Joe, an end-user, reports that his smart phone has been lost. Which of the following should a helpdesk staff member perform FIRST?


Options are :

  • Follow the approved response to the incident.
  • Call the phone number associated with the device.
  • Lock or disable all of Joe┬'s network accounts.
  • Initiate a remote wipe of Joe┬'s device.

Answer : Follow the approved response to the incident.

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

Which of the following provides recourse in the event a third party application vendor causes application or network outages because of updates?


Options are :

  • SLA
  • Sandboxing
  • EULA
  • Network segmentation

Answer : SLA

Disabling which of the following jeopardizes device performance if enrolled in an MDM? (Select TWO).


Options are :

  • RDP
  • APNS
  • GCM
  • ICMP
  • SSMTP

Answer : APNS GCM

Given a WiFi deployment using the 2.4GHz band, which of the following channels are the BEST for multiple mobile channel access deployment?


Options are :

  • 1, 2, 2003
  • 36, 40, 44
  • .1, 6, 11
  • 3, 5, 2007

Answer : .1, 6, 11

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions