CompTIA
MB0-001
CompTIA Mobility+
Question: 1
|
Which of the following would be used to enforce a policy
requiring two-factor authentication on certain mobile devices?
A. Username and password
B. Facial recognition and PIN
C. Pattern unlock and password
D. Fingerprint and retina scan
Answer: B
|
Question: 2
|
An employee reports a network connectivity issue to the
helpdesk. Which of the following steps should be taken before escalating the
issue?
A. Identify and document the issue, questioning the
obvious
B. Attempt to resolve the network issue by rebooting a
server
C. Ask the user to remote their machine and wait 15
minutes before calling back
D. Document resolution outcomes and lessons learned
Answer: A
|
Question: 3
|
Which of the following can be applied to a mobile device
to support a corporate mandate which does not allow Internet gambling
activities?
A. Network IDS
B. Host IDS
C. Software antivirus
D. Content filtering
Answer: D
|
Question: 4
|
When setting up a wireless access point for 802.11g, the
user must ensure mobile devices utilize which of the following frequency
bands?
A. 2.4 MHz
B. 5 MHz
C. 5 GHz
Answer: A
|
Question: 5
|
Which of the following is a topology that uses multiple
access points to communicate with each other to pass data?
A. Filter
B. Mesh
C. Modulate
D. Backhaul
Answer: B
|
Question: 6
|
The mobility team has been tasked with placing Wi-Fi
access points in a conference room. They have been provided with a floor plan
by the building architect. Which of the following are components of a
predictive wireless audit? (Select TWO).
A. Oscilloscope
B. Spectrum analysis
C. Distance to nearest cellular tower
D. Construction materials used in the walls
E. Time Domain Reflectometer
Answer: B,D
|
Question: 7
|
The mobility team is evaluating new smartphones for
deployment from multiple vendors. Which of the following items is a concern for
the adherence to IT Policy? (Select TWO).
A. No API for remote management
B. The ability to set complex passwords
C. Lack of business applications on the vendor
application store
D. The resolution of the display E. Duration of the
battery life
Answer: A,B
|
Question: 8
|
An end-user has notified the helpdesk that a tablet was
left in a taxi-cab. Which of the following is the order of response?
A. Wipe device, track device, escalate
B. Wipe device, confirm end-user identity, escalate
C. Confirm end-user identity, determine policy response,
report incident
D. Confirm end-user identity, unlock device, track
device
Answer: C
|
Question: 9
|
The IT department has been contacted by Joe, an end-user,
reporting he is unable to login to his smart phone. Which of the following
would cause this issue?
A. The certificate for the Wi-Fi has expired
B. Passwords must be changed after a certain amount of
days
C. Updates are required to the OS
D. The device is not connected to the Internet
Answer: B
|
Question: 10
|
The IT department is contacted by Joe, an end-user, who
is unable to connect to the corporate IPsec VPN from outside of his corporate
network. Joe confirms he can connect to popular web pages. Which of the
following would cause this issue?
A. Port 80 is blocked
B. Port 587 is blocked
C. Port 4200 is blocked
D. Port 5223 is blocked
Answer: C
|
Question: 11
|
Which of the following is a cellular technology that
supports data and voice at the same time?
A. APN
B. GSM
C. GPRS
D. EDVO
Answer: B
|
Question: 12
|
Which of the following device configuration parameters
could be used to change how the mobile device data is routed back to a company
on a cellular network?
A. VLAN ID
B. APN
C. SSID
D. IMEI
Answer: B
|
Question: 13
|
Which of the following is used so that mobile devices can
continue to communicate with a mobile device management service if multiple
front-end servers are configured?
A. Cellular tower
B. Network load-balancer
C. Traffic shaper
D. Proxy server
Answer: B
|
Question: 14
|
Which of the following secure protocols is used for
Microsoft Exchange ActiveSync communications traffic?
A. HTTPS
B. MAPI
C. SMTP
D. SFTP
Answer: A
|
Question: 15
|
Which of the following entities performs the final
testing and approval of the mobile device before being publically
released?
A. Mobile operator/carrier
B. IT department
C. Retailer
D. End user
Answer: A
|
Question: 16
|
Which of the following solution features will lower
overall support costs for a large scale mobile device deployment?
A. Compliance management
B. Self-service portal
C. Security policy management
D. Location-based Services
Answer: B
|
Question: 17
|
Which of the following items are valid placements for an
MDM solution? (Select TWO).
A. SaaS
B. Cellular tower
C. Access point
D. On-premise
E. Hotspots
Answer: A,D
|
Question: 18
|
Which of the following sequences is the BEST way to
implement a mobile device management solution?
A. Setup server(s), configure, go-live, test, make
necessary changes, and on-board devices
B. Gather requirements, setup server(s), management
sign-off, and go-live
C. Create certificates, setup server(s), go-live, and
on-board devices
D. Pilot test group, receive feedback, make necessary
changes, receive sign-off, and go-live
Answer: D
|
Question: 19
|
Which of the following tasks can assist to on-board
mobile devices into a mobile device management solution? (Select TWO).
A. Integrating with LDAP
B. Compliance reporting
C. Using self-service portal
D. Activation of mobile devices
E. Entering IMEI numbers
Answer: A,C
|
Question: 20
|
Which of the following must be used to successfully
deploy an in-house developed application?
A. LDAP server
B. Application certificate store
C. Content management solution
D. Enterprise application store
Answer: D
|
No comments:
Post a Comment