MB0-001 - CompTIA Mobility+ Certification Exam

Go back to CompTIA

Example Questions

Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution? Which of the following disaster recovery principles would allow Joe, a user, to download his phone contacts from a lost phone to a new phone without regaining physical possession of the device? Which of the following provides recourse in the event a third party application vendor causes application or network outages because of updates? Joe, a user, reports that he does not have connectivity in WLAN. Which of the following is the FIRST approach a mobile technician should take for troubleshooting? Which of the following is a best practice for protecting mobile devices that use RDP to access highly sensitive information? (Select TWO). Which of the following is the BEST way to renew an expired remote employee's device certificates? An outside firm has been hired to conduct a penetration test on a company. The firm informs the company of what tools may be used, when the test will be completed, and the IP addresses they will be attacking from. The IPS is setup to ignore all alerts geared around the tools during this timeframe. Which of the following is at risk of occurring in this scenario? The IT department has been contacted by Joe, an end-user, reporting he is unable to login to his smart phone. Which of the following would cause this issue? Given an enterprise WLAN deployment, which of the following access point types is BEST to use? Which of the following is the definition of jailbreak? Which of the following technologies is considered PAN? Which of the following is correct while designing/implementing mobility? Lightning strikes and damages the only cellular tower used for wireless coverage at a remote vacation resort. Which of the following design elements would have guaranteed uninterrupted wireless communication at the resort? Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements? Which of the following cellular technologies divides digital cellular channels into three separate time slots for a more efficient manner of transporting data than previous methods? Which of the following layers of the OSI model deals with the use of MAC addresses? Administrators receive a call saying Joe, a user, is not receiving email on his mobile device, although all other functions are normal. Which of the following are the MOST likely actions to perform to troubleshoot the problem? (Select TWO). Which of the following capabilities would ensure that employees do not access an application after leaving a specified physical location? An employee reports a network connectivity issue to the helpdesk. Which of the following steps should be taken before escalating the issue? A wireless network administrator finds that many users are unable to achieve a link-speed of more than 130Mbps. Which of the following is the MOST likely cause? An organization wants to allow employees to use personal mobile devices for business purposes, but requires adherence to corporate mandates. Which of the following should the organization implement? When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands? Which of the following can be used to secure data at rest? (Select TWO). Ann, a user, states she is not receiving a requested enterprise application. The administrator confirms all other users are able to receive applications without error. Which of the following is the MOST likely cause? After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents? Which of the following is the MOST efficient way to immediately notify administrators of telecommunication vendor changes that affect mobile devices? Joe, a user, reports that he is no longer receiving email on his device. Joe's directory services account password was updated earlier that day. Which of the following will resolve this issue? Ann, a user, reports that her touch screen enabled device is activating various icons and randomly calling people. Which of the following is the MOST likely cause of the issue? Executive management asks about threats that can affect multiple mobile devices. Which of the following needs to be addressed? (Select TWO). The proper order to configure a mobile device for use with an MDM system is: Which of the following involves a key exchange which introduces the vulnerability of a man-in-the- middle attack? Joe, an employee, from a company with a BYOD policy synchronizes his mobile device information to his home computer on a weekly basis. After connecting to Joe's corporate network for the first time, all of his stored files are no longer recognized by his home computer. Which of the following policies is MOST likely causing this issue to occur? Which of the following is the BEST approach when installing 802.11 access points in a building to ensure that everyone will get a signal to attach to the WLAN? Which of the following encryption methods will be the BEST way to secure the company wireless network? High availability procedures include which of the following? Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point? Ann, a user, wishes to share an Internet connection via a portable hot-spot. Which of the following needs to be in place for sharing to occur? Which of the following standards will MOST likely require polling intervals as opposed to push intervals? An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred? It is possible to switch between which of the following technologies? Which of the following BEST describes the network elements for 3G and 4G cellular technologies? Ann, a user, is in another country using her device, but when using the browser to find local restaurants she is seeing the search engine site for her home country. Which of the following is the MOST likely cause? If a user's device is compromised, it is best practice to FIRST: A company replicates their MDM system to a geographically separate backup site. Which of the following is the BEST option to restore normal operations as soon as possible, in the event the main site goes down? When Ann, an employee, connects her personal USB device to the network she is informed the device will be encrypted and all information will no longer be readable outside the corporate network. Which of the following describes the cause of this occurrence? Which of the following is MOST likely to be used by default for WPA2? Ann, a user, is unable to login to the network from her mobile device. Which of the following is the FIRST step a help desk administrator should take to resolve this issue? Which of the following protocols is used to configure devices and to gather information for reporting? An administrator can control network access to enterprise resources using which of the following? Administrators are receiving calls that captive portals are unavailable even though sufficient WiFi signals are available. Which of the following would be the MOST likely cause?

Study Guides