MB0-001 - CompTIA Mobility+ Certification Exam
Go back to CompTIA
Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution?
LDAP to MDM
Which of the following disaster recovery principles would allow Joe, a user, to download his phone contacts from a lost phone to a new phone without regaining physical possession of the device?
Device backups to a remote server
Which of the following provides recourse in the event a third party application vendor causes application or network outages because of updates?
Joe, a user, reports that he does not have connectivity in WLAN. Which of the following is the FIRST approach a mobile technician should take for troubleshooting?
Use ICMP echo through ping
Which of the following is a best practice for protecting mobile devices that use RDP to access highly sensitive information? (Select TWO).
Block internal storage
Block SD storage
Which of the following is the BEST way to renew an expired remote employee's device certificates?
Have the employee delete all policies and reactivate the device on MDM
An outside firm has been hired to conduct a penetration test on a company. The firm informs the company of what tools may be used, when the test will be completed, and the IP addresses they will be attacking from. The IPS is setup to ignore all alerts geared around the tools during this timeframe. Which of the following is at risk of occurring in this scenario?
The IT department has been contacted by Joe, an end-user, reporting he is unable to login to his smart phone. Which of the following would cause this issue?
Passwords must be changed after a certain amount of days
Given an enterprise WLAN deployment, which of the following access point types is BEST to use?
Which of the following is the definition of jailbreak?
Bypassing OEM OS security controls
Which of the following technologies is considered PAN?
Which of the following is correct while designing/implementing mobility?
More mobile controllers and antennas are required in the crowded areas
Lightning strikes and damages the only cellular tower used for wireless coverage at a remote vacation resort. Which of the following design elements would have guaranteed uninterrupted wireless communication at the resort?
Joe, a technician, is assigned to design a wireless network for a SOHO that has to be able to support video streaming with an acceptable throughput, have good coverage for the building, and be able to support multiple channels with a full duplex capability. Which of the following is the BEST device to choose to support these requirements?
802.11n AP with MIMO
Which of the following cellular technologies divides digital cellular channels into three separate time slots for a more efficient manner of transporting data than previous methods?
Which of the following layers of the OSI model deals with the use of MAC addresses?
Administrators receive a call saying Joe, a user, is not receiving email on his mobile device, although all other functions are normal. Which of the following are the MOST likely actions to perform to troubleshoot the problem? (Select TWO).
Look into the MDM portal for device status and logs
Check for account status
Which of the following capabilities would ensure that employees do not access an application after leaving a specified physical location?
An employee reports a network connectivity issue to the helpdesk. Which of the following steps should be taken before escalating the issue?
Identify and document the issue, questioning the obvious
A wireless network administrator finds that many users are unable to achieve a link-speed of more than 130Mbps. Which of the following is the MOST likely cause?
The device supports only 2.4GHz
An organization wants to allow employees to use personal mobile devices for business purposes, but requires adherence to corporate mandates. Which of the following should the organization implement?
A BYOD policy
When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands?
Which of the following can be used to secure data at rest? (Select TWO).
Ann, a user, states she is not receiving a requested enterprise application. The administrator confirms all other users are able to receive applications without error. Which of the following is the MOST likely cause?
Directory services group settings
After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents?
Acceptable use policy
Which of the following is the MOST efficient way to immediately notify administrators of telecommunication vendor changes that affect mobile devices?
Joe, a user, reports that he is no longer receiving email on his device. Joe's directory services account password was updated earlier that day. Which of the following will resolve this issue?
Update device account with new password
Ann, a user, reports that her touch screen enabled device is activating various icons and randomly calling people. Which of the following is the MOST likely cause of the issue?
The screen is dirty
Executive management asks about threats that can affect multiple mobile devices. Which of the following needs to be addressed? (Select TWO).
The proper order to configure a mobile device for use with an MDM system is:
install client, sign in to server, accept certificates, install profiles.
Which of the following involves a key exchange which introduces the vulnerability of a man-in-the- middle attack?
Joe, an employee, from a company with a BYOD policy synchronizes his mobile device information to his home computer on a weekly basis. After connecting to Joe's corporate network for the first time, all of his stored files are no longer recognized by his home computer. Which of the following policies is MOST likely causing this issue to occur?
Encryption of all device information
Which of the following is the BEST approach when installing 802.11 access points in a building to ensure that everyone will get a signal to attach to the WLAN?
Configure the adjacent access points to use channels that do not interfere with each other
Which of the following encryption methods will be the BEST way to secure the company wireless network?
High availability procedures include which of the following?
Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point?
Ann, a user, wishes to share an Internet connection via a portable hot-spot. Which of the following needs to be in place for sharing to occur?
Which of the following standards will MOST likely require polling intervals as opposed to push intervals?
An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred?
It is possible to switch between which of the following technologies?
GPRS and GSM
Which of the following BEST describes the network elements for 3G and 4G cellular technologies?
Mobile base station and mobile switching center
Ann, a user, is in another country using her device, but when using the browser to find local restaurants she is seeing the search engine site for her home country. Which of the following is the MOST likely cause?
VPN is active
If a user's device is compromised, it is best practice to FIRST:
Capture the logs.
A company replicates their MDM system to a geographically separate backup site. Which of the following is the BEST option to restore normal operations as soon as possible, in the event the main site goes down?
When Ann, an employee, connects her personal USB device to the network she is informed the device will be encrypted and all information will no longer be readable outside the corporate network. Which of the following describes the cause of this occurrence?
DLP has been recently implemented.
Which of the following is MOST likely to be used by default for WPA2?
Ann, a user, is unable to login to the network from her mobile device. Which of the following is the FIRST step a help desk administrator should take to resolve this issue?
Verify password was entered correctly
Which of the following protocols is used to configure devices and to gather information for reporting?
An administrator can control network access to enterprise resources using which of the following?
Administrators are receiving calls that captive portals are unavailable even though sufficient WiFi signals are available. Which of the following would be the MOST likely cause?