Certbus > CompTIA > CompTIA Mobility+ > MB0-001 > MB0-001 Online Practice Questions and Answers

MB0-001 Online Practice Questions and Answers

Questions 4

Which of the following would be used to enforce a policy requiring two-factor authentication on certain mobile devices?

A. Username and password

B. Facial recognition and PIN

C. Pattern unlock and password

D. Fingerprint and retina scan

Browse 302 Q&As
Questions 5

Which of the following is used so that mobile devices can continue to communicate with a mobile device management service if multiple front-end servers are configured?

A. Cellular tower

B. Network load-balancer

C. Traffic shaper

D. Proxy server

Browse 302 Q&As
Questions 6

Which of the following encryption methods will be the BEST way to secure the company wireless network?

A. WAP

B. WPA-TKIP

C. WEP

D. WPA2/CCMP

Browse 302 Q&As
Questions 7

Which of the following is required to connect to a WiFi network?

A. Authentication

B. SSID

C. VLAN

D. DNS server

Browse 302 Q&As
Questions 8

After registering a device for use with the corporate MDM server, Joe, a user, is unable to receive corporate email. Joe can send and receive personal email, SMS messages, access Internet sites from his device, and place phone calls. Other users are able to access their email from the same server. Which of the following is the MOST likely cause of the problem?

A. The device no longer meets MDM security requirements

B. The WiFi antenna is disabled

C. Joe's mailbox is empty on the server

D. The corporate firewall is not configured properly

Browse 302 Q&As
Questions 9

An administrator wants to configure two-factor authentication on all enterprise-owned mobile devices. Which of the following should the administrator configure?

A. Username and password

B. Face recognition and PIN

C. Face recognition and thumbprint

D. Pattern lock and PIN

Browse 302 Q&As
Questions 10

An administrator has been informed that one of the systems on the corporate network has been compromised. Which of the following steps should the administrator take NEXT to initiate proper incident response?

A. Take screen shots and copy logs from the affected machine, storing these in a secured environment.

B. Use MD5 on the system and backup the current image if the system is virtual.

C. Isolate the device and perform a device wipe.

D. Alert the incident response team and await further instruction on procedures.

Browse 302 Q&As
Questions 11

A user is able to view unauthorized websites using a secure MDM browser on a device. Which of the following is BEST used for troubleshooting the issue?

A. Group membership

B. Firewall port configuration

C. Certificate authentication

D. Firmware version

Browse 302 Q&As
Questions 12

An email password prompt appears on a device after a specific interval. Which of the following is the MOST likely cause?

A. The email server was recently upgraded and mailbox configurations changed.

B. The user's mailbox has exceeded the corporate size limits.

C. The device battery level is low, requiring charging in order to sync password information.

D. A password was reset according to corporate security policy guidelines.

Browse 302 Q&As
Questions 13

If a user's device is compromised, it is best practice to FIRST:

A. Wipe the device.

B. Capture the logs.

C. Lock the device.

D. Document the incident.

Browse 302 Q&As
Questions 14

Which of the following would help mitigate threats inherent in legacy operating systems?

A. Using a telecommunications carrier

B. Using a device hardware provider

C. Using an OS vendor

D. Using an MDM

Browse 302 Q&As
Questions 15

A network system that pushes a network identity out into the public Internet is known as which of the following?

A. DNS

B. DHCP

C. TCP

D. UDP

Browse 302 Q&As
Questions 16

An administrator receives a call from an executive who had been traveling. The executive informed the administrator that upon returning the service provider bill is much larger than expected. Which of the following MOST likely occurred?

A. Traffic shaping

B. Roaming

C. Latency

D. Content filtering

Browse 302 Q&As
Questions 17

In WiFi, loss of signal strength over distance is a result of which of the following?

A. Attenuation

B. Refraction

C. Reflection

D. Absorption

Browse 302 Q&As
Questions 18

Which of the following are known as mobile device identifiers? (Select All Apply).

A. IMEI

B. SCEP

C. SMTP

D. UMTS

E. ICCID

Browse 302 Q&As
Exam Code: MB0-001
Exam Name: CompTIA Mobility+
Last Update: Apr 23, 2024
Questions: 302 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99