PassLeader released the NEWEST CompTIA MB0-001 exam dumps recently! Both MB0-001 VCE dumps and MB0-001 PDF dumps are available on PassLeader, either MB0-001 VCE dumps or MB0-001 PDF dumps have the NEWEST MB0-001 exam questions in it, they will help you passing CompTIA MB0-001 exam easily! You can download the valid MB0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/mb0-001.html (302 Q&As Dumps)
Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc
QUESTION 1
Which of the following items are valid placements for an MDM solution? (Select TWO.)
A. SaaS
B. Cellular tower
C. Access point
D. On-premise
E. Hotspots
Answer: AD
QUESTION 2
Which of the following sequences is the BEST way to implement a mobile device management solution?
A. Setup server(s), configure, go-live, test, make necessary changes, and on-board devices
B. Gather requirements, setup server(s), management sign-off, and go-live
C. Create certificates, setup server(s), go-live, and on-board devices
D. Pilot test group, receive feedback, make necessary changes, receive sign-off, and go-live
Answer: D
QUESTION 3
Which of the following tasks can assist to on-board mobile devices into a mobile device management solution? (Select TWO.)
A. Integrating with LDAP
B. Compliance reporting
C. Using self-service portal
D. Activation of mobile devices
E. Entering IMEI numbers
Answer: AC
QUESTION 4
Which of the following must be used to successfully deploy an in-house developed application?
A. LDAP server
B. Application certificate store
C. Content management solution
D. Enterprise application store
Answer: D
QUESTION 5
Which of the following provides information on potential security risks and threats impacting administration of mobile devices?
A. Review security incidents within the given industry
B. Document security incident response and escalate
C. Recovery of lost mobile devices
D. Verification of security certificates
Answer: A
QUESTION 6
Enabling Visible Passwords on an Android phone results in which of the following: ____.
A. Allows the user to use a pattern rather than set of numbers as their screenlock
B. Allows the user to set how long the phone will wait after inactivity to lock
C. Allows the user to see a password as its being typed
D. Allows the user to use the digital camera as an authentication technique
Answer: C
QUESTION 7
Upon realizing you have misplaced your mobile device, which contains copies of your latest tax returns, what is the first thing you can do to mitigate your potential loss?
A. Enable remote wipe.
B. Enable remote tracking.
C. Enable remote backup.
D. Enable remote locator.
Answer: A
QUESTION 8
An organization wants to ensure its mobile Android devices are just as protected as their laptops and desktops. Which of the following should they implement on the mobile device? (Select all that apply)
A. Enable Passcode locks.
B. Install Antivirus.
C. Disable wireless networks.
D. Install a locator app.
Answer: ABD
QUESTION 9
Which of the following capabilities would ensure that employees do not access an application after leaving a specified physical location?
A. Wide area network
B. Geo-fencing
C. Captive portals
D. Near field communication
Answer: B
QUESTION 10
An organization is going to deploy a BYOD model to allow users to provision their personally owned devices to receive email on their mobile devices. Which of the following should be completed before allowing users to self provision their devices? (Select TWO.)
A. Directory service setup
B. Profile creation
C. Mobile application distribution
D. Administrative permissions
E. Device activation
Answer: AB
QUESTION 11
Which of the following is a messaging protocol that protects the confidentiality of email content?
A. SSMTP
B. POP3
C. SFTP
D. IMAP
Answer: A
QUESTION 12
Ann, a user, called to report an issue related to authenticating to her mobile device. After resolving the issue, which of the following is the FINAL task that should be completed by the mobility administrator according to troubleshooting best practices?
A. Establish a theory of probable cause
B. Verify full system functionality
C. Document findings, actions, and outcomes
D. Implement preventative measures
Answer: C
QUESTION 13
After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents?
A. End-user licensing agreement
B. Service level agreement
C. Acceptable use policy
D. Content filter policy
Answer: C
QUESTION 14
The Chief Information Officer (CIO) has allowed employees to use their personal devices to access the enterprise guest wireless network. The organization has decided to deploy network configurations through a profile. Which of the following should be specified within the profile for the personal devices? (Select TWO.)
A. IPsec configuration
B. Password expiration date
C. Wireless SSID
D. VPN configuration
E. Authentication methods
Answer: CE
QUESTION 15
An organization is concerned with employees using cellular data in excess of the established usage thresholds. Which of the following would be BEST for the organization to implement?
A. Application metering
B. Data capture
C. Telecom expense management
D. Carrier billing
Answer: C
QUESTION 16
Which of the following layers of the OSI model deals with the use of MAC addresses?
A. Application layer
B. Transport layer
C. Physical layer
D. Datalink layer
Answer: D
QUESTION 17
Which of the following layers of the OSI model is responsible for routing protocols and IP addresses?
A. Network layer
B. Datalink layer
C. Application layer
D. Session layer
Answer: A
QUESTION 18
A technician receives a ticket that Ann, a wireless customer, cannot access her email. As part of the troubleshooting process, the technician has finished establishing a plan of action to resolve the problem. Which of the following is the NEXT logical step the technician should take?
A. Verify full system functionality
B. Document findings
C. Gather information
D. Implement the solution
Answer: D
QUESTION 19
A technician receives a trouble ticket that Joe, a wireless customer, cannot access his email. As part of the troubleshooting process, the technician gathered information and identified the symptoms. Which of the following is the NEXT logical step in troubleshooting?
A. Test the theory
B. Document findings and outcomes
C. Establish a theory to determine the cause
D. Implement the solution
Answer: C
QUESTION 20
Which of the following can be used to secure data at rest? (Select TWO.)
A. VPN
B. AES
C. SSL
D. 3DES
E. IPsec
Answer: BD
QUESTION 21
Which of the following are used to secure data in transit? (Select TWO.)
A. IPsec
B. WPA
C. Block level encryption
D. FTP
E. File level encryption
Answer: AB
QUESTION 22
Ann, a wireless customer, cannot access her email. A technician found that Ann lost access to her email at the same time an update was pushed to all customers. Which of the following is the NEXT troubleshooting step?
A. Revert to last known good configuration on device
B. Revert back to a previous state on the email server
C. Verify that other customers cannot access email
D. Reload Ann’s email client
Answer: C
QUESTION 23
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
A. Access control list
B. Password policy
C. Firewall
D. Full-disk encryption
Answer: D
QUESTION 24
Which of the following is the BEST method of access control on a mobile device?
A. AES
B. PIN
C. Screen saver
D. Encryption
Answer: B
QUESTION 25
Executive management asks about threats that can affect multiple mobile devices. Which of the following needs to be addressed? (Select TWO.)
A. Data loss
B. Travel
C. DLP
D. Device cloning
E. IPS
Answer: AD
Welcome to choose PassLeader MB0-001 dumps for 100% passing CompTIA MB0-001 exam: https://www.passleader.com/mb0-001.html (302 Q&As VCE Dumps and PDF Dumps)
Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc