[Free] New Updated (October) CompTIA MB0-001 Real Exam 101-110

Ensurepass

 

QUESTION 101

A user on a mobile device is unable to access a video-sharing website. Other network connectivity is working normally. Which of the following actions should the administrator perform to troubleshoot the situation? (Select TWO).

 

A.

Check MAC address

B.

Check APNS

C.

Check user group

D.

Check WiFi settings

E.

Check MDM policy

 

Correct Answer: CE

 

 

QUESTION 102

After Ann, an employee, connects to the corporate network, her mobile device data usage spikes and menu options appear differently than before. Which of the following is MOST likely causing both of these issues to occur?

 

A.

Device backups

B.

Device encryption

C.

Patching on the mobile device

D.

VPN connection initialization

 

Correct Answer: C

QUESTION 103

Joe, a corporate MDM administrator, needs to implement device encryption. Which of the following would provide the BEST encryption?

 

A.

Data in transit encryption

B.

Block level device encryption

C.

Folder level device encryption

D.

Whole device encryption

 

Correct Answer: D

 

 

QUESTION 104

A company does not wish to provide the WiFi network password to their employees. Which of the following is the BEST option to allow employees to connect to the company’s WiFi if devices are managed by MDM?

&nbsp

;

A.

Have an administrator configure each employee’s mobile device

B.

Push encrypted WiFi profile to mobile devices

C.

Give MAC-based access to mobile devices

D.

Give IMEI-based access to mobile devices

 

Correct Answer: B

 

 

QUESTION 105

Corporate users have been assigned locked-down mobile devices where the ability to add, remove, or update the software and operating system has been disabled. Which of the following can be used to approve centralized device updates?

 

A.

Problem management

B.

Incident management

C.

Change management

D.

Asset management

 

Correct Answer: C

 

 

QUESTION 106

An administrator has been informed that one of the systems on the corporate network has been compromised. Which of the following steps should the administrator take NEXT to initiate proper incident response?

 

A.

Take screen shots and copy logs from the affected machine, storing these in a secured environment.

B.

Use MD5 on the system and backup the current image if the system is virtual.

C.

Isolate the device and perform a device wipe.

D.

Alert the incident response team and await further instruction on procedures.

 

Correct Answer: D

 

 

 

QUESTION 107

Corporate policy stipulates user accounts only be granted to employees; however, many departments within the organization use private consultants to assist with various projects.Which of the following allows consultants network access without compromising security? (Select TWO).

 

A.

Provide open wireless access.

B.

Provide wireless guest network access.

C.

Provide an internal user account.

D.

Provide VPN access.

E.

Provide a CAT5 cable.

 

Correct Answer: BD

 

 

QUESTION 108

While troubleshooting a problem reported by an end-user, which of the following steps comes between establishing a plan of action and implementing the plan of action?

 

A.

Gather information

B.

Verify full system functionality

C.

Question the user

D.

Identify potential effects

 

Correct Answer: D

 

 

QUESTION 109

A user is able to view unauthorized websites using a secure MDM browser on a device. Which of the following is BEST used for troubleshooting the issue?

 

A.

Group membership

B.

Firewall port configuration

C.

Certificate authentication

D.

Firmware version

 

Correct Answer: A

 

 

QUESTION 110

The mobile workforce keeps cached survey data on their mobile devices. Which of the following should the organization implement to ensure minimal data loss due to damaged devices?

 

A.

Data restoration procedures should be implemented and tested annually.

B.

A backup policy should be implemented and enforced on all the devices used by the mobile workforce.

C.

Mandatory backup and restoration training should be administered to all members of the mobile workforce.

D.

A remote wipe policy should be implemented and employees should report damaged devices immediately.

 

Correct Answer: B

Free VCE & PDF File for CompTIA MB0-001 Real Exam

Instant Access to Free VCE Files: CompTIA | CompTIA | SAP …
Instant Access to Free PDF Files: CompTIA | CompTIA | SAP …

This entry was posted in MB0-001 Real Exam (October) and tagged , , , , , , . Bookmark the permalink.