100% Pass Ensure CompTIA Mobility+ MB0-001 Practice Test with Free VCE and PDF (Question 51 – Question 75)

PassLeader released the NEWEST CompTIA MB0-001 exam dumps recently! Both MB0-001 VCE dumps and MB0-001 PDF dumps are available on PassLeader, either MB0-001 VCE dumps or MB0-001 PDF dumps have the NEWEST MB0-001 exam questions in it, they will help you passing CompTIA MB0-001 exam easily! You can download the valid MB0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/mb0-001.html (302 Q&As Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc

QUESTION 51
Which of the following protocols is primarily used for transporting email?

A.    DNS
B.    POP
C.    SMTP
D.    FTP

Answer: C

QUESTION 52
Which of the following protocols ensures reliable communication?

A.    TCP
B.    UDP
C.    MAC
D.    IP

Answer: A

QUESTION 53
Which of the following protocols is used to configure devices and to gather information for reporting?

A.    POP3
B.    PoE
C.    SNMP
D.    MIB

Answer: C

QUESTION 54
Which of the following ports is used for relaying email?

A.    Port 21
B.    Port 22
C.    Port 23
D.    Port 25

Answer: D

QUESTION 55
Which of the following methods would MOST likely prevent a laptop from being booted without the correct key or password?

A.    File level encryption
B.    Full-disk encryption
C.    Folder level encryption
D.    Removable media encryption

Answer: B

QUESTION 56
A device that maliciously transmits on the same frequency as another device, which would prevent normal wireless communication, is an example of: ____.

A.    Spoofing
B.    Sandboxing
C.    Jamming
D.    Rooting

Answer: C

QUESTION 57
Forwarding authentication requests to a centralized server would be the role of which of the following? (Select TWO.)

A.    RADIUS
B.    APNS
C.    SIEM
D.    TACACS+
E.    Multifactor authentication

Answer: AD

QUESTION 58
An access point that is on a network without authorization would be defined as a(n): ____.

A.    Lightweight access point
B.    Rogue access point
C.    Wireless access point
D.    Autonomous access point

Answer: B

QUESTION 59
Malicious software that is designed to appear as a legitimate program would be defined as a: ____.

A.    trojan
B.    DDoS
C.    rogue access point
D.    man-in-the-middle attack

Answer: A

QUESTION 60
Preventing USB flash drives from being used in mobile devices could be accomplished with which of the following?

A.    Software firewalls
B.    Hardware firewalls
C.    Intrusion prevention systems
D.    Physical port disabling

Answer: D

QUESTION 61
Which of the following changes with the increase in frequency?

A.    Wavelength
B.    Amplitude
C.    Bandwidth
D.    Throughput

Answer: A

QUESTION 62
When multiple signals arrive at a certain location at a given time and disrupt radio signal reception, this is called: ____.

A.    Interference
B.    Refraction
C.    Jamming
D.    Absorption

Answer: A

QUESTION 63
An antenna that propagates its signal in 360 degrees is called which of the following?

A.    Semi-directional
B.    Parabolic
C.    Directional
D.    Omni-directional

Answer: D

QUESTION 64
A radio signal bounces off hard surfaces and arrives at a point via multiple paths. Which of the following describes this phenomenon?

A.    Reflection
B.    Attenuation
C.    Absorption
D.    Refraction

Answer: A

QUESTION 65
Which of the following phenomenon results in decreased signal levels due to passing through a solid structure?

A.    Reflection
B.    Absorption
C.    Attenuation
D.    Refraction

Answer: B

QUESTION 66
When a new building WiFi system is installed, a map is built in order to understand where the system provides access to the network. Which of the following maps will aid the help desk technician in troubleshooting connectivity issues?

A.    Coverage map
B.    Site map
C.    Signal map
D.    Nmap

Answer: A

QUESTION 67
Joe, a help desk technician, is receiving multiple calls that WiFi is not working in a new area of the building. Joe determines that the coverage should be adequate. Which of the following would be the recommended escalation procedure?

A.    Log analysis
B.    Spectrum analysis
C.    Protocol analyzer
D.    Penetration testing

Answer: B

QUESTION 68
It takes a user 20 seconds or more to send mail from a remote location, and experiences intermittent slowness during web browsing. The technician determines that the network signal is adequate. There is a large meeting in the conference room adjacent to the user. Which of the following conditions is MOST likely occurring?

A.    Email congestion
B.    Bandwidth optimization
C.    Content filtering
D.    Network latency

Answer: D

QUESTION 69
After upgrading the email program, a user cannot access email. The technician verifies the email account is configured properly. Which of the following should be checked for accuracy? (Select TWO.)

A.    SNMP settings
B.    Operating system version
C.    Email server address
D.    Network account name
E.    MAC address

Answer: CD

QUESTION 70
Which of the following is required to connect to a WiFi network?

A.    Authentication
B.    SSID
C.    VLAN
D.    DNS server

Answer: B

QUESTION 71
High availability procedures include which of the following?

A.    Load balancing
B.    VLAN tagging
C.    Traffic shaping
D.    Usage monitoring

Answer: A

QUESTION 72
A user traveling overseas is in a place where there is access to WiFi. The user can receive email and talk using VoIP, but cannot place or receive phone calls. Which of the following is the MOST likely cause of this issue?

A.    The phone will need a new SIM card
B.    Incompatible cellular technology
C.    ICCID needs to be changed
D.    IMEI needs to be changed

Answer: B

QUESTION 73
After registering a device for use with the corporate MDM server, Joe, a user, is unable to receive corporate email. Joe can send and receive personal email, SMS messages, access Internet sites from his device, and place phone calls. Other users are able to access their email from the same server. Which of the following is the MOST likely cause of the problem?

A.    The device no longer meets MDM security requirements
B.    The WiFi antenna is disabled
C.    Joe’s mailbox is empty on the server
D.    The corporate firewall is not configured properly

Answer: A

QUESTION 74
The proper order to configure a mobile device for use with an MDM system is: ____.

A.    install client, sign in to server, accept certificates, install profiles.
B.    install profiles, install client, accept certificates, sign in to server.
C.    sign in to server, install profiles, install client, accept certificates.
D.    sign in to server, install profiles, accept certificates, install client.

Answer: A

QUESTION 75
The correct sequence for deploying a new security profile in an MDM server is: ____.

A.    deploy to test group, observe results, create policy, deploy profile.
B.    create policy, deploy to test group, observe results, deploy profile.
C.    observe results, deploy profile, create policy, deploy to test group.
D.    deploy profile, observe results, create policy, deploy to test group.

Answer: B


Welcome to choose PassLeader MB0-001 dumps for 100% passing CompTIA MB0-001 exam: https://www.passleader.com/mb0-001.html (302 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc