Update CompTIA Mobility+ MB0-001 Dumps with VCE and PDF for Free (Question 76 – Question 100)

PassLeader released the NEWEST CompTIA MB0-001 exam dumps recently! Both MB0-001 VCE dumps and MB0-001 PDF dumps are available on PassLeader, either MB0-001 VCE dumps or MB0-001 PDF dumps have the NEWEST MB0-001 exam questions in it, they will help you passing CompTIA MB0-001 exam easily! You can download the valid MB0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/mb0-001.html (302 Q&As Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc

QUESTION 76
Which of the following technologies isolates the internal network from the outside world?

A.    Email server
B.    Rogue access point
C.    DNS server
D.    DMZ

Answer: D

QUESTION 77
Which of the following topologies should an engineer consider when designing a wireless LAN?

A.    Bus
B.    Star
C.    Mesh
D.    Token ring

Answer: C

QUESTION 78
Joe, a mobile user, calls the help desk inquiring about his access to the Campus Area Network (CAN). The administrator uses the troubleshooting methodology to determine that the Access Point is unable to connect to the main campus. The administrator visits building B and notices that the Access Point has failed. Which of the following is the MOST likely cause of the problem?

A.    The Smart Device is on the wrong VLAN.
B.    Joe called the administrator using his Smart Device.
C.    The PoE adapter did not recover.
D.    Network traffic dropped because of a bad NIC.

Answer: C

QUESTION 79
All executive offices are being equipped with a laptop, smart phone, tablet, and printers. The laptop is able to communicate with the other devices through Bluetooth technology. Which of the following is being created in this scenario?

A.    SSID
B.    VLAN
C.    Hotspot
D.    PAN

Answer: D

QUESTION 80
Ann, an employee, works remotely most of the time, only visiting the office for quarterly meetings. During one of these visits, a wireless technician picks up a new network that seems to be broadcasting from Ann’s laptop. Which of the following types of networks has the technician encountered?

A.    WLAN
B.    Point-to-point
C.    VPN
D.    Ad-hoc

Answer: D

QUESTION 81
A wireless administrator has been tasked with ensuring all WAPs backup their configurations on a daily basis at a 24/7 operations center. This backup cannot take place over the wireless network without interrupting operations. Which of the following should be implemented to meet these requirements?

A.    QoS
B.    Traffic shaping
C.    Backhauling traffic
D.    Off-hours backups

Answer: C

QUESTION 82
Which of the following disaster recovery principles would allow Joe, a user, to download his phone contacts from a lost phone to a new phone without regaining physical possession of the device?

A.    Device backups to a remote server
B.    Device backups to a SIM card
C.    Server backups to a cloud provider
D.    Device backups to internal memory

Answer: A

QUESTION 83
A corporation provides their board members with tablets, preloaded with materials containing sensitive information, at each board meeting. Prior to one of the quarterly meetings, the operating system for the tablet is updated to include mandatory cloud storage of all information on the devices. Which of the following actions can be taken to maintain usability for these tablets while reducing the risk of leaking sensitive information to an outside party?

A.    Revoke tablet certificates from trusted sources and cloud sites
B.    Block communication from the tablets to the cloud storage provider
C.    Remove communication from the tablets to external networks
D.    Harden the tablets to only allow connections from trusted sources

Answer: B

QUESTION 84
After months of planning and testing an MDM solution has been rolled out to a multinational organization. Which of the following should occur NEXT to ensure administration and upkeep of this solution in the future?

A.    Post-implementation feedback
B.    Software development lifecycle management
C.    Post-pilot lessons learned
D.    End-user license agreement roll-out

Answer: A

QUESTION 85
An insurance company has employees responding to a regional disaster through use of mobile printers and tablet devices. Which of the following options should be allowed on mobile devices to ensure the employees are able to route through a number of impassable road ways in order to aid customers as quickly as possible?

A.    Location services
B.    PAN
C.    Geo-fencing
D.    Self-service portals

Answer: A

QUESTION 86
Joe, an employee, from a company with a BYOD policy synchronizes his mobile device information to his home computer on a weekly basis. After connecting to Joe’s corporate network for the first time, all of his stored files are no longer recognized by his home computer. Which of the following policies is MOST likely causing this issue to occur?

A.    Encryption of all device information
B.    Remote wipe
C.    Application and OS patching on the mobile device
D.    OS patching on the home computer

Answer: A

QUESTION 87
After Ann, an employee, connects to the corporate network, her mobile device data usage spikes and menu options appear differently than before. Which of the following is MOST likely causing both of these issues to occur?

A.    Device backups
B.    Device encryption
C.    Patching on the mobile device
D.    VPN connection initialization

Answer: C

QUESTION 88
Which of the following can be used to ensure login credentials are secured when in transit from a mobile device’s browser to a web server? (Select THREE.)

A.    3DES
B.    DES
C.    MD5
D.    HTTPS
E.    SSL
F.    TLS
G.    AES

Answer: DEF

QUESTION 89
An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement?

A.    Key fob and swipe card
B.    Pattern swipe and facial scan
C.    Finger print and retina scan
D.    PIN and complex password

Answer: B

QUESTION 90
An administrator is tasked with remotely wiping the Chief Information Officer’s (CIO’s) device after it is reported stolen. Which of the following should be reviewed to determine if authentication attempts have failed after the device was stolen?

A.    Logon attempts on the MDM server
B.    Review cellular logs
C.    Location services on the device
D.    Accounts lockout on the network ID

Answer: D

QUESTION 91
Joe, an employee, contacts the database administrator about an issue with a local database on his hard drive. Which of the following questions would be MOST helpful in determining the next step in troubleshooting?

A.    What is the state of the database service?
B.    What is the error message being received?
C.    Is there a connection to the Internet?
D.    What is the password being used to access the database?

Answer: B

QUESTION 92
An outside firm has been hired to conduct a penetration test on a company. The firm informs the company of what tools may be used, when the test will be completed, and the IP addresses they will be attacking from. The IPS is setup to ignore all alerts geared around the tools during this timeframe. Which of the following is at risk of occurring in this scenario?

A.    Content filter misconfiguration
B.    False negative
C.    Authentication failure
D.    False positive

Answer: B

QUESTION 93
The main difference between CDMA and TDMA is that: ____.

A.    TDMA splits the channel into sequential slices while CDMA uses wide spectrum.
B.    TDMA uses a single tone to generate modulation while CDMA uses multiple channels modulation.
C.    TDMA only works in GSM systems while CDMA does not support GSM.
D.    TDMA uses carrier sense multiple access while CDMA uses collision detection.

Answer: A

QUESTION 94
Ann, a contractor, has conducted a passive wireless site survey of a theatre. She noticed that the control room uses sound proof walls reinforced with a metal mesh. Which of the following should Ann recommend to provide adequate wireless coverage throughout the theatre?

A.    One 802.11n access point, with dual antennas, placed in the middle of the theatre is sufficient to cover all areas.
B.    One 802.11ac access point should be placed in the middle of the theatre.
The AP directional antenna should point to the control room.
C.    Full mesh, high-density, access point coverage should be provided through the theatre, with a wireless repeater in the control room.
The repeater should be part of the wireless mesh.
D.    Access points should be placed through the theatre with a dedicated access point in the control room.
The AP in the control room should be hard wired to the network.

Answer: D

QUESTION 95
Which of the following are the MAIN differences between a lightweight access point and an autonomous access point? (Select THREE.)

A.    Autonomous access points support multiple channels
B.    Lightweight access points require a central controller after being configured
C.    Lightweight access points must be preconfigured
D.    Autonomous access points can operate independently once configured
E.    Multiple lightweight access points take less time to manage
F.    Lightweight access points support fewer users

Answer: BDE

QUESTION 96
Which of the following is often used when minimal data degradation does NOT impact the overall quality at the receiver’s end?

A.    TCP
B.    IPv6
C.    UDP
D.    NAT

Answer: C

QUESTION 97
Lightning strikes and damages the only cellular tower used for wireless coverage at a remote vacation resort. Which of the following design elements would have guaranteed uninterrupted wireless communication at the resort?

A.    Implement a cold site
B.    Implement redundancy
C.    Implement a warm site
D.    Install an enterprise UPS at the tower site

Answer: B

QUESTION 98
The mobile workforce keeps cached survey data on their mobile devices. Which of the following should the organization implement to ensure minimal data loss due to damaged devices?

A.    Data restoration procedures should be implemented and tested annually.
B.    A backup policy should be implemented and enforced on all the devices used by the mobile workforce.
C.    Mandatory backup and restoration training should be administered to all members of the mobile workforce.
D.    A remote wipe policy should be implemented and employees should report damaged devices immediately.

Answer: B

QUESTION 99
An organization wants to ensure that personnel are automatically alerted and ready to unload merchandise when a shipping container is approaching the warehouse. Which of the following would allow the organization to implement automatic alerting?

A.    Geo-fencing
B.    Cloud computing
C.    Geo-caching
D.    High availability

Answer: A

QUESTION 100
An organization wants to allow employees to use personal mobile devices for business purposes, but requires adherence to corporate mandates. Which of the following should the organization implement?

A.    A B2B agreement
B.    A BYOD policy
C.    A B2C agreement
D.    An RFC

Answer: B


Welcome to choose PassLeader MB0-001 dumps for 100% passing CompTIA MB0-001 exam: https://www.passleader.com/mb0-001.html (302 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc