PassLeader Valid MB0-001 Dumps with VCE and PDF (Question 101 – Question 125)

PassLeader released the NEWEST CompTIA MB0-001 exam dumps recently! Both MB0-001 VCE dumps and MB0-001 PDF dumps are available on PassLeader, either MB0-001 VCE dumps or MB0-001 PDF dumps have the NEWEST MB0-001 exam questions in it, they will help you passing CompTIA MB0-001 exam easily! You can download the valid MB0-001 dumps VCE and PDF from PassLeader here: https://www.passleader.com/mb0-001.html (302 Q&As Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc

QUESTION 101
A large organization, with multiple remote locations, is looking for a way to securely provision company-owned mobile devices. Which of the following would be BEST to use for MDM enrollments?

A.    LDAP
B.    IMEI
C.    SCEP
D.    ICCID

Answer: C

QUESTION 102
Corporate users have been assigned locked-down mobile devices where the ability to add, remove, or update the software and operating system has been disabled. Which of the following can be used to approve centralized device updates?

A.    Problem management
B.    Incident management
C.    Change management
D.    Asset management

Answer: C

QUESTION 103
Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company’s sensitive data from the device?

A.    Device lock and remote wipe should be enforced on the personal device.
B.    A software container policy should wrap and encrypt both the user and company data.
C.    Encryption should be enabled when company data is transmitted and received.
D.    A secure container device policy should separate company data from personal data.

Answer: D

QUESTION 104
A generic mobile operating system is developed by a third party, and then is customized by the mobile wireless carrier to fit each specific device’s hardware. Which of the following should the administrator do FIRST, when updating enterprise owned devices?

A.    The administrator should configure the mobile management server to automatically push the wireless carrier’s OS.
B.    The administrator should download the OS from the third party, apply hardware changes, and then push the OS.
C.    The administrator should push the updated OS developed by the third party through the mobile management server.
D.    The administrator should consult the mobile wireless carrier release notes and upgrade procedure.

Answer: D

QUESTION 105
Ann, a user, wants to configure the email client on her newly purchased mobile device. Ann wants to ensure that the phone email client and the email server stay synchronized at all times, and that offline changes to the read status of an email will be synchronized once the phone is online. Which of the following should she configure?

A.    IMAP
B.    SSMTP
C.    POP
D.    SMTP

Answer: A

QUESTION 106
An administrator wants to configure two-factor authentication on all enterprise-owned mobile devices. Which of the following should the administrator configure?

A.    Username and password
B.    Face recognition and PIN
C.    Face recognition and thumbprint
D.    Pattern lock and PIN

Answer: B

QUESTION 107
Which of the following would allow a mobile device administrator to automatically correlate mobile device logs, and receive customized alerts based on predetermined activity patterns?

A.    SMTP
B.    Syslog
C.    SIEM
D.    SNMP

Answer: C

QUESTION 108
Which of the following should a mobile administrator deploy to prevent sensitive company information from being transmitted to an employee’s personal email account?

A.    Transmission encryption
B.    DLP system
C.    Content filter
D.    Mobile antivirus

Answer: B

QUESTION 109
An application displays a 3D world clock and calendar when the screen is locked. Which of the following will be MOST impacted by this application?

A.    Device battery life
B.    Device power supply
C.    User authorization prior to being installed
D.    Mobile storage for cached data

Answer: A

QUESTION 110
Two children have been given new phones by their parents with the GPS tracking feature enabled. Both phones are powered on and have connectivity. Which of the following is the MOST likely cause of why the parents are unable to track their children’s location?

A.    The children’s phones did not come with a removable SD card.
B.    The GPS on the parent’s phone is not enabled.
C.    The location service is not working properly.
D.    The phone is only connected to three satellites.

Answer: C

QUESTION 111
An administrator has installed a network based security appliance. The security appliance was placed between the email server and the company’s Internet gateway. Employees are now reporting issues with email synchronization. Which of the following is the MOST likely reason for the issue?

A.    The SSL certificate on all employees’ mobile devices has expired.
B.    The employees are reporting what is known to be a false positive.
C.    A required port is being blocked by the newly installed network device.
D.    The email server must be reconfigured to account for the security appliance.

Answer: C

QUESTION 112
Which of the following is a characteristic of 802.11a?

A.    802.11a uses dual band.
B.    802.11a is unable to stream video.
C.    802.11a uses 5 GHz.
D.    802.11a uses 2.4 GHz.

Answer: C

QUESTION 113
Which of the following is a BEST practice when selecting corporate cellular hardware devices?

A.    Choose based on frequency hopping capabilities
B.    Choose the AP from one vendor and terminals from others
C.    Choose devices from the same wireless carrier
D.    Choose devices based on user preference

Answer: C

QUESTION 114
When mobile users roam from one point of a building to another, their connection drops and they have to reinitiate pending downloads. The administrator determines that the signal is weak in certain areas of the building. Which of the following is the BEST way of addressing this issue?

A.    Identify areas as known dead zones for wireless connectivity
B.    Increase the signal strength in the mobile device
C.    Use a different SSID while roaming the building
D.    Strengthen AP signal and AP device placement

Answer: D

QUESTION 115
An administrator is tasked with implementing disk encryption for information stored on a mobile device with at least 128-bits of strength. Which of the following should be applied to meet this requirement?

A.    AES
B.    SSL
C.    SHA-1
D.    DES

Answer: A

QUESTION 116
Joe, a corporate MDM administrator, needs to implement device encryption. Which of the following would provide the BEST encryption?

A.    Data in transit encryption
B.    Block level device encryption
C.    Folder level device encryption
D.    Whole device encryption

Answer: D

QUESTION 117
Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point?

A.    VPN
B.    SSL
C.    WPA2
D.    TLS

Answer: C

QUESTION 118
Which of the following is MOST likely to be used by default for WPA2?

A.    AES
B.    TKIP
C.    WEP
D.    3DES

Answer: A

QUESTION 119
During the e-discovery process, a litigation hold has been placed on information stored in several areas, including the mobile device of the Chief Financial Officer (CFO). Which of the following steps should be taken to prove the data integrity of information on this device during the investigation?

A.    Review logging on the device and connecting MDM server
B.    Isolate the device and apply chain of custody controls
C.    Encrypt information stored internally on the device
D.    Hash information stored on the device

Answer: D

QUESTION 120
An administrator has been informed that one of the systems on the corporate network has been compromised. Which of the following steps should the administrator take NEXT to initiate proper incident response?

A.    Take screen shots and copy logs from the affected machine, storing these in a secured environment.
B.    Use MD5 on the system and backup the current image if the system is virtual.
C.    Isolate the device and perform a device wipe.
D.    Alert the incident response team and await further instruction on procedures.

Answer: D

QUESTION 121
Which of the following involves a key exchange which introduces the vulnerability of a man-in-the-middle attack?

A.    SSL
B.    RSA
C.    Kerberos
D.    PKI

Answer: A

QUESTION 122
An administrator noticed a number of mobile devices are downloading applications from unauthorized mobile application stores. Which of the following has MOST likely occurred?

A.    Jamming
B.    Jailbreaking
C.    Out-of-date virus definitions
D.    Keylogging

Answer: B

QUESTION 123
An administrator has been tasked with correlating system logs to identify brute force attacks. Which of the following would allow for this as well as a centralized location to review system logs?

A.    NIDS
B.    SIEM
C.    NIPS
D.    DLP

Answer: B

QUESTION 124
Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?

A.    Network firewall
B.    Software firewall
C.    NIDS
D.    HIPS

Answer: A

QUESTION 125
Ann, an attacker, has spoofed a mobile device serial number so she can connect to the MDM environment. Which of the following would an administrator check to uncover this attack?

A.    Review the SIEM logs on a corporate network to determine authentication issues
B.    Review certificate revocations by the MDM
C.    Review connection attempts to the network from that phone’s serial number
D.    Review recent connection locations, looking for an abnormal location

Answer: D


Welcome to choose PassLeader MB0-001 dumps for 100% passing CompTIA MB0-001 exam: https://www.passleader.com/mb0-001.html (302 Q&As VCE Dumps and PDF Dumps)

Also, previewing the NEWEST PassLeader MB0-001 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpNWp4Rk9HSmQ4eWc