Ann, an end-user reports, that she cannot access popular web pages unless she enters the IPv4 address of the site. Which of the following ports is MOST likely blocked for the device?
A. 25
B. 53
C. 80
D. 443
Ann, an attacker, has spoofed a mobile device serial number so she can connect to the MDM environment. Which of the following would an administrator check to uncover this attack?
A. Review the SIEM logs on a corporate network to determine authentication issues
B. Review certificate revocations by the MDM
C. Review connection attempts to the network from that phone's serial number
D. Review recent connection locations, looking for an abnormal location
An administrator has been tasked with correlating system logs to identify brute force attacks. Which of the following would allow for this as well as a centralized location to review system logs?
A. NIDS
B. SIEM
C. NIPS
D. DLP
Which of the following devices can be used to block a list of known malicious IP addresses at the furthest edge of a corporate network?
A. Network firewall
B. Software firewall
C. NIDS
D. HIPS
Which of the following involves a key exchange which introduces the vulnerability of a man-in-the- middle attack?
A. SSL
B. RSA
C. Kerberos
D. PKI
An administrator noticed a number of mobile devices are downloading applications from unauthorized mobile application stores. Which of the following has MOST likely occurred?
A. Jamming
B. Jailbreaking
C. Out-of-date virus definitions
D. Keylogging
An administrator has been informed that one of the systems on the corporate network has been compromised. Which of the following steps should the administrator take NEXT to initiate proper incident response?
A. Take screen shots and copy logs from the affected machine, storing these in a secured environment.
B. Use MD5 on the system and backup the current image if the system is virtual.
C. Isolate the device and perform a device wipe.
D. Alert the incident response team and await further instruction on procedures.
During the e-discovery process, a litigation hold has been placed on information stored in several areas, including the mobile device of the Chief Financial Officer (CFO). Which of the following steps should be taken to prove the data integrity of information on this device during the investigation?
A. Review logging on the device and connecting MDM server
B. Isolate the device and apply chain of custody controls
C. Encrypt information stored internally on the device
D. Hash information stored on the device
Which of the following should MOST likely be used at corporate headquarters to secure transmission between a mobile device and a wireless access point?
A. VPN
B. SSL
C. WPA2
D. TLS
Which of the following is MOST likely to be used by default for WPA2?
A. AES
B. TKIP
C. WEP
D. 3DES
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MB0-001 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.