Lightning strikes and damages the only cellular tower used for wireless coverage at a remote vacation resort. Which of the following design elements would have guaranteed uninterrupted wireless communication at the resort?
A. Implement a cold site
B. Implement redundancy
C. Implement a warm site
D. Install an enterprise UPS at the tower site
Which of the following are the MAIN differences between a lightweight access point and an autonomous access point? (Select THREE).
A. Autonomous access points support multiple channels
B. Lightweight access points require a central controller after being configured
C. Lightweight access points must be preconfigured
D. Autonomous access points can operate independently once configured
E. Multiple lightweight access points take less time to manage
F. Lightweight access points support fewer users
The main difference between CDMA and TDMA is that:
A. TDMA splits the channel into sequential slices while CDMA uses wide spectrum.
B. TDMA uses a single tone to generate modulation while CDMA uses multiple channels modulation.
C. TDMA only works in GSM systems while CDMA does not support GSM.
D. TDMA uses carrier sense multiple access while CDMA uses collision detection.
Ann, a contractor, has conducted a passive wireless site survey of a theatre. She noticed that the control room uses sound proof walls reinforced with a metal mesh. Which of the following should Ann recommend to provide adequate wireless coverage throughout the theatre?
A. One 802.11n access point, with dual antennas, placed in the middle of the theatre is sufficient to cover all areas.
B. One 802.11ac access point should be placed in the middle of the theatre. The AP directional antenna should point to the control room.
C. Full mesh, high-density, access point coverage should be provided through the theatre, with a wireless repeater in the control room. The repeater should be part of the wireless mesh.
D. Access points should be placed through the theatre with a dedicated access point in the control room. The AP in the control room should be hard wired to the network.
An outside firm has been hired to conduct a penetration test on a company. The firm informs the company of what tools may be used, when the test will be completed, and the IP addresses they will be attacking from. The IPS is setup to ignore all alerts geared around the tools during this timeframe. Which of the following is at risk of occurring in this scenario?
A. Content filter misconfiguration
B. False negative
C. Authentication failure
D. False positive
Joe, an employee, contacts the database administrator about an issue with a local database on his hard drive. Which of the following questions would be MOST helpful in determining the next step in troubleshooting?
A. What is the state of the database service?
B. What is the error message being received?
C. Is there a connection to the Internet?
D. What is the password being used to access the database?
An administrator is tasked with remotely wiping the Chief Information Officer's (CIO's) device after it is reported stolen. Which of the following should be reviewed to determine if authentication attempts have failed after the device was stolen?
A. Logon attempts on the MDM server
B. Review cellular logs
C. Location services on the device
D. Accounts lockout on the network ID
An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement?
A. Key fob and swipe card
B. Pattern swipe and facial scan
C. Finger print and retina scan
D. PIN and complex password
After Ann, an employee, connects to the corporate network, her mobile device data usage spikes and menu options appear differently than before. Which of the following is MOST likely causing both of these issues to occur?
A. Device backups
B. Device encryption
C. Patching on the mobile device
D. VPN connection initialization
Which of the following can be used to ensure login credentials are secured when in transit from a mobile device's browser to a web server? (Select THREE).
A. 3DES
B. DES
C. MD5
D. HTTPS
E. SSL
F. TLS
G. AES
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MB0-001 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.