Executive management asks about threats that can affect multiple mobile devices. Which of the following needs to be addressed? (Select TWO).
A. Data loss
B. Travel
C. DLP
D. Device cloning
E. IPS
A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of the following threats should be taken into account? (Select TWO).
A. Rogue access point
B. New employee
C. Firewall
D. NAT
E. Warpathing
Which of the following is the BEST method of access control on a mobile device?
A. AES
B. PIN
C. Screen saver
D. Encryption
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
A. Access control list
B. Password policy
C. Firewall
D. Full-disk encryption
Ann, a wireless customer, cannot access her email. A technician found that Ann lost access to her email at the same time an update was pushed to all customers. Which of the following is the NEXT troubleshooting step?
A. Revert to last known good configuration on device
B. Revert back to a previous state on the email server
C. Verify that other customers cannot access email
D. Reload Ann's email client
Which of the following can be used to secure data at rest? (Select TWO).
A. VPN
B. AES
C. SSL
D. 3DES
E. IPsec
Which of the following are used to secure data in transit? (Select TWO).
A. IPsec
B. WPA
C. Block level encryption
D. FTP
E. File level encryption
A technician receives a trouble ticket that Joe, a wireless customer, cannot access his email. As part of the troubleshooting process, the technician gathered information and identified the symptoms. Which of the following is the NEXT logical step in troubleshooting?
A. Test the theory
B. Document findings and outcomes
C. Establish a theory to determine the cause
D. Implement the solution
A technician receives a ticket that Ann, a wireless customer, cannot access her email. As part of the troubleshooting process, the technician has finished establishing a plan of action to resolve the problem. Which of the following is the NEXT logical step the technician should take?
A. Verify full system functionality
B. Document findings
C. Gather information
D. Implement the solution
Which of the following layers of the OSI model is responsible for routing protocols and IP addresses?
A. Network layer
B. Datalink layer
C. Application layer
D. Session layer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MB0-001 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.