Which of the following solution features will lower overall support costs for a large scale mobile device deployment?
A. Compliance management
B. Self-service portal
C. Security policy management
D. Location-based Services
Which of the following is a best practice for configuring mobile network access control?
A. Device password
B. Certificate authentication
C. IPsec VPN
D. ActiveSync
Which of the following frequencies fall under the unlicensed spectrum for WiFi network access? (Select TWO).
A. 1 GHz
B. 2.4 GHz
C. 3 GHz
D. 3.5 GHz
E. 5 GHz
Administrators are receiving calls that captive portals are unavailable even though sufficient WiFi signals are available. Which of the following would be the MOST likely cause?
A. VPN Tunnels
B. RSA Tokens
C. CDMA
D. TDMA
Which of the following methods would MOST likely prevent a laptop from being booted without the correct key or password?
A. File level encryption
B. Full-disk encryption
C. Folder level encryption
D. Removable media encryption
An information security consultant has recommended that mobile devices for special agents use two-factor authentication. Which of the following would fulfill this requirement?
A. Key fob and swipe card
B. Pattern swipe and facial scan
C. Finger print and retina scan
D. PIN and complex password
A user in a hotel is unable to see the hotel captive WiFi portal. Which of the following is the MOST likely explanation?
A. Encryption problem
B. VPN is active
C. APN issues
D. Location services problem
An administrator receives a call from Ann, a user, after wiping her device. The server does not allow Ann to re-enroll the device, while other users are able to enroll their devices successfully. The administrator confirms that Ann's account is not the problem. Which of the following can cause this?
A. Group policy is misconfigured
B. Ann has locked out her directory account
C. The password was entered incorrectly in the self service portal
D. Policy limits one device per person
An MDM console works with which of the following layers of the OSI model?
A. Application
B. Session
C. Transport
D. Presentation
Which of the following is the BEST way to ensure users de-provisioned from directory services are also de-provisioned from the MDM solution?
A. Remove user certificate
B. LDAP to MDM
C. SCEP sync with MDM
D. Re-enroll in MDM