The two-factor
authentication
Help Desk Escalation steps
Mobile device mandate to stop internet gambling on your network
802.11G uses what frequency?
Which of the following is topology for wireless access points
In order to conduct a predictive wireless audit (install wifi)
Mobile team is evaluating new smartphones for mass deployment considerations
Order of response in case of loss of device
If someone is reporting that the can not log into there phone (mdm) (password expires every 30 days)
VPN= what port number?
Celular technology supports voice and data at the same time
How can be transmitted back through a mobile network?
Mobile devices using mdm can communicate through a service using servers = ?
Microsoft exchange active sync uses what port?
What entity preforms final testing of mobile devices before going public?
Large scale mobile device deployment
valid placements to implement (mdm)
mdm roll out process
on board mobile devices into mdm
An enterprise application store
reviewing security incidents in a company
best option to deploy mobile ddevice mdm software
First thing to do after losing mobile device
If you have to sync a device
Geofencing
Admins responsibilty for emailing at work on a mobile device
Confidential emails are sent on?
Final step in troubleshooting a mobile device
Acceptable use policy
Your company wants you to get on wifi, what do you need to know
Employees are using more data then they have on the plan
What layer of the osi model uses mac address
what layer of the osi model uses IP address
6 comptia Troubleshooting steps
how do you secure data at rest
How do you secure data in transit
Employee lost email access after an update what do you do
the best way to secure coorperate data from being compromised
What is the best method for access control on a mobile device
Threats for mobile devices
wireless assessment
encryption for data at rest
What is the best method for mobile network access control
Best way to ensure that a fired employee can not get on the network using a mobile device
To find out why the wifi is slow
What is the best security method for wifi
Which is the best data encryption for cell phone
umts belongs to what generation
What cellular technology divides into 3 separate time slots?
Heavy snow
Dynamically switching from tower with out dropping is called?
employees phone won't send text and/or calls . why?
CEO is reporting latency on 3 devices
Which of the following are known as mobile device identifiers?
Joe is not receiving email on mobile device, everything else is working. what is wrong?
What is the best way to renew an expired certificate remotely?
Transporting email
which of the following protocol secures reliable transport?
Information reported for configuring devices is known as ..?
which port is used for relaying email on your computer
How can you prevent a laptop from being booted without the correct key or password ?
What would prevent normal wireless communications when another device transmitted maliciously?
An access point that is on a network without authorization
Malicous software that trys to appear as something else
Preventing usb flash drives from being utilized on any device can be accomplished by doing what?
increasing frequency the wave length gets longer?
When multiple signals arive at a certain location at the same time and disrupt each other?
antena that goes 360 degree
radio wave bounces off something
which of the following is required to connect to wifi?
high availability procedures include which of the following