1.
Which of the following would be used to enforce a policy requiring two-factor authentication on certain mobile devices?
2.
An employee reports a network connectivity issue to the helpdesk. Which of the following steps should be taken before escalating the issue?
3.
Which of the following can be applied to a mobile device to support a corporate mandate which does not allow Internet gambling activities?
4.
When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize which of the following frequency bands?
5.
Which of the following is a topology that uses multiple access points to communicate with each other to pass data?
6.
An end-user has notified the helpdesk that a tablet was left in a taxi-cab. Which of the following is the order of response?
7.
The IT department has been contacted by Joe, an end-user, reporting he is unable to login to his smart phone. Which of the following would cause this issue?
8.
The IT department is contacted by Joe, an end-user, who is unable to connect to the corporate IPsec VPN from outside of his corporate network. Joe confirms he can connect to popular web pages. Which of the following would cause this issue?
9.
Which of the following is a cellular technology that supports data and voice at the same time?
10.
Which of the following device configuration parameters could be used to change how the mobile device data is routed back to a company on a cellular network?