1.
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
2.
Which of the following is the BEST method of access control on a mobile device?
3.
Which of the following is an example of encryption for data at rest?
4.
Which of the following is a best practice for configuring mobile network access control?
5.
Which of the following is the BEST way to ensure Joe, a terminated employee, no longer has access to the company network on his mobile device?
6.
While connected to the company's wireless network, users are experiencing connection issues and reporting slow network speeds. Which of the following actions is the BEST method to identify the issue?
7.
Which of the following encryption methods will be the BEST way to secure the company wireless network?
8.
Which of the following encryption methods is BEST for data at rest on mobile devices?
9.
Guests are allowed to use the company wireless network for Internet access only by connecting to the guest SSID through a captive portal for authentication. Guests reported that they connected to the Internet without captive portal authentication. Which of the following would BEST explain this problem?
10.
UMTS belongs to which of the following generation of mobile cellular systems?