1.
Ann, an end-user reports, that she cannot access popular web pages unless she enters the IPv4 address of the site. Which of the following ports is MOST likely blocked for the device?
2.
Which of the following allows devices to access an organization's WiFi network before ensuring that they conform to policy?
3.
Which of the following is a capability of geo-fencing?
4.
Which of the following technologies allows secure communication with a previously unverified entity?
5.
Which of the following helps ensure that a correct channel is configured for an access point?
6.
Which of the following technologies allows a network administrator to force traffic to be cached by a network device?
7.
While troubleshooting a problem reported by an end-user, which of the following steps comes between establishing a plan of action and implementing the plan of action?
8.
Which of the following is the MOST important consideration for in-house application development?
9.
A user is able to view unauthorized websites using a secure MDM browser on a device. Which of the following is BEST used for troubleshooting the issue?
10.
Joe, a user, has multiple devices and is continually locked out of his user account. In which of the following locations should the administrator look to determine which device is MOST likely causing the problem?