1.
Which of the following is a WiFi topology that occurs when Ann, an end-user, configures her laptop to be a WiFi access point to which another device connects?
2.
Which of the following technologies allows multiple network devices to have the same public source IPv4 address when communicating with other devices on the Internet?
3.
If an application stores data on corporate servers, which of the following is a technique to ensure that data is available even if someone accidentally deletes it?
4.
Which of the following technologies allows multiple devices to use a single source of authentication for access to services?
5.
Which of the following is MOST likely to benefit from an MDM solution to support multiple platforms?
6.
Which of the following is the BEST technique to segregate corporate data from personal data on end-user devices?
7.
An application is installed through the enterprise MDM application store. An upgrade is issued and a single device does not receive the upgrade as expected. Which of the following is the MOST likely cause?
8.
An email password prompt appears on a device after a specific interval. Which of the following is the MOST likely cause?
9.
When addressing BYOD local backups, it is best practice to do which of the following?
10.
A potential security breach has occurred that requires a device policy change to mitigate the risk. The default policy sync interval is four hours. Which of the following should occur immediately?