1.
Which of the following must be used to successfully deploy an in-house developed application?
2.
Which of the following provides information on potential security risks and threats impacting administration of mobile devices?
3.
A network administration team will not be able to support an MDM project within the requested timeline. Which of the following would be the BEST option for deploying the Mobile Device Management software?
4.
Joe, a user, has noticed that his corporate-owned device has been stolen. Which of the following actions should Joe take FIRST?
5.
While at a conference, Ann, a user, is attempting to sync data from her device back to the corporate server. Ann has a cellular signal, however the sync will not complete. Which of the following is MOST likely causing the issue?
6.
Which of the following capabilities would ensure that employees do not access an application after leaving a specified physical location?
7.
Which of the following is a messaging protocol that protects the confidentiality of email content?
8.
Ann, a user, called to report an issue related to authenticating to her mobile device. After resolving the issue, which of the following is the FINAL task that should be completed by the mobility administrator according to troubleshooting best practices?
9.
After installation of an MDM solution within an organization, the organization should ensure that all users of mobile devices agree to rules stated in which of the following documents?
10.
An organization is concerned with employees using cellular data in excess of the established usage thresholds. Which of the following would be BEST for the organization to implement?