Which of the following would be used to enforce a policy requiring two-factor authentication on certain mobile
Which of the following would be used to enforce a policy requiring two-factor authentication on
certain mobile devices?
Which of the following steps should be taken before escalating the issue?
An employee reports a network connectivity issue to the helpdesk. Which of the following steps
should be taken before escalating the issue?
which does not allow Internet gambling activities?
Which of the following can be applied to a mobile device to support a corporate mandate which
does not allow Internet gambling activities?
which of the following frequency bands?
When setting up a wireless access point for 802.11g, the user must ensure mobile devices utilize
which of the following frequency bands?
Which of the following is a topology that uses multiple access points to communicate with each other to pass d
Which of the following is a topology that uses multiple access points to communicate with each
other to pass data?
Which of the following are components of a predictive wireless audit?
The mobility team has been tasked with placing Wi-Fi access points in a conference room. They
have been provided with a floor plan by the building architect. Which of the following are
components of a predictive wireless audit? (Select TWO).
Which of the following items is a concern for the adherence to IT Policy?
The mobility team is evaluating new smartphones for deployment from multiple vendors. Which of
the following items is a concern for the adherence to IT Policy? (Select TWO).
Which of the following is the order of response?
An end-user has notified the helpdesk that a tablet was left in a taxi-cab. Which of the following is
the order of response?
Which of the following would cause this issue?
The IT department has been contacted by Joe, an end-user, reporting he is unable to login to his
smart phone. Which of the following would cause this issue?
Which of the following would cause this issue?
The IT department is contacted by Joe, an end-user, who is unable to connect to the corporate
IPsec VPN from outside of his corporate network. Joe confirms he can connect to popular web
pages. Which of the following would cause this issue?