<< Prev Question Next Question >>

Question 264/268

Joe, an employee, from a company with a BYOD policy synchronizes his mobile device information to his home computer on a weekly basis. After connecting to Joe's corporate network for the first time, all of his stored files are no longer recognized by his home computer. Which of the following policies is MOST likely causing this issue to occur?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (268q)
Question 1: A solution which tracks and organizes the usage and cost of ...
Question 2: Which of the following are the MAIN differences between a li...
Question 3: When multiple signals arrive at a certain location at a give...
Question 4: Which of the following ports is used for relaying email?...
Question 5: Which of the following is the BEST way to provide ongoing tr...
Question 6: Which of the following frequencies fall under the unlicensed...
Question 7: VPN transmitting data over secure connections is an example ...
Question 8: Joe, a corporate MDM administrator, needs to implement devic...
Question 9: A user is issued a new device. The old device has been turne...
Question 10: Users in the corporate office are reporting dropped calls on...
Question 11: It is possible to switch between which of the following tech...
Question 12: An organization needs to configure and deploy dozens of new ...
Question 13: Which of the following devices can handle a full data backup...
Question 14: An administrator wants to configure two-factor authenticatio...
Question 15: Which of the following is a WiFi topology that occurs when A...
Question 16: An administrator has been informed that one of the systems o...
Question 17: Which of the following is the BEST way to renew an expired r...
Question 18: An application displays a 3D world clock and calendar when t...
Question 19: A large organization, with multiple remote locations, is loo...
Question 20: An application is installed through the enterprise MDM appli...
Question 21: Which of the following encryption methods is BEST for data a...
Question 22: Joe, a user, reports that after installing a new application...
Question 23: Which of the following technologies allows multiple network ...
Question 24: Access points function at which of the following layers of t...
Question 25: Ann, a user, cannot access the company WiFi. She states that...
Question 26: High availability procedures include which of the following?...
Question 27: A company has locations worldwide and needs to push promotio...
Question 28: All employees are unable to connect their corporate laptops ...
Question 29: Ann, a user, reports that her calendar is always an hour dif...
Question 30: Which of the following is the MOST important consideration f...
Question 31: Joe, an employee, is unable to unlock his mobile device and ...
Question 32: Which of the following tasks can assist to on-board mobile d...
Question 33: Ann, a user, reports that her touch screen enabled device is...
Question 34: Given an enterprise WLAN deployment, which of the following ...
Question 35: Which of the following are considered security protocols? (S...
Question 36: Joe, a network technician, has been using the company smart ...
Question 37: A user is concerned with device availability while traveling...
Question 38: Which of the following is a best practice for protecting mob...
Question 39: Which of the following is required to connect to a WiFi netw...
Question 40: Which of the following MUST be implemented in conjunction wi...
Question 41: Ann, a user, states she is not receiving a requested enterpr...
Question 42: Which of the following is considered best practice for secur...
Question 43: The main difference between CDMA and TDMA is that:...
Question 44: If a user's device is compromised, it is best practice to FI...
Question 45: In WiFi, loss of signal strength over distance is a result o...
Question 46: An organization is going to deploy a BYOD model to allow use...
Question 47: Which of the following application development methods deliv...
Question 48: When an application is assigned to a group profile:...
Question 49: A wireless network administrator finds that many users are u...
Question 50: If Android devices are synching email successfully, but iOS ...
Question 51: Which of the following is the correct sequence for promoting...
Question 52: Which of the following must be used to successfully deploy a...
Question 53: An MDM client was recently installed on a device. The user h...
Question 54: Ann, a user, has removed or turned off the MDM solution on h...
Question 55: Which of the following services can be used to locate a lost...
Question 56: Which of the following is the BEST way to ensure users de-pr...
Question 57: Preventing USB flash drives from being used in mobile device...
Question 58: An administrator receives a call from an executive who had b...
Question 59: Which of the following protocols can be used to establish a ...
Question 60: Which of the following protocols is used to configure device...
Question 61: Joe, a user, normally has access to internal network resourc...
Question 62: Which of the following is a topology that uses multiple acce...
Question 63: A radio signal bounces off hard surfaces and arrives at a po...
Question 64: Which of the following ports is used as alternate SMTP?...
Question 65: Which of the following capabilities would ensure that employ...
Question 66: A well-known security organization has released an alert reg...
Question 67: Which of the following sequences is the BEST way to implemen...
Question 68: Ann, a user, can no longer receive corporate email on her mo...
Question 69: Ann, an end-user reports, that she cannot access popular web...
Question 70: Which of the following is a BEST practice when selecting cor...
Question 71: After Ann, an employee, connects to the corporate network, h...
Question 72: When addressing BYOD local backups, it is best practice to d...
Question 73: Which of the following is the BEST technique to segregate co...
Question 74: Which of the following device configuration parameters could...
Question 75: Corporate users have been assigned locked-down mobile device...
Question 76: A user traveling overseas is in a place where there is acces...
Question 77: A user on a mobile device is unable to access a video-sharin...
Question 78: Which of the following are used to secure data in transit? (...
Question 79: Which of the following is the definition of jailbreak?...
Question 80: Which of the following will help in restoring data in the ev...
Question 81: Which of the following provides information on potential sec...
Question 82: Users are having trouble connecting to the intranet site fro...
Question 83: Which of the following disaster recovery principles would al...
Question 84: Ann, an administrator, is at a tradeshow and wishes to excha...
Question 85: Which of the following conditions are required for an admini...
Question 86: For a device that has corporate data segregated from persona...
Question 87: Ann, a wireless customer, cannot access her email. A technic...
Question 88: A user in a hotel is unable to see the hotel captive WiFi po...
Question 89: Which of the following services can be used to improve strea...
Question 90: Which of the following provides recourse in the event a thir...
Question 91: While connected to the company's wireless network, users are...
Question 92: Which of the following allows for secondary servers to assum...
Question 93: Joe, a user, reports that he does not have connectivity in W...
Question 94: Joe, a user, is unable to use the mapping features on his GP...
Question 95: Which of the following protocols ensures reliable communicat...
Question 96: Which of the following protocols is primarily used for trans...
Question 97: Ann, an employee, works remotely most of the time, only visi...
Question 98: Joe, a user, reports that he is no longer receiving email on...
Question 99: Which of the following protocols is required for iOS device ...
Question 100: Joe, a technician, is assigned to design a wireless network ...
Question 101: A Corporate Security Officer (CSO) asks that a wireless risk...
Question 102: Which of the following technologies is considered PAN?...
Question 103: After installation of an MDM solution within an organization...
Question 104: Which of the following is the BEST practice to maintain awar...
Question 105: Joe, a user, has noticed that his corporate-owned device has...
Question 106: Malicious software that is designed to appear as a legitimat...
Question 107: Which of the following should be implemented when a personal...
Question 108: Which of the following protocols is used for dynamic address...
Question 109: An insurance company has employees responding to a regional ...
Question 110: Which of the following technologies isolates the internal ne...
Question 111: Joe, a user, is receiving errors from an application service...
Question 112: A technician has been given a task to implement a WiFi netwo...
Question 113: Which of the following are ways to minimize the risks associ...
Question 114: A technician receives a trouble ticket that Joe, a wireless ...
Question 115: Which of the following is a messaging protocol that protects...
Question 116: An information security consultant has recommended that mobi...
Question 117: Which of the following is required to leverage Kerberos for ...
Question 118: Which of the following phenomenon results in decreased signa...
Question 119: A wireless administrator has been tasked with ensuring all W...
Question 120: Lightning strikes and damages the only cellular tower used f...
Question 121: The proper order to configure a mobile device for use with a...
Question 122: A technician receives a ticket that Ann, a wireless customer...
Question 123: Which of the following secure protocols is used for Microsof...
Question 124: Which of the following items are valid placements for an MDM...
Question 125: An administrator noticed a number of mobile devices are down...
Question 126: Which of the following is a characteristic of APNS?...
Question 127: An email password prompt appears on a device after a specifi...
Question 128: Which of the following topologies should an engineer conside...
Question 129: When setting up a wireless access point for 802.11g, the use...
Question 130: Which of the following are the MOST important benefits of gr...
Question 131: An administrator can control network access to enterprise re...
Question 132: Ann, a user, is concerned about her power class 3 Bluetooth ...
Question 133: BYOD is a concept that combines which of the following aspec...
Question 134: Which of the following cellular technologies divides digital...
Question 135: Forwarding authentication requests to a centralized server w...
Question 136: Joe, a help desk technician, is receiving multiple calls tha...
Question 137: Which of the following would be used to enforce a policy req...
Question 138: The board members of a financial institution have been suppl...
Question 139: Which of the following is an example of a faraday cage?...
Question 140: An administrator is tasked with implementing disk encryption...
Question 141: The mobility team has been tasked with placing Wi-Fi access ...
Question 142: Which of the following is the BEST model to deploy managed i...
Question 143: Which of the following involves a key exchange which introdu...
Question 144: Joe, a user, reports that his touch enabled mobile device no...
Question 145: Which of the following technologies allows a network adminis...
Question 146: A network system that pushes a network identity out into the...
Question 147: The mobility team is evaluating new smartphones for deployme...
Question 148: Joe, a user, states that his email is no longer being delive...
Question 149: Joe, a user, has multiple devices and is continually locked ...
Question 150: Which of the following is MOST likely to benefit from an MDM...
Question 151: Executive management asks about threats that can affect mult...
Question 152: Which of the following can be either broadcasted or hidden?...
Question 153: The IT department has been contacted by Joe, an end-user, re...
Question 154: Which of the following protocols is preferred for VoIP commu...
Question 155: Joe, an employee, contacts the database administrator about ...
Question 156: A network administration team will not be able to support an...
Question 157: Which of the following allows devices to access an organizat...
Question 158: Which of the following are known as mobile device identifier...
Question 159: An outside firm has been hired to conduct a penetration test...
Question 160: Ann, an attacker, has spoofed a mobile device serial number ...
Question 161: A user lost access to an internal network resource (e.g. app...
Question 162: The correct sequence for deploying a new security profile in...
Question 163: Ann, a user, wishes to share an Internet connection via a po...
Question 164: Which of the following devices can be used to block a list o...
Question 165: Which of the following is an example of encryption for data ...
Question 166: Which of the following would help mitigate threats inherent ...
Question 167: A potential security breach has occurred that requires a dev...
Question 168: Which of the following is the BEST practice to create groups...
Question 169: Joe, an end-user, files a help ticket stating that after rec...
Question 170: A company wants to deploy a wireless network for their emplo...
Question 171: Which of the following should a mobile administrator deploy ...
Question 172: In the troubleshooting process, which of the following steps...
Question 173: Which of the following is the BEST configuration for mission...
Question 174: Which of the following technologies allows multiple devices ...
Question 175: Which of the following is used so that mobile devices can co...
Question 176: UMTS belongs to which of the following generation of mobile ...
Question 177: A user is able to view unauthorized websites using a secure ...
Question 178: Which of the following is considered a best practice when ma...
Question 179: After upgrading the email program, a user cannot access emai...
Question 180: An administrator has been tasked with correlating system log...
Question 181: Which of the following is an application development methodo...
Question 182: Guests are allowed to use the company wireless network for I...
Question 183: When Ann, an employee, connects her personal USB device to t...
Question 184: Which of the following ports are used by APNS? (Select TWO)....
Question 185: Ann, a user, wants to configure the email client on her newl...
Question 186: While troubleshooting a problem reported by an end-user, whi...
Question 187: Two children have been given new phones by their parents wit...
Question 188: Which of the following can be applied to a mobile device to ...
Question 189: A corporation provides their board members with tablets, pre...
Question 190: Which of the following RF behaviors would MOST likely be see...
Question 191: Disabling which of the following jeopardizes device performa...
Question 192: Which of the following is a best practice for configuring mo...
Question 193: Joe, a mobile user, claims he is unable to connect to resour...
Question 194: A generic mobile operating system is developed by a third pa...
Question 195: Which of the following are contained in a secure mobile devi...
Question 196: Company employees are reporting wireless network connectivit...
Question 197: Which of the following BEST describes the network elements f...
Question 198: When configuring user groups that use separate applications ...
Question 199: All executive offices are being equipped with a laptop, smar...
Question 200: Which of the following would allow a mobile device administr...
Question 201: Joe, a mobile user, calls the help desk inquiring about his ...
Question 202: Which of the following is the MOST efficient way to immediat...
Question 203: A company with limited IT resources is planning to implement...
Question 204: Ann, a user, is in another country using her device, but whe...
Question 205: Which of the following layers of the OSI model is responsibl...
Question 206: The chief executive officer (CEO) is reporting extreme laten...
Question 207: Which of the following describes dynamically switching from ...
Question 208: When mobile users roam from one point of a building to anoth...
Question 209: An access point that is on a network without authorization w...
Question 210: Which of the following BEST facilitates OTA on-boarding?...
Question 211: If an application stores data on corporate servers, which of...
Question 212: After months of planning and testing an MDM solution has bee...
Question 213: An MDM console works with which of the following layers of t...
Question 214: Which of the following is a characteristic of 802.11a?...
Question 215: A company replicates their MDM system to a geographically se...
Question 216: Which of the following is MOST likely to be used by default ...
Question 217: The mobile workforce keeps cached survey data on their mobil...
Question 218: Which of the following is the BEST way to mitigate risk asso...
Question 219: Joe, an end-user, reports that his smart phone has been lost...
Question 220: A mobile administrator receives a call from Joe, an end user...
Question 221: Given a WiFi deployment using the 2.4GHz band, which of the ...
Question 222: Which of the following is the BEST approach when configuring...
Question 223: Which of the following helps ensure that a correct channel i...
Question 224: Joe, a user, has problems connecting to the wireless network...
Question 225: The IT department is contacted by Joe, an end-user, who is u...
Question 226: All VPN connectivity and syncing has stopped for both cellul...
Question 227: Users in a building report difficulty connecting and slow pe...
Question 228: An organization wants to allow employees to use personal mob...
Question 229: HTTP is run over which of the following ports? (Select TWO)....
Question 230: Which of the following can be used to ensure login credentia...
Question 231: An administrator receives a call from Ann, a user, after wip...
Question 232: Administrators are receiving calls that captive portals are ...
Question 233: Users report that while at work they are unable to access an...
Question 234: A company does not wish to provide the WiFi network password...
Question 235: Which of the following are considered part of a site coverag...
Question 236: Which of the following can be used to secure data at rest? (...
Question 237: Which of the following encryption methods will be the BEST w...
Question 238: Which of the following should be monitored on mobile devices...
Question 239: Ann, a user, reports there is a power outage and she is unab...
Question 240: Which of the following is correct while designing/implementi...
Question 241: Which of the following is often used when minimal data degra...
Question 242: An employee reports a network connectivity issue to the help...
Question 243: Ann, a user, called to report an issue related to authentica...
Question 244: In case of loss or theft, which of the following methods is ...
Question 245: An end-user has notified the helpdesk that a tablet was left...
Question 246: After registering a device for use with the corporate MDM se...
Question 247: When a new building WiFi system is installed, a map is built...
Question 248: Which of the following entities performs the final testing a...
Question 249: An administrator is tasked with remotely wiping the Chief In...
Question 250: Which of the following solution features will lower overall ...
Question 251: Which of the following should be done FIRST after installing...
Question 252: Which of the following changes with the increase in frequenc...
Question 253: Ann, a user, is unable to login to the network from her mobi...
Question 254: Which of the following layers of the OSI model deals with th...
Question 255: Which of the following technologies allows secure communicat...
Question 256: Administrators receive a call saying Joe, a user, is not rec...
Question 257: Which of the following is considered a native push technolog...
Question 258: While at a conference, Ann, a user, is attempting to sync da...
Question 259: Ann, a contractor, has conducted a passive wireless site sur...
Question 260: Which of the following is the BEST way to ensure Joe, a term...
Question 261: Corporate policy stipulates user accounts only be granted to...
Question 262: A user's mobile phone will not keep a charge. Which of the f...
Question 263: Which of the following is a cellular technology that support...
Question 264: Joe, an employee, from a company with a BYOD policy synchron...
Question 265: A replicated network at another location is used as part of ...
Question 266: Ann, a user, is unable to access new applications that are a...
Question 267: A user's device has not checked-in with MDM for a long perio...
Question 268: Which of the following is the entry point between external r...