Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CompTIA MB0-001 Exam -

Free MB0-001 Sample Questions:

Q: 1
Ann, an attacker, has spoofed a mobile device serial number so she can connect to the MDM environment. Which of the following would an administrator check to uncover this attack?
A. Review the SIEM logs on a corporate network to determine authentication issues
B. Review certificate revocations by the MDM
C. Review connection attempts to the network from that phone’s serial number
D. Review recent connection locations, looking for an abnormal location
Answer: D

Q: 2
Ann, an end-user reports, that she cannot access popular web pages unless she enters the IPv4 address of the site. Which of the following ports is MOST likely blocked for the device?
A. 25
B. 53
C. 80
D. 443
Answer: B

Q: 3
Which of the following allows devices to access an organization’s WiFi network before ensuring that they conform to policy?
A. Captive portal
B. SCEP portal
C. TKIP portal
D. Administrative portal
Answer: A

Q: 4
Which of the following is a capability of geo-fencing?
A. Enable SDLC on device
B. Disable corporate firewall
C. Enable POE-injector of device
D. Disable camera on device
Answer: D

Q: 5
Which of the following technologies allows secure communication with a previously unverified entity?
Answer: D

Q: 6
Which of the following helps ensure that a correct channel is configured for an access point?
A. Geo-fencing analysis
B. Directory analysis
C. Firewall analysis
D. Spectrum analysis
Answer: D

Q: 7
Which of the following technologies allows a network administrator to force traffic to be cached by a network device?
A. Proxies
B. Certificates
C. Roaming
D. Biometrics
Answer: A

Q: 8
In the troubleshooting process, which of the following steps help identify the problem? (Select TWO).
A. Provide additional training
B. Capture logs
C. Implement preventative measures
D. Document the findings and outcomes
E. Identify symptoms
Answer: B,E

Q: 9
While troubleshooting a problem reported by an end-user, which of the following steps comes between establishing a plan of action and implementing the plan of action?
A. Gather information
B. Verify full system functionality
C. Question the user
D. Identify potential effects
Answer: D

Q: 10
Which of the following is the MOST important consideration for in-house application development?
A. Attenuation
B. Platform
C. Topology
D. Firmware
Answer: B

© 2014, All Rights Reserved