The mobility team has been tasked with placing Wi-Fi access points in a conference room. They have been provided with a floor plan by the building architect. Which of the following are components of a predictive wireless audit? (Select TWO).
A. Oscilloscope
B. Spectrum analysis
C. Distance to nearest cellular tower
D. Construction materials used in the walls
E. Time Domain Reflectometer
Which of the following is a cellular technology that supports data and voice at the same time?
A. APN
B. GSM
C. GPRS
D. EDVO
Which of the following solution features will lower overall support costs for a large scale mobile device deployment?
A. Compliance management
B. Self-service portal
C. Security policy management
D. Location-based Services
Which of the following is a best practice for configuring mobile network access control?
A. Device password
B. Certificate authentication
C. IPsec VPN
D. ActiveSync
Which of the following protocols is required for iOS device MDM enrollments?
A. VPN
B. HTTP
C. APNS
D. IPSEC
An administrator is tasked with remotely wiping the Chief Information Officer's (CIO's) device after it is reported stolen. Which of the following should be reviewed to determine if authentication attempts have failed after the device was stolen?
A. Logon attempts on the MDM server
B. Review cellular logs
C. Location services on the device
D. Accounts lockout on the network ID
The mobile workforce keeps cached survey data on their mobile devices. Which of the following should the organization implement to ensure minimal data loss due to damaged devices?
A. Data restoration procedures should be implemented and tested annually.
B. A backup policy should be implemented and enforced on all the devices used by the mobile workforce.
C. Mandatory backup and restoration training should be administered to all members of the mobile workforce.
D. A remote wipe policy should be implemented and employees should report damaged devices immediately.
An administrator noticed a number of mobile devices are downloading applications from unauthorized mobile application stores. Which of the following has MOST likely occurred?
A. Jamming
B. Jailbreaking
C. Out-of-date virus definitions
D. Keylogging
Ann, an attacker, has spoofed a mobile device serial number so she can connect to the MDM environment. Which of the following would an administrator check to uncover this attack?
A. Review the SIEM logs on a corporate network to determine authentication issues
B. Review certificate revocations by the MDM
C. Review connection attempts to the network from that phone's serial number
D. Review recent connection locations, looking for an abnormal location
An organization needs to configure and deploy dozens of new mobile devices at a central location for use at various off-site locations. Which of the following deployment methods should the organization implement?
A. Image and deploy
B. Server push of applications
C. Mandatory Access Control
D. Remote control of devices