While you convey a CompTIA on your set of skills, itll very first benefit you by just helping replace your operate circulation. Through advancing your understanding bottom part, you will find a more effective perception of what you are doing and also operate more expeditiously. Further, you should understand on your path round the software as good as a good number of, which could often let you discover the best and a lot of helpful means for that you complete ones assignments. But it surely doesn?¡¥t purely end using very own efficiency degrees and also figuring out all to know about CompTIA techniques.
2021 Oct MB0-001 practice
Q141. Access points function at which of the following layers of the OSI model?
A. 2
B. 3
C. 4
D. 7
Answer: A
Topic 3, Volume C
Q142. Which of the following is considered best practice for secure backup of enterprise data?
A. Use full-disk encryption
B. Use encrypted SD cards
C. Use encrypted home network storage
D. Use encrypted corporate servers
Answer: D
Q143. Which of the following is the correct sequence for promoting changes from development to production?
A. Quality Assurance, Development, Production
B. Development, Documentation, Production
C. Development, Quality Assurance, Production
D. Document, Development, Quality Assurance, Production
Answer: C
Q144. A generic mobile operating system is developed by a third party, and then is customized by the mobile wireless carrier to fit each specific device’s hardware. Which of the following should the administrator do FIRST, when updating enterprise owned devices?
A. The administrator should configure the mobile management server to automatically push the wireless carrier’s OS.
B. The administrator should download the OS from the third party, apply hardware changes, and then push the OS.
C. The administrator should push the updated OS developed by the third party through the mobile management server.
D. The administrator should consult the mobile wireless carrier release notes and upgrade procedure.
Answer: D
Q145. Which of the following protocols is primarily used for transporting email?
A. DNS
B. POP
C. SMTP
D. FTP
Answer: C
Renewal MB0-001 exam answers:
Q146. An administrator can control network access to enterprise resources using which of the following?
A. AES encryption
B. SNMP
C. DNS
D. PKI
Answer: D
Q147. A solution which tracks and organizes the usage and cost of voice and data is referred to as:
A. TEM.
B. MaaS.
C. SaaS.
D. B2B.
Answer: A
Q148. Ann, a user, is concerned about her power class 3 Bluetooth device not having the distance she believes it should. Specifically, Ann reports that after moving more than 15 feet (4.6 meters) away from the paired device the connection is lost. Which of the following is the MOST likely cause?
A. Bluetooth connectivity requires line of sight for connections.
B. Interference from other devices is disrupting the connection.
C. 15 feet (4.6 meters) is the maximum distance for power class 3 devices.
D. The device is not properly paired for maximum distance.
Answer: B
Q149. Which of the following must be used to successfully deploy an in-house developed application?
A. LDAP server
B. Application certificate store
C. Content management solution
D. Enterprise application store
Answer: D
Q150. When addressing BYOD local backups, it is best practice to do which of the following?
A. Restore the device to factory settings
B. Allow personal backups at regular intervals
C. Encrypt and password protect backups
D. Save the backup to another source
Answer: C