CompTIA CompTIA certification is the dream of every one of the IT enthusiasts whom want to have a bright potential in the field of IT. However, passing the particular CompTIA certification exam is not a good easy task only by yourself. If you are one of these types of IT aspirants, please stop at Ucertify.org and find everything you would like for the CompTIA MB0-001 exam preparation.

2021 Dec MB0-001 exam question

Q41. Malicious software that is designed to appear as a legitimate program would be defined as a: 

A. trojan. 

B. DDoS. 

C. rogue access point. 

D. man-in-the-middle attack. 

Answer:


Q42. Which of the following is the entry point between external resources and internal servers? 

A. VPN concentrator 

B. Gateway 

C. Access point 

D. Switch 

Answer:


Q43. An administrator has been informed that one of the systems on the corporate network has been compromised. Which of the following steps should the administrator take NEXT to initiate proper incident response? 

A. Take screen shots and copy logs from the affected machine, storing these in a secured environment. 

B. Use MD5 on the system and backup the current image if the system is virtual. 

C. Isolate the device and perform a device wipe. 

D. Alert the incident response team and await further instruction on procedures. 

Answer:


Q44. Which of the following BEST describes the network elements for 3G and 4G cellular technologies? 

A. Mobile device, access point, router, and layer three switch 

B. Antenna, mobile device, WiFi device, and domain server name 

C. Group policy, mobile ACL, wireless controller, and WiFi 

D. Mobile base station and mobile switching center 

Answer:


Q45. Which of the following can be used to ensure login credentials are secured when in transit from a mobile device’s browser to a web server? (Select THREE). 

A. 3DES 

B. DES 

C. MD5 

D. HTTPS 

E. SSL 

F. TLS 

G. AES 

Answer: D,E,F 


Improved MB0-001 exam question:

Q46. Which of the following device configuration parameters could be used to change how the mobile device data is routed back to a company on a cellular network? 

A. VLAN ID 

B. APN 

C. SSID 

D. IMEI 

Answer:


Q47. Which of the following is a messaging protocol that protects the confidentiality of email content? 

A. SSMTP 

B. POP3 

C. SFTP 

D. IMAP 

Answer:


Q48. Which of the following is a characteristic of 802.11a? 

A. 802.11a uses dual band. 

B. 802.11a is unable to stream video. 

C. 802.11a uses 5 GHz. 

D. 802.11a uses 2.4 GHz. 

Answer:


Q49. A user traveling overseas is in a place where there is access to WiFi. The user can receive email and talk using VoIP, but cannot place or receive phone calls. Which of the following is the MOST likely cause of this issue? 

A. The phone will need a new SIM card 

B. Incompatible cellular technology 

C. ICCID needs to be changed 

D. IMEI needs to be changed 

Answer:


Q50. When multiple signals arrive at a certain location at a given time and disrupt radio signal reception, this is called: 

A. Interference. 

B. Refraction. 

C. Jamming. 

D. Absorption. 

Answer: