An organization is concerned with employees using cellular data in excess of the established usage thresholds. Which of the following would be BEST for the organization to implement?
A. Application metering
B. Data capture
C. Telecom expense management
D. Carrier billing
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
A. Access control list
B. Password policy
C. Firewall
D. Full-disk encryption
Which of the following protocols is primarily used for transporting email?
A. DNS
B. POP
C. SMTP
D. FTP
Which of the following changes with the increase in frequency?
A. Wavelength
B. Amplitude
C. Bandwidth
D. Throughput
An organization wants to ensure that personnel are automatically alerted and ready to unload merchandise when a shipping container is approaching the warehouse. Which of the following would allow the organization to implement automatic alerting?
A. Geo-fencing
B. Cloud computing
C. Geo-caching
D. High availability
A company does not wish to provide the WiFi network password to their employees. Which of the following is the BEST option to allow employees to connect to the company's WiFi if devices are managed by MDM?
A. Have an administrator configure each employee's mobile device
B. Push encrypted WiFi profile to mobile devices
C. Give MAC-based access to mobile devices
D. Give IMEI-based access to mobile devices
Joe, an employee, is unable to unlock his mobile device and has forgotten the device password. Which of the following is the BEST way to resolve this issue?
A. Replace the certificate
B. Reset the password
C. Perform a soft reset of the device
D. Perform a hard reset of the device
If an application stores data on corporate servers, which of the following is a technique to ensure that data is available even if someone accidentally deletes it?
A. Ensure that each server uses RAID 5
B. Perform regular backups of the servers
C. Install load balancers in front of multiple servers
D. Require VPN to access the corporate servers
When addressing BYOD local backups, it is best practice to do which of the following?
A. Restore the device to factory settings
B. Allow personal backups at regular intervals
C. Encrypt and password protect backups
D. Save the backup to another source
Which of the following is the MOST efficient way to immediately notify administrators of telecommunication vendor changes that affect mobile devices?
A. RSS feeds
B. Certificates
C. Industry publications
D. POTS