Check Your Understanding / Deployment and Management Flashcards
What links a device to an MDM (mobile device management) solution?
A. APNs
B. Firewall
C. Restriction
D. Enrollment profile
D. Enrollment profile
Enrollment profiles are the links between devices and the MDM solution.
What does MDM need to operate, specifically for APNs and SSL?
A. Certificates
B. Restrictions
C. Enrollment profiles
A. Certificates
Which Apple device capability allows MDM to secure devices?
A. Location Services
B. Enrollment profiles
C. Built-in device security features
C. Built-in device security features
An MDM solution allows you to use the device’s built-in security features.
Which statement about the Apple management framework is true?
A. It’s built into Apple devices.
B. It doesn’t support personal devices.
C. It provides settings created by third parties to manage Apple devices.
A. It’s built into Apple devices.
Each MDM solution uses the built-in Apple management framework in iOS, iPadOS, macOS, and tvOS to manage features and settings for each platform.
After a device has enrolled with an MDM server, what happens next?
A. The device reports status to the server.
B. The device polls the server for any commands.
C. The server sends push notifications to the device.
C. The server sends push notifications to the device.
After a device enrolls with the MDM server, the server sends push notifications to the device when there are commands to process on the device.
What transformative update to the MDM protocol allows a device to react autonomously to its own state changes and apply management logic to itself without cues from the server?
A. User Enrollment
B. Device Assignment
C. Declarative Management
C. Declarative Management
Declarative management allows the device to be autonomous and proactive, freeing up the server to be lightweight, reactive, and able to subscribe to updates without constant polling.
When is it recommended to test beta software releases?
A. Quarterly
B. Year-round
C. When new devices are added to your organization
B. Year-round
A modern approach to managing Apple devices involves committing to the latest software, testing year-round, and ensuring that everything works together.
In which type of enrollment and ownership model can users personalize apps and data on their managed devices?
A. BYOD, organization-owned
B. Nonpersonalized, organization-owned
C. Personally enabled, organization-owned
C. Personally enabled, organization-owned
The organization assigns devices to users, and after configuration, users can personalize their devices with their own apps and data.
In which type of ownership model can users personalize apps and data on their personal devices?
A. BYOD, User Enrollment
B. BYOD, organization-owned
C. Nonpersonalized, organization-owned
D. Personally enabled, organization-owned
A. BYOD, User Enrollment
BYOD users can customize their personal devices before and after enrolling them in an MDM solution.
In which ownership model can IT administrators restrict the installed apps and personal data on a device meant to be shared with multiple users?
A. BYOD, User Enrollment
B. BYOD, personally enabled
C. Nonpersonalized, organization-owned
D. Personally enabled, organization-owned
C. Nonpersonalized, organization-owned
IT administrators typically centrally configure and manage shared or single-purpose devices.
How do you enroll devices ineligible for automatic enrollment in Apple Business Manager or Apple School Manager?
A. Device Enrollment
B. Automated Device Enrollment
C. Automatic enrollment
D. No enrollment possible
A. Device Enrollment
You can choose to manually enroll devices into your MDM solution by installing an enrollment profile locally on the devices.
Which type of enrollment is ideal for devices you need to distribute to multiple users in multiple regions?
A. Device Enrollment
B. User Enrollment
C. Automated Device Enrollment
C. Automated Device Enrollment
Which type of enrollment do you commonly use for BYOD deployments?
A. Device
B. User
C. Automated device
B. User
BYOD deployments most commonly employ User Enrollment. You can provide BYOD users a customized URL to an enrollment portal.
What do you need to consider when evaluating MDM solutions?
A. Support for watchOS
B. Pricing structure and subscription model
C. A device’s life cycle and trade-in value
B. Pricing structure and subscription model
Understand your organization’s budget and growth projections, then compare MDM solution pricing and subscription options.
Which is a deployment model to consider as part of your device management goals?
A. Application Programming Interface (API)
B. Over-the-air (OTA) enrollment
C. One-to-one
C. One-to-one
Also known as personally enabled, one-to-one is a deployment model you can consider when understanding your organization’s needs.
Which is an important user authentication feature of an MDM solution that you should consider?
A. Support and integration with your identity provider or directory service
B. Support for future versions of macOS, iOS, and iPadOS
C. Support for the BYOD deployment model
A. Support and integration with your identity provider or directory service
Verify if the MDM solution supports your current identity provider or directory service.
Which aspects of your organization’s infrastructure should you evaluate to ensure that it meets the network roaming needs of users throughout a building?
A. Number of devices per user
B. Wi-Fi coverage and capacity
C. Adequate number of access points per device
D. Sources of interference caused by construction materials
B. Wi-Fi coverage and capacity
Evaluating Wi-Fi coverage and capacity helps you strategically place wireless access points that have enough power to meet the roaming needs throughout your organization’s facilities.
Which type of network uses individual user credentials or device- and/or user-based certificates to control who or what devices can use the network?
A. Provisioning network
B. WPA2 Personal network
C. WPA2 Enterprise network
C. WPA2 Enterprise network
WPA2 Enterprise network uses individual user credentials or device- and/or user-based certificates to control who or what devices can use the network.
Which functions require Apple devices to continuously access APNs?
A. Bonjour access, content caching, and internet connection sharing
B. SSO, VPN connectivity, and Wi-Fi network roaming
C. Notifications of operating-system and app updates, MDM policies, and messages
D. Ad and location tracking, Keychain data backup, and app suggestions
C. Notifications of operating-system and app updates, MDM policies, and messages
Apple devices learn of operating-system and app updates, MDM policies, and incoming messages through continuous access to APNs. Make sure that your organization allows network traffic access to Apple’s network on the entire 17.0.0.0/8 address block on port 5223, with a fallback option of port 443.
What should you do to ensure that Apple devices can access APNs and other Apple services on your organization’s network?
A. Configure all devices to auto-establish secure VPN access to Apple’s network.
B. Deploy devices with an SSO payload that are configured to allow access to Apple’s network.
C. Adjust network configurations on web proxies or firewall ports to allow access to Apple’s network.
D. Set up your network to work with Bonjour so that devices can connect to APNs and Apple services.
C. Adjust network configurations on web proxies or firewall ports to allow access to Apple’s network.
For Apple devices to access APNs and Apple services, you might need to adjust network configurations on web proxies or firewall ports to allow network traffic access to Apple’s network. Make sure that your organization allows network traffic access to Apple’s network on the entire 17.0.0.0/8 address block on port 5223, with a fallback option of port 443.
Which is the most commonly deployed authentication technology that both AD and SSO use?
A. Kerberos
B. MSCHAPv2
C. OAuth
D. SAML
A. Kerberos
Kerberos is the most commonly deployed authentication technology that both AD and SSO use.
What is used for personalized setup of a managed device?
A. Apple Configurator
B. MDM solution
C. Setup Assistant
C. Setup Assistant
Setup Assistant is used for personalized setup of a managed device.
Why might you create a security policy that enforces the use of FileVault for data encryption on a managed Mac?
A. This policy ensures that users can’t disable FileVault.
B. When you turn on FileVault using an MDM solution, it adds a Recovery Key to a user’s iCloud account.
C. FileVault is compatible with any Apple device.
D. You can use third-party encryption algorithms to configure FileVault.
A. This policy ensures that users can’t disable FileVault.
Users can’t disable FileVault if it’s enforced with a configuration profile on managed Mac computers.
Which benefit helps IT administrators reduce the need to perform extensive configurations on Apple devices?
A. Many security features are turned on by default.
B. Users can select a security profile in Setup Assistant.
C. IT administrators can deliver and enforce policies without an MDM solution.
D. IT administrators can issue remote commands to devices to erase all private information.
A. Many security features are turned on by default.
Because many security features on Apple devices are turned on by default, administrators save time when they configure devices.