Learning Guide Questions Flashcards
What links a device to an MDM solution?
A. APNs
B. A firewall
C. restriction
D. An enrollment profile
D. An enrollment profile
Explanation:
An enrollment profile links a device to the MDM solution.
What does MDM need to operate, specifically for APNs and SSL?
A. Certificates
B. Restrictions
C. Enrollment profiles
A. Certificates
Explanation:
MDM requires multiple certificates to operate, including an APNs certificate to talk to clients and an SSL certificate to communicate securely.
Which Apple device capability allows MDM to secure devices?
A. Location Services
B. Enrollment profiles
C. Built-in device security features
C. Built-in device security features
Explanation:
An MDM solution allows you to use the device’s built-in security features.
How do devices report their status when using declarative device management?
A. Declarations
B. The status channel
C. Profiles
B. The status channel
Explanation:
The status channel is what a device uses to update the MDM server with information about itself.
Which statement about the Apple management framework is true?
A. It’s built into Apple devices.
B. It doesn’t support personal devices.
C. It provides settings created by third parties to manage Apple devices.
A. It’s built into Apple devices.
Explanation:
Each MDM solution uses the built-in Apple management framework to manage features and settings for each platform.
After a device has enrolled in an MDM server, what happens next?
A. The device reports status to the server.
B. The device polls the server for any commands.
C. The server sends push notifications to the device.
C. The server sends push notifications to the device.
Explanation:
After a device enrolls in the MDM server, the server sends push notifications to the device when there are commands to process on the device.
What transformative update to the MDM protocol allows a device to react autonomously to its own state changes and apply management logic to itself without cues from the server?
A. User Enrollment
B. Device Assignment
C. Declarative device management
C. Declarative device management
Explanation:
Declarative device management allows the device to be autonomous and proactive, freeing up the server to be lightweight, reactive, and able to subscribe to updates without constant polling.
What happens if you install an exclusive payload setting onto a managed Apple device that already contains settings for the same payload?
A. The payload setting will be undefined.
B. The payload setting overwrites the previous setting.
C. The payload setting will be combined and the more restrictive setting will be applied.
B. The payload setting overwrites the previous setting.
Explanation:
Exclusive payloads can have only one possible version of a setting and you can apply this type of setting only once.
When is it recommended to test beta software releases?
A. Quarterly
B. Year-round
C. When new devices are added to your organization
B. Year-round
Explanation:
A modern approach to managing Apple devices involves committing to the latest software, testing year-round, and ensuring that everything works together.
In which type of enrollment and ownership model can users personalize apps and data on their managed devices?
A. BYOD, organization-owned
B. Nonpersonalized, organization-owned
C. Personally enabled, organization-owned
C. Personally enabled, organization-owned
Explanation:
The organization assigns devices to users, and after configuration, users can personalize their devices with their own apps and data.
In which type of ownership model can users personalize apps and data on their personal devices?
A. BYOD, User Enrollment
B. BYOD, organization-owned
C. Nonpersonalized, organization-owned
D. Personally enabled, organization-owned
A. BYOD, User Enrollment
Explanation:
BYOD users can customize their personal devices before and after enrolling them in an MDM solution.
In which ownership model can IT administrators restrict the installed apps and personal data on a device meant to be shared with multiple users?
A. BYOD, User Enrollment
B. BYOD, personally enabled
C. Nonpersonalized, organization-owned
D. Personally enabled, organization-owned
C. Nonpersonalized, organization-owned
Explanation:
IT administrators typically centrally configure and manage shared or single-purpose devices.
Which method should you use to enroll devices that are ineligible for automatic enrollment in Apple Business Manager or Apple School Manager?
A. Device Enrollment
B. Automated Device Enrollment
C. Automatic enrollment
D. No enrollment possible
A. Device Enrollment
Explanation:
You can enroll devices ineligible for automatic enrollment in Apple Business Manager or Apple School Manager.
Which type of enrollment is ideal for devices you need to distribute to multiple users in multiple regions?
A. Device Enrollment
B. User Enrollment
C. Automated Device Enrollment
C. Automated Device Enrollment
Explanation:
Automated Device Enrollment is the most convenient choice because you can enroll devices in MDM without physically handling or preparing devices before users receive them.
Which type of enrollment do you commonly use for BYOD deployments?
A. Device
B. User
C. Automated device
B. User
Explanation:
BYOD deployments most commonly employ User Enrollment with a dedicated Managed Apple Account.
What do you need to consider when evaluating MDM solutions?
A. Support for a wireless infrastructure
B. Pricing structure and subscription model
C. A device’s life cycle and trade-in value
B. Pricing structure and subscription model
Explanation:
Understand your organization’s budget and growth projections, then compare MDM solution pricing and subscription options.
Which is a deployment model to consider as part of your device management goals?
A. Application Programming Interface (API)
B. Over-the-air (OTA) enrollment
C. One-to-one
C. One-to-one
Explanation:
One-to-one is a deployment model that provides at least one dedicated device configured specifically for each user.
Which is an important user authentication feature of an MDM solution that you should consider?
A. Support and integration with your identity provider or directory service
B. Support for future versions of Apple’s software platforms.
C. Support for the BYOD deployment model
A. Support and integration with your identity provider or directory service
Explanation:
Verify if the MDM solution supports your current identity provider or directory service.
Which aspect of your organization’s infrastructure should you evaluate to ensure that your organization meets the network roaming needs of users throughout a building?
A. Number of devices per user
B. Wi-Fi coverage and capacity
C. Adequate number of access points per device
D. Sources of interference caused by construction materials
B. Wi-Fi coverage and capacity
Explanation:
Evaluating Wi-Fi coverage and capacity helps you strategically place wireless access points that have enough power to meet the roaming needs throughout your organization’s facilities.
Which type of network uses individual user credentials or device- and/or user-based certificates to control who or which devices can use the network?
A. Provisioning network
B. WPA2 Personal network
C. WPA2 Enterprise network
C. WPA2 Enterprise network
Explanation:
WPA2 Enterprise network uses individual user credentials or device- and/or user-based certificates to control who or what devices can use the network.
Which functions require Apple devices to continuously access APNs?
A. Bonjour access, content caching, and internet connection sharing
B. SSO, VPN connectivity, and Wi-Fi network roaming
C. Notifications of operating-system and app updates, MDM policies, and messages
D. Ad and location tracking, Keychain data backup, and app suggestions
C. Notifications of operating-system and app updates, MDM policies, and messages
Explanation:
Apple devices learn of operating-system and app updates, MDM policies, and incoming messages through continuous access to APNs. Make sure that your organization allows network traffic access to Apple’s network on the entire 17.0.0.0/8 address block on port 5223, with a fallback option of port 443.
What should you do to ensure that Apple devices can access APNs and other Apple services on your organization’s network?
A. Configure all devices to auto-establish secure VPN access to Apple’s network.
B. Deploy devices with an SSO payload that are configured to allow access to Apple’s network.
C.Adjust network configurations on web proxies or firewall ports to allow access to Apple’s network.
D. Set up your network to work with Bonjour so that devices can connect to APNs and Apple services.
C. Adjust network configurations on web proxies or firewall ports to allow access to Apple’s network.
Explanation:
For Apple devices to access APNs and Apple services, you might need to adjust network configurations on web proxies or firewall ports to allow network traffic access to Apple’s network. Make sure that your organization allows network traffic access to Apple’s network on the entire 17.0.0.0/8 address block on port 5223, with a fallback option of port 443
What’s the most commonly deployed authentication technology that both AD and SSO use?
A. Kerberos
B. MSCHAPv2
C. OAuth
D. SAML
A. Kerberos
Explanation:
Kerberos is the most commonly deployed authentication technology that both AD and SSO use.
Which Kerberos feature allows users to sign in once and access multiple authenticated services?
A. Sign in with Apple at Work & School
B. OAuth
C. Ticket-granting ticket (TGT)
D. SAML
C. Ticket-granting ticket (TGT)
Explanation:
TGT generates a ticket for the use of any resource that supports Kerberos without requiring the user to authenticate again.