Sample questions Flashcards

1
Q

Who retains the license of a managed app in Apple Business Manager or Apple School Manager when the
app is revoked?
A. The device user
B. The organization
C. The Managed Apple ID user
D. The personal Apple ID owner

A

B. The organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which security MDM query can you use to check whether the startup volume is protected on a Mac?
A. Find My enabled
B. Passcode present
C. Secure boot status
D. Hardware encryption type

A

C. Secure boot status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Content caching is configured with a 300GB cache size on a managed Mac mini to support Shared iPad
users. Users tell you that large files stored in iCloud take longer to download than before.
How can you speed up downloads of iCloud user data?
A. Increase the cache size.
B. Use the MDM command PurgeCache to empty the cache.
C. Do nothing. Content caching doesn’t store iCloud user data.
D. Delete the /Library/Application Support/Apple/AssetCache folder.

A

A. Increase the cache size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which security MDM query should you use to check whether Mac computers have access to websites
while preventing unauthorized access to user files?
A. Firewall settings
B. Find My enabled
C. Passcode present
D. Hardware encryption type

A

A. Firewall settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The BetterBag Information Security team wants to prevent users from manually installing configuration profiles in System Settings on their device-enrolled Mac computers.
What is required on the managed Mac computers to implement this strategy?
A. They must be supervised.
B. They must be using macOS 13 or later.
C. They must be assigned in Apple Business Manager.
D. They must be enrolled with Automated Device Enrollment.

A

B. They must be using macOS 13 or later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BetterBag IT wants to verify that Mac users can’t start up from any volume other than the designated startup volume.
Which security MDM query can you use?
A. Find My enabled
B. Passcode present
C. Firmware password status
D. Hardware encryption type

A

C. Firmware password status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A BetterBag custom app quits unexpectedly. The app developer asks you for the log report.
How do you locate and send the correct log?
A. Open Activity Monitor, click View, and select Run System Diagnostics.
B. In Terminal, type tail -f /Applications/BetterBag.app/Contents/MacOS/BetterBag.
C. Open Console, click Log Reports from the sidebar, search for BetterBag, select the log, and click the
Share button.
D. Open Console, click Diagnostic Reports from the sidebar, search for BetterBag, select the log, and press
the Share button.

A

C. Open Console, click Log Reports from the sidebar, search for BetterBag, select the log, and click the
Share button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two certificate components can you use to securely identify a client or server and encrypt the
communication between them?
A. Public key and private key
B. Trust key and trust certificate
C. Intermediate certificate and trust key
D. Trust certificate and intermediate certificate

A

A. Public key and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Leticia needs to verify that a group of new employees have set up their managed iPad devices to prevent
unauthorized users from accessing their orientation files.
Which security MDM query can she use?
A. Passcode present
B. Secure boot status
C. Firmware password status
D. Can Activation Lock be managed

A

A. Passcode present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BetterBag requires that FileVault encryption protects all managed Mac computers.
What must BetterBag’s MDM solution escrow to grant a secure token to mobile accounts?
A. A content token
B. A bootstrap token
C. A personal recovery key
D. An institutional recovery key

A

B. A bootstrap token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BetterBag’s security team wants to recover managed iPhone devices that were stolen.
Which MDM setting do you enable to locate a stolen iPhone?
A. Apple Maps
B. Find My
C. Location Services
D. Managed Lost Mode

A

D. Managed Lost Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BetterBag uses Automated Device Enrollment for all of its managed Apple devices. You must remove all
data from a previous user’s Mac before you can deploy it to the next user.
Which MDM command can you use to reprovision devices?
A. Uninstall Managed Apps
B. Erase Provisioning Profile
C. Install Provisioning Profile
D. Erase All Content and Settings

A

D. Erase All Content and Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The BetterBag accounting department wants to ensure that the financial data contained on its iPad devices
is secure.
Which security MDM query can you use to confirm that sensitive data is secure?
A. Secure boot status
B. Hardware encryption type
C. Firmware password status
D. Can Activation Lock be managed

A

B. Hardware encryption type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BetterBag wants to verify that customers can’t log in to retail kiosk iPad devices.
Which security MDM query can you use?
A. Secure boot status
B. Firmware password status
C. Can Activation Lock be managed
D. Passcode compliant with profiles

A

D. Passcode compliant with profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which MDM command helps prevent an unauthorized person from accessing data on a lost or stolen
iPhone or iPad?
A. ActivationLockRequest
B. DeviceLock
C. EraseDevice
D. SetAutoAdminPassword

A

C. EraseDevice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The BetterBag security team wants to verify that employees have met requirements to secure their iPad
devices from loss and theft.
Which security MDM query should they use?
A. Find My enabled
B. Secure boot status
C. Firmware password status
D. Can Activation Lock be managed

A

A. Find My enabled

17
Q

A former employee’s managed iPhone needs to be returned to service. Your MDM solution can’t remove
Activation Lock.
How can you disable organization-linked Activation Lock?
A. Enter the personal Apple ID credentials in iCloud settings at the Activation Lock screen.
B. Enter the Managed Apple ID credentials that created the device enrollment token at the Activation
Lock screen.
C. In Apple Business Manager or Apple School Manager, find the device and send the clear
Activation Lock command.
D. Use your MDM solution to send the clear passcode command to the device. The device-based
Activation Lock will be automatically disabled.

A

B. Enter the Managed Apple ID credentials that created the device enrollment token at the Activation
Lock screen.

18
Q

BetterBag IT wants to configure its executives’ iPad devices to access the organization Wi-Fi network with
the most secure encryption available. IT needs BetterBag’s Wi-Fi network to also maintain compatibility
with other devices that may not support the latest standard.
Which authentication method is most likely to meet these requirements?
A. WPA2 Personal
B. WPA3 Enterprise
C. Wi-Fi Protected Access
D. Wired Equivalent Privacy

A

A. WPA2 Personal

19
Q

You manually added donated Mac computers to Apple School Manager and enrolled them in your
MDM solution.
What is the management status of the Mac computers after you’ve manually added and enrolled them in
your MDM solution?
A. They’re supervised, and a user can unenroll them at any time.
B. They’re unsupervised, and a user can unenroll them at any time.
C. A user can release them from device management for up to 30 days.
D. A user can release them from device management for up to 60 days.

A

C. A user can release them from device management for up to 30 days.

20
Q

Which security MDM query should you use to check whether a Mac computer’s critical file locations
are secured?
A. Find My enabled
B. Passcode present
C. Hardware encryption type
D. System Integrity Protection enabled

A

D. System Integrity Protection enabled

21
Q

Which Terminal command should you use if you want to write shell scripts and automate certain processes
with Apple Configurator for Mac?
A. automator
B. cfgenrollment
C. cfgutil
D. startosinstall

A

C. cfgutil

22
Q

Which Setup Assistant screen can you not configure to be skipped on a supervised iPhone that’s enrolled
in Apple Business Manager?
A. Apple ID
B. Language
C. Location Services
D. Terms and Conditions

A

B. Language

23
Q

A BetterBag user receives a “Cellular Plan is Ready to be Installed” notification in Settings on their
managed iPhone. A cellular plan can’t be installed on their managed iPhone even though the user can
make calls.
What is the most likely reason that a cellular plan can’t be installed?
A. The eSIM was already used.
B. The iPhone can’t reach the Apple Lookup Service.
C. The AllowESIMModification restriction is enabled.
D. The AllowESIMModification restriction is disabled.

A

D. The AllowESIMModification restriction is disabled.

24
Q

Which MDM command can initiate an iPhone to download an eSIM profile from a carrier’s
(SM-DP+) server?
A. InstallESIM
B. CarrierActivation
C. Provision Cellular Plan
D. Refresh Cellular Plans

A

D. Refresh Cellular Plans

25
Q

Which setting configures Automatic Proxy Setup in the Global HTTP Proxy MDM payload?
A. Authentication type
B. Password
C. Proxy PAC URL
D. Security type

A

C. Proxy PAC URL

26
Q

Which role in Apple Business Manager or Apple School Manager has default permissions to add, assign,
unassign, and release devices?
A. Administrator
B. Content Manager
C. Manager
D. Staff

A

A. Administrator

27
Q

BetterBag requires a maximum passcode age on all iPhone and iPad devices.
What is the maximum passcode age you can set with an MDM solution?
A. 90 days
B. 180 days
C. 365 days
D. 730 days

A

D. 730 days

28
Q

What is the maximum number of days an MDM solution can retrieve the Activation Lock bypass codes from
newly supervised iPad devices?
A. 7 days
B. 15 days
C. 21 days
D. 90 days

A

B. 15 days

29
Q

Which declaration type is used to convey overall management state to the device and describes details
about the organization and capabilities of the MDM solution?
A. Devices
B. Enrollments
C. Management
D. Security

A

C. Management

30
Q

Nisha is preparing to deploy a fleet of Mac computers. She wants to ensure that only approved Mac
computers can access content caching.
In which payload should she configure this setting?
A. Content Caching
B. Privacy and Security
C. Restrictions
D. System Settings

A

C. Restrictions