Certified Wandera Support Engineer

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Stijn Paumen
S
Stijn Paumen
Community Contributor
Quizzes Created: 3 | Total Attempts: 8,223
Questions: 52 | Attempts: 65

SettingsSettingsSettings
Certified Wandera Support Engineer - Quiz


This exam is designed to assess technical knowledge of Wandera's Mobile Data Gateway services. The questions are mostly multiple choice. This is a timed test, you have 60 minutes to complete all questions. You are required to achieve a score of 75% in order to become a Certified Wandera Support Engineer.
Good luck!


Questions and Answers
  • 1. 

    What key benefits does Wandera provide to customers? 

    • A.

      Scalability, Savings and Speed

    • B.

      Visibility, Performance and Security

    • C.

      Visibility, Savings and Security

    • D.

      Scalability, Simplicity and Savings

    Correct Answer
    C. Visibility, Savings and Security
    Explanation
    Savings, Visibility and Security are the three key pillars of the Wandera service and we always explain these benefits in detail when we speak to prospects.
    1. Visibility: Wandera View provides previously unavailable insight into mobile data usage on a per app and per user basis. We effectively itemise a phone bill for data;

    2. Savings: Wandera Extend delivers data savings through the use of proprietary compression and policy regulation;

    3. Security: Wandera Secure detects one-off network threats and persistent threats from apps on mobile devices to ensure data and network integrity

    Rate this question:

  • 2. 

    What does APN stand for? 

    • A.

      Alternative Point Network

    • B.

      Application Program Network

    • C.

      Access Pin Number

    • D.

      Access Point Name

    Correct Answer
    D. Access Point Name
    Explanation
    APN or Access Point Name is the name of the gateway of the mobile carrier which provides access to the Internet. Having a Wandera APN profile on your device means your carrier passes your cellular web data to Wandera for optimisation and visibility

    Rate this question:

  • 3. 

    What does the Wandera App do? 

    • A.

      It routes the traffic through Wandera Mobile Data Gateway

    • B.

      It provides notification service and blocks traffic only based on policy

    • C.

      It provides end-user usage information and sends location data and heartbeat information to the Wandera service

    • D.

      It compresses content to be routed through the Mobile Data Gateway

    Correct Answer
    C. It provides end-user usage information and sends location data and heartbeat information to the Wandera service
    Explanation
    The Wandera App detects the location of the user using the SLC (Significant Location Change) functionality of the operating system so that a roaming policy can be applied at the Gateway level when a user is a out of the country.
    The App also delivers useful end-user reports, and collects heartbeat information for threat detections and security improvement.

    Rate this question:

  • 4. 

    What happens when a user is "blocked" by a Wandera policy?

    • A.

      The internet stops working completely

    • B.

      The device shuts down

    • C.

      The user can't access the specific site or app

    • D.

      All mobile data is blocked

    Correct Answer
    C. The user can't access the specific site or app
    Explanation
    The user can't access that specific site or app that is blocked. Block policies are configured in RADAR to match a block rule by URL. For example, news.bbc.co.uk will match only that subdomain, whereas apple.com will match the entire domain. Once set, both browser and app web traffic will be blocked by Wandera.

    Rate this question:

  • 5. 

    How is Wandera installed on iOS mobile devices? 

    • A.

      An App and an APN profile are installed

    • B.

      An APN profile is installed

    • C.

      An App is installed

    • D.

      A VPN profile is installed

    Correct Answer
    A. An App and an APN profile are installed
    Explanation
    Both an app and an APN profile are installed.
    The APN profile ensures that mobile data is redirected via the Wandera optimisation service and the Wandera App detects the location of the user so that a roaming policy can be applied. The App also delivers useful end-user reports.

    Rate this question:

  • 6. 

    What does a Wandera APN setting do? 

    • A.

      It configures a web proxy setting on the device to ensure all cellular web data is redirected via Wandera's Mobile Data Gateway

    • B.

      It installs a web proxy setting to ensure cellular traffic bypasses the phone carrier network

    • C.

      It creates a VPN connection to the Mobile Data Gateway

    • D.

      It ensures that all cellular and wifi traffic is routed via Wandera

    Correct Answer
    A. It configures a web proxy setting on the device to ensure all cellular web data is redirected via Wandera's Mobile Data Gateway
    Explanation
    The Wandera APN profile configures a proxy setting to ensure all cellular web data is redirected from the carrier gateway onwards to Wandera's MDG. The Wandera APN should not be confused with a private APN which would replace the existing mobile carrier as the default gateway to the Internet.
    In fact, customers need to specify which mobile carrier each user is on so that we can provide the correct Wandera APN settings.
    The settings apply to cellular data only.

    Rate this question:

  • 7. 

    What happens when a roaming user reaches their "data cap"? 

    • A.

      All cellular web data is blocked (except for the admin-configured whitelist exceptions)

    • B.

      All cellular data is blocked except for email

    • C.

      All web data including wifi is blocked

    • D.

      All traffic including tethering is blocked

    Correct Answer
    A. All cellular web data is blocked (except for the admin-configured whitelist exceptions)
    Explanation
    All cellular web data/traffic that passes through Wandera will be blocked - this doesn't include WiFi traffic or non cellular web traffic such as tethering.

    Rate this question:

  • 8. 

    What is a valid method that a customer can use to deploy Wandera 

    • A.

      The admin contacts the Carrier to send the Wandera application to the user

    • B.

      The admin deploys Wandera using App Pull and a supported MDM

    • C.

      The admin sends the user a file to install Wandera on their device

    • D.

      The admin deploys Wandera using App Push and a supported MDM

    Correct Answer
    D. The admin deploys Wandera using App Push and a supported MDM
    Explanation
    An administrator can set-up App Push by following the instructions within RADAR.

    Rate this question:

  • 9. 

    For what time period(s) can the "data cap" be configured?  

    • A.

      Monthly

    • B.

      Daily and monthly

    • C.

      Annual

    • D.

      Daily

    Correct Answer
    B. Daily and monthly
    Explanation
    Daily and Monthly.
    The data cap functionality can be configured for a monthly or daily period. If the data cap is configured for a monthly period then the customer is required to specifiy the start of the billing cycle

    Rate this question:

  • 10. 

    What's the name of Wandera's admin management portal? 

    • A.

      RADARS

    • B.

      CONTROL

    • C.

      RADAR

    • D.

      MONITOR

    Correct Answer
    C. RADAR
    Explanation
    RADAR is the central admin portal where Wandera administrators can add / manage users, configure compression and policy settings and view data usage reports.

    Rate this question:

  • 11. 

    What is the web address for RADAR? 

    • A.

      Wandera.radar.com

    • B.

      Wandera.radar.net

    • C.

      Radar.wandera.com

    Correct Answer
    C. Radar.wandera.com
    Explanation
    radar.wandera.com can be used to access RADAR

    Rate this question:

  • 12. 

    What cost plans can be configured in RADAR? 

    • A.

      Cost per MB while roaming and the monthly cost for a domestic plan. Cost plans are limited to a single carrier.

    • B.

      Cost per MB while roaming and monthly cost for a domestic plan. Cost plans can be set and created for each carrier.

    • C.

      Cost of monthly domestic and roaming plan only.

    Correct Answer
    B. Cost per MB while roaming and monthly cost for a domestic plan. Cost plans can be set and created for each carrier.
    Explanation
    The settings tab allows the user to input two cost numbers: a cost per roaming MB and monthly plan costs.
    Most users use a blended average to specify the cost per roaming MB and simply enter their monthly plan costs for domestic cost settings.

    Rate this question:

  • 13. 

    What can an admin determine from the Apps/Sites report provided in View? 

    • A.

      Data usage of apps

    • B.

      Popularity of apps

    • C.

      Data usage and popularity of apps

    • D.

      Time spent on applications & sites

    Correct Answer
    C. Data usage and popularity of apps
    Explanation
    View, provides a report which itemises how much data each app consumed over the period and is expressed as a share of overall data (ie. how data hungry the app is).
    The report also highlights what share of the user base has used the site/app (ie. how popular an app is). This report can also be filtered on a per user basis.

    Rate this question:

  • 14. 

    How does Wandera calculate savings? 

    • A.

      Data saved by compression and estimated savings through usage policy

    • B.

      Number of caps multiplied by an estimated saving per cap

    • C.

      Roaming data saved multiplied by an average $1 per MB

    • D.

      An algorithm using information across our customer base

    Correct Answer
    A. Data saved by compression and estimated savings through usage policy
    Explanation
    Wandera Data Savings are calculated based on the compression savings and the most popular blocks. The savings associated with blocks are calculated using a proprietary algorithm that looks at the average data usage for that destination. For example, when Facebook is blocked, Wandera calculates in real-time the average data usage of a Facebook session (based on data from our entire user base).

    Rate this question:

  • 15. 

    What compression settings can be configured in RADAR? 

    • A.

      Text, Images and Video

    • B.

      Images and YouTube

    • C.

      Images and Video

    • D.

      Javascript and CSS

    Correct Answer
    C. Images and Video
    Explanation
    Wandera customers can tune the compression settings for Images and Video. They can be set as Low, Med and High in a domestic and a roaming scenario. On average, Low compression results in 5%-10% data savings, Medium compression in 10%-20% data savings and High in 20%-30%. These are averages and actual results depend on your traffic profile. Generally speaking, the higher the share of regular web traffic, the higher the savings.

    Rate this question:

  • 16. 

    What is plus WiFi? 

    • A.

      Security & Compliance over WiFi Connections

    • B.

      Enhanced malicious WiFi hotspot detection techniques

    • C.

      WiFI traffic is not handled yet by Wandera

    Correct Answer
    A. Security & Compliance over WiFi Connections
    Explanation
    Wandera can no handle WiFi traffic on iOS supervised devices, via our GHP deployment.

    Rate this question:

  • 17. 

    What happens to most corporate email traffic? 

    • A.

      Email isn't redirected via Wandera

    • B.

      Email traffic passes through the Wandera Secure Mobile Gateway but isn't compressed

    • C.

      Email traffic is compressed by Wandera

    Correct Answer
    B. Email traffic passes through the Wandera Secure Mobile Gateway but isn't compressed
    Explanation
    Email traffic passes throught Wandera but is not compressed.
    Most companies use ActiveSync or another secure web connection to sync email to the device. Email traffic (and SSL / HTTPS traffic in general) passes through the Wandera service but isn’t compressed.
    This means secure connections are fully functional for the end user and may be subject to blocking, capping and reporting by the RADAR admin.
    Their secure nature means that compression is not applied.

    Rate this question:

  • 18. 

    What happens to VPN traffic on a Wandera enrolled device? 

    • A.

      VPN traffic isn't redirected via Wandera because it used a different port (other than ports 80/443)

    • B.

      VPN traffic passes through Wandera but isn't compressed

    • C.

      VPN traffic is compressed by Wandera

    Correct Answer
    A. VPN traffic isn't redirected via Wandera because it used a different port (other than ports 80/443)
    Explanation
    VPN traffic isn't redirected via Wandera.
    The Wandera APN settings redirect all cellular Web traffic via the Wandera services.
    VPN traffic isn’t regarded as web traffic and therefore it will bypass the service.

    Rate this question:

  • 19. 

    What happens to tethered / personal hotspot traffic? 

    • A.

      Tethered traffic is redirected via Wandera and optimised

    • B.

      Tethered traffic is redirected via Wandera but isn't optimised

    • C.

      Tethered traffic is classified as non-web data and bypasses the Wandera proxy

    Correct Answer
    C. Tethered traffic is classified as non-web data and bypasses the Wandera proxy
    Explanation
    The Wandera APN settings redirect all cellular Web traffic via the Wandera optimisation service. This does not include tethered traffic. Wandera has recently released the cellular counters feature which allows administrators to measure non HTTP traffic, including tethered data.

    Rate this question:

  • 20. 

    How frequently does the Wandera engineering team aim to roll out new features to the service? 

    • A.

      Once a week

    • B.

      Once every 2 - 3 weeks

    • C.

      Once a quarter

    Correct Answer
    B. Once every 2 - 3 weeks
    Explanation
    Wandera uses an AGILE development methodology and releases improvements and new features every 2-weeks.

    Rate this question:

  • 21. 

    When a customer admin makes a policy change in RADAR, how quickly is the update pushed out to the proxies? 

    • A.

      Almost immediately

    • B.

      Within 15 minutes, due to caching in the publishing system

    • C.

      At the end of the customer's day, in line with cap rollovers

    Correct Answer
    A. Almost immediately
    Explanation
    Policy changes are made availible in real-time

    Rate this question:

  • 22. 

    The Wandera Architecture has been built to be what?  

    • A.

      Cloud Agnostic

    • B.

      Hosted in our own datacenters

    • C.

      Cloud Specific

    Correct Answer
    A. Cloud Agnostic
    Explanation
    Wandera's global platform was built to be cloud agnostic. It has been architected from the ground up to run in different public clouds. We also call this a heterogenous data center architecture

    Rate this question:

  • 23. 

    Which of the following are Wandera components? 

    • A.

      View, Extend and Secure

    • B.

      View and Mobile Data Optimization

    • C.

      Extend and Visibility

    • D.

      Compression, Reporting and Security

    Correct Answer
    A. View, Extend and Secure
    Explanation
    Wandera offers 3 products - View, Extend and Secure based on our proven cloud Mobile Data Gateway (MDG)

    Rate this question:

  • 24. 

    What protocols are routed through the Wandera service using APN? 

    • A.

      HTTP and HTTPS traffic only

    • B.

      All TCP traffic only

    • C.

      TCP and UDP traffic

    • D.

      All traffic except VoIP

    Correct Answer
    A. HTTP and HTTPS traffic only
    Explanation
    HTTP and HTTPS traffic only is routed to the Wandera Mobile Data Gateway (MDG) through the use of a proxy server.
    A VPN option, which will route all traffic through the MDG, will be available in the near future.

    Rate this question:

  • 25. 

    Which of the following are reports available under Wandera View? (Select all that apply) 

    • A.

      Usage

    • B.

      Roaming

    • C.

      Blocks

    • D.

      Usage time

    • E.

      Sites / Apps

    • F.

      BYOD

    • G.

      Business / Personal

    • H.

      User Summary

    • I.

      Tethering

    • J.

      Categories

    • K.

      Compression savings

    Correct Answer(s)
    A. Usage
    B. Roaming
    E. Sites / Apps
    G. Business / Personal
    H. User Summary
    I. Tethering
    J. Categories
    Explanation
    Usage, Roaming, Sites/Apps, Business/Personal, User Summary

    Rate this question:

  • 26. 

    What is Wandera Secure? 

    • A.

      An anti-virus solution for mobile devices

    • B.

      A multi-level security solution designed to detect and stop mobile threats on employee devices

    • C.

      An intrusion prevention system for mobile devices

    • D.

      A firewall for mobile

    Correct Answer
    B. A multi-level security solution designed to detect and stop mobile threats on employee devices
    Explanation
    Wandera Secure is a multi-level solution that provides organizations with real-time visibility and detection of mobile threats affecting your employees’ mobile devices. Equipped with risk assessment and scoring for each threat and device, you are able to evaluate your organization’s exposure to mobile security threats and take prioritized action against those that are impacting your users.

    Rate this question:

  • 27. 

    Wandera Secure provides multi-level protection because? 

    • A.

      It uses multiple virus scanners and malware databases

    • B.

      It uses multiple machine learning technologies

    • C.

      It leverages multiple Wandera data centers around the world

    • D.

      It correlates data from the device, in-line proxy and EMM software

    • E.

      It filters content based on reputation lists and malware engines

    Correct Answer
    D. It correlates data from the device, in-line proxy and EMM software
    Explanation
    Wandera Secure collects security-related information for each Wandera-enrolled device from multiple sources and levels, including at the gateway-level with Wandera Mobile Data Gateway and at the device-level through the Wandera app.
    Wandera is the only multi level security solution for mobile. This data is processed and correlated by our cloud-based proprietary security assessment engine – SmartWire Threat Intelligence – with threats discovered presented within RADAR – the Wandera Admin portal.

    Rate this question:

  • 28. 

    Wandera detects and classifies threats into Network Threats and Persistent Threats. What are Network Threats? 

    • A.

      Email threats

    • B.

      Browser threats

    • C.

      App Threats

    • D.

      Threats resulting from a connection to the Internet

    Correct Answer
    D. Threats resulting from a connection to the Internet
    Explanation
    A network threat represents communication between a device and the Internet that poses a risk to the user, his privacy or data.
    App-to-Server communication and web browser activity is typically the sources of network threats.

    These events are transient in nature and may occur multiple times or only once. Wandera can block network threats in real-time at the gateway level with Wandera Mobile Data Gateway. Examples include phishing, spam, or user id leaks, password leaks, etc.

    Rate this question:

  • 29. 

    What specific threats does Wandera Secure detect (select all that apply)? 

    • A.

      Malicious profiles

    • B.

      Phishing

    • C.

      Spam

    • D.

      Leaky/Insecure Apps

    • E.

      Browser Malware

    • F.

      Outdated OS

    • G.

      Jailbreak status

    • H.

      Malicious Apps

    • I.

      Spyware

    • J.

      Denial of service attack

    • K.

      Keystroke logger

    • L.

      Trojan horse

    Correct Answer(s)
    A. Malicious profiles
    B. pHishing
    C. Spam
    D. Leaky/Insecure Apps
    E. Browser Malware
    F. Outdated OS
    G. Jailbreak status
    H. Malicious Apps
    Explanation
    Malicious profiles: Configuration profiles are created with Apple’s iPhone Configuration Utility. They’re intended for IT departments and cellular carriers. These files have the .mobileconfig file extension and are essentially an easy way of distributing network settings to iOS devices. For example, a configuration profile can contain Wi-Fi, VPN, email, calendar, and even passcode restriction settings. An IT department can distribute the configuration profile to its employees, allowing them to quickly configure their device to connect to the corporate network and other services.
    The bad guys can create their own configuration profile files and distribute them. The profile could configure the device to use a malicious proxy or VPN, effectively allowing the attacker to monitor everything going over the network and redirect the device to phishing websites or malicious pages.
    Configuration profiles could also be used to install certificates. If a malicious certificate was installed, the attacker could effectively impersonate secure websites like banks.
    Configuration profiles can be distributed in several different ways. The most concerning ways are as email attachments and as files on web pages. An attacker could create a spear phishing email encouraging employees of a corporation to install a malicious configuration profile attached to the email. Or, an attacker could set up a phishing site that tries to download a configuration profile file.
    Compared to rogue apps, the configuration profile can only infect the device in a limited way. It can’t replicate itself like malware, nor can it hide itself from view like a rootkit. It can only point the device at malicious servers and install malicious certificates.


    Phishing: is the practice of targeting specific users’ information within a corporation and represents a significant threat to enterprises. Spam filters have been an effective defense against emails used by hackers, yet more than 300,000 new phising sites a month were discovered in 2012. For the typical email attack, the hacker obtains an employee’s email address and sends a message with a malicious link or file attachment. The employee may read the message while in a meeting and unwittingly hit the link in the email that takes them to a phishing site that installs malware. The employee may know better, but they’re multi-tasking, looking at a small screen and probably not using their best judgment. Still the bad guys get the information they seek. SMS phishing is the practice of texting people phishing emails that try to get users to log in to their banking or gain access to the corporate network.


    Insecure Apps: Poorly secured mobile apps and browsers have proved to be a "golden nugget," according to a May 2010 NSA presentation: harvesting sensitive data sent over public networks by applications is not a problem, but it was a little trickier to tag the intercepted information in the agency's XKeyscore database so that analysts could easily pull up a person's records. As an example the immensely popular Angry Birds game from Finnish developer Rovio had become a useful source thanks to advertising code added by US firm Millennial Media.
    Millennial's tracking software generates a personal record for each user that can store information from their political affiliation and sexual orientation to whether their marital state was single, married, divorced, engaged or "swinger." This information is used to target in-app ads more effectively, and can be collected by UK and US intelligence agencies for analysis. This may sound like an extreme example but many approved can leak sensitive corporate information from those devices. For example, an employee may install an app that asks for access to their address book, which may contain the names and information of every employee in your enterprise since employee address books are connected to Microsoft’s Active Directory. The app will then send the entire contents of the address book to a server on the Internet, which could be stolen by hackers. That means there might very well be a database in the loud that contains all the names, titles, phone numbers, and email addresses of each of your employees. With access to this information, hackers have everything they need for spear phishing and advanced persistent threats.


    Leaky Apps: these are apps that transmit sensitive information such as usernames, passwords, email addresses or location in the clear without encrypting the data. Any man in the middle can intercept these credentials and use it to steal information and money


    Browser Malware: Mobile web browser is an emerging attack vector for mobile devices. Just as common Web browsers, mobile web browsers are extended from pure web navigation with widgets and plug-ins, or are completely native mobile browsers. Jailbreaking the iPhone is often based entirely on vulnerabilities on the web browser. As a result, the exploitation of the vulnerability described here underlines the importance of the Web browser as an attack vector for mobile devices. In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser. Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc. The big difference is that smartphones do not have any layered defence against such threats.


    Outdated OS: Security patches or fixes for mobile devices' operating systems are not always installed on mobile devices in a timely manner. It can take weeks to months before security updates are provided to' devices depending on whether users take action. For example, the iOS 7.1.2 update fixes a critical email encryption bug, which leaves unpatched users vulnerable to hackers stealing email attachments. Also, outdated OS users are more vulnerable to jailbreaks as most OS updates patch know jailbreak exploits


    Jailbreak: OS jailbreaking is the process of removing limitations on iOS, Apple's operating system on devices running it through the use of software and hardware exploits. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store. This leaves the device highly vulnerable to malicious apps and other threats


    Malicious Apps: The top categories types of mobile malicious app include:
    Premium Service Abuser – Send text messages to premium mobile phone numbers, racking up unauthorized charges.
    - Adware – Leak data such as GPS location, personal information and call logs enabling advertising to better target ads and reach more users. Some adware also send unwarranted notifications that can annoy users and cause battery drain.
    - Information Theft – Similar to adware and some legitimate apps, this type of malware leaks sensitive information. The intent here is almost always to find sensitive information that can be sold or exploited for other attacks such as phishing or mobile banking fraud.
    - Malicious Downloader – Main purpose is to download other malware.

    Rate this question:

  • 30. 

    Automated Threat Responses allow you to (select all that apply) -

    • A.

      Set-up Admin Notifications in the event of Security Events

    • B.

      Set-up User Notifications in the event of Security Events

    • C.

      Block certain traffic automatically (where possible) in the event of a specific Security Event being detected

    • D.

      Configure an email summary of the threats that have been encountered

    • E.

      Configure EMM Tagging for further remediation actions

    Correct Answer(s)
    A. Set-up Admin Notifications in the event of Security Events
    B. Set-up User Notifications in the event of Security Events
    C. Block certain traffic automatically (where possible) in the event of a specific Security Event being detected
    E. Configure EMM Tagging for further remediation actions
    Explanation
    Automated threat responses all you to set-up notifications and block certain traffic automatically for certain categories

    Rate this question:

  • 31. 

    How can administrators use Wandera Secure to measure the severity of threats that impact a device or organization? (Select all that apply) 

    • A.

      A ranking of the top 10 devices is available in RADAR

    • B.

      A risk score between 0 and 100 indicating the level of risk in RADAR

    • C.

      The admin receives a digest email summarising the high impact threats

    Correct Answer
    B. A risk score between 0 and 100 indicating the level of risk in RADAR
    Explanation
    RADAR provides visibility to organizations and assists them by identifying and prioritizing detected security events. Wandera Secure applies a severity value to each threat while providing a calculated score of risk for each device and the company as a whole.
    Severity of a threat is graded on a score of one to five, with five being the most severe. Our security experts are constantly assessing the risk of threats we detect, applying the appropriate severity level to each. Risk is determined based upon a variety of factors, such as the likelihood of a vulnerability being exploited and the impact severity if it were exploited.
    Our risk scoring utilizes a proprietary algorithm based upon the severity and quantity of threats detected on a device, resulting in an assigned value to each device between 0 and 100. The higher the risk score, the more at risk that device is and the sooner it should be evaluated. A company wide risk score is derived from all of the organization’s combined risk scores to allow you to assess the overall security posture of the customer's mobile deployment in a single glance.

    Rate this question:

  • 32. 

    What is MI:RIAM?  

    • A.

      Wandera's proprietary cloud-based threat detection engine

    • B.

      A large database of known malware

    • C.

      An app reputation database

    • D.

      A highly specialised virus scanner for mobile threats

    Correct Answer
    A. Wandera's proprietary cloud-based threat detection engine
    Explanation
    Wandera’s proprietary SmartWire algorithm analyzes and correlates data across all known threats and detects anomalies in the cloud and on the device, across the Wandera customer network. By using a combination of multiple, correlated detection techniques and the industry’s largest mobile data set, SmartWire is able to accurately determine the security risk of each mobile data request. For example, if SmartWire identifies passwords sent as clear text from a device, all devices with the culprit app are flagged and/or secured thereafter. If a mobile device is on an unknown Wi-Fi network, the service closely monitors all data transfers especially with other employees’ devices. SmartWire also leverages multiple malware scanners, app and other security databases

    Rate this question:

  • 33. 

    What are device 'heartbeats'? 

    • A.

      These are mobile data requests that are scanned in real-time at the Wandera Mobile Data Gateway

    • B.

      Blocked pages which the device attempt to access through the mobile device

    • C.

      Device fingerprints (configuration, apps, events and logs) collected from the device by the Wandera app

    Correct Answer
    C. Device fingerprints (configuration, apps, events and logs) collected from the device by the Wandera app
    Explanation
    Wandera app collects heuristic data such as configuration files, events and other logs from the device seamlessly and continuously upload them to the Wandera Mobile Data Gateway for processing.

    Data from different devices are correlated with various threats found. With the proprietary SmartWire machine learning technology, cues from risky devices are fed into the system to detect threats that are present on other devices in real-time. MDG will alert administrator to seek remediation promptly and limit the spread.

    Rate this question:

  • 34. 

    What does every deployment start with? 

    • A.

      Configuring policy settings

    • B.

      A Customer Activation Call

    • C.

      Setting up notifications

    • D.

      Configuring the cost plans

    Correct Answer
    B. A Customer Activation Call
    Explanation
    A customer activation call is the initial step in every deployment process. This call allows the deployment team to communicate with the customer and gather important information about their requirements, preferences, and expectations. It helps in setting the right direction for the deployment and ensures that all parties are on the same page. This call also provides an opportunity to address any concerns or questions the customer may have and establish a strong working relationship between the customer and the deployment team.

    Rate this question:

  • 35. 

    There are 6 key areas within RADAR to cover during the Activation Call.Which of the following is not one of those key areas? 

    • A.

      Device Enrolment

    • B.

      Configure Data Policy

    • C.

      Review each Threat Category

    • D.

      Configure Carrier Plans

    • E.

      View Reports

    • F.

      Extend Reports

    • G.

      Secure Reports

    Correct Answer
    C. Review each Threat Category
    Explanation
    Enrolling Devices and customising APN Settings are not key steps on an Activation Call.

    Key steps are: Configue Data Policy, Configure Carrier Plans, View Reports, Extend Reports and Secure Reports

    Rate this question:

  • 36. 

    How long is data retained on Wandera? 

    • A.

      6 months

    • B.

      12 months

    • C.

      2 years

    • D.

      5 years

    Correct Answer
    B. 12 months
    Explanation
    Standard Retention Policy is 12 months. Data is securely dropped from our datawarehouses after the 12 month period.

    Rate this question:

  • 37. 

    Which of the following are the established ways to contact Wandera support should any issues arise? (Select all that apply) 

    • A.

      Phone call

    • B.

      Email

    • C.

      Raising a Support Ticket within the Support Centre

    • D.

      Social Media

    Correct Answer(s)
    A. pHone call
    B. Email
    C. Raising a Support Ticket within the Support Centre
    Explanation
    The following support contact means are available:
    Email – [email protected]
    Ticket through web portal – https://support.wandera.com (requires log into Radar)
    Phone – +44 203 301 2660

    Rate this question:

  • 38. 

    What Secure reports and views are available in RADAR?

    • A.

      Threat and device based threat report along with raw security events

    • B.

      Threat based report only

    • C.

      Device based threat report only

    Correct Answer
    A. Threat and device based threat report along with raw security events
    Explanation
    The correct answer is "Threat and device based threat report along with raw security events." This means that in RADAR, users have access to reports that provide information on both threats and device-based threats. Additionally, they can also view raw security events.

    Rate this question:

  • 39. 

    Which component does Wandera use to synchronise between RADAR and a supported MDM solution?

    • A.

      Wandera Connect

    • B.

      MDM Connect

    • C.

      EMM Connect

    • D.

      Device Connect

    Correct Answer
    C. EMM Connect
    Explanation
    Wandera uses the EMM Connect component to synchronize between RADAR and a supported MDM solution. This component allows for seamless integration and communication between the two systems, ensuring that data and policies are synchronized accurately and efficiently.

    Rate this question:

  • 40. 

    How is Wandera installed on Samsung Galaxy mobile devices? 

    • A.

      An App and an APN profile are installed

    • B.

      An APN profile is installed

    • C.

      An App is installed and a Device Administrator is configured

    • D.

      An APN profile is installed and a Device Administrator is configured

    Correct Answer
    C. An App is installed and a Device Administrator is configured
    Explanation
    Both an app and a device administrator are configured on Android devices.

    Rate this question:

  • 41. 

    What information is displayed to an Administrator when they log in to their RADAR Portal? 

    • A.

      Product Updates Splash Screen

    • B.

      Last Login Time

    • C.

      Latest Device Statistics

    • D.

      Amount of Security Threats

    Correct Answer
    A. Product Updates Splash Screen
    Explanation
    Product Updates are displayed to administrators upon logging into the RADAR Portal

    Rate this question:

  • 42. 

    Which of the following are Wandera Data Centre locations? 

    • A.

      Sao Paolo, Brazil

    • B.

      Hong Kong, China

    • C.

      Milan, Italy

    • D.

      Buenos Aires, Argentina

    • E.

      Dubai, UAE

    • F.

      Paris, France

    Correct Answer(s)
    A. Sao Paolo, Brazil
    B. Hong Kong, China
    C. Milan, Italy
    F. Paris, France
    Explanation
    Wandera uses Data Centres located in Sao Paolo, Hong Kong and Syndey Australia

    Rate this question:

  • 43. 

    What happens when Wandera are unable to determine a device location for 72 hours? 

    • A.

      All cellular web data is automatically blocked (except for the admin-configured whitelist exceptions)

    • B.

      The device is put into an Auto-Roaming status and the roaming policy is automatically applied

    • C.

      All cellular web data is automatically blocked (including admin-configured whitelist exceptions)

    • D.

      Tethering is blocked

    Correct Answer
    B. The device is put into an Auto-Roaming status and the roaming policy is automatically applied
    Explanation
    The device is put into an Auto-roaming status and the devices auto roaming policy is automatically applied

    Rate this question:

  • 44. 

    Can Wandera be installed on an iPad? 

    • A.

      No, iPads are not currently supported

    • B.

      Yes, iPads which have a valid SIM card are supported

    • C.

      Yes, WiFi only iPads are supported

    Correct Answer
    B. Yes, iPads which have a valid SIM card are supported
    Explanation
    Wandera can be installed on iPad devices which have a valid SIM card in place

    Rate this question:

  • 45. 

    What can be configured within Service Controls? 

    • A.

      The Deployment Method to be used to roll-out Wandera

    • B.

      EMM Connect & Over-the-Air Deployments

    • C.

      Advanced configuration items such as PIN Lock Profiles

    Correct Answer
    C. Advanced configuration items such as PIN Lock Profiles
    Explanation
    Service Controls are used to configure more advanced items such as App Ping functionality

    Rate this question:

  • 46. 

    What installation steps are required when installing Wandera on an iOS device? 

    • A.

      Access to Location Services

    • B.

      Enable Push Notifications

    • C.

      Review the Data Policy to be applied to the device

    • D.

      Install Secure Mobile Gateway Profile

    Correct Answer(s)
    A. Access to Location Services
    B. Enable Push Notifications
    D. Install Secure Mobile Gateway Profile
    Explanation
    Location Services, Push Notifications and the Secure Mobile Gateway would be required to complete an installation

    Rate this question:

  • 47. 

    What information is contained on the Support Centre?

    • A.

      The Wandera Technical Account Manager assigned to your deployment

    • B.

      Contact details for the Support team

    • C.

      Useful guides and tips to assist you in deploying and managing Wandera

    • D.

      The amount of Wandera licenses you have available to deploy

    Correct Answer(s)
    B. Contact details for the Support team
    C. Useful guides and tips to assist you in deploying and managing Wandera
    Explanation
    Contact details for the support team and useful guides and tips are included on the Support Centre

    Rate this question:

  • 48. 

    What is the correct email address to contact Wandera Support?

    Correct Answer
    C. [email protected]
    Explanation
    Wandera Support can be contacted at [email protected]

    Rate this question:

  • 49. 

    What does a Critical Device Status mean? 

    • A.

      The Wandera App has been uninstalled

    • B.

      The User has been blocked

    • C.

      The User has been capped

    • D.

      Wandera have not seen device traffic in over 72 hours

    Correct Answer
    D. Wandera have not seen device traffic in over 72 hours
    Explanation
    A critical device status denotes that Wandera have not seen cellular traffic from the device in over 72 hours

    Rate this question:

  • 50. 

    What can a Super Administrator do that a regular Administrator can not?

    • A.

      Reset Admin passwords

    • B.

      Create new administrators

    • C.

      Delete administrators

    Correct Answer(s)
    B. Create new administrators
    C. Delete administrators
    Explanation
    Super Administrators have the ability to create and delete administrator accounts

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 31, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 19, 2016
    Quiz Created by
    Stijn Paumen
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.