Certified Wandera Support Engineer

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Stijn Paumen
S
Stijn Paumen
Community Contributor
Quizzes Created: 3 | Total Attempts: 8,231
| Attempts: 66 | Questions: 52
Please wait...
Question 1 / 52
0 %
0/100
Score 0/100
1. Can Wandera be installed on an iPad? 

Explanation

Wandera can be installed on iPad devices which have a valid SIM card in place

Submit
Please wait...
About This Quiz
Certified Wandera Support Engineer - Quiz

This exam is designed to assess technical knowledge of Wandera's Mobile Data Gateway services. The questions are mostly multiple choice. This is a timed test, you have 60 minutes to complete all questions. You are required to achieve a score of 75% in order to become a Certified Wandera... see moreSupport Engineer.
Good luck! see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What is the correct email address to contact Wandera Support?

Explanation

Wandera Support can be contacted at [email protected]

Submit
3. What does APN stand for? 

Explanation

APN or Access Point Name is the name of the gateway of the mobile carrier which provides access to the Internet. Having a Wandera APN profile on your device means your carrier passes your cellular web data to Wandera for optimisation and visibility

Submit
4. Which devices are currently supported for the Plus WiFi Feature? 

Explanation

Currently, Wandera support Plus WiFi on iOS DEP devices via a GHP deployment.

Submit
5. What happens when a roaming user reaches their "data cap"? 

Explanation

All cellular web data/traffic that passes through Wandera will be blocked - this doesn't include WiFi traffic or non cellular web traffic such as tethering.

Submit
6. What's the name of Wandera's admin management portal? 

Explanation

RADAR is the central admin portal where Wandera administrators can add / manage users, configure compression and policy settings and view data usage reports.

Submit
7. What happens to VPN traffic on a Wandera enrolled device? 

Explanation

VPN traffic isn't redirected via Wandera.
The Wandera APN settings redirect all cellular Web traffic via the Wandera services.
VPN traffic isn’t regarded as web traffic and therefore it will bypass the service.

Submit
8. What is Wandera Secure? 

Explanation

Wandera Secure is a multi-level solution that provides organizations with real-time visibility and detection of mobile threats affecting your employees’ mobile devices. Equipped with risk assessment and scoring for each threat and device, you are able to evaluate your organization’s exposure to mobile security threats and take prioritized action against those that are impacting your users.

Submit
9. What is MI:RIAM?  

Explanation

Wandera’s proprietary SmartWire algorithm analyzes and correlates data across all known threats and detects anomalies in the cloud and on the device, across the Wandera customer network. By using a combination of multiple, correlated detection techniques and the industry’s largest mobile data set, SmartWire is able to accurately determine the security risk of each mobile data request. For example, if SmartWire identifies passwords sent as clear text from a device, all devices with the culprit app are flagged and/or secured thereafter. If a mobile device is on an unknown Wi-Fi network, the service closely monitors all data transfers especially with other employees’ devices. SmartWire also leverages multiple malware scanners, app and other security databases

Submit
10. Which component does Wandera use to synchronise between RADAR and a supported MDM solution?

Explanation

Wandera uses the EMM Connect component to synchronize between RADAR and a supported MDM solution. This component allows for seamless integration and communication between the two systems, ensuring that data and policies are synchronized accurately and efficiently.

Submit
11. What happens when a user is "blocked" by a Wandera policy?

Explanation

The user can't access that specific site or app that is blocked. Block policies are configured in RADAR to match a block rule by URL. For example, news.bbc.co.uk will match only that subdomain, whereas apple.com will match the entire domain. Once set, both browser and app web traffic will be blocked by Wandera.

Submit
12. For what time period(s) can the "data cap" be configured?  

Explanation

Daily and Monthly.
The data cap functionality can be configured for a monthly or daily period. If the data cap is configured for a monthly period then the customer is required to specifiy the start of the billing cycle

Submit
13. What is the web address for RADAR? 

Explanation

radar.wandera.com can be used to access RADAR

Submit
14. What can an admin determine from the Apps/Sites report provided in View? 

Explanation

View, provides a report which itemises how much data each app consumed over the period and is expressed as a share of overall data (ie. how data hungry the app is).
The report also highlights what share of the user base has used the site/app (ie. how popular an app is). This report can also be filtered on a per user basis.

Submit
15. What happens to tethered / personal hotspot traffic? 

Explanation

The Wandera APN settings redirect all cellular Web traffic via the Wandera optimisation service. This does not include tethered traffic. Wandera has recently released the cellular counters feature which allows administrators to measure non HTTP traffic, including tethered data.

Submit
16. When a customer admin makes a policy change in RADAR, how quickly is the update pushed out to the proxies? 

Explanation

Policy changes are made availible in real-time

Submit
17. What happens when Wandera are unable to determine a device location for 72 hours? 

Explanation

The device is put into an Auto-roaming status and the devices auto roaming policy is automatically applied

Submit
18. What key benefits does Wandera provide to customers? 

Explanation

Savings, Visibility and Security are the three key pillars of the Wandera service and we always explain these benefits in detail when we speak to prospects.
1. Visibility: Wandera View provides previously unavailable insight into mobile data usage on a per app and per user basis. We effectively itemise a phone bill for data;

2. Savings: Wandera Extend delivers data savings through the use of proprietary compression and policy regulation;

3. Security: Wandera Secure detects one-off network threats and persistent threats from apps on mobile devices to ensure data and network integrity

Submit
19. How is Wandera installed on iOS mobile devices? 

Explanation

Both an app and an APN profile are installed.
The APN profile ensures that mobile data is redirected via the Wandera optimisation service and the Wandera App detects the location of the user so that a roaming policy can be applied. The App also delivers useful end-user reports.

Submit
20. What is a valid method that a customer can use to deploy Wandera 

Explanation

An administrator can set-up App Push by following the instructions within RADAR.

Submit
21. What is plus WiFi? 

Explanation

Wandera can no handle WiFi traffic on iOS supervised devices, via our GHP deployment.

Submit
22. How frequently does the Wandera engineering team aim to roll out new features to the service? 

Explanation

Wandera uses an AGILE development methodology and releases improvements and new features every 2-weeks.

Submit
23. What protocols are routed through the Wandera service using APN? 

Explanation

HTTP and HTTPS traffic only is routed to the Wandera Mobile Data Gateway (MDG) through the use of a proxy server.
A VPN option, which will route all traffic through the MDG, will be available in the near future.

Submit
24. Wandera detects and classifies threats into Network Threats and Persistent Threats. What are Network Threats? 

Explanation

A network threat represents communication between a device and the Internet that poses a risk to the user, his privacy or data.
App-to-Server communication and web browser activity is typically the sources of network threats.

These events are transient in nature and may occur multiple times or only once. Wandera can block network threats in real-time at the gateway level with Wandera Mobile Data Gateway. Examples include phishing, spam, or user id leaks, password leaks, etc.

Submit
25. How long is data retained on Wandera? 

Explanation

Standard Retention Policy is 12 months. Data is securely dropped from our datawarehouses after the 12 month period.

Submit
26. What does a Wandera APN setting do? 

Explanation

The Wandera APN profile configures a proxy setting to ensure all cellular web data is redirected from the carrier gateway onwards to Wandera's MDG. The Wandera APN should not be confused with a private APN which would replace the existing mobile carrier as the default gateway to the Internet.
In fact, customers need to specify which mobile carrier each user is on so that we can provide the correct Wandera APN settings.
The settings apply to cellular data only.

Submit
27. How does Wandera calculate savings? 

Explanation

Wandera Data Savings are calculated based on the compression savings and the most popular blocks. The savings associated with blocks are calculated using a proprietary algorithm that looks at the average data usage for that destination. For example, when Facebook is blocked, Wandera calculates in real-time the average data usage of a Facebook session (based on data from our entire user base).


Submit
28. What compression settings can be configured in RADAR? 

Explanation

Wandera customers can tune the compression settings for Images and Video. They can be set as Low, Med and High in a domestic and a roaming scenario. On average, Low compression results in 5%-10% data savings, Medium compression in 10%-20% data savings and High in 20%-30%. These are averages and actual results depend on your traffic profile. Generally speaking, the higher the share of regular web traffic, the higher the savings.

Submit
29. What does every deployment start with? 

Explanation

A customer activation call is the initial step in every deployment process. This call allows the deployment team to communicate with the customer and gather important information about their requirements, preferences, and expectations. It helps in setting the right direction for the deployment and ensures that all parties are on the same page. This call also provides an opportunity to address any concerns or questions the customer may have and establish a strong working relationship between the customer and the deployment team.

Submit
30. Which of the following are the established ways to contact Wandera support should any issues arise? (Select all that apply) 

Explanation

The following support contact means are available:
Email – [email protected]
Ticket through web portal – https://support.wandera.com (requires log into Radar)
Phone – +44 203 301 2660

Submit
31. What cost plans can be configured in RADAR? 

Explanation

The settings tab allows the user to input two cost numbers: a cost per roaming MB and monthly plan costs.
Most users use a blended average to specify the cost per roaming MB and simply enter their monthly plan costs for domestic cost settings.

Submit
32. What does the Wandera App do? 

Explanation

The Wandera App detects the location of the user using the SLC (Significant Location Change) functionality of the operating system so that a roaming policy can be applied at the Gateway level when a user is a out of the country.
The App also delivers useful end-user reports, and collects heartbeat information for threat detections and security improvement.

Submit
33. How can administrators use Wandera Secure to measure the severity of threats that impact a device or organization? (Select all that apply) 

Explanation

RADAR provides visibility to organizations and assists them by identifying and prioritizing detected security events. Wandera Secure applies a severity value to each threat while providing a calculated score of risk for each device and the company as a whole.
Severity of a threat is graded on a score of one to five, with five being the most severe. Our security experts are constantly assessing the risk of threats we detect, applying the appropriate severity level to each. Risk is determined based upon a variety of factors, such as the likelihood of a vulnerability being exploited and the impact severity if it were exploited.
Our risk scoring utilizes a proprietary algorithm based upon the severity and quantity of threats detected on a device, resulting in an assigned value to each device between 0 and 100. The higher the risk score, the more at risk that device is and the sooner it should be evaluated. A company wide risk score is derived from all of the organization’s combined risk scores to allow you to assess the overall security posture of the customer's mobile deployment in a single glance.

Submit
34. What Secure reports and views are available in RADAR?

Explanation

The correct answer is "Threat and device based threat report along with raw security events." This means that in RADAR, users have access to reports that provide information on both threats and device-based threats. Additionally, they can also view raw security events.

Submit
35. The Wandera Architecture has been built to be what?  

Explanation

Wandera's global platform was built to be cloud agnostic. It has been architected from the ground up to run in different public clouds. We also call this a heterogenous data center architecture

Submit
36. How is Wandera installed on Samsung Galaxy mobile devices? 

Explanation

Both an app and a device administrator are configured on Android devices.

Submit
37. Which of the following are Wandera components? 

Explanation

Wandera offers 3 products - View, Extend and Secure based on our proven cloud Mobile Data Gateway (MDG)

Submit
38. What information is displayed to an Administrator when they log in to their RADAR Portal? 

Explanation

Product Updates are displayed to administrators upon logging into the RADAR Portal


Submit
39. What can be configured within Service Controls? 

Explanation

Service Controls are used to configure more advanced items such as App Ping functionality

Submit
40. What does a Critical Device Status mean? 

Explanation

A critical device status denotes that Wandera have not seen cellular traffic from the device in over 72 hours

Submit
41. What installation steps are required when installing Wandera on an iOS device? 

Explanation

Location Services, Push Notifications and the Secure Mobile Gateway would be required to complete an installation


Submit
42. What happens to most corporate email traffic? 

Explanation

Email traffic passes throught Wandera but is not compressed.
Most companies use ActiveSync or another secure web connection to sync email to the device. Email traffic (and SSL / HTTPS traffic in general) passes through the Wandera service but isn’t compressed.
This means secure connections are fully functional for the end user and may be subject to blocking, capping and reporting by the RADAR admin.
Their secure nature means that compression is not applied.

Submit
43. Wandera Secure provides multi-level protection because? 

Explanation

Wandera Secure collects security-related information for each Wandera-enrolled device from multiple sources and levels, including at the gateway-level with Wandera Mobile Data Gateway and at the device-level through the Wandera app.
Wandera is the only multi level security solution for mobile. This data is processed and correlated by our cloud-based proprietary security assessment engine – SmartWire Threat Intelligence – with threats discovered presented within RADAR – the Wandera Admin portal.

Submit
44. Which of the following are Wandera Data Centre locations? 

Explanation

Wandera uses Data Centres located in Sao Paolo, Hong Kong and Syndey Australia

Submit
45. What are device 'heartbeats'? 

Explanation

Wandera app collects heuristic data such as configuration files, events and other logs from the device seamlessly and continuously upload them to the Wandera Mobile Data Gateway for processing.

Data from different devices are correlated with various threats found. With the proprietary SmartWire machine learning technology, cues from risky devices are fed into the system to detect threats that are present on other devices in real-time. MDG will alert administrator to seek remediation promptly and limit the spread.

Submit
46. Automated Threat Responses allow you to (select all that apply) -

Explanation

Automated threat responses all you to set-up notifications and block certain traffic automatically for certain categories

Submit
47. What information is contained on the Support Centre?

Explanation

Contact details for the support team and useful guides and tips are included on the Support Centre

Submit
48. There are 6 key areas within RADAR to cover during the Activation Call.Which of the following is not one of those key areas? 

Explanation

Enrolling Devices and customising APN Settings are not key steps on an Activation Call.

Key steps are: Configue Data Policy, Configure Carrier Plans, View Reports, Extend Reports and Secure Reports

Submit
49. What specific threats does Wandera Secure detect (select all that apply)? 

Explanation

Malicious profiles: Configuration profiles are created with Apple’s iPhone Configuration Utility. They’re intended for IT departments and cellular carriers. These files have the .mobileconfig file extension and are essentially an easy way of distributing network settings to iOS devices. For example, a configuration profile can contain Wi-Fi, VPN, email, calendar, and even passcode restriction settings. An IT department can distribute the configuration profile to its employees, allowing them to quickly configure their device to connect to the corporate network and other services.
The bad guys can create their own configuration profile files and distribute them. The profile could configure the device to use a malicious proxy or VPN, effectively allowing the attacker to monitor everything going over the network and redirect the device to phishing websites or malicious pages.
Configuration profiles could also be used to install certificates. If a malicious certificate was installed, the attacker could effectively impersonate secure websites like banks.
Configuration profiles can be distributed in several different ways. The most concerning ways are as email attachments and as files on web pages. An attacker could create a spear phishing email encouraging employees of a corporation to install a malicious configuration profile attached to the email. Or, an attacker could set up a phishing site that tries to download a configuration profile file.
Compared to rogue apps, the configuration profile can only infect the device in a limited way. It can’t replicate itself like malware, nor can it hide itself from view like a rootkit. It can only point the device at malicious servers and install malicious certificates.


Phishing: is the practice of targeting specific users’ information within a corporation and represents a significant threat to enterprises. Spam filters have been an effective defense against emails used by hackers, yet more than 300,000 new phising sites a month were discovered in 2012. For the typical email attack, the hacker obtains an employee’s email address and sends a message with a malicious link or file attachment. The employee may read the message while in a meeting and unwittingly hit the link in the email that takes them to a phishing site that installs malware. The employee may know better, but they’re multi-tasking, looking at a small screen and probably not using their best judgment. Still the bad guys get the information they seek. SMS phishing is the practice of texting people phishing emails that try to get users to log in to their banking or gain access to the corporate network.


Insecure Apps: Poorly secured mobile apps and browsers have proved to be a "golden nugget," according to a May 2010 NSA presentation: harvesting sensitive data sent over public networks by applications is not a problem, but it was a little trickier to tag the intercepted information in the agency's XKeyscore database so that analysts could easily pull up a person's records. As an example the immensely popular Angry Birds game from Finnish developer Rovio had become a useful source thanks to advertising code added by US firm Millennial Media.
Millennial's tracking software generates a personal record for each user that can store information from their political affiliation and sexual orientation to whether their marital state was single, married, divorced, engaged or "swinger." This information is used to target in-app ads more effectively, and can be collected by UK and US intelligence agencies for analysis. This may sound like an extreme example but many approved can leak sensitive corporate information from those devices. For example, an employee may install an app that asks for access to their address book, which may contain the names and information of every employee in your enterprise since employee address books are connected to Microsoft’s Active Directory. The app will then send the entire contents of the address book to a server on the Internet, which could be stolen by hackers. That means there might very well be a database in the loud that contains all the names, titles, phone numbers, and email addresses of each of your employees. With access to this information, hackers have everything they need for spear phishing and advanced persistent threats.


Leaky Apps: these are apps that transmit sensitive information such as usernames, passwords, email addresses or location in the clear without encrypting the data. Any man in the middle can intercept these credentials and use it to steal information and money


Browser Malware: Mobile web browser is an emerging attack vector for mobile devices. Just as common Web browsers, mobile web browsers are extended from pure web navigation with widgets and plug-ins, or are completely native mobile browsers. Jailbreaking the iPhone is often based entirely on vulnerabilities on the web browser. As a result, the exploitation of the vulnerability described here underlines the importance of the Web browser as an attack vector for mobile devices. In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser. Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc. The big difference is that smartphones do not have any layered defence against such threats.


Outdated OS: Security patches or fixes for mobile devices' operating systems are not always installed on mobile devices in a timely manner. It can take weeks to months before security updates are provided to' devices depending on whether users take action. For example, the iOS 7.1.2 update fixes a critical email encryption bug, which leaves unpatched users vulnerable to hackers stealing email attachments. Also, outdated OS users are more vulnerable to jailbreaks as most OS updates patch know jailbreak exploits


Jailbreak: OS jailbreaking is the process of removing limitations on iOS, Apple's operating system on devices running it through the use of software and hardware exploits. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store. This leaves the device highly vulnerable to malicious apps and other threats


Malicious Apps: The top categories types of mobile malicious app include:
Premium Service Abuser – Send text messages to premium mobile phone numbers, racking up unauthorized charges.
- Adware – Leak data such as GPS location, personal information and call logs enabling advertising to better target ads and reach more users. Some adware also send unwarranted notifications that can annoy users and cause battery drain.
- Information Theft – Similar to adware and some legitimate apps, this type of malware leaks sensitive information. The intent here is almost always to find sensitive information that can be sold or exploited for other attacks such as phishing or mobile banking fraud.
- Malicious Downloader – Main purpose is to download other malware.

Submit
50. What can a Super Administrator do that a regular Administrator can not?

Explanation

Super Administrators have the ability to create and delete administrator accounts

Submit
51. Which of the following are reports available under Wandera View? (Select all that apply) 

Explanation

Usage, Roaming, Sites/Apps, Business/Personal, User Summary

Submit
52. Recently, Wandera has added new threat detection capabilities for Samsung Android. Which of the below are fall within that new category? 

Explanation

Malicious profiles: Configuration profiles are created with Apple’s iPhone Configuration Utility. They’re intended for IT departments and cellular carriers. These files have the .mobileconfig file extension and are essentially an easy way of distributing network settings to iOS devices. For example, a configuration profile can contain Wi-Fi, VPN, email, calendar, and even passcode restriction settings. An IT department can distribute the configuration profile to its employees, allowing them to quickly configure their device to connect to the corporate network and other services.
The bad guys can create their own configuration profile files and distribute them. The profile could configure the device to use a malicious proxy or VPN, effectively allowing the attacker to monitor everything going over the network and redirect the device to phishing websites or malicious pages.
Configuration profiles could also be used to install certificates. If a malicious certificate was installed, the attacker could effectively impersonate secure websites like banks.
Configuration profiles can be distributed in several different ways. The most concerning ways are as email attachments and as files on web pages. An attacker could create a spear phishing email encouraging employees of a corporation to install a malicious configuration profile attached to the email. Or, an attacker could set up a phishing site that tries to download a configuration profile file.
Compared to rogue apps, the configuration profile can only infect the device in a limited way. It can’t replicate itself like malware, nor can it hide itself from view like a rootkit. It can only point the device at malicious servers and install malicious certificates.


Phishing: is the practice of targeting specific users’ information within a corporation and represents a significant threat to enterprises. Spam filters have been an effective defense against emails used by hackers, yet more than 300,000 new phising sites a month were discovered in 2012. For the typical email attack, the hacker obtains an employee’s email address and sends a message with a malicious link or file attachment. The employee may read the message while in a meeting and unwittingly hit the link in the email that takes them to a phishing site that installs malware. The employee may know better, but they’re multi-tasking, looking at a small screen and probably not using their best judgment. Still the bad guys get the information they seek. SMS phishing is the practice of texting people phishing emails that try to get users to log in to their banking or gain access to the corporate network.


Insecure Apps: Poorly secured mobile apps and browsers have proved to be a "golden nugget," according to a May 2010 NSA presentation: harvesting sensitive data sent over public networks by applications is not a problem, but it was a little trickier to tag the intercepted information in the agency's XKeyscore database so that analysts could easily pull up a person's records. As an example the immensely popular Angry Birds game from Finnish developer Rovio had become a useful source thanks to advertising code added by US firm Millennial Media.
Millennial's tracking software generates a personal record for each user that can store information from their political affiliation and sexual orientation to whether their marital state was single, married, divorced, engaged or "swinger." This information is used to target in-app ads more effectively, and can be collected by UK and US intelligence agencies for analysis. This may sound like an extreme example but many approved can leak sensitive corporate information from those devices. For example, an employee may install an app that asks for access to their address book, which may contain the names and information of every employee in your enterprise since employee address books are connected to Microsoft’s Active Directory. The app will then send the entire contents of the address book to a server on the Internet, which could be stolen by hackers. That means there might very well be a database in the loud that contains all the names, titles, phone numbers, and email addresses of each of your employees. With access to this information, hackers have everything they need for spear phishing and advanced persistent threats.


Leaky Apps: these are apps that transmit sensitive information such as usernames, passwords, email addresses or location in the clear without encrypting the data. Any man in the middle can intercept these credentials and use it to steal information and money


Browser Malware: Mobile web browser is an emerging attack vector for mobile devices. Just as common Web browsers, mobile web browsers are extended from pure web navigation with widgets and plug-ins, or are completely native mobile browsers. Jailbreaking the iPhone is often based entirely on vulnerabilities on the web browser. As a result, the exploitation of the vulnerability described here underlines the importance of the Web browser as an attack vector for mobile devices. In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser. Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc. The big difference is that smartphones do not have any layered defence against such threats.


Outdated OS: Security patches or fixes for mobile devices' operating systems are not always installed on mobile devices in a timely manner. It can take weeks to months before security updates are provided to' devices depending on whether users take action. For example, the iOS 7.1.2 update fixes a critical email encryption bug, which leaves unpatched users vulnerable to hackers stealing email attachments. Also, outdated OS users are more vulnerable to jailbreaks as most OS updates patch know jailbreak exploits


Jailbreak: OS jailbreaking is the process of removing limitations on iOS, Apple's operating system on devices running it through the use of software and hardware exploits. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store. This leaves the device highly vulnerable to malicious apps and other threats


Malicious Apps: The top categories types of mobile malicious app include:
Premium Service Abuser – Send text messages to premium mobile phone numbers, racking up unauthorized charges.
- Adware – Leak data such as GPS location, personal information and call logs enabling advertising to better target ads and reach more users. Some adware also send unwarranted notifications that can annoy users and cause battery drain.
- Information Theft – Similar to adware and some legitimate apps, this type of malware leaks sensitive information. The intent here is almost always to find sensitive information that can be sold or exploited for other attacks such as phishing or mobile banking fraud.
- Malicious Downloader – Main purpose is to download other malware.

Submit
View My Results

Quiz Review Timeline (Updated): May 31, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 31, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 19, 2016
    Quiz Created by
    Stijn Paumen
Cancel
  • All
    All (52)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Can Wandera be installed on an iPad? 
What is the correct email address to contact Wandera Support?
What does APN stand for? 
Which devices are currently supported for the Plus WiFi Feature? 
What happens when a roaming user reaches their "data...
What's the name of Wandera's admin management portal? 
What happens to VPN traffic on a Wandera enrolled device? 
What is Wandera Secure? 
What is MI:RIAM?  
Which component does Wandera use to synchronise between RADAR and a...
What happens when a user is "blocked" by a Wandera policy?
For what time period(s) can the "data cap" be...
What is the web address for RADAR? 
What can an admin determine from the Apps/Sites report provided in...
What happens to tethered / personal hotspot traffic? 
When a customer admin makes a policy change in RADAR, how quickly is...
What happens when Wandera are unable to determine a device location...
What key benefits does Wandera provide to customers? 
How is Wandera installed on iOS mobile devices? 
What is a valid method that a customer can use to deploy Wandera 
What is plus WiFi? 
How frequently does the Wandera engineering team aim to roll out new...
What protocols are routed through the Wandera service using APN? 
Wandera detects and classifies threats into Network Threats and...
How long is data retained on Wandera? 
What does a Wandera APN setting do? 
How does Wandera calculate savings? 
What compression settings can be configured in RADAR? 
What does every deployment start with? 
Which of the following are the established ways to contact Wandera...
What cost plans can be configured in RADAR? 
What does the Wandera App do? 
How can administrators use Wandera Secure to measure the severity of...
What Secure reports and views are available in RADAR?
The Wandera Architecture has been built to be what?  
How is Wandera installed on Samsung Galaxy mobile devices? 
Which of the following are Wandera components? 
What information is displayed to an Administrator when they log in to...
What can be configured within Service Controls? 
What does a Critical Device Status mean? 
What installation steps are required when installing Wandera on an iOS...
What happens to most corporate email traffic? 
Wandera Secure provides multi-level protection because? 
Which of the following are Wandera Data Centre locations? 
What are device 'heartbeats'? 
Automated Threat Responses allow you to (select all that apply) -
What information is contained on the Support Centre?
There are 6 key areas within RADAR to cover during the Activation...
What specific threats does Wandera Secure detect (select all that...
What can a Super Administrator do that a regular Administrator can...
Which of the following are reports available under Wandera View?...
Recently, Wandera has added new threat detection capabilities for...
Alert!

Advertisement