Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?
A. WPS
B. WPA2-PSK
C. WPA-Enterprise
D. WEP
A technician performs a risk assessment and determines a requested change has low risk and low impact. Which of the following best practices should the technician follow to proceed with implementing the change?
A. Update the ticket with the results of the risk assessment and implement the change
B. Reference the business policy and follow all change management procedures
C. Obtain approval from the department and implement the change
D. Provide a risk assessment to colleagues for peer review
Which of the following employs content filtering to prevent data leaks within an organization?
A. DLP
B. IPS
C. ACL
D. VPN
A technician is installing the Mac OS X operating system. The technician is prompted to select the filesystem. Which of the following filesystems should the technician utilize to install the listed operating system?
A. EW2
B. FAT32
C. HFS
D. NTFS
Which of the following should be done prior to installing replacement RAM modules into a desktop computer?
A. Wear an ESD wrist strap.
B. Put on latex gloves
C. Connect power to a grounded outlet
D. Disconnect the CMOS battery
A technician is working on a desktop computer that is not performing as expected. Program windows sometimes open and close without user intervention. Windows cannot check for OS updates, and some websites are not accessible. Which of the following tasks should the technician perform FIRST?
A. Roll back recent driver updates.
B. Replace the defective keyboard.
C. Reset all the settings in the Internet Options.
D. Unplug the Ethernet cable.
Joe. a user, cannot read encrypted email messages on a corporate smartphone, but he has been able to read them in the past A technician restarts Joe's smartphone. but the issue remains. The technician deletes the corporate email account and has Joe re-add it. verifying all settings are correct Despite these steps, the issue persists
Which of the following is MOST likely causing the issue?
A. The certificate is expired
B. The TPM is bad.
C. The phone is not encrypted
D. The incorrect mail server is selected in settings
A remote user has reported a suspicious pop-up. and a technician is troubleshooting the user's laptop. The technician needs to connect securely to the computer to view the user's screen and investigate the issue Which of the following should the technician use?
A. SSH
B. MSTSC
C. SFTP
D. MSRA
A technician needs to connect securely to a Linux-based network appliance in a remote datacenter. Which of the following will the technician MOST likely use?
A. SSH
B. SFTP
C. RDP
D. Telnet
A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?
A. Ignore the message as a false positive
B. Shut down and restart the computer.
C. Unplug the Ethernet cable.
D. Follow the onscreen instructions to remove the malware
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.