An administrator is asked to review a file on a local drive. The file contains what appear to be multiple conversations from emails, chat sessions, and various word processing files that were accessed during the past several days. Ann, the user, advises the administrator this was not a file she had created. The file is MOST likely created by which of the following?
A. Malware
B. Phishing
C. Social engineering
D. Keylogger
By disabling DHCP and allowing only static IP address assignments, which of the following will occur? (Select TWO).
A. The domain controller will require additional RAM
B. Devices without static IP addresses cannot connect to the network
C. IP address assignments will be consistent over time
D. Crosstalk will be reduced on the network
E. Network traffic and congestion will increase over time
F. A gateway will be required for every Ethernet port
Which of the following are characteristics of a strong password? (Select TWO).
A. Hard to guess.
B. Cannot be reversed.
C. Uses dictionary words.
D. Uses special characters.
E. Can be encrypted.
Joe, a user, reports that random pages are being printed on his printer. Which of the following can mitigate this from occurring?
A. Enable static IP's
B. Change the network frequency
C. Change the default encryption key
D. Disable the SSID broadcasting
After performing a wireless survey, a technician reports the following data:
WAP Name Channel WAP1 6 WAP2 8 WAP3 9
Which of the following channels should the technician use for the SOHO WAP to be installed next?
A. 1
B. 3
C. 7
D. 11
A technician sends an email to an employee in the finance office telling them they need to change their password right away. The technician then walks into the employee's office to observe as the password is being changed. Later, the employee in the finance office reports that their password was compromised. Which of the following is the MOST likely cause?
A. Shoulder surfing
B. Malware
C. Phishing
D. SPAM
Which of the following types of physical security features a passcode generated from an algorithm?
A. Key Fob
B. RFID Badge
C. Biometrics
D. RSA Token
Which of the following security threats are typically designed to get the user to make a purchase? (Select TWO).
A. Worm
B. Virus
C. Adware
D. Spam
E. Trojan
F. Phishing
A home user has forgotten their password and cannot log into their Windows XP Home PC. They do not want to lose any information. Which of the following should be used FIRST, assuming that the user had set up the PC?
A. Restart in safe mode and log in as administrator
B. Use third party software to change password
C. Re-install the OS from the resource CD
D. Log in as administrator from start up screen
A user has highly confidential information on an old hard drive. Which of the following methods would BEST ensure that the data can never be recovered?
A. FORMAT /Q
B. Overwrite program
C. Degaussing tool
D. Low level format
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.