A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).
A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords
Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?
A. Startup
B. Services
C. Tools
D. Boot
A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?
A. NET USE
B. PING
C. XCOPY
D. IPCONFIG
Which of the following is TRUE about the difference between a worm and a virus?
A. Worms are written in assembly while viruses are written with scripting languages.
B. Viruses hide in the boot record while worms hide within the file system.
C. Worms self-propagate while viruses need human intervention to replicate.
D. Viruses disable the antivirus update service while worms kill the antivirus process.
Which of the following BEST describes a method for installing an operating system across the network?
A. USB 3.0
B. IEEE 1394
C. PXE
D. NTFS
Which of the following security threats is BEST mitigated through proper user training?
A. A Worm
B. Rootkits
C. Social Engineering
D. Browser Adware
A technician is asked to create a login for each member of a four person family, on a home computer running Windows 7. The parents need to have administrative access but the children need to be standard users. Which of the following Control Panel icons should the technician select to create these logons?
A. Parental Controls
B. User Account Control
C. User Accounts
D. Personalization
Which of the following is the BEST tool for a technician to use to make sure the network cable is securely fastened in the RJ-45 connector?
A. Cable tester
B. Crimper
C. Small flat screwdriver
D. Punch down
A virtual machine running locally would be BEST utilized in which of the following situations?
A. On a PC with minimal RAM
B. Patch testing before rollout
C. Thick client configuration
D. Gaming workstation configuration
A technician believes a machine loaded with Windows XP Professional has issues with file integrity of the core OS components. Which of the following commands could be used to both check and replace damaged files?
A. SFC /SCANNOW
B. CHKDSK /R /F
C. FORMAT C:
D. DISKPART
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.