A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
When running a combination of full and incremental backups, which of the following represents the required tapes in order to completely restore a system?
A. The system cannot be restored completely using full and incremental backups.
B. Only the latest full backup is required.
C. Only the latest incremental backup is required.
D. The latest full and all incremental backups since the last full backup.
Which of the following statements BEST describes client-side virtualization?
A. Using another machine to improve the performance of the current machine
B. Using a virtual reality interface to access the client
C. Creating a software-based machine inside the physical machine
D. Creating a virtual desktop PC to assist with building a new machine
A technician is interested in running a test to see how much latency exists between a workstation and device at 10.0.0.15. Which of the following command line tools could be used to accomplish this?
A. IPCONFIG 10.0.0.15
B. NSLOOKUP 10.0.0.15
C. NETSTAT 10.0.0.15
D. PING 10.0.0.15
A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?
A. Message of the Day
B. Email lists
C. Company forums
D. Regular user education
Which of the following scenarios BEST defines phishing?
A. A user receives an email from a friend to download a picture but the file format ends in .exe.
B. A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus.
C. A user receives a message about unwanted activity from their antivirus asking to remove the suspect file.
D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.
Which of the following requirements must be considered when implementing virtual servers with sensitive information?
A. Security
B. DMZ
C. Firewall
D. Network
For the last year, a company has gathered statistics on the most common security incidents.
The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
A. Annual cyber security education
B. Update antivirus signatures more often
C. Block all email attachments
D. Install an IPS on each workstation
Which of the following security threats involve shoulder surfing and phone phishing?
A. Man-in-the-Middle
B. Social engineering
C. Trojan virus
D. Spyware
Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
A. Firmware
B. Rootkits
C. SQL injection
D. Cross-side scripting
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.