Which of the following security threats does NOT use software to extract sensitive information or credentials?
A. Grayware
B. Shoulder surfing
C. Malware
D. Man-in-the-Middle exploits
In order to prevent read errors on a hard drive, which of the following maintenance tools should be set to a regular schedule?
A. Check Disk
B. System Backup
C. Disk Defragmentation
D. Windows Update
An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?
A. Set up shares with permissions based upon group membership.
B. Implement a written policy addressing the issue for all users.
C. Monitor access to the network shares using SNMP.
D. Prevent remote logins to all network shares and drives.
A SOHO network with nine workstations all connected to a switch is located in a room that visitors can enter. A technician wants to make the network secure from visitors. Which of the following would be the BEST solution?
A. Enable QoS settings
B. Create strong network usernames and passwords
C. Disable all unused ports on the switch
D. Ask administration to label the room off limits to visitors
A website that attempts to mimic a bank website with malicious intent is known as which of the following?
A. Malware
B. Shoulder surfing
C. Social engineering
D. Phishing
A PC is running slower than usual. Which of the following tools would BEST diagnose the possible bottleneck?
A. CHKDSK
B. Device Manager
C. Task Scheduler
D. Task Manager
Which of the following can be used as an appropriate boot device?
A. USB drive
B. HDMI
C. OEM recovery media
D. FDISK
A technician is hardening the security on a wired SOHO router and needs the router to still be able to connect to the Internet. Which of the following methods would the technician do to achieve this?
A. Disable NAT
B. Disable the SSID broadcast
C. Disable unused ports
D. Enable WPA2
A technician is trying to request a new IP address to a customer's computer through the command prompt. Which of the following commands should the technician use?
A. ipconfig /flushdns
B. ipconfig /renew
C. ipconfig /all
D. ipconfig /release
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.