A technician suspects that a computer issue is caused by a failed NIC. Following the troubleshooting theory, which of the following is the NEXT step the technician should take?
A. Identify the problem
B. Document findings, actions and outcome
C. Verify full system functionality
D. Establish a theory of probable cause
E. Test the theory to determine cause
A technician has been given a PC that is not powering up. After brief troubleshooting, the technician comes to the conclusion the power supply needs to be replaced. Which of the following is the NEXT step in the process of performing the repair?
A. The technician should replace the power supply
B. The technician should review disposal regulations
C. The technician should check the environment
D. The technician should remove jewelry
For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
A. Annual cyber security education
B. Update antivirus signatures more often
C. Block all email attachments
D. Install an IPS on each workstation
A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC. Which of the following would the technician use to accomplish this?
A. IMAP
B. SMTP
C. SMNP
D. POP3
A technician has configured the ability to connect to a small office server using remote desktop from a workstation within the office. The technician has reviewed logs that show constant brute force attacks to that server from outside the network. Which of the following would prevent this from occurring?
A. Configure the server to use a static IP
B. Logically move the server to the DMZ
C. Reallocate the server to a different networking closet
D. Disable the remote desktop port
A Windows workstation is suspected of having malicious software that created an infected start-up item or service. Which of the following tools would a technician use to test this theory?
A. chkdsk
B. msconfig
C. dxdiag
D. ipconfig
Which of the following operating systems can be upgraded directly to Windows 7 Professional by a default installation? (Select TWO).
A. Windows 7 Home Premium
B. Windows Vista Business
C. Windows XP Home
D. Windows XP Professional 64-bit
E. Windows XP Media Center
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company's network jacks unless such jacks are designated for guest use?
A. Disable DHCP and assign a static IP address to each network device physically connected to the network.
B. Enable MAC address filtering across all network jacks and record the MAC address of guest devices.
C. Disable all switch ports when they are not utilized and enable them on an as needed basis.
D. Place guest network jacks in public areas and all other jacks in secure areas as needed.
An administrator wants to give a user limited access rights in Windows Vista so that the user can install printers and create local user accounts. Which of the following accounts should the administrator create for the user?
A. Power user
B. Administrator
C. Standard
D. Guest
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A. phishing.
B. botnets.
C. logic bomb.
D. man-in-the-middle.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.