Which of the following computers would be MOST suitable to host virtual workstations?
A. A computer with a 6-core processor, 512 MB RAM, 1 TB SSD hard drive, and a Gigabit NIC
B. A computer with a 6-core processor, 512 MB RAM, 1 TB hard drive, and a Gigabit NIC
C. A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC
D. A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Fast Ethernet NIC
A customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?
A. NETSTAT
B. NET SHOW
C. IPCONFIG
D. TRACERT
Which of the following user accounts should be disabled to adhere to security best practices?
A. Standard user
B. Guest
C. Administrator
D. Power user
A technician wants to know the MAC address of a computer. Which of the following commands would the technician use?
A. IPCONFIG
B. NSLOOKUP
C. NETSTAT
D. PING
After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
A. Trojan horse
B. Logic bomb
C. Spyware
D. Rootkit
An administrator is asked to review a file on a local drive. The file contains what appear to be multiple conversations from emails, chat sessions, and various word processing files that were accessed during the past several days. Ann, the user, advises the administrator this was not a file she had created. The file is MOST likely created by which of the following?
A. Malware
B. Phishing
C. Social engineering
D. Keylogger
Which of the following BEST describes the security term known as tailgating?
A. Propping open a secure entrance to gain later access
B. Following behind someone when entering a secure area
C. Removing files from a site using a hidden USB drive
D. Using someone else's logged in computer to access files
Browser redirection is caused by which of the following types of viruses?
A. Hijack
B. Trojan
C. Worm
D. Keylogger
A user gets a warning from their ISP about illegally downloading copyrighted movies. The user insists that they did not download any movies and calls a technician to implement stronger small office home office (SOHO) security. Which of the following will allow only known workstations to connect to the SOHO router?
A. WPA password
B. Static IPs
C. MAC filtering
D. WEP password
On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?
A. Content Advisor
B. Proxy Settings
C. Network Drive Mapping
D. Local Security Policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.