A technician enabled remote management on the small office WAP to manage this device from another location. Users are reporting that the WAP has changed its SSID without anyone's knowledge. Which of the following would prevent this from occurring?
A. Change to user MAC filtering
B. Change default usernames and passwords
C. Disable the SSID from broadcasting
D. Enable static IP addresses
Which of the following System Tools would be the BEST one to perform a regular archiving of information on a PC?
A. ROBOCOPY
B. XCOPY
C. Backup
D. System Restore
Which of the following allows a user to reset their password with a series of security questions that only the user should know?
A. Permission propagation
B. Administration
C. Verification
D. Authentication
Which of the following can be used to remove a virus from a computer?
A. Anti-spyware software
B. Anti-malware software
C. System Restore
D. Event Viewer
Joe, a user, reports that random pages are being printed on his printer. Which of the following can mitigate this from occurring?
A. Enable static IP's
B. Change the network frequency
C. Change the default encryption key
D. Disable the SSID broadcasting
Which of the following commands would a technician use to map a network share?
A. NET
B. NSLOOKUP
C. IPCONFIG
D. COPY
A technician has installed the hardware for a SOHO wired network. Which of the following is the FIRST step to securing the network?
A. Enable MAC filtering
B. Change default usernames and passwords
C. Disable unused ports
D. Assign static IP addresses
Which of the following will allow a company to implement the MOST cost-efficient way to easily identify whether a user has secure access to particular areas of a building?
A. Require badges
B. Install retina scanners
C. Install firewalls
D. Require key fobs
Which of the following is typically the MOST difficult security threat to remove?
A. Spyware
B. Virus
C. Trojan
D. Rootkit
A technician is tasked with implementing the principle of least privilege to secure a file server so that only authorized users can modify company documents. Which of the following should the technician implement to comply with the request?
A. Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.
B. Create a shared folder and grant full administrative rights only to the users who need to modify company documents.
C. Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders.
D. Create a shared folder and only provide read access to all users regardless of their role.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.