A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).
A. Disable the guest account
B. Install antivirus applications
C. Disable DHCP
D. Change the SSID
E. Change the default username
Which of the following encryption standards is found on older wireless devices and provides minimal security?
A. WPA
B. WPA2
C. WEP
D. AES
Phishing is:
A. An infection that causes a web browser to go to a different site than the one intended from a search result page.
B. A technique used to obtain financial information from a user mimicking a legitimate website.
C. An infection that causes a computer to behave erratically by playing music and launching browser windows.
D. A technique used to obtain financial information from a user by compiling information from social networks and their friends.
Turnstiles and other mantraps will prevent which of the following security threats?
A. Shoulder surfing
B. Tailgating
C. Rootkits
D. Viruses
The practice of following an authorized person through an entrance without using a badge to defeat security is called:
A. tailgating
B. spamming
C. shredding
D. phishing
Which of the following security threats is BEST mitigated through proper user training?
A. A Worm
B. Rootkits
C. Social Engineering
D. Browser Adware
A computer program that functions normally while quietly installing malicious software on a machine is known as a:
A. DDoS attack.
B. Worm.
C. Phishing attack.
D. Trojan.
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
Which of the following is BEST used to prevent other people from viewing a user's computer screen?
A. Anti-virus software
B. Key fob
C. Biometric device
D. Privacy filter
After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
A. Recovery Console
B. Factory restore CD
C. Anti-malware software
D. System Restore
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.