An employee at a company lost their mobile device that contains proprietary information.
Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?
A. Lock screen pattern
B. Cancel mobile service
C. Remote wipe
D. Six character password
A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?
A. Train users on tailgating
B. Implement an escort policy
C. Install mantraps
D. Require all users to have badges
A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?
A. Run in Windows XP compatibility mode
B. Run the program in a virtual PC environment
C. Log out of the system and login under another user's name
D. Right click select "run as" and select administrator
Which of the following security threats are MOST often delivered via email? (Select TWO).
A. Rootkits
B. Phishing
C. Shoulder surfing
D. Social engineering
E. Spam
Which of the following helps to prevent virus infections from USB flash drives?
A. Strong passwords
B. Password protected screen savers
C. Disabling the guest account
D. Disabling the autorun feature
An attack that creates a website that looks like another website, with the purpose of learning someone's account information is called which of the following?
A. Virus
B. Shoulder surfing
C. Trojan
D. Phishing
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
A. Quick format
B. FDISK
C. Low level format
D. Standard format
Which of the following computers would be MOST suitable to host virtual workstations?
A. A computer with a 6-core processor, 512 MB RAM, 1 TB SSD hard drive, and a Gigabit NIC
B. A computer with a 6-core processor, 512 MB RAM, 1 TB hard drive, and a Gigabit NIC
C. A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Gigabit NIC
D. A computer with a 6-core processor, 64 GB RAM, 1 TB SSD hard drive, and a Fast Ethernet NIC
In Windows 7, which of the following is the MOST restrictive network location setting to control sharing files and granting access to a computer over a network?
A. Home
B. Public
C. WAN
D. Work
A Windows XP computer is displaying an error that states "virtual memory is running low". Which of the following tabs in the system Control Panel is used to reconfigure virtual memory settings?
A. Remote desktop
B. Remote settings
C. Hardware
D. Advanced
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.