Ensurepass

 

QUESTION 11

Which of the following drive destruction methods is considered the MOST secure when dealing with highly sensitive data?

 

A.

Degaussing

B.

Wiping

C.

Magnetizing

D.

Shredding

 

Correct Answer: D

 

 

QUESTION 12

A user is attempting to use Remote Desktop to connect to a server but is getting an error message. Which of the following tools should be used to verify that the server is powered on and connected to the network?

 

A.

PING

B.

NSLOOKUP

C.

MSTSC

D.

SFC

 

Correct Answer: A

 

 

QUESTION 13

Which of the following user accounts should be renamed to adhere to security best practices?

 

A.

Power user

B.

Guest

C.

Standard user

D.

Administrator

 

Correct Answer: D

Explanation:

Reference: http://technet.microsoft.com/en-us/library/jj852273.aspx

 

 

QUESTION 14

A technician has just installed and terminated a new CAT5 network cable. The device using the cable cannot connect to the network. Which of the following tools would be BEST in troubleshooting this issue?

 

A.

Cable tester

B.

Network analyzer

C.

Multimeter

D.

Toner probe

 

Correct Answer: A

 

 

QUESTION 15

Which of the following commands may need to be run after a virus removal if the computer will not boot?

 

A.

SCANDSK

B.

DXDIAG

C.

FIXMBR

D.

MSCONFIG

 

Correct Answer: C

Explanation:

Reference: http://pcsupport.about.com/od/termsf/p/fixmbr.htm

 

 

QUESTION 16

A user reports that their PC does not work. Which of the following would be the BEST question for the technician to ask the user to get further information?

 

A.

“Can you get to the Internet?”

B.

“What exactly does not work?”

C.

“Does the PC turn on?”

D.

“Are you able to sign on?”

 

Correct Answer: B

Explanation:

Clarify what is not working. The line of questioning is an effective strategy to discover and solve a problem especially on phone.

 

 

QUESTION 17

A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?

 

A.

Enable Windows automatic updates

B.

Enable screensaver required passwords

C.

Enable MAC filtering

D.

Enable wireless encryption

 

Correct Answer: B

Explanation:

Reference: http://windows.microsoft.com/is-is/windows-vista/use-your-windows-password- for-your-screen-saver-password

 

 

QUESTION 18

An Android mobile device will easily synchronize with which of the following services? (Select TWO)

 

A.

Email

B.

SMS

C.

Passwords

D.

Calendar

E.

Incoming calls

 

Correct Answer: AD

 

 

QUESTION 19

Many business laptops now come with fingerprint readers to enable users to login without typing in passwords. This is an example of which of the following?

 

A.

Privacy filters

B.

RFID

C.

RSA tokens

D.

Biometrics

 

Correct Answer: D

 

 

QUESTION 20

A technician is having issues with a corporate wireless signal bleeding into nearby offices. Which of the following techniques could be used to mitigate the risk of wireless attacks by third parties in the nearby offices?

 

A.

Switch from 802.11b to 802.11g spectrums

B.

Disable WEP-128 security

C.

Radio power adjustment

D.

Switch from 802.11g to 802.11n spectrums

 

Correct Answer: C

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

 

Comments are closed.