Ensurepass

 

QUESTION 181

Which of the following security controls would be an example of the least privilege principle on a home PC?

 

A.

Install antispyware on the PC.

B.

Create a standard user account for kids.

C.

Store all financial data in a separate folder.

D.

Disable the firewall for online gaming.

 

Correct Answer: B

Explanation:

Reference: http://en.wikipedia.org/wiki/Principle_of_least_privilege

 

 

QUESTION 182

Which of the following user accounts should be disabled to adhere to security best practices?

 

A.

Standard user

B.

Guest

C.

Administrator

D.

Power user

 

Correct Answer: B

Explanation:

Reference: http://windows.microsoft.com/is-is/windows-vista/what-is-a-guest-account

 

 

QUESTION 183

Which of the following commands is used to duplicate a directory from one location to another?

 

A.

MOVE

B.

COPY

C.

XCOPY

D.

EDIT

 

Correct Answer: C

 

 

QUESTION 184

A technician notices that a computer is making a loud clicking noise but continues to run. System speed is barely affected, but they cannot access certain drives. These are the symptoms of which of the following?

 

A.

Failing second hard drive

B.

Failing system hard drive

C.

Bad CMOS chip

D.

Bad CPU fan

 

Correct Answer: A

Explanation:

There must be a second hard drive that is failing. When you hear clicking noises and the speed of the system is not affected, the second hard drive is failing since the primary hard drive is running the OS and other applications and it is working fine, it means the second hard drive has a problem.

 

 

QUESTION 185

Which of the following allows a user to reset their password with a series of security questions that only the user should know?

 

A.

Permission propagation

B.

Administration

C.

Verification

D.

Authentication

 

Correct Answer: D

 

 

QUESTION 186

A company wants to ensure that the latest cyber security threats are known to the employees across the enterprise to minimize occurrences. Which of the following should be implemented?

 

A.

Message of the Day

B.

Email lists

C.

Company forums

D.

Regular user education

 

Correct Answer: D

Explanation:

Educating user is the best way to combat security threats. After all security threats occur when a human carries it across unknowingly.

 

 

QUESTION 187

When connecting a Bluetooth device to a mobile device, which of the following BEST describes the purpose of discovery mode?

 

A.

Allows two Bluetooth devices to connect to each other without a mobile device

B.

Disconnects all devices and connects to the closest powered on device

C.

Allows a peripheral to be contacted by the mobile device

D.

Instructs the phone to seek out all nearby devices and connect to them

 

Correct Answer: C

Explanation:

Reference: http://electronics.howstuffworks.com/bluetooth-surveillance1.htm

 

 

QUESTION 188

A user states that the computer takes a long time to load the desktop after login. Which of the following tools should be used to help remediate the problem?

 

A.

Disk Management

B.

FIXMBR

C.

MSCONFIG

D.

SFC

 

Correct Answer: C

Explanation:

Reference: http://www.netsquirrel.com/msconfig/

 

 

QUESTION 189

Privacy filters applied to users computer screens are used to combat which of the following security risks?

 

A.

Rootkits

B.

Spear phishing

C.

Shoulder surfing

D.

Social Engineering

 

Correct Answer: C

Explanation:

Reference: http://blog.securityactive.co.uk/tag/stop-shoulder-surfing/

 

 

QUESTION 190

A new LAN drop has been activated but users report that they are unable to connect to the Internet and are receiving an IP address of 169.254.255.55 from that Windows workstation. Which of the following symptoms has occurred? (Select TWO).

 

A.

DHCP server unavailable

B.

IP address assigned by NAT

C.

Limited connectivity

D.

APIPA address assigned

E.

IP conflict detected

F.

Statically assigned IP address

 

Correct Answer: AD

 

 

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.