Ensurepass

 

QUESTION 451

A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the user’s NEXT step in resolving this issue?

 

A.

Configure Wake-on-LAN for the NIC on the Work PC.

B.

Configure a firewall exception on the Home PC.

C.

Switch the Work PC network from “Work” to “Home”.

D.

Disable the Windows firewall on the Home PC.

 

Correct Answer: B

Explanation:

Reference: http://windows.microsoft.com/is-is/windows7/open-a-port-in-windows-firewall

 

 

QUESTION 452

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

 

A.

Bandwidth throttling

B.

Eliminate password history

C.

Enable QoS

D.

Antivirus software

E.

User education

F.

Enforced login/logoff hours

 

Correct Answer: DEF

Explanation:

Reference: http://www.esecurityplanet.com/network-security/how-to-prevent-security-breaches-from-known-vulnerabilities.html

 

 

QUESTION 453

A company would like to prevent commonly known social engineering risks. Which of the following would help mitigate these risks?

 

A.

Annual security training

B.

Install new switches

C.

Review security policies

D.

Require 180 day password expiration

 

Correct Answer: A

 

 

QUESTION 454

A technician is repairing a workstation that exhibits random reboots at odd times of the day. Which of the following should be performed FIRST when troubleshooting the issue? (Select TWO).

 

A.

Check the PSU integrity

B.

Check the CMOS battery

C.

Check the video card integrity

D.

Check the memory integrity

E.

Check the optical drive integrity

 

Correct Answer: AD

Explanation:

Reference: http://www.tomshardware.com/forum/352927-31-computer-rebooting-frequently

 

 

QUESTION 455

Which of the following should a technician do LAST after cleaning up a virus infection?

 

A.

Enable system restore and create restore point

B.

Update antivirus software

C.

Schedule scans and updates

D.

Educate the end user

 

Correct Answer: D

Explanation:

Most of the time users install virus, Trojans and other malicious codes on their computers unknowingly. The best to prevent this loophole is to educate the user about viruses and where to look and what to do to prevent installing malicious codes.

 

 

QUESTION 456

Which of the following describes when an application is able to reuse Windows login credentials?

 

A.

Access control list

B.

Principle of least privilege

C.

Single sign-on

D.

Pass-through authentication

 

Correct Answer: C

Explanation:

Reference: http://stackoverflow.com/questions/545667/how-to-use-windows-login-for-single-sign-on-and-for-active-directory-entries-for-wi

 

 

QUESTION 457

Which of the following is the correct path to add new local user accounts to a Windows 7 computer?

 

A.

Click on the Start button> Right click on Computer> Select Manage> Expand Local Users and Groups> Right click on Users> Select New User

B.

Click on the Start button> Right click on My Computer> Select Manage> Right click on Local Users and Groups> Select Add Users from the menu

C.

Click on the Start button> Right click on Computer> Select Manage> Right click on Local Users and Computers> Select New User

D.

Click on the Start button> Right click on Network Neighborhood> Select Manage> Right click on Users> Select New User

 

Correct Answer: A

 

 

QUESTION 458

Which of the following BEST describes the practice of attempting to gain information through deceptive emails?

 

A.

Hashing

B.

Biometrics

C.

Phishing

D.

Encryption

 

Correct Answer: C

 

 

QUESTION 459

When comparing laptops and tablet PCs which of the following is true?

 

A.

Tablets typically have higher resolution displays

B.

Laptops typically have a longer battery life

C.

Laptops typically use touch screen displays

D.

Tablets typically use solid state drives

 

Correct Answer: D

Explanation:

Reference: http://www.forbes.com/sites/tomcoughlin/2013/09/11/solid-state-drives-shingling-and-fat-tablets/

 

 

QUESTION 460

A user installed a new SOHO router and new wireless NICs to increase their transmission speed from 802.11b to 802.11g with the manufacturer’s default settings. The user lives in an apartment building and is still experiencing slowness to the Internet after the installations. Which of the following is the MOST secure option that a technician could implement to resolve this issue?

 

A.

Hide the SSID

B.

Assign static IP addresses

C.

Enable MAC filtering

D.

Disable the WAN port

 

Correct Answer: C

Explanation:

Reference: http://security.stackexchange.com/questions/755/how-does-basic-http-auth-work

 

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.