Ensurepass

 

QUESTION 751

A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?

 

A.

Setting encryption

B.

Resetting all user-names and passwords

C.

Assign static IP addresses

D.

Enable MAC filtering

 

Correct Answer: A

 

 

QUESTION 752

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?

 

A.

Standard format

B.

Low level format

C.

Overwrite program

D.

Drive wipe

 

Correct Answer: A

Explanation:

Reference: http://pcsupport.about.com/od/windows7/ht/format-hard-drive-windows-7.htm

 

 

QUESTION 753

After installing an updated video card driver in a Windows XP machine, a technician sees a bluescreen of death (BSOD). Which of the following would BEST help the technician repair the computer?

 

A.

Update antivirus definitions

B.

Run System Restore

C.

Last Known Good Configuration

D.

Factory pre-installation CD

 

Correct Answer: C

 

 

QUESTION 754

A customer would like a technician to establish a Windows network that affords the easiest path for creating persistently mapped network drives using a login script. Which of the following is the BEST option to meet this need?

 

A.

HomeGroup

B.

Simple File Sharing

C.

Windows Domain

D.

Workgroup

 

Correct Answer: C

 

 

QUESTION 755

Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?

 

A.

Startup

B.

Services

C.

Tools

D.

Boot

 

Correct Answer: A

Explanation:

Reference: http://www.hongkiat.com/blog/speed-windows-startup-with-msconfig/

 

 

QUESTION 756

Ann, a user who works with many patients during the day, has a privacy screen attached to her monitor. Which of the following does this help prevent?

 

A.

Rootkits

B.

Phishing

C.

Shoulder surfing

D.

Trojans

E.

Whaling

 

Correct Answer: C

 

 

QUESTION 757

A technician has discovered two PCs with the same name being used on the network. Which of the following BEST describes what has been happening and how to resolve the problem?

 

A.

Both users can log in but only one can access company shares; both PCs need their network names changed.

B.

Only one user can log in; one PC needs to have its network name changed.

C.

Both users can log in and access company shares; one PC needs to have its network name changed.

D.

Neither user can log in; one PC needs to have its network name changed.

 

Correct Answer: B

 

 

QUESTION 758

A user states that they have noticed longer wait times when opening applications. Which of the following should the technician perform in order to BEST resolve this issue?

 

A.

Remove all startup entries

B.

Perform a chkdsk /x command

C.

Defragment the hard drive

D.

Convert the drive from FAT32 to NTFS

 

Correct Answer: C

 

 

QUESTION 759

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?

 

A.

Configure the access point encryption from unsecured access to WEP.

B.

Adjust the radio power so that coverage is restricted to the business.

C.

Change the SSID to reflect the business name instead of a public access point.

D.

Enable MAC filtering and restrict access to other company’s devices.

 

Correct Answer: B

Explanation:

Best way to do this is to adjust radio power to restrict the coverage to the business. When the radio power is restricted to an office. The persons in the other office space cannot detect the signals at all.

 

 

QUESTION 760

You need to configure your mobile device to send and receive electronic messages from your company. Your mobile device must be able to truly synchronize the message state with your desktop so that when a message is read on your desktop it is marked as read on your mobile device These are the proper parameters:

 

Email address tech@techies com

Password P@SSwOrd

Pop techies com Port 110 Security. None

IMAP techies com Port 993 Security SSL

Smtp.techies.com Port 465 Security: TLS

Company SSID Techies

Security WPA2

Passphrase P@SSwOrd

SSID is not broadcasted

 

Instructions You are not authorized to use the Company’s WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.

 

clip_image001

 

Correct Answer:

Settings are configured exactly as solution below:

 

clip_image002

clip_image003

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.