Ensurepass

 

QUESTION 781

An application is unresponsive and causing system instability. Which of the following command line options would only close the application?

 

A.

taskkill

B.

shutdown

C.

chkdsk

D.

tasklist

 

Correct Answer: A

 

 

QUESTION 782

Which of the following methods of securing mobile devices will prevent data loss due to corruption?

 

A.

Enforce pass code locks

B.

Install location monitoring application

C.

Perform remote wipe after failed login

D.

Perform remote application back-up

 

Correct Answer: D

 

 

 

 

QUESTION 783

After replacing a motherboard on a customer’s laptop for a no sound issue, a technician realizes that there is intermittent wireless connectivity on the laptop. Which of the following should the technician perform FIRST?

 

A.

Reinstall the driver of the WiFi card.

B.

Check to see if there is a wireless switch on the laptop and its current position.

C.

Replace the wireless card because it is not fully compatible with the new motherboard.

D.

Check if the WiFi antenna is connected properly to the wireless card.

 

Correct Answer: D

Explanation:

Reference: https://communities.intel.com/thread/38676

 

 

QUESTION 784

Which of the following are examples of physical security? (Select TWO).

 

A.

Badges

B.

Anti-virus

C.

Encryption

D.

Firewalls

E.

Locked doors

 

Correct Answer: AE

Explanation:

Reference: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf

 

 

QUESTION 785

A technician is working on a Windows 7 computer that will not boot correctly; it is stuck in a constant loop. Which of the following should the technician perform FIRST to try and resolve this issue?

 

A.

Repair installation

B.

A recovery from a shadow copy

C.

System restore

D.

Factory restore

 

Correct Answer: A

 

 

QUESTION 786

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

 

A.

User training

B.

Anti-malware

C.

Paper shredding

D.

Time of day restrictions

E.

Employee badges

F.

Mantraps

 

Correct Answer: AC

Explanation:

Reference: http://en.wikipedia.org/wiki/Paper_shredder

 

 

QUESTION 787

A technician wants to prevent users in a computer lab from seeing the name of the last user who logged onto the computer after the user logs out from the workstation. Which of the following MUST the technician configure?

 

A.

Screen saver advanced options

B.

User access control

C.

Local computer policy

D.

Control Panel options

 

Correct Answer: C

 

 

QUESTION 788

Which of the following will help limit unauthorized access to a mobile device?

 

A.

Remote wipes

B.

Screen locks

C.

Geotracking

D.

Antivirus software

 

Correct Answer: B

 

 

QUESTION 789

A technician is trying to setup a non-domain user account on a workstation, but receives the following error message “Password does not meet the complexity requirements.” Which of the following utilities should the technician use to identify the criteria?

 

A.

Local Security Policy

B.

Users and Groups

C.

Performance Monitor

D.

MSCONFIG

 

Correct Answer: A

Explanation:

Reference: http://www.tomshardware.com/forum/23713-63-password-meet-password-policy-requirements

 

 

QUESTION 790

Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot Manager on a Windows 7 PC?

 

A.

f2

B.

f8

C.

esc

D.

delete

Correct Answer: C

Explanation:

Reference: http://pcsupport.about.com/od/fixtheproblem/a/biosaccess_bios.htm

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.