Which of the following operating systems utilizes a web browser as the medium between the user and the applications, storing data in the cloud?
A. Google Chrome
B. Red Hat Enterprise Linux
C. Mac OS X
D. Microsoft Windows 7
Which of the following WiFi protocols is the MOST secure?
A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP
A user enters an identification number and password to access a computer network.
Which of the following types of authentication is this an example of?
A. Single-factor
B. Multifactor
C. Biometric
D. Token
Several users in an office need to attend training. The training video will be played on a projector, but each user will need access to a lab server to follow along. The administrator needs to configure the proper permissions for each user, as
well as the appropriate applications.
Which of the following remote access technologies should the administrator configure for the training?
A. Telnet
B. Virtual network
C. Remote desktop
D. Video conferencing software
A technician is installing a Linux operating system and is prompted to select the filesystem.
Which of the following filesystems should the technician choose?
A. FAT32
B. HFS
C. NTFS
D. Ext4
A technician is setting up a new laptop for an employee who travels.
Which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
Ann, a user, is experiencing issues trying to decrypt email on a new mobile device. She is unable to access internal resources, but she can get to the Internet while connected to the WLAN. Ann can also decrypt email while using a desktop computer. A technician notices she has several authentication errors when connecting to the WLAN.
Which of the following is MOST likely causing the wireless issues?
A. There is an incorrect certificate on the mobile device.
B. There is no wireless connectivity.
C. Ann is using an incorrect password.
D. The email application is not working correctly.
E. Ann's user account is disabled.
Ann, a user, has two monitors: one connected with VGA and another connected with DisplayPort. Ann contacts the help desk because she can only see one monitor at a time. Ann tried to fix this on her own, but she sees very limited display settings.
Which of the following is MOST likely the issue?
A. Ann does not have administrative rights over the machine.
B. The OS is using basic drivers for the video card.
C. The DisplayPort is plugged into an HDMI port.
D. The monitor refresh rate is above 60Hz and cannot display a digital signal.
A customer is setting up a new cable modem and wireless router. The customer wants to be able to access a remote desktop while traveling.
Which of the following must be configured FIRST to enable this capability?
A. Port forwarding
B. Disabling ports
C. Content filtering
D. MAC filtering
A systems administrator needs to reset a user's password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account.
Which of the following should the systems administrator do?
A. Require the user to change the password at the next login.
B. Disallow the user from changing the password.
C. Disable the account.
D. Choose a password that never expires.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.