A cybersecurity researcher purchased several used laptops at an auction. While the hard drives appeared to be blank, the researcher was able to recover all the data that previously existed on the drives.
Which of the following methods did the original owner MOST likely use to clear the drives' contents?
A. Standard format
B. Drive degaussing
C. Disk encryption
D. Drive wipe
A sales manager uses a phone as a hot-spot to connect a laptop to the Internet. The connection is fast most of the time, but the connection becomes noticeably slower every few weeks. The manager contacts the help desk for assistance.
Which of the following should a technician check NEXT to troubleshoot the issue?
A. Wireless channel interference
B. The time since the last phone restart
C. The data plan limits
D. The mobile OS update log
An administrator wants to deploy updates during the company's off-hours.
Which of the following properties should the administrator implement to facilitate the deployment of the updates?
A. WaKe-on-LAN
B. Proxy settings
C. Remote Assistance
D. Quality of service
A user enters an identification number and password to access a computer network. Which of the following types of authentication is this an example of?
A. Single-factor
B. Multifactor
C. Biometric
D. Token
Which of the following malware types would MOST likely require reimaging?
A. Botnet
B. Spyware
C. Rootkit
D. Keylogger
Users have reported their files have disappeared, and they are unable to access local data. The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing. Which of the following has MOST likely occurred?
A. Rootkit installation
B. Data backup failure
C. OS update failure
D. Ransomware attack
E. Browser redirection
A technician has enabled port security on a switchport. Which of the following BEST describes the effect this will have?
A. Devices must match a list of allowed MAC addresses before accessing the network
B. Devices need to conform to the policies set forth by the MDM software
C. Data loss prevention software will be monitoring for data exfiltration on the port.
D. A firewall is actively monitoring the network traffic using heuristic analysis.
A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?
A. Update all antivirus definitions and run a full scan on all networked computers.
B. Make sure the operating systems on all networked computers are fully patched and up to date
C. Update all software drivers and firmware on all the affected computers.
D. Enable geofiltering on the network firewall to stop unwanted communications.
A technician was contacted regarding an issue affecting hundreds of users on a domain network. Which of the following would be MOST effective at remediating future issues through documentation?
A. Take personal notes for future reference.
B. Document the findings in the technician ticketing system.
C. Document the solution in a user-facing FAQ page.
D. Brief upper management in a meeting regarding the findings.
A technician needs to recommend a disaster recovery solution for a company that has three offices across two states. The technician must ensure the solution has:
1.
The ability to centralize data backups
2.
High availability
3.
The ability to synchronize user data to local machines
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
A. Cold storage of all corporate data
B. Redundant network links
C. Hot site
D. Servers at each location
E. Clustered backups
F. Cloud replication
G. Local backups
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.