A system administrator needs to submit a change request to the change control board for review and approved. The system administrator will be upgrading the production servers to the latest OS.
Which of the following must the administrator include in the change request before the change control board will approve the request? (Select THREE.)
A. A continuity of operations plan
B. Change board approval
C. A rack diagram
D. An updated baseline
E. A risk analysis
F. A change plan
G. A back-out plan
H. A security event log
Company's website is responsible for the theft of customer credit card numbers. An investigation determined private keys for certificates were stolen, allowing attackers to decrypt traffic between clients and the website.
Which of the following types of attacks does this describe?
A. Man-in-the-middle
B. Keylogger
C. Zero-day ?
D. Brute force
A customer is planning to recycle a computer. The customer wants to ensure any personal data on the computer is no longer recoverable, but the hardware must will still the be useable.
Which of the following is the BEST method to dispose of the customer's data?
A. OS reinstallation
B. TPM configuration
C. Low-level format
D. Drive incineration
Which of the following security measure would MOST likely use RFID?
A. Control roster
B. Biometric lock
C. Badge reader
D. Hardware token
A user downloaded a program from a website. After saving the file, the user cannot find the executable.
Which of the following is MOST likely the cause?
A. The file was quarantined by an anti-malware software.
B. The host-based firewall blocked the download.
C. The file is incompatible with the operating system.
D. File permissions do not allow the user to access the file.
A user's mobile social media application is sending emails on behalf of the user. However, the user has not authorized any new permissions for the social media application. The user only has this application installed on their smart phone and no other devices.
Which of the following should a technician perform to resolve the issue?
A. Run a malware scan on the device.
B. Instruct the user to change the device's password.
C. Disable access to the user's contacts.
D. Deny access to text messages.
A Chief Financial Officer (CFO) who is returning from vacation notices several emails from the Chief Executive Officer (CEO) requesting funds be transferred immediately. The CFO replies that the funds will be transferred, but the CEO responds that there was never a request for funds to be transferred. Which of the following MOST likely happened?
A. Shadow IT
B. Hijacking
C. Malware
D. Virus
E. Spear phishing
A user contains the help desk the restore an application that was lost when a System Restore was performed last week. A technician development the application was emitted to the user from an unknown source and downloaded from a link in the email.
Which of the following should the technician do NEXT?
A. Educate the user.
B. Reboot the computer.
C. Update the anti-malware software.
D. Update the antivirus software.
Which of the following are methods used to prevent an unauthorized computer from establishing a connection as a node on a corporate network? (Select TWO.)
A. Port security
B. Anti-malware
C. Certificate
D. IDS
E. Firewall
F. Captive portal
Which of the following security concepts can be overcome through social engineering? (Select TWO)
A. Port blocking
B. Strong passwords
C. Firewalls
D. MAC filtering
E. Email attachment filtering
F. Antivirus updates
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.