A security learn recommends a disaster recovery plan with the following requirements:
1.
Recent backups should be readily available.
2.
Only long-term backups should be stored off premises
3.
There should be minimum expenditure on hardware. Which of the following satisfies all of these requirements?
A. Store 30 days of backups on premises and then age the backups to the public cloud
B. Store backups on premises and burst to the public cloud if needed.
C. Store backups both on premises and in a public cloud infrastructure
D. Store all the backups in a public cloud with no on-premises backup storage
Which of the following is a risk to computer equipment when the humidity is low?
A. Static discharge
B. Corrosion
C. Frequent brownouts
D. Increased dust
Which of the following security tools can leverage the onboard TPM to protect data at rest?
A. Encrypted file system
B. Access control list
C. BitLocker
D. Secure file transfer protocol
Which of the following authentication methods was designed to be used primarily for administration purposes, such as giving users access to manage switches and routers?
A. RADIUS
B. LDAP
C. TACACS
D. Active Directory
A technician is setting up a media server and wireless router that can stream video files to portable devices. The technician was asked to configure the system so the videos can be accessed by devices outside the LAN. Which of the following does the technician MOST likely need to configure to allow access?
A. Wireless encryption
B. Port forwarding
C. Content filtering
D. Static IP addresses
Which of the following is used with WPA2 to authenticate wireless clients?
A. TACACS+
B. LDAP
C. RADIUS
D. MDM
A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin. Which of the following BEST describes this scenario?
A. Principle of least privilege
B. Password expiration
C. Single sign-on
D. Permission inheritance
A technician is updating a network switch at a location facility. The technician needs to ensure the data is not sent in plaintext over untrusted networks. Which of the following should the technician use? (Choose two.)
A. SSH
B. SCP
C. TFTP
D. FTP
E. RDP
F. VNC
A company is creating a disaster recovery plan.
Which of the following should be implemented to BEST ensure the company's data can be successfully restored in the event of a disaster?
A. File-level backups
B. Backups for critical applications
C. Regular backup testing
D. Backups to cloud storage
E. Redundant backups on site
A window appears on a user's screen stating the computer's files have been encrypted and an access code must be used to unlock the user's data. This is an example of:
A. ransomware.
B. incorrect file permissions.
C. a virus
D. an invalid certificate
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.