A user's PC has become infected with malware that has a known remediation. Which of the following would MOST likely prevent this from happening again?
A. Create a restore point.
B. Utilize a preinstallation environment.
C. Disable System Restore.
D. Keep software up to date.
Ann, a user, is receiving automatic replies from some email addresses she knows and others she does not. Which of the following is happening?
A. Computer virus
B. Invalid certificate
C. Spam email
D. Hijacked email
A technician is creating a network topology diagram Which of the following would be the MOST appropriate to include? (Select TWO)
A. A list of network addresses for each device
B. A list of the ports on each device and what they are connected to
C. Technical specifications and performance ratings for the devices
D. Settings, configuration details, and notes on proper operations
E. A list of devices that need replacement within the next 6-12 months
F. The MAC address and serial number of each device on the network
A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user's computer hardware?
A. A surge protector
B. Grounding
C. A power generator
D. An uninterruptible power supply
A customer Is having trouble opening several files on a computer The customer renames one of the files, but then the correct program will no longer open it
Which of the following settings is a solution to the issue?
A. Set the view options to detail.
B. Hide the extensions.
C. Utilize Credential Manager.
D. View the system files
Which of the following security principles help to prevent employees from changing files they are intended only to view?
A. DLP
B. MDM
C. ACL
D. MFA
A technician is troubleshooting vendor-specific software. Which of the following is where the technician should go to find problem-specific fixes on the vendor's website?
A. Software user manual
B. Knowledge base articles
C. System requirements documentation
D. Installation instructions
Joe, a user, notices someone use his computer while he was on break, Joe's browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else's PII.
Which of the following steps should Joe take to prevent unauthorized access of his account?
A. Lock the desktop while he is away
B. Change his password
C. Implement login time restriction
D. Change the default administrator password
A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:
A. BitLocker is operating on the system but not for the user
B. BitLocker has locked the drive, and it is no longer accessible
C. BitLocker is suspended, and the drive is no longer encrypted
D. BitLocker has encountered an error and the user should run the check disk utility.
A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While troubleshooting, a technician discovers there are rules on the user's account that are forwarding the emails to an external email address and deleting the emails from the bank.
This is an example of:
A. spam email.
B. invalid certificates.
C. hijacked email.
D. browser pop-ups.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.