A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave.
Which of the following would allow the company to accomplish this task?
A. Encrypted file system
B. BitLocker
C. Secure Boot
D. BIOS password
Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights?
A. Inheritance
B. Ownership
C. Sharing
D. Encryption
A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing the folder via the share?
A. Read
B. Change
C. Write
D. Modify
A technician is troubleshooting a home WiFi router that is used by a small company of 30 employees. The business is experiencing intermittent wireless connectivity issues. Which of the following is the MOST likely cause of the issues'?
A. Some of the employees are not licensed to use the router
B. The router has insufficient capabilities
C. Static DNS has not been set up on the router.
D. Several of the employees are using an incorrect SSlD
A user needs to transfer some information from a work computer to a server. The user plugs a personal USB into the computer but is denied access to save information on the storage medium due to the security policy. This is an example of:
A. port security.
B. an access control list
C. a Trojan horse,
D. data loss prevention
Which of the following would be used to protect technicians from dust particles when they are entering a datacenter located near a construction site?
A. A surge suppressor
B. Compressed air
C. Vacuums
D. ESD gloves
E. Air filters
After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications. Which of the following permissions should be revoked to disable the unwanted notifications?
A. Account access
B. Mobile data
C. Location access
D. Contacts access
A technician is installing an application on a Linux system using the Bash shell console. Which of the following extensions should the technician select to install the application?
A. .Exe
B. .Apk
C. .Sh
D. .app
A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later. Which of the following should the technician use?
A. Inline comments
B. End-user documentation
C. Change management
D. Environmentally aware variables
A technician needs to connect to a server using a secure terminal application. The technician must be able to reboot the server quickly and restart all the daemons with this application
Which of the following methods will the technician MOST likely use? (Select TWO)
A. SSH
B. Telnet
C. Putty
D. HTTPS
E. Remote Assistance
F. RDP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.