Which of the following is the memory limitation of a 32-bit OS?
A. 16MB
B. 2048MB
C. 4GB
D. 1024GB
E. 2TB
F. 8TB
A company's security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user. Which of the following commands should the administrator run on the user's workstation?
A. chkdsk
B. netstat
C. gpupdate
D. diskpart
Which of the following built-in accounts was removed in Windows 10?
A. Power User
B. Administrator
C. Guest
D. Standard User
Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?
A. Unattended installation
B. Remote installation
C. Repair installation
D. Image deployment installation
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.
Which of the following actions should be taken to close the vulnerability? (Select two.)
A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall
Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?
A. BranchCache
B. Swap partition
C. Domain access
D. Proxy server
A user's computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?
A. Preserve data integrity
B. Identify violations of acceptable use
C. Collect evidence of illegal activity
D. Report through proper channels
With which of the following types is a man-in-the-middle attack associated?
A. Brute force
B. Spoofing
C. DDoS
D. Zero-day
An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?
A. Update antivirus definitions
B. Install anti-malware software
C. Enable the pop-up blocker
D. Reboot the PC
A Windows user is attempting to install a local printer and is unsuccessful on permissions.
Which of the following user types BEST describes this user?
A. Guest
B. Power User
C. Administrator
D. Standard User
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1002 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.