Joe, a client, wants to allow only specific portable devices to connect to his wireless network. Which of the following methods would BEST accomplish this?
A. Disabling SSID broadcast
B. MAC filtering
C. Lower radio power levels
D. Directional antennas
A server is configured to boot with a "mirrored" RAID configuration. Which of the following BEST describes this configuration?
A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5
Which of the following methods of securing mobile devices will prevent data loss due to corruption?
A. Enforce pass code locks
B. Install location monitoring application
C. Perform remote wipe after failed login
D. Perform remote application back-up
A user's computer consistently shuts down several minutes after booting. When the technician reboots the computer, a message stating "CPU fan failure" appears. Which of the following is the MOST likely reason the computer shuts down?
A. Overheating
B. Power supply failure
C. Faulty CPU
D. High humidity
An administrator, Ann, wants to be able to access a customer's router interface from a remote location. Ann always has to have the customer print out the current router settings before she can remotely manage the router. Which of the following should Ann do to eliminate this extra step before connecting to the router remotely?
A. Change the default user name and password
B. Request a static IP from the ISP
C. Enable the remote management port
D. Enable port forwarding on the router
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering
A user recently installed an application. Upon the next reboot, the system is displaying various errors relating to the system files and certain actions e.g. right-clicking no longer works. The user does not have time to reimage the computer, nor do they wish to remove and reinstall the application. Which of the following should the technician do FIRST?
A. Open up the command prompt and type SFC /SCANNOW
B. Open Task Manager and stop all running SERVICES processes
C. Open up MSCONFIG and remove the application from the start-up tab
D. Open a command prompt and type REGSVR32 SYSMAIN.DLL ?U
A user on a domain PC needs to leave their desk immediately, but does not want to compromise displayed content. Which of the following should be done?
A. Screensaver password
B. Restart PC
C. Lock screen
D. Reset user password
Which of the following can be used to help recover a lost smartphone?
A. Remote support software
B. Locator application
C. NFC enabled device
D. GPS navigation software
An employee recently departed under bad terms, and the client is concerned for their SOHO network security. Which of the following should the technician do FIRST?
A. Physically secure the access point
B. Change default password
C. Lower the transmission power
D. Assign static IP addresses
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.