Chain of custody needs to be kept intact for which of the following reasons?
A. To ensure data preservation during evidence inspection
B. To ensure that the evidence is not left at the scene
C. To ensure evidence is admissible in legal proceeding
D. To ensure evidence is returned to proper owner
Best business practices in IT include.
A. always suggesting the fastest route to fix the problem
B. following up with a customer to verify satisfaction
C. always suggesting the least expensive option
D. offering all possible choices to a customer
During a presentation, a client removes confidential proposal materials from the presenter's laptop via an IR connection. This behavior is expressly prohibited by the company. The client's location in the audience is immediately identified. Which of the following should the technician do NEXT?
A. Track the evidence
B. Report to the proper channel
C. Identify the information compromised
D. Document the security breach
Which type of fire extinguishing technology should be used when encountering an electrical fire?
A. Class B fire extinguishers
B. Overhead sprinkler system
C. Water-based fire extinguishers
D. Non-water based extinguishers
Which of the following will provide the BEST protection against power failures and data loss?
A. Auto-switching power supply
B. Uninterruptible power supply
C. Line conditioner
D. Surge suppressor
Activity logs show a large amount of data downloaded from a company server to an employee's workstation overnight. Upon further investigation, the technician identifies the data as being outside the scope of the employee's regular job functions. Which of the following steps should the technician take NEXT?
A. Report through proper channels
B. Document the changes
C. Continue to track more evidence
D. Preserve the chain of custody
After a system was hacked by an outsider, a technician is dispatched to the system. The technician records the location of the system on a log and then signs the system over to a tier-two technician. The tier-two technician analyzes the system and then signs it over to the case manager. Which of the following is this an example of?
A. Evidence preservation
B. Process documentation
C. Due process
D. Chain of custody
Which of the following cable types should always be used through life safety areas?
A. PVC
B. Plenum
C. STP
D. Fiber
A datacenter server technician notices that several of the last sticks of RAM which were installed as upgrades have been found damaged due to static electricity. This only occurs in a particular server room within a large datacenter. Which of the following environmental hazards is MOST likely at play here?
A. Humidity levels are well below average
B. Temperature levels are too high
C. Temperature levels are well below average
D. The room does not have enough ventilation
After making repairs to a user's system, which of the following actions should a technician take?
A. Close the case and wait for the customer to call again in the future
B. Leave the case open in the event a similar issue arises
C. Contact the customer a few days later to determine the state of repairs
D. Wait to update service records until the repair is confirmed
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-801 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.