A computer user, Joe, was surfing for information on a news site when he reported a screen flicker and then a pop-up appeared on his screen stating the computer was infected with a virus. Joe noticed the title of the pop-up was not from his installed antivirus. Which of the following BEST describes this infection?
A. Worm
B. Spyware
C. Social engineering
D. Malware
Anne, a technician, is trying to access the company intranet and is receiving an error stating the website is not found. Which of the following tools would she use to determine if the intranet server is online?
A. PING
B. NETSTAT
C. NSLOOKUP
D. IPCONFIG
Joe, an employee, has just migrated from the Marketing department to the Accounting department and cannot save files to the Accounting share. He is a member
of both the Marketing and Accounting security groups. A technician discovers the following permissions are in effect for the Accounting share:
Share permissions: Everyone Full Control
NTFS permissions: Accounting Full Control, Marketing Deny All.
Which of the following should the technician do to enable Joe to save files to the Accounting share without compromising security?
A. Remove Joe from the Marketing group
B. Ask Joe to resave the file, as the permissions are correct
C. Grant the Accounting group Full Control share permissions
D. Remove the Deny permission for the Marketing group
Ann, a small business owner, would like to implement wireless networking for her business but wants to be sure the wireless is ONLY accessible from within her business' premises.
Which of the following would BEST accomplish this?
A. Disabling SSID broadcast to ensure that only employees know the SSID
B. Using unidirectional antennas and reducing radio power levels appropriately
C. Assigning DHCP addresses that expire after a shorter period of time
D. Using omni-directional antennas and reducing radio power levels appropriately
Which of the following threats changes system functionality at the operating system level for a malicious purpose by gaining administrative access after being installed by a user?
A. Botnet
B. Trojan
C. Worm
D. Rootkit
Which of the following BEST describes the difference between batteries used in iOS devices versus Android devices?
A. iOS devices batteries are NiMH
B. Android device batteries are wirelessly charged
C. Android device batteries also work in iOS devices
D. iOS device batteries are not replaceable
On a mobile device, enforcing a policy that erases a device after a number of failed login attempts is used to prevent which of the following?
A. Unauthorized application installations
B. Brute forcing
C. Social engineering
D. Man-in-the-middle attack
Which of the following mobile device features is responsible for shifting the device display orientation?
A. Device calibration
B. Gyroscope
C. GPS
D. Accelerometer
An individual pretending to be a consultant trying to gain access to information is an example of which of the following?
A. Chassis Intrusion
B. Principle of Least Privilege
C. Social Engineering
D. Identity Theft
A user, Joe, wants to enable communication between his GPS and his smartphone. Which of the following would allow for this communication?
A. A data link cable
B. A wireless access point
C. Bluetooth pairing
D. Infrared communication
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.