A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?
A. NET USE
B. PING
C. XCOPY
D. IPCONFIG
A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?
A. Retinal scanners
B. Mantraps
C. Door locks
D. Smart card badges
For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?
A. MAC address filtering
B. Windows password
C. Proper SSID
D. SSL certificate
A user regularly has to walk away from their computer and is worried someone may access their workstation. Which of the following would BEST prevent this?
A. Lock the workstation
B. Shutdown the computer
C. Logon using the unprivileged guest account
D. Set the screensaver password
Which of the following features helps to prevent shoulder surfing?
A. Native resolution
B. Auto adjust
C. Degaussing
D. Privacy screen
Which of the following security controls would be an example of the least privilege principle on a home PC?
A. Install antispyware on the PC.
B. Create a standard user account for kids.
C. Store all financial data in a separate folder.
D. Disable the firewall for online gaming.
Which of the following security best practices would prevent a program on a CD from immediately launching when inserted into a computer?
A. MSCONFIG >Startup Tab
B. Disable the Guest account
C. Rename the Administrator account
D. Disable autorun
E. Restrict user permissions
Which of the following security threats involve shoulder surfing and phone phishing?
A. Man-in-the-Middle
B. Social engineering
C. Trojan virus
D. Spyware
Which of the following security threats does NOT use software to extract sensitive information or credentials?
A. Grayware
B. Shoulder surfing
C. Malware
D. Man-in-the-Middle exploits
Which of the following is solely designed to avoid detection by an antivirus program by using the underlying operating system to its advantage?
A. Rootkit
B. Virus
C. Trojan
D. Worm
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.