A company has replaced all computers in their accounting department. Due to the sensitive nature of the department, company management has decided to remove and destroy all hard drives prior to donating the computers to a local charity. Now that the drives are removed, which of the following is the MOST efficient method of destroying the hard drives to prevent sensitive information from being leaked?
A. Drive wiping
B. Formatting
C. Overwriting
D. Degaussing
After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?
A. Trojan horse
B. Logic bomb
C. Spyware
D. Rootkit
A website that attempts to mimic a bank website with malicious intent is known as which of the following?
A. Malware
B. Shoulder surfing
C. Social engineering
D. Phishing
A technician is hardening the security on a wired SOHO router and needs the router to still be able to connect to the Internet. Which of the following methods would the technician do to achieve this?
A. Disable NAT
B. Disable the SSID broadcast
C. Disable unused ports
D. Enable WPA2
Which of the following is a device intended to prevent physical access to a facility?
A. Tailgate
B. Bollards
C. Firewall
D. Mantrap
Which of the following OS based features limits access to a workstation? (Select TWO).
A. User permissions
B. Strong passwords
C. Employee badges
D. Privacy filters
E. MAC filtering
A user states they constantly get pop-ups on their workstations asking them to buy a product. Which of the following is this known as?
A. Shoulder surfing
B. Phishing
C. Social engineering
D. Malware
A customer wants to setup a SOHO wired network. The customer needs assistance in setting up a static IP address on three computers on the network. Which of the following is the BEST solution for the technician to implement?
A. Internet Options >Connection > Network > LAN settings > choose Proxy server, type in the IP address
B. Windows Firewall > the Connections tab > Add Exception > Change Scope, type in the IP address
C. Internet Options > Advanced tab > LAN settings, type in the IP address
D. Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address
To which of the following security methods does "User authentication/strong passwords" belong?
A. Digital security
B. Principle of least privilege
C. Physical security
D. User education
A technician is tasked with implementing the principle of least privilege to secure a file server so that only authorized users can modify company documents. Which of the following should the technician implement to comply with the request?
A. Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders.
B. Create a shared folder and grant full administrative rights only to the users who need to modify company documents.
C. Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders.
D. Create a shared folder and only provide read access to all users regardless of their role.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.