Which of the following scenarios BEST defines phishing?
A. A user receives an email from a friend to download a picture but the file format ends in .exe.
B. A user receives a pop-up message about a virus from a company that states that if they buy this product it will remove the virus.
C. A user receives a message about unwanted activity from their antivirus asking to remove the suspect file.
D. A user receives an email from a person in another country with a story as to why they need help with a financial arrangement.
Which of the following should a technician do LAST after cleaning up a virus infection?
A. Enable system restore and create restore point
B. Update antivirus software
C. Schedule scans and updates
D. Educate the end user
A user does not want their kids to be able to install software on their home desktop. Which of the following types of accounts should the user set up in Windows 7?
A. Standard
B. Remote Desktop Users
C. Administrator
D. Power User
When securing a small office home office (SOHO) that has empty cubicles with unused network ports, which of the following can be used to secure ONLY the unused ports?
A. Use DHCP addressing on the network.
B. Disable the ports on the router or switch.
C. Power down the router when it is not being used.
D. Disable DNS on the network.
A technician would like to limit computer access to certain users. Which of the following should be configured?
A. Advanced security
B. Boot.ini file
C. System configuration
D. Local security policy
Which of the following common security threats could be occurring when a user calls and requests his co- worker's password?
A. Shoulder surfing
B. Spyware
C. Phishing
D. Social engineering
An Internet browser's cookie could be classified as which of the following?
A. Rootkit
B. Phishing
C. Malware
D. Spyware
A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?
A. Windows Firewall
B. Windows Security Center
C. Local Security Policy
D. System Configuration
A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).
A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords
A user has setup a SOHO and needs to implement a network configuration that allows for sharing of devices and files across the network without the complexity of
a centralized server.
Which of the following would be MOST appropriate?
A. PAN
B. WorkGroup
C. Domain
D. WAN
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.