A technician recently setup a new wired network and wants to ensure only their computers can use it. Which of the following is the MOST secure way to accomplish this?
A. Make sure the computers are using strong passwords.
B. Enable an intrusion detection system.
C. Assign the computers static IP addresses.
D. Disable the extra ports on the router.
A technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
A. Local Security Policy
B. Users and Groups
C. Performance Monitor
D. MSCONFIG
When securing a new wireless router, which of the following should be changed FIRST?
A. Default SSID
B. Radio power levels
C. Default password
D. DHCP settings
A client has a computer that is infected with several viruses and spyware. Which of the following should the technician perform FIRST before spyware removal?
A. Run Windows Update
B. Disable system restore
C. Run the chkdsk /r command
D. Disable network cards
The benefit of MAC filtering in wireless networking is that the network:
A. is encrypted.
B. is not visible.
C. uses static IP addresses.
D. is more secure.
A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus software. A virus is found and removed, but the performance issue is not resolved. Which of the following should the technician perform NEXT?
A. Document findings, actions, and outcomes
B. Establish a plan of action to resolve the problem
C. Re-establish a new theory or escalate
D. Implement preventative measures
A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).
A. Change router default logins
B. Change the security settings on their computer
C. Set encryption on the router
D. Update router firmware
E. Change the encryption on the computer's wireless adapter
A user receives a phone call from a person claiming to be from technical support. This person knows the user's name and that the user has Windows installed on their computer. The technician directs the user to open Event Viewer and look at some event log entries to demonstrate the effects of a virus on the computer. The technician also asks the user for their user ID and password so that they can clean the computer. This is an example of which of the following security threats?
A. Social engineering
B. Phishing
C. Malware
D. Virus
A technician is configuring a PC that will have confidential information stored on it. To ensure that only authorized users can access this PC, which of the following should the technician do? (Select TWO).
A. Disable the guest account
B. Install antivirus applications
C. Disable DHCP
D. Change the SSID
E. Change the default username
A company recently had a security breach and is now required to increase the security on their workstations. A technician has been tasked to harden all the workstations on the network. Which of the following should the technician do?
A. Enable Windows automatic updates
B. Enable screensaver required passwords
C. Enable MAC filtering
D. Enable wireless encryption
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.