Phishing is:
A. An infection that causes a web browser to go to a different site than the one intended from a search result page.
B. A technique used to obtain financial information from a user mimicking a legitimate website.
C. An infection that causes a computer to behave erratically by playing music and launching browser windows.
D. A technique used to obtain financial information from a user by compiling information from social networks and their friends.
Turnstiles and other mantraps will prevent which of the following security threats?
A. Shoulder surfing
B. Tailgating
C. Rootkits
D. Viruses
Which of the following encryption standards is found on older wireless devices and provides minimal security?
A. WPA
B. WPA2
C. WEP
D. AES
The practice of following an authorized person through an entrance without using a badge to defeat security is called:
A. tailgating
B. spamming
C. shredding
D. phishing
A computer program that functions normally while quietly installing malicious software on a machine is known as a:
A. DDoS attack.
B. Worm.
C. Phishing attack.
D. Trojan.
Which of the following security threats is BEST mitigated through proper user training?
A. A Worm
B. Rootkits
C. Social Engineering
D. Browser Adware
A pest exterminator tries to gain access to a company's computer lab, but the receptionist does not see an extermination scheduled on the calendar and denies the exterminator access to the lab. Which of the following security threats almost occurred?
A. War driving
B. Social engineering
C. Shoulder surfing
D. Phishing
After being infected with a virus, a user's computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user's backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?
A. Recovery Console
B. Factory restore CD
C. Anti-malware software
D. System Restore
Which of the following is BEST used to prevent other people from viewing a user's computer screen?
A. Anti-virus software
B. Key fob
C. Biometric device
D. Privacy filter
A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company's content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?
A. Anti-malware software
B. Factory pre-installation
C. System restore
D. Recovery console
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.