Which of the following PING switches would be used to continue a ping to a host until stopped?
A. -r
B. -a
C. -t
D. -l
A user reports that their computer restarts at 3:00 PM every day. Which of the following tools would BEST help a technician troubleshoot this issue?
A. Event Viewer
B. Task Scheduler
C. Performance Monitor
D. System Restore
After installing an updated video card driver in a Windows XP machine, a technician sees a blue screen of death (BSOD). Which of the following would BEST help the technician repair the computer?
A. Update antivirus definitions
B. Run System Restore
C. Last Known Good Configuration
D. Factory pre-installation CD
A network consultant needs to redo a CAT5e wall jack that has become unusable due to recent physical damage. In order to install the replacement jack, which of the following tools would need to be used to both install and validate the hardware? (Select TWO).
A. Cable crimper
B. Loopback plug
C. Voltage meter
D. Cable tester
E. Punch down tool
Which of the following technologies can be used to secure mobile devices and their data? (Select TWO).
A. Protective screen
B. Remote wipe
C. Physical lock
D. Locator
E. Passcode lock
A residential customer just purchased a new wireless router. During the setup, which of the following should be done to increase the default security of the router?
A. Change the default SSID
B. Change the default password
C. Turn off DHCP services
D. Change the default wireless channel
A user attempts to remote into their machine at night but cannot connect. The user believes that someone is unplugging their computer from the network at night and plugging in a personal machine. Which of the following security measures would BEST prevent this behavior from continuing?
A. Limit the port to a specific MAC address.
B. Set the port to only activate during business hours.
C. Disable DHCP on the network router.
D. Deactivate the port that is being used from the switch.
Which of the following devices would provide the GREATEST security to a server room?
A. Keycode pad
B. Retinal scanner
C. Badge reader
D. Mantrap
When issuing user permissions for job functions, an administrator should assign:
A. Permissions based on employee's role.
B. Them to the Power User role on the machine.
C. Permissions based on employee's seniority.
D. Them to the Administrator role on the machine.
A user needs to replicate a large directory containing folders and files from one drive to another. It also contains several empty folders needed for future growth. Which of the following commands should a technician use in order to accomplish this task?
A. ATTRIB /S
B. RD /S
C. COPY /A
D. XCOPY /E
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.