A user's smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?
A. Reset the device's network settings
B. Check the data usage statistics on the device
C. Verify the SSID with which the device is associated
D. Run any pending application or OS updates
A security team is auditing a company's network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were than successfully performed using common login information. Which of the following actions should be taken to close the vulnerability? (Select two.)
A. Disable guest account
B. Remove admin permissions
C. Modify AutoRun settings
D. Change default credentials
E. Run OS security updates
F. Install a software firewall
A user needs access to files within a shared folder on a Linux server. The user is mapped to the folder but cannot access the files. Which of the following tools should the technician use to give the user access to these files? (Select two.)
A. groups
B. netshare
C. chown
D. chmod
E. apt-get
F. passwd
A user has installed several applications, which has led to critical OS files being overwritten by files supplied by the application's creator. Which of the following commands and switches should a technician run to restore OS files to their original versions?
A. sfc /scannow
B. chkdsk /r
C. tasklist /svc
D. gpupdate /force
A technician has a requirement to be able to stage several servers on demand and with little notice. The technician has decided to use cloud technologies. Which of the following technologies should the technician use in this case?
A. PaaS
B. SaaS
C. IaaS
D. RaaS
After successfully removing malware from a user's Windows OS PC, a technician confirms the machine had been infected for many months. Two weeks after removing the malware, the malware inadvertently returns. The technician MOST likely forgot to:
A. install antivirus updates
B. disable and enable System Restore
C. update the firewall rules
D. quarantine the system for 30 days
Which of the following types of attacks is MOST likely to occur if an attacker utilizes an HTTPS proxy?
A. Man-in-the-middle
B. Spear phishing
C. Zero day
D. Social engineering
Which of the following is used to assist developers with programming applications for mobile devices and taking advantage of built-in features?
A. SDK
B. SCP
C. GUI
D. GPS
Which of the following is the proper way to dispose rechargeable batteries?
A. Shred
B. Recycle
C. Dispose in trash
D. Incinerate
A customer has started a cloud initiative and would like to make the log-in process to a different application easier for users. The customer has also requested the login process initiate from the same portal. As a technician, which of the following tools will be the BEST solution?
A. MFA
B. SSO
C. RDP
D. LDAP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-902 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.