A SOHO has had several issues with various unauthorized devices consuming the network's bandwidth. There are only four network devices that are authorized to access the Internet as well as the local LAN's resources. Which of the following security implementations would MOST likely help disable network access to the unauthorized devices?
A. Using complex passwords
B. Disabling the use of static IP addresses
C. Disabling ports
D. MAC filtering
A new LAN drop has been activated but users report that they are unable to connect to the Internet and are receiving an IP address of 169.254.255.55 from that Windows workstation. Which of the following symptoms has occurred? (Select TWO).
A. DHCP server unavailable
B. IP address assigned by NAT
C. Limited connectivity
D. APIPA address assigned
E. IP conflict detected
F. Statically assigned IP address
A SOHO location is being remodeled and the users are concerned about unauthorized traffic on their network during the remodel. The WLAN needs to be able to allow various types of devices to securely connect 24 hours a day while requiring the least amount of overhead to manage. Which of the following security implementations would MOST likely be implemented?
A. Setting encryption
B. Resetting all user-names and passwords
C. Assign static IP addresses
D. Enable MAC filtering
Which of the following Windows installations is MOST likely to contain custom user settings and files?
A. Clean Install
B. Imaging
C. Unattended Installation
D. Remote Network Installation
Which of the following is the BEST example of social engineering?
A. Impersonation
B. Key logger
C. Virus
D. Malicious cookie
A user on a domain PC needs to leave their desk immediately, but does not want to compromise displayed content. Which of the following should be done?
A. Screensaver password
B. Restart PC
C. Lock screen
D. Reset user password
Which of the following describes the function of a firewall?
A. Hardware or software designed to analyze data packets to determine the origin or destination of the packet
B. Hardware or software designed to block packets based on traffic behavior over time
C. Hardware or software designed to compare data packets to known signatures
D. Hardware or software designed to block certain packets from entering or leaving a network
A customer calls a technician frequently for the same problem. Which of the following troubleshooting steps MUST the technician perform NEXT to attempt to permanently solve this issue?
A. Establish a plan of action to resolve the problem and implement the solution.
B. Document findings, actions, and outcomes.
C. Verify full system functionality and implement preventive measures.
D. Identify the problem or symptoms.
A user has reported a file permissions issue to the network administrator. The administrator tries to recreate the problem on their computer but has no trouble accessing the file. Which of the following BEST describes what is occurring?
A. The user did not taken ownership of the file from the server.
B. The user is logged in using the wrong local profile.
C. The user is not in the appropriate group to have access to the file.
D. The user has been granted "read only" access to the file.
When installing Hyper-V, which of the following is a hardware requirement?
A. 64-bit processor
B. 32GB of RAM
C. 1TB of storage space
D. Multi-display video card
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.