A user, Joe, wants to enable communication between his GPS and his smartphone. Which of the following would allow for this communication?
A. A data link cable
B. A wireless access point
C. Bluetooth pairing
D. Infrared communication
Which of the following is a common component found on ultra thin laptops and tablet devices?
A. Solid state drives
B. Touch screen interface
C. Upgradeable RAM
D. Field serviceable parts
Joe, a new employee, requests to receive Exchange based company email on his tablet device. Which of the following can a technician enable to BEST secure his Exchange account to ensure the email account is not compromised in case his device is lost or stolen?
A. Remote backup applications
B. Antivirus
C. Locator applications
D. Forced pin locks
An employee receives a phone call inquiring about company information. This is an example of which of the following?
A. Phishing
B. Social engineering
C. Shoulder surfing
D. Rootkits
Anne, an end-user, reports to Joe, a helpdesk technician, that her computer has been redirecting her browser to unknown websites when clicking on search results. Joe runs a malware scan and finds that her computer is infected with malware. Joe uses the anti- malware program to remove the infection but Anne reports that the problem resurfaced the next day. Joe runs the malware scan again and finds the same malware is still infecting Anne's computer. Joe runs several passes of the malware scan to remove the infection but it keeps recurring. Which of the following would MOST likely aid in removing the infection?
A. Enable Windows User Access Control to ensure the user has proper rights to remove the infected files.
B. Disable Windows firewall as it may be conflicting with the malware scan.
C. Run the malware scan in Windows safe mode.
D. Change the desktop's IP address to a different subnet.
Which of the following settings should be implemented when a mobile device MUST be configured to receive push email notification?
A. POP3 with SSL
B. ActiveSync
C. IMAP
D. Secure SMTP
Which of the following boot methods would a technician use to BEST install an image from an optical media onto a new computer?
A. PXE
B. Tape
C. DVD
D. USB
Joe, a user, receives a spam email supposedly sent from a coworker's email address asking for money. This is an example of which of the following common security threats?
A. Phishing
B. Spyware
C. Malware
D. Evil Twin
Joe, an end user, has reported that his computer is extremely slow for several minutes after logging in. He has noticed that many unnecessary programs automatically start when he logs into his computer. Which of the following tools could the technician use to prevent the unnecessary programs from starting automatically when Joe logs into his computer?
A. Performance Monitor
B. Task Scheduler
C. MSCONFIG
D. Windows Firewall
Anne, an employee, stepped away from her workstation to deliver a report to her boss. When she came back, confidential material was displayed on the screen that was not opened prior to her leaving. Which of the following could have mitigated this from occurring?
A. Intrusion detection system
B. Screensaver password
C. Privacy filters
D. RFID badges
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.