The payroll department works with company financial data and had an incident that involved employee's salary being shared across the network. Which of the following would enforce least privilege?
A. Paper shredding
B. Firewalls
C. RFID employee badges
D. Directory permissions
A company's security guard found Ann, an unauthorized person, searching through the recycling dumpster behind the building. When Ann was questioned she responded with, "I work for the company and have lost a report". Which of the following is occurring?
A. Social engineering
B. Malware
C. Phishing
D. Shoulder surfing
At the airport the company sales employees work on their laptops to submit financial proposals. Which of the following would mitigate shoulder surfing?
A. Firewalls
B. The use of VPNs
C. Privacy filters
D. RSA key fobs
A company has decided to implement a recycling program across the organization. The financial department uses employee sensitive information on a regular basis for payroll. Which of the following would need to be implemented for the financial department?
A. Use a single garbage container for department paper waste
B. Paper shredding service
C. Disable printing for all users in the department
D. Pickup material more often
Joe, a user, is reporting he cannot start an Internet browser. Which of the following commands is MOST likely to resolve this issue?
A. FIXMBR
B. SFC
C. BOOTREC
D. RD
A technician is responding to a user reporting corrupted files. Which of the following should the technician do to determine the problem?
A. Ensure all Windows updates are installed
B. Perform a backup of all drives
C. Run CHKDSK
D. Run defragmentation
Ann, a user, reports that a newly purchased laptop is only showing 65GB total on the C. drive, but she purchased a 100GB hard drive. Which of the following is MOST likely the cause of this difference?
A. The unavailable space is set aside for Windows system files
B. The manufacturer provided a factory recovery partition
C. Corrupted data is being stored in the unused space
D. The partition was setup incorrectly and needs to be extended
Joe, a customer, called and stated that since a virus was removed from his PC, Windows is now displaying errors about damaged system files. Which of the following tools should be used to correct the issue?
A. TASKKILL
B. DISKPART
C. CHKDSK
D. SFC
A user receives the following email message: From: IT Department
To: Joe User
Subject: Email quota exceeded.
Your mailbox has reached the maximum size. Your account will be suspended unless you provide the IT department the following required information: Username:
Password:
This an example of which of the following?
A. Phishing
B. Worm
C. Spyware
D. Malware
Joe, a user, should be aware of his surroundings when using a portable device to ensure that which of the following does not occur?
A. Shoulder surfing
B. Social engineering
C. Phishing
D. Rootkits
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.