Which of the following methods of securing mobile devices will prevent data loss due to corruption?
A. Enforce pass code locks
B. Install location monitoring application
C. Perform remote wipe after failed login
D. Perform remote application back-up
The mouse arrow on Joe's laptop screen is unexpectedly moving around while he types on the built-in keyboard. Which of the following would be the lowest cost solution to the problem?
A. Use of an external keyboard.
B. Use of an external mouse.
C. Use of Fn key to lock the keypad.
D. Use of Fn key to disable the touchpad.
Which of the following activities would BEST be described as social engineering?
A. Downloading Spyware
B. Bribery
C. Writing down passwords
D. Brute force
A company has purchased new computers. The old computers will be donated to a local charity. Before the computers are picked up, the president of the company wants to make sure that the computers do not have confidential company information on them. Which of the following is the BEST method to accomplish this?
A. Run CHKDSK
B. Format the hard drive
C. Use a degaussing tool
D. Defragment the hard drive
A technician is tasked with resolving a display issue with a laptop. The technician has determined that the laptop's display needs to be replaced. Which of the following is the NEXT step the technician should perform?
A. Identify the problem that caused the display to fail.
B. Establish a theory of the probable cause.
C. Verify full system functionality and implement preventive measures.
D. Establish an action plan to resolve the problem.
Ann, the network administrator, is notified that the server is responding very slowly. Upon entering the server room, she notices one of the drives in a RAID1 array has failed. Which of the following would BEST restore full functionality of the server while preserving redundancy?
A. Use Disk Management to remove the RAID array and use the drive standalone.
B. Use the RAID configuration tool to remove the RAID array and use the drive standalone.
C. Remove the failed drive in device manager and continue operating.
D. Replace the drive with a new drive and repair the RAID.
Which of the following can a technician implement to ensure that only company owned mobile devices can connect to the wireless network?
A. Deploy a script to auto-configure employees' mobile devices wireless settings.
B. Configure MAC address filtering on the access points.
C. Implement a wireless policy and train all users.
D. Enable WPA2-Personal with a strong password.
A loud clicking noise in a RAID array indicates which of the following is MOST likely failing?
A. Hard drive
B. Power supply
C. Audio adapter
D. RAID controller
Which of the following security methods requires that a user enter a passcode that is changed at regular intervals?
A. WPA encryption
B. Biometrics
C. PSK
D. RSA token
An administrative assistant receives a phone call from the IT department asking for personal information to update their records. One of the questions asked is the password to the company's administrative portal. Which of the following is occurring?
A. Shoulder surfing
B. Configuration management
C. Helpdesk troubleshooting methodology
D. Social engineering
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.