Exam Details

  • Exam Code
    :JK0-802
  • Exam Name
    :CompTIA A+ Certification Exam (JK0-802)
  • Certification
    :CompTIA A+
  • Vendor
    :CompTIA
  • Total Questions
    :993 Q&As
  • Last Updated
    :

CompTIA CompTIA A+ JK0-802 Questions & Answers

  • Question 81:

    A client requests a small SOHO wireless network setup. The client has only three devices that will require access to the Internet. The client is also concerned that a neighboring business will attempt to access the Internet without permission. Which of the following should the technician ensure when setting up the SOHO network? (Select TWO).

    A. Enable client isolation

    B. Lower radio power levels

    C. Physically secure the access point

    D. Disable unused ports

    E. Enable MAC filtering

    F. Enable short preambles

  • Question 82:

    A remote Windows XP user believes unauthorized software has been installed on their laptop. The technician must direct the user to which of the following locations to remove the application?

    A. Action Center

    B. Add/remove Programs

    C. Windows Firewall

    D. Computer Management

  • Question 83:

    An employee recently departed under bad terms, and the client is concerned for their SOHO network security. Which of the following should the technician do FIRST?

    A. Physically secure the access point

    B. Change default password

    C. Lower the transmission power

    D. Assign static IP addresses

  • Question 84:

    A user calls the corporate helpdesk stating that their battery is not charging. The operating system shows that there is a problem with the battery. Which of the following should the technician do FIRST to determine what the issue is without erasing the user's unsaved data?

    A. Using a known-good computer of the same type, switch batteries between the two laptops.

    B. Remove the A/C adapter while the system is running and observe if the screen dims.

    C. Completely shut down the laptop, remove the A/C power source and restart the laptop.

    D. Using a known-good computer of the same type, switch A/C adapters between the two laptops.

  • Question 85:

    A user suspects that everything they type is being captured. Which of the following security threats would this indicate?

    A. Worm

    B. Keylogger

    C. Trojan

    D. Rootkit

  • Question 86:

    A technician is installing a new operating system. The company policy requires that the file system used must support file permissions and security. Which of the following should the technician use to BEST meet the company needs?

    A. NTFS

    B. CDFS

    C. FAT32

    D. UDF

  • Question 87:

    A prospective employee asks for wired Internet access while waiting for a job interview. Later, it is discovered that spyware was uploaded to the network from this particular location and the prospective employee cannot be contacted with the information provided. Which of the following security threats is this an example of?

    A. Phishing

    B. Shoulder surfing

    C. Viruses

    D. Social engineering

  • Question 88:

    A user reports that they are seeing odd shapes or blocks on their monitor that seem to be random, but stay until the system is rebooted. The monitor has been connected to another computer of the exact make and model and has shown no adverse issues. However, the problem returns once the monitor is connected to the original computer. Which of the following is MOST likely the issue?

    A. The monitor is overheating into above-optimal temperatures.

    B. The monitor is experiencing low voltage conditions.

    C. The video card is incompatible with the monitor.

    D. The video card on the problem computer is failing.

  • Question 89:

    An administrator has advised against providing any information over the phone as a way to prevent against which of the following threats?

    A. Session hijacking

    B. Social engineering

    C. Man-in-the-middle

    D. Shoulder surfing

  • Question 90:

    Which of the following is the MAIN difference between a rootkit and a virus?

    A. Rootkits encrypt the operating system while viruses encrypt documents

    B. Rootkits execute as super user while viruses execute as regular users

    C. Rootkits modify the BIOS while viruses cannot access the BIOS

    D. Rootkits infiltrate the kernel while viruses infiltrate files

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JK0-802 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.