[Free] New Updated (October) CompTIA 220-802 Real Exam 161-170

Ensurepass

 

QUESTION 161

An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?

 

A.

Lock screen pattern

B.

Cancel mobile service

C.

Remote wipe

D.

Six character password

 

Correct Answer: C

Explanation:

http://www.mobiledevicemanager.com/mobile-device-security/remote-wipe/

 

 

QUESTION 162

Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?

 

A.

Standard format

B.

Low level format

C.

Overwrite program

D.

Drive wipe

 

Correct Answer: A

Explanation:

http://pcsupport.about.com/od/windows7/ht/format-hard-drive-windows-7.htm

 

 

QUESTION 163

Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).

 

A.

Bandwidth throttling

B.

Eliminate password history

C.

Enable QoS

D.

Antivirus software

E.

User education

F.

Enforced login/logoff hours

Correct Answer: DEF

Explanation:

http://www.esecurityplanet.com/network-security/how-to-prevent-security-breaches-from-known-vulnerabilities.html

 

 

QUESTION 164

Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).

 

A.

Temporary Internet Files

B.

My Document Files

C.

Windows System Files

D.

Network Files

E.

Program Files

 

Correct Answer: CE

Explanation:

Windows program files are important for Windows operating system. If these files are deleted, Windows will corrupt. Similarly program files are related to applications and programs installed on a computer. These are highly sensitive files because they are related to the functioning of the operating system and the applications installed on it.

 

 

QUESTION 165

A technician wants to ensure that only authorized administrators can make configuration changes to the company’s wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?

 

A.

MAC address filters

B.

Manufacturer password

C.

Default SSID

D.

Configure encryption

 

Correct Answer: B

Explanation:

http://pcsupport.about.com/od/windows7/f/default-password-windows-7.htm

 

 

QUESTION 166

Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?

 

A.

Users and Groups

B.

Windows Firewall

C.

Registry Editor

D.

Task Scheduler

 

Correct Answer: B

Explanation:

http://windows.microsoft.com/en-us/windows7/products/features/windows-firewall

 

 

 

QUESTION 167

A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?

 

A.

System Protection

B.

Security Center

C.

Windows Firewall

D.

Internet Options

 

Correct Answer: D

Explanation:

http://windows.microsoft.com/is-is/windows-vista/using-windows-security-center

 

 

QUESTION 168

Which of the following security threats is defined by its self-propagating characteristic?

 

A.

Virus

B.

Rootkit

C.

Trojan

D.

Worm

 

Correct Answer: D

Explanation:

http://www.pcworld.com/article/111965/article.html

 

 

QUESTION 169

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

 

A.

Disable DHCP and assign a static IP address to each network device physically connected to the network.

B.

Enable MAC address filtering across all network jacks and record the MAC address of guest devices.

C.

Disable all switch ports when they are not utilized and enable them on an as needed basis.

D.

Place guest network jacks in public areas and all other jacks in secure areas as needed.

 

Correct Answer: C

Explanation:

The best way is to disable all switch ports when they are not utilized. Switch them on when you need them. This way, you can prevent external contractors from physically plugging devices in to company’s network jacks.

 

 

QUESTION 170

Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?

 

A.

Disable DHCP and assign a static IP address to each network device physically connected to the network.

B.

Enable MAC address filtering across all network jacks and record the MAC address of guest devices.

C.

Disable all switch ports when they are not utilized and enable them on an as needed basis.

D.

Place guest network jacks in public areas and all other jacks in secure areas as needed.

 

Correct Answer: C

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | CompTIA | SAP …
Instant Access to Free PDF Files: CompTIA | CompTIA | SAP …

This entry was posted in 220-802 Real Exam (October) and tagged , , , , , , . Bookmark the permalink.