[Free] New Updated (October) CompTIA 220-802 Real Exam 171-180

Ensurepass

 

QUESTION 171

A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?

 

A.

Configure the access point encryption from unsecured access to WEP.

B.

Adjust the radio power so that coverage is restricted to the business.

C.

Change the SSID to reflect the business name instead of a public access point.

D.

Enable MAC filtering and restrict access to other company’s devices.

 

Correct Answer: B

Explanation:

Best way to do this is to adjust radio power to restrict the coverage to the business. When the radio power is restricted to an office, the persons in the other office space cannot detect the signals at all.

 

 

QUESTION 172

An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?

 

A.

Set up shares with permissions based upon group membership.

B.

Implement a written policy addressing the issue for all users.

C.

Monitor access to the network shares using SNMP.

D.

Prevent remote logins to all network shares and drives.

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/cc768050.aspx

 

 

QUESTION 173

A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?

 

A.

Simple 1-pass zero overwrite

B.

Low level 3-pass random wipe

C.

Low level 7-pass random wipe

D.

High level format 10 times

 

Correct Answer: C

Explanation:

http://superuser.com/questions/215852/is-using-multiple-passes-for-wiping-a-disk-really-necessary

QUESTION 174

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

 

A.

Shoulder surfing

B.

Phishing attack

C.

Social engineering

D.

Malware infection

 

Correct Answer: C

Explanation:< /span>

http://www.social-engineer.org/

 

 

QUESTION 175

Which of the following identifies traffic based upon its physical network address?

 

A.

Phishing

B.

Hashing

C.

MAC filtering

D.

Geotracking

 

Correct Answer: C

Explanation:

http://compnetworking.about.com/cs/wirelessproducts/qt/macaddress.htm

 

 

QUESTION 176

A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).

 

A.

User training

B.

Anti-malware

C.

Paper shredding

D.

Time of day restrictions

E.

Employee badges

F.

Mantraps

 

Correct Answer: AC

Explanation:

http://en.wikipedia.org/wiki/Paper_shredder

 

 

QUESTION 177

Which of the following is TRUE about the difference between a worm and a virus?

 

A.

Worms are written in assembly while viruses are written with scripting languages.

B.

Viruses hide in the boot record while worms hide within the file system.

C.

Worms self-propagate while viruses need human intervention to replicate.

D.

Viruses disable the antivirus update service while worms kill the antivirus process.

 

Correct Answer: C

Explanation:

http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

 

 

QUESTION 178

A technician is tasked with improving the security of a SOHO network. The office is comprised of a single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?

 

A.

Disable the router’s remote management feature.

B.

Enable WPA2 wireless encryption.

C.

Change the router’s default admin name and password.

D.

Place the router in a locked room.

 

Correct Answer: D

Explanation:

http://network.cmu.ac.th/wp-content/uploads/2011/05/CCNA-Security-Ch2-Securing-Network-Devices.pdf

 

 

QUESTION 179

After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?

 

A.

Run the malware removal program while disconnected from the Internet

B.

Run the malware removal program in Windows Safe Mode

C.

Reinstall the malware removal program from a trusted source

D.

Set the malware removal program to run each time the computer is rebooted

 

Correct Answer: B

Explanation:

http://www.pcworld.com/article/243818/how_to_remove_malware_from_your_windows_pc.html

 

 

QUESTION 180

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

 

A.

Configure the workstation for a static IP

B.

Disable all wireless network connections

C.

Remove shortcuts to the application

D.

Block the application in Windows Firewall

E.

Change network location to Work

F.

Reroute the web address in HOSTS file

 

Correct Answer: DF

Explanation:

Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | CompTIA | SAP …
Instant Access to Free PDF Files: CompTIA | CompTIA | SAP …

This entry was posted in 220-802 Real Exam (October) and tagged , , , , , , . Bookmark the permalink.