Comptia 220 802 exam pass any exam any time

This preview shows page 104 - 108 out of 401 pages.

CompTIA 220-802 Exam "Pass Any Exam. Any Time." - 104
A. Malware B. Phishing C. Social engineering D. Keylogger Answer: D Explanation: QUESTION NO: 271 A technician is tasked with implementing the principle of least privilege to secure a file server so that only authorized users can modify company documents. Which of the following should the technician implement to comply with the request? A. Create a folder hierarchy, disable inheritance and assign user's permissions to specific folders. B. Create a shared folder and grant full administrative rights only to the users who need to modify company documents. C. Create a folder tree hierarchy, enable inheritance and assign user's permissions to specific folders. D. Create a shared folder and only provide read access to all users regardless of their role. Answer: A Explanation: QUESTION NO: 272 To which of the following security methods does "User authentication/strong passwords" belong? A. Digital security B. Principle of least privilege C. Physical security D. User education Answer: A Explanation: QUESTION NO: 273 A customer wants to setup a SOHO wired network. The customer needs assistance in setting up a CompTIA 220-802 Exam "Pass Any Exam. Any Time." - 105
static IP address on three computers on the network. Which of the following is the BEST solution for the technician to implement? A. Internet Options >Connection > Network > LAN settings > choose Proxy server, type in the IP address B. Windows Firewall > the Connections tab > Add Exception > Change Scope, type in the IP address C. Internet Options > Advanced tab > LAN settings, type in the IP address D. Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address Answer: D Explanation: QUESTION NO: 274 A user states they constantly get pop-ups on their workstations asking them to buy a product. Which of the following is this known as? A. Shoulder surfing B. Phishing C. Social engineering D. Malware Answer: D Explanation: QUESTION NO: 275 Which of the following OS based features limits access to a workstation? (Select TWO). A. User permissions B. Strong passwords C. Employee badges D. Privacy filters E. MAC filtering Answer: A,B Explanation: CompTIA 220-802 Exam "Pass Any Exam. Any Time." - 106
QUESTION NO: 276 A technician is hardening the security on a wired SOHO router and needs the router to still be able to connect to the Internet. Which of the following methods would the technician do to achieve this? A. Disable NAT B. Disable the SSID broadcast C. Disable unused ports D. Enable WPA2 Answer: C Explanation: QUESTION NO: 277 Which of the following is a device intended to prevent physical access to a facility? A. Tailgate B. Bollards C. Firewall D. Mantrap Answer: D Explanation: QUESTION NO: 278 After gaining administrative access, a malicious intruder might leave which of the following behind on a compromised system to allow for continued monitoring and access?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture