With which of the following types is a man in the

This preview shows page 11 - 14 out of 17 pages.

Killtest CompTIA 220-1002 Free Exam Questions V10.02.pdf

With which of the following types is a man in the middle attack associated A from KILLTEST 50 at Tech Era College Of Sciences & IT, Muzaffarabad

34.   A manager requests remote access to a server after hours and on weekends to check data . The manager insists on using the server . Before granting the access , which of the following is the MOST important step a technician can take to protect against possible infection ?
A . Create a policy to remove Internet access from the server during off hours
B . Set the local antivirus software on the server to update and scan daily
C. Ensure the server is patched with the latest security updates
D. Educate the manager on safe Internet browsing practices
35 .   A manager with a restricted user account receives the following error message : Windows Update can not currently check for updates because the service is not running . The manager contacts the help desk to report t he error . A technician remotely connects to the user ’s computer and identifies the problem . Which of the following should the technician do NEXT ?
Get answer to your question and much more
36.   A SOHO technician recently moved some data from one server to another to increase storage capacity . Several users are now reporting they can not access certain shares on the network . When the users attempt to access the shares , they get the following error : Access Denied . The technician confirms the users are all in the proper security groups and have the proper access , but they are still unable to access the shares . Which of the following are the MOST likely reasons for these issues ? ( Select two . )
Get answer to your question and much more
37 .   With which of the following types is a man - in - the - middle attack associated ?
Get answer to your question and much more
38 .   An employee reported that a suspicious individual was looking through the recycle bin . Which of the following types of social engineering threats is this ?
A. Phishing
39.   A SOHO user reports desktop applications are performing slowly , and no emails have been received all morning . A technician remotes in and determines Internet pages ’ load slowly or not at all , CPU performance is normal , and the local router can successfully ping . The remote connection drops periodically . Which of the following steps should the technician take NEXT to resolve the problem ?
Get answer to your question and much more
40 .   An employee is unable to view in - office network folders while working at home . Which of the following is the MOST likely cause of the problem ?
Get answer to your question and much more
41.   A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade . Which of the following documents did the network administrator MOST likely give to the technician ?
Get answer to your question and much more
42 .   After a virus has been spread unknowingly via USB removable hard drives , a technician is tasked with limiting removable hard drive access to certain network users . USB ports are used for many devices , including scanners , printers , and signature pads , so a policy is created to deny access to removable hard drives only . When testing the policy , a removable drive is plugged in but can still be accessed . Which of the following command - line tools should the technician use to apply the new policy ?
A. grupdate
B. diskpart
C. gpresult
D. net use
43.   A network administrator notifies a technician that the company is experiencing a DDoS attack . Several internal Windows PCs are the source of the traffic . The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately . With which of the following types of infections are the PCs MOST likely infected ? ( Select two . )
Get answer to your question and much more
44 .   Ann , a user , is attempting to log in to her email service form a third - party email client on her phone . When Ann enters her usual username and password , she receives an error message saying the credentials are invalid . Ann then decides to reset her email password , but after the reset , the new credentials still do not work in the third - party email client . Which of the following settings or features is responsible for the problems Ann is experiencing ?
Get answer to your question and much more
45 .   Joe , a user , returns his computer to the technician who performed a virus removal on it the week before . Joe states that several symptoms have returned . Which of the following should the technician have covered previously as part of the original repair ?
Get answer to your question and much more
46 .   In which of the following file ext ension types would a user expect to see the command . “ net use T : \ \ server\ files ’?
A. . bat
B. . vbs
C. . js
D. . py
47 .   A user contacts a technician to troubleshoot server errors . The user explains that some files will not
Get answer to your question and much more
37.With which of the following types is a man-in-the-middle attack associated? A. Brute force B. Spoofing C. DDoS D. Zero-day Answer:B
38.An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?
11/ 15
39.A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping. The remote connection drops periodically. Which of the following steps should the technician take NEXT to resolve the problem?
40.An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?
41.A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade. Which of the following documents did the network administrator MOST likely give to the technician? A. Process diagram B. Physical network diagram C. Fiber backbone diagram D. Logical topology diagram Answer:B
42.After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?
The safer , easier way to help you pass any IT exams.12/ 15
43.A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture