Download Free Version Of Braindump2go CompTIA 220-802 Premium VCE Dumps
A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).
A. Install additional antivirus software
B. Disable screen savers
C. Conduct a daily security audit
D. Assign security rights based on job roles
E. Use strong passwords
To improve security, assign security rights based on job roles. You need to give least amount of privilege to users so that they can do their jobs without having access to resources that have nothing to do with their job roles.
A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
A. Configure the workstation for a static IP
B. Disable all wireless network connections
C. Remove shortcuts to the application
D. Block the application in Windows Firewall
E. Change network location to Work
F. Reroute the web address in HOSTS file
Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.
A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to troubleshoot this problem?
A. Run System Restore, update antivirus program, and run an antivirus scan.
B. Remove all Internet temporary files, run an antivirus scan, and reboot using Last Known Good Configuration.
C. Remove all temporary files, turn off System Restore, update and run an antivirus scan.
D. Run an antivirus scan, Run Disk Cleanup, and reboot into Safe Mode.
This might be the sign of a virus infecting the system. First, remove all temporary Internet files on your computer. Viruses are downloaded through software or a webpage. And normally it resides in Temporary Internet Files folder. Now turn off system restore because you don’t want to load a previous state on the computer with the virus still lingering the digital wild. Run an antivirus program to clean infected files.
– Email address tech@techies com
– Password P@SSwOrd
– Pop techies com Port 110 Security. None
– IMAP techies com Port 993 Security SSL
– smtp.techies.com Port 465 Security: TLS
– Company SSID Techies
– Security WPA2
– Passphrase P@SSwOrd
– SSID is not broadcasted
Instructions: You are not authorized to use the Company’s WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.
Answer: See Answer from Full Version
Which of the following steps would allow display output from a laptop to an external display? (Select TWO).
A. Press the appropriate Function Key combination
B. A second video card in the Express card slot
C. Disconnect the integrated display
D. Enabling second monitor in the Windows Display Settings
E. Loading external monitor drivers on the laptop
First enable second monitor in Windows Display settings. After that press the function key along with the assigned key to display the output on an external monitor.
When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).
A. Disable unused ports
B. Change the SSID
C. Position the antennas to prevent outside access
D. Enable MAC filtering
E. Change the default user name
The basic tasks to secure a network is to change SSID and the default user name. This is the basic security a user can employ to secure the network immediately.
For which of the following instances is System Restore MOST likely to be used?
A. Deleting temporary files that are not needed.
B. Replacing a failed hard drive with a new drive.
C. Placing the system configuration into a prior state.
D. Downgrading an operating system to another version.
Administrative share names are MOST commonly designated by which of the following symbols?
After loading a new operating system, which of the following accounts is MOST often changed for security purposes?
A. Standard User
B. Power User
Virtual machines help users developing cloud applications in which of the following ways?
A. Provides an environment where the host cannot be connected to the network.
B. Provides a platform where operating system requirements are lessened.
C. Provides a safe, secure environment in which to test patches or application updates.
D. Provides an environment that is never accessible from the Internet.
Which of the following installation types uses an answer file as part of the installation process?
A. Unattended installation
B. Clean installation
C. Virtual desktop image deployment
D. Remote network installation
An administrator sets up a wireless device that they will need to manage across the Internet. Which of the following security measures would BEST prevent unauthorized access to the device from the Internet?
A. Set the channels to wireless 802.11n only
B. Change the default username and password
C. Enable the wireless AP’s MAC filtering
D. Enable the wireless AP’s WPA2 security
New Realeased Braindump2go CompTIA 220-801 Practice Tests Questions and Answers Free Sharing