220-802 Real Tests (Spring 2015)

Download New Updated (Spring 2015) CompTIA 220-802 Actual Tests 581-590

April 22, 2015

Ensurepass

 

QUESTION 581

While using an application on a Windows XP desktop PC, a BSOD appears. Which of the following should the technician select upon reboot to troubleshoot this issue?

 

A.

Boot to safe mode

B.

Boot to last known good configuration

C.

Boot to another OS on a second partition

D.

Boot normally

 

Correct Answer: A

 

 

QUESTION 582

A technician is installing a new wired router and needs to disable all the ports currently not in use. The documentation for router mentions the web interface for the router is available by default at 192.168.1.1. In which of the following ways would the technician go about doing this?

 

A.

Place labels on top of all the ports that are not to be used.

B.

Manually set the IP address to 10.168.1.1, and then access the website at 192.168.1.1.

C.

Use an Internet browser to access the router configuration at 192.168.1.1.

D.

Use Windows Explorer and search for a file called 192.168.1.1.

 

Correct Answer: C

Explanation:

Reference: http://compnetworking.about.com/od/routers/g/192_168_1_1_def.htm

 

QUESTION 583

A user suspects that everything they type is being captured. Which of the following security threats would this indicate?

 

A.

Worm

B.

Keylogger

C.

Trojan

D.

Rootkit

 

Correct Answer: B

 

 

QUESTION 584

Which of the following common security threats could be occurring when a user calls and requests his co-worker’s password?

 

A.

Shoulder surfing

B.

Spyware

C.

Phishing

D.

Social engineering

 

Correct Answer: D

Explanation:

Reference: http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html

 

 

QUESTION 585

Which of the following file system types is used for optical media?

 

A.

FAT32

B.

FAT

C.

CDFS

D.

NTFS

 

Correct Answer: C

Explanation:

Reference: http://www.computerhope.com/jargon/c/cdfs.htm

 

 

QUESTION 586

A user has moved into a building and is installing a new wired network. There is existing cabling throughout the building. The user would like to prevent hardware that they do not own from connecting to the network. Which of the following actions would BEST prevent outside users from connecting?

 

A.

Enable static IPs

B.

Disable DNS

C.

Disable local proxy server

D.

Enable MAC filtering

 

Correct Answer: D

 

QUESTION 587

A client requests a small SOHO wireless network setup. The client has only three devices that will require access to the Internet. The client is also concerned that a neighboring business will attempt to access the Internet without permission. Which of the following should the technician ensure when setting up the SOHO network? (Select TWO).

 

A.

Enable client isolation

B.

Lower radio power levels

C.

Physically secure the access point

D.

Disable unused ports

E.

Enable MAC filtering

F.

Enable short preambles

 

Correct Answer: BE

 

 

QUESTION 588

A user receives an unsolicited email stating that they need to follow a link to change their username and password because their bank account has been compromised. Of which of the following is this an example?

 

A.

SPAM

B.

Spyware

C.

Phishing

D.

Malware

 

Correct Answer: C

 

 

QUESTION 589

A technician works for a company that uses an application to track licensing information. The application runs in the background on the Windows 7 computers. A technician receives a call stating that the licensing tracking software is not running. Which of the following should the technician perform to ensure that the application is always running?

 

A.

Keep Windows updated with the latest patches

B.

Run the application in compatibility mode

C.

Set the service to automatically start

D.

Install application in Windows XP mode

 

Correct Answer: C

 

 

QUESTION 590

A user wants to prevent access to specific websites to prevent their children from accidently accessing them. Which of the following can be implemented?

 

A.

A switch

B.

Antivirus software

C.

Antispyware software

D.

A firewall

 

Correct Answer: D

Explanation:

Reference: http://en.wikipedia.org/wiki/MAC_filtering

Free VCE & PDF File for CompTIA 220-802 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …