220-802 (Part 3)

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?
2.
1 point
A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).
3.
1 point
Which of the following security threats are MOST often delivered via email? (Select TWO).
4.
1 point
A technician is working on a workstation that is receiving read/write failures when trying to access a particular file. Which of the following commands should the technician use to resolve this issue?
5.
1 point
Which of the following ports MUST be open in order for Remote Desktop to function?
6.
1 point
Which of the following areas of a file system should a standard user have restricted permissions to in order to promote a security best practice? (Select TWO).
7.
1 point
Which of the following is MOST effective in preventing security breaches on a network? (Select THREE).
8.
1 point
Which of the following helps to prevent virus infections from USB flash drives?
9.
1 point
Which of the following commands can be used in Windows XP to modify when the CHKDSK command runs?
10.
1 point
Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?
11.
1 point
Which of the following allows a user to enable XP mode?
12.
1 point
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
13.
1 point
A user on a domain network cannot install software that they need. Which of the following user groups is this user MOST likely associated with?
14.
1 point
A technician must secure company documents from accidental disclosure. Which of the following should be implemented? (Select TWO).
15.
1 point
An entry level network analyst calls and is not sure which Windows OS features to use to check for users who are currently logged on. Which of the following features would BEST assist this
analyst?
16.
1 point
When scheduling a backup for preventative maintenance, which of the following would ensure all data was captured?
17.
1 point
A customer needs to setup their laptop for use with a proxy server to browse the web at work. Which of the following areas would a technician need to visit to configure this on a Windows 7 system?
18.
1 point
Which of the following options is MOST likely active on a network of three workstations, running Windows 7 Home Edition x64, to enable File and Print sharing?
19.
1 point
Which of the following is TRUE about the difference between a worm and a virus?
20.
1 point
An employee at a company lost their mobile device that contains proprietary information. Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?
21.
1 point
Which of the following is an advantage of a virtual machine hosted on a PC?
22.
1 point
A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?
23.
1 point
A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?
24.
1 point
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
25.
1 point
A technician is creating an image that will be used to deploy Windows 7 to 100 PCs. Which of the following tools should be used to accomplish this?
26.
1 point
Which of the following Control Panel utilities would be BEST to use to remove a Windows 7 application?
27.
1 point
A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?
28.
1 point
A technician is tasked with improving the security of a SOHO network. The office is comprised of a
single wireless router located under the front desk where the office manager sits. All desktop computers are wired into the router which is configured with strong device credentials. Additionally, wireless is disabled on the router. Which of the following should the technician perform NEXT to improve the security of the SOHO network?
29.
1 point
Windows Virtual PC is designed to:
30.
1 point
Which of the following components would a user MOST need when building a virtual server? (SELECT TWO)
31.
1 point
A user is operating a virtual machine (VM) and discovers it has been infected with malware. Which of the following applies?
32.
1 point
An administrator is concerned about users accessing network shares outside of their job role. Which of the following would BEST prevent this?
33.
1 point
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
34.
1 point
Which of the following commands would a technician use to map a network share?
35.
1 point
Which of the following should a technician implement to prevent external contractors from physically plugging devices into the company’s network jacks unless such jacks are designated for guest use?
36.
1 point
A technician needs to create a new folder from the command line on the root of the C. drive. Which of the following is the correct command to use?
37.
1 point
For the last year, a company has gathered statistics on the most common security incidents. The highest percentage deals with opening email attachments that contain malware. Which of the following would mitigate this issue without reducing productivity?
38.
1 point
A user would like to run a copy of Windows XP for testing; however, the user is currently using a Windows 7 PC. Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?
39.
1 point
Which of the following utilities would a technician use on a Windows Vista or Windows 7 machine to configure what applications are allowed to send/receive data over the LAN connection?
40.
1 point
A technician wants to ensure that only authorized administrators can make configuration changes to the company’s wireless router. Which of the following MUST the technician change to prevent unauthorized users from modifying the access point configuration?
41.
1 point
A technician is reconfiguring an email account for off-line mode. Which of the following will describe the expected time of account synchronization with the email server?
42.
1 point
After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?
43.
1 point
A user is advised by the software vendor that the user must have elevated privileges in order to run a program. The user should do which of the following to BEST accomplish this?
44.
1 point
A technician has 50 identical computers that need to be upgraded to the Windows 7 OS, and are capable of booting from the network. They are running a Gigabit network with a Windows deployment server. Which of the following will be the BEST to use in this scenario?
45.
1 point
A technician needs to use Remote Desktop Connection in order to get access to a remote Windows workstation. However, the Programs menu has been hidden and they only have access to the Run command utility or a command-line prompt. Which of the following is the utility that the technician should use to access Remote Desktop Connection?
46.
1 point
Which of the following security threats is defined by its self propagating characteristic?
47.
1 point
Which of the following paths would a technician use to map a network drive?
48.
1 point
A company wants to prevent non-authorized users from entering into a secure building. Which of the following will BEST mitigate this activity?
49.
1 point
A technician receives an error every time a workstation boots up. The technician needs to find out what process is responsible for the error. Which of the following utilities would be used FIRST?
50.
1 point
Which of the following identifies traffic based upon its physical network address?