CompTIA 220-801 Certification Practice Test - Question List

Select how would you like to study

86. Which of the following programs are not destructive, but leach bandwidth in networks and can turn a speedy machine into a slow one?
  1. Malware
  2. Adware
  3. Spyware
  4. Grayware
87. What is the generic term that defines a hacker going through your refuse to find critical information?
  1. Dumpster diving
  2. Refuse searching
  3. Refuse diving
  4. Dumpster searching
88.

Which of the following tools should be use to enable auditing on a local level?

  1. Local Security Settings
  2. AD policy
  3. Group Policy
  4. User Settings
89. Choose the most effective method to prevent computer viruses from spreading throughout the network:
  1. You should enable scanning of all e-mail attachments
  2. You should require root/administrator access to run programs and applications
  3. You should prevent the execution of .vbs files
  4. You should install a host based IDS (Intrusion Detection System)
90. Which of the following needs to be done in order to ensure that your computer is protected?
  1. Keep updating your antivirus periodically.
  2. Always open all e-mail attachments.
  3. Install a virus to ensure your computer is protected
  4. Never turn on your computer during peak web traffic hours

Select how would you like to study