CompTIA 220-802 Certification Practice Test - Question List

Select how would you like to study

171. David is troubleshooting a problem with hacking attempts to his network. Which of the following TCP/IP troubleshooting utilities will allow him to view the open TCP/IP connections on a machine?
  1. Netstat
  2. PING
  3. Nbtstat
  4. Tracert
172. Which authentication methodmakes use of hand scanners, fingerprints, retinal scanners, or DNA structure to identify the user.
  1. Smart Cards
  2. Multi-Factor
  3. Kerberos
  4. Biometrics
173. Which of the following can capture and store data about other authentication methods in a secure setting?
  1. Biometrics
  2. Smart cards
  3. Passwords
174. Several employees have complained that their coworkers are working (or playing) on their computers when they are away from their desk. Due to the highly sensitive nature of work content, senior management wants the most secure method for locking computers when employees step away from their desks. You recommend that users:
  1. Log off each time they step away from the computer.
  2. Set screen savers to require passwords.
  3. Utilize the lock desktop feature.
  4. Use USB devices to provide hardware authentication.
175. Which of the following is a secure crypto processor that stores cryptographic keys used by other applications?
  1. BitLocker Drive Encryption
  2. TPM
  3. Drive locking
  4. BIOS passwords

Select how would you like to study