ExamGecko
Home Home / CompTIA / 220-1101

CompTIA 220-1101 Practice Test - Questions Answers, Page 54

Question list
Search
Search

List of questions

Search

Related questions











A technician is mitigating threats to web clusters. Which of the following tools is the most appropriate for a technician to use to mitigate unwanted traffic against the web clusters' public-facing interface?

A.
Device encryption
A.
Device encryption
Answers
B.
Intrusion detection system
B.
Intrusion detection system
Answers
C.
Antivirus/anti-malware
C.
Antivirus/anti-malware
Answers
D.
Physical firewall
D.
Physical firewall
Answers
Suggested answer: D

Explanation:

A physical firewall is a hardware device that filters and blocks unwanted or malicious traffic from entering or leaving a network. A physical firewall can be configured with rules and policies to allow or deny traffic based on various criteria, such as source and destination IP addresses, ports, protocols, applications, etc.A physical firewall can also provide logging and monitoring capabilities to detect and prevent network attacks12.

A physical firewall is the most appropriate tool for a technician to use to mitigate threats to web clusters, which are groups of web servers that work together to provide high availability and scalability for web applications. Web clusters are often exposed to the internet and face various types of threats, such as denial-of-service (DoS) attacks, brute force attacks, SQL injection attacks, cross-site scripting (XSS) attacks, etc.A physical firewall can protect the web clusters' public-facing interface by filtering and blocking the unwanted or malicious traffic before it reaches the web servers, thus reducing the risk of compromise or downtime34.

The other options are not as effective or relevant as a physical firewall for mitigating threats to web clusters. Device encryption is a process of transforming data into an unreadable form using a secret key, which can prevent unauthorized access to the data if the device is lost or stolen. However, device encryption does not prevent network attacks or filter traffic, and it may not apply to web clusters that use shared storage or cloud services. Intrusion detection system (IDS) is a software or hardware tool that monitors network traffic and alerts the administrator of any suspicious or malicious activity. However, IDS does not block or filter traffic, and it may not be able to prevent or stop an attack in progress. IDS is often used in conjunction with a firewall, not as a replacement. Antivirus/anti-malware is a software tool that scans and removes viruses, worms, trojans, spyware, ransomware, and other malicious software from a device. However, antivirus/anti-malware does not filter or block network traffic, and it may not be able to detect or prevent some web-based attacks, such as XSS or SQL injection. Antivirus/anti-malware is also often used in conjunction with a firewall, not as a replacement.

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 5: Networking, Section 5.4: Network Devices, Page 233

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 5: Networking, Section 5.4: Network Devices, Page 197

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Pearson uCertify Course and Labs and Textbook Bundle, Chapter 5: Networking, Section 5.4: Network Devices, Page 234

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, Chapter 5: Networking, Section 5.4: Network Devices, Page 205

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.3: Device Security, Page 419

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.4: Network Security, Page 431

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.5: Malware and Threats, Page 443

A technician is setting up storage in a server that only has SAS connectors for storage. The technician wants the server to utilize RAID 10 for increased performance. Which of the following storage types should the technician install?

A.
NVMe M.2
A.
NVMe M.2
Answers
B.
Mechanical
B.
Mechanical
Answers
C.
mSATA
C.
mSATA
Answers
D.
Optical
D.
Optical
Answers
Suggested answer: B

Explanation:

SAS stands for Serial Attached SCSI, which is a type of interface that connects storage devices to servers or workstations.SAS supports both mechanical hard disk drives (HDDs) and solid state drives (SSDs), but not other types of storage devices, such as NVMe M.2, mSATA, or optical drives12.

RAID stands for Redundant Array of Independent Disks, which is a method of combining multiple storage devices into a logical unit that provides improved performance, reliability, or both.RAID 10 is a combination of RAID 1 (mirroring) and RAID 0 (striping), which means that data is written across two or more striped sets of mirrored drives34.

Therefore, the only type of storage device that the technician can install in a server that only has SAS connectors and wants to use RAID 10 is mechanical HDDs. Mechanical HDDs use spinning platters and moving heads to store and access data, and they are usually cheaper and have larger capacities than SSDs, but they are also slower and more prone to failure .

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 3: Hardware, Section 3.3: Storage Devices, Page 131

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 3: Storage, Section 3.2: Storage Interfaces, Page 97

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 3: Hardware, Section 3.4: RAID, Page 143

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 3: Storage, Section 3.4: RAID, Page 104

CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 3: Hardware, Section 3.3: Storage Devices, Page 129

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 3: Storage, Section 3.3: Hard Disk Drives, Page 99

A printer is leaving vertical black lines on every print job. A technician runs a test job and sees the same patterned lines. Which of the following should the technician do first to resolve the issue?

A.
Replace the toner.
A.
Replace the toner.
Answers
B.
Contact the vendor.
B.
Contact the vendor.
Answers
C.
Clean the rollers.
C.
Clean the rollers.
Answers
D.
Replace the paper.
D.
Replace the paper.
Answers
Suggested answer: C

Which of the following network devices converts fiber network signals from light into electric signals that can be used by a Wi-Fi router?

A.
Hub
A.
Hub
Answers
B.
PoE
B.
PoE
Answers
C.
ONT
C.
ONT
Answers
D.
NIC
D.
NIC
Answers
Suggested answer: C

Explanation:

An ONT, or Optical Network Terminal, is a device that converts fiber network signals from light into electric signals that can be used by a Wi-Fi router. An ONT is an interface between the fiber optic network that carries optical signals and the devices that use electrical signals, such as routers, telephones, or computers. An ONT is similar to a modem for fiber internet, as it allows the devices to communicate with the internet service provider (ISP) and access the internet.

The Official CompTIA A+ Core 1 Student Guide (Exam 220-1101) eBook, page 4-111

What Is an ONT?Optical Network Terminals Explained l Reviews.org2

What Is An ONT & How is it Used in Fiber Networks?- STL Tech3

A user with a custom hosts file is having difficulty connecting to a locally hosted site on a small office network. The technician cannot ping the server hostname from the user's computer. Which of the following should the technician ensure on the server?

A.
The server is configured with a static IP address.
A.
The server is configured with a static IP address.
Answers
B.
The server does not have an APIPA.
B.
The server does not have an APIPA.
Answers
C.
The appropriate services are enabled on the server.
C.
The appropriate services are enabled on the server.
Answers
D.
The server's secondary NIC is functioning.
D.
The server's secondary NIC is functioning.
Answers
Suggested answer: A

Explanation:

A custom hosts file is a file that maps hostnames to IP addresses, allowing the user to access websites or servers by their names instead of their numerical addresses. For example, a user can add a line like192.168.1.100 myserver.localto their hosts file and then access the server by typingmyserver.localin their browser. However, this method only works if the IP address of the server does not change. If the server is configured with a dynamic IP address, which means it can be assigned a different IP address by the network router or DHCP server, then the hosts file entry will become invalid and the user will not be able to connect to the server by its hostname. Therefore, the technician should ensure that the server is configured with a static IP address, which means it has a fixed and permanent IP address that does not change. This way, the hosts file entry will always point to the correct IP address of the server and the user will be able to ping the server hostname from their computer.

How to Add a Local DNS Lookup to Hosts File - Help Desk Geek1

Set Custom Domain Name for localhost Website in IIS - TutorialsTeacher.com2

The Official CompTIA A+ Core 1 Student Guide (Exam 220-1101) eBook, page 4-9

Which of the following is the primary function of a DNS service?

A.
To dynamically assign network addresses to hosts
A.
To dynamically assign network addresses to hosts
Answers
B.
To translate domain names to IP addresses
B.
To translate domain names to IP addresses
Answers
C.
To authenticate users to remote servers
C.
To authenticate users to remote servers
Answers
D.
To serve files over the network
D.
To serve files over the network
Answers
Suggested answer: B

Which of the following allows several websites from different companies to be housed on the same virtual server?

A.
Rapid elasticity
A.
Rapid elasticity
Answers
B.
High availability
B.
High availability
Answers
C.
Shared resources
C.
Shared resources
Answers
D.
Metered utilization
D.
Metered utilization
Answers
Suggested answer: C

Explanation:

Shared resources is the concept that allows several websites from different companies to be housed on the same virtual server. A virtual server is a software-based server that runs on a physical server and can host multiple virtual machines (VMs). Each VM can run a different operating system and application, such as a website, and have its own allocated resources, such as CPU, memory, disk space, and network bandwidth. However, the VMs share the underlying hardware resources of the physical server, which reduces the cost and complexity of maintaining separate servers for each website. This also enables rapid scalability, as new VMs can be created or deleted as needed.

One of the methods to host multiple websites on the same virtual server is to use virtual hosts. Virtual hosts are a feature of web servers, such as Apache, that allow the web server to serve different websites based on the domain name or IP address requested by the client. For example, a web server can host two websites, a.example.com and b.example.com, on the same virtual server and the same port (such as 80 or 443), by using virtual hosts to map each domain name to a different document root directory. The web server will then deliver the content of the corresponding website to the client based on the domain name in the HTTP request header.

How to Host Multiple Websites With One Apache Server1

How to run multiple sites on one apache instance2

Multiple different website hosting on same port 443 and same server or ...3

When several name-based virtual hosts on the same web server share the ...4

How to Host Multiple Sites on One Server - Server Mania5

A company wants to save money by leveraging the cloud while still being able to customize the infrastructure. Which of the following cloud models would best address the company's needs?

A.
Private
A.
Private
Answers
B.
Public
B.
Public
Answers
C.
Hybrid
C.
Hybrid
Answers
D.
Community
D.
Community
Answers
Suggested answer: C

Explanation:

A hybrid cloud model would best address the company's needs of saving money by leveraging the cloud while still being able to customize the infrastructure. A hybrid cloud model is a combination of public and private cloud services, connected by a secure network. A public cloud service is a cloud service that is offered by a third-party provider over the Internet, and is shared by multiple customers. A private cloud service is a cloud service that is dedicated to a single customer, and is hosted either on-premises or by a third-party provider. A hybrid cloud model allows the company to use the public cloud for cost-effective and scalable services, such as storage, backup, or analytics, and use the private cloud for more sensitive or customized services, such as security, compliance, or performance. A hybrid cloud model also enables the company to move workloads between the public and private cloud as needed, depending on the demand, availability, or cost. A hybrid cloud model can provide the company with the best of both worlds: the flexibility and efficiency of the cloud, and the control and customization of the infrastructure.

What is Hybrid Cloud?| IBM1

Hybrid Cloud Computing | Microsoft Azure2

Which of the following network types is used for pairing a Bluetooth device to a smartphone?

A.
PAN
A.
PAN
Answers
B.
WAN
B.
WAN
Answers
C.
LAN
C.
LAN
Answers
D.
MAN
D.
MAN
Answers
Suggested answer: A

Explanation:

A PAN, or Personal Area Network, is the network type that is used for pairing a Bluetooth device to a smartphone. A PAN is a network that connects personal devices, such as phones, tablets, laptops, headphones, speakers, or printers, over a short distance, usually less than 10 meters or 33 feet. A PAN can use wireless technologies, such as Bluetooth, Wi-Fi, or infrared, to enable communication and data exchange between the devices. A Bluetooth PAN, also known as a piconet, can consist of up to eight devices, one of which acts as the master and the others as slaves. The master device initiates the pairing process with the other devices and controls the data transmission. The devices use radio waves in the 2.4 GHz frequency band to communicate with each other. Bluetooth is a low-power, low-cost, and secure technology that is widely used for creating PANs.

What Is Bluetooth Wireless Networking?1

Bluetooth - GeeksforGeeks2

Bluetooth | Institute of Physics3

6 Different Types of Bluetooth Devices - TechJeny4

A laser printer, which is located in a large office, has a leaky toner cartridge. Some toner spilled into the printer when the cartridge was removed.

Which of the following is the best way to clean up the toner?

A.
Magnetic duster
A.
Magnetic duster
Answers
B.
ESD-safe vacuum
B.
ESD-safe vacuum
Answers
C.
Compressed air
C.
Compressed air
Answers
D.
Damp cloth
D.
Damp cloth
Answers
Suggested answer: B

Explanation:

The best way to clean up the toner that spilled into the printer is to use an ESD-safe vacuum. An ESD-safe vacuum is a special type of vacuum that has a filter that traps toner particles and prevents them from escaping into the air. An ESD-safe vacuum also has a grounding wire that prevents static electricity from building up and damaging the printer's components. Toner is electrically conductive and can cause short circuits or sparks if it contacts sensitive parts of the printer. Therefore, using an ESD-safe vacuum is the safest and most effective method to remove the toner from the printer.

Other methods, such as a magnetic duster, compressed air, or a damp cloth, are not recommended for cleaning up toner spills. A magnetic duster is a device that uses a magnet to attract toner particles, but it can also damage the printer's components that rely on magnetism, such as the drum or the fuser. Compressed air can blow the toner around and create a cloud of dust that can be harmful to breathe or contaminate other parts of the printer. A damp cloth can smear the toner and make it harder to remove, as well as cause corrosion or rust on the printer's metal parts.

Cleaning up Toner Spills or Leaks Inside the Printer - Xerox Support1

How to Clean Up Toner Spills - YouTube2

How to Clean up a Laser Toner Spill - Cartouches Certifies3

Total 718 questions
Go to page: of 72