ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

A.
Removed all jewelry
A.
Removed all jewelry
Answers
B.
Completed an inventory of tools before use
B.
Completed an inventory of tools before use
Answers
C.
Practiced electrical fire safety
C.
Practiced electrical fire safety
Answers
D.
Connected a proper ESD strap
D.
Connected a proper ESD strap
Answers
Suggested answer: D

Explanation:

The technician should have connected a proper ESD strap to prevent damage to the motherboard.ESD (electrostatic discharge) can cause damage to electronic components, and an ESD strap helps to prevent this by grounding the technician and preventing the buildup of static electricity. Removing all jewelry is also a good practice, but it is not the most likely solution to this problem.

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

A.
Default gateway
A.
Default gateway
Answers
B.
Host address
B.
Host address
Answers
C.
Name server
C.
Name server
Answers
D.
Subnet mask
D.
Subnet mask
Answers
Suggested answer: A

Explanation:

The technician most likely needs to change the default gateway on the workstation to resolve the issue. The default gateway is the IP address of the router that connects the workstation to the internet, and it is responsible for routing traffic between the workstation and the internet. If the default gateway is incorrect, the workstation will not be able to access external web pages.

A technician needs to recommend the best backup method that will mitigate ransomware attacks.

Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

A.
Full
A.
Full
Answers
B.
Differential
B.
Differential
Answers
C.
Off-site
C.
Off-site
Answers
D.
Grandfather-father-son
D.
Grandfather-father-son
Answers
Suggested answer: B

Explanation:

The differential backup method would best address these concerns. Differential backups only back up files that have changed since the last full backup, which means that only a few files would be backed up each time. This would help to mitigate the risk of ransomware attacks, as only a few files would be affected if an attack occurred. Additionally, differential backups require less storage space than full backups.

A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?

A.
Scope of change
A.
Scope of change
Answers
B.
Risk level
B.
Risk level
Answers
C.
Rollback plan
C.
Rollback plan
Answers
D.
End user acceptance
D.
End user acceptance
Answers
Suggested answer: C

Explanation:

The rollback plan should be updated before requesting approval again. A rollback plan is a plan for undoing a change if it causes problems, and it is an important part of any change management process. If the change advisory board did not approve the requested change due to the lack of alternative actions if implementation failed, then updating the rollback plan would be the best way to address this concern.

A user is having phone issues after installing a new application that claims to optimize performance.

The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

A.
Reset the phone to factory settings
A.
Reset the phone to factory settings
Answers
B.
Uninstall the fraudulent application
B.
Uninstall the fraudulent application
Answers
C.
Increase the data plan limits
C.
Increase the data plan limits
Answers
D.
Disable the mobile hotspot.
D.
Disable the mobile hotspot.
Answers
Suggested answer: B

Explanation:

Installing applications directly from a vendor's website can be risky, as the application may be malicious or fraudulent. Uninstalling the application can help mitigate the issue by removing the source of the problem

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

A.
Remote wipe
A.
Remote wipe
Answers
B.
Anti-maIware
B.
Anti-maIware
Answers
C.
Device encryption
C.
Device encryption
Answers
D.
Failed login restrictions
D.
Failed login restrictions
Answers
Suggested answer: A

Explanation:

The feature that BEST addresses the user’s concern is remote wipe. This is because remote wipeallows the user to erase all data on the mobile device if it is lost or stolen, which will prevent unauthorized access to the device1.

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

A.
Have the user provide a callback phone number to be added to the ticket
A.
Have the user provide a callback phone number to be added to the ticket
Answers
B.
Assign the ticket to the department's power user
B.
Assign the ticket to the department's power user
Answers
C.
Register the ticket with a unique user identifier
C.
Register the ticket with a unique user identifier
Answers
D.
Provide the user with a unique ticket number that can be referenced on subsequent calls.
D.
Provide the user with a unique ticket number that can be referenced on subsequent calls.
Answers
Suggested answer: D

Explanation:

The technician should provide the user with a unique ticket number that can be referenced on subsequent calls to make sure the ticket is associated with the correct user. This is becauseregistering the ticket with a unique user identifier, having the user provide a callback phone number to be added to the ticket, or assigning the ticket to the department’s power user will not ensure that the ticket is associated with the correct user2.

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

A.
Home
A.
Home
Answers
B.
Pro for Workstations
B.
Pro for Workstations
Answers
C.
Enterprise
C.
Enterprise
Answers
D.
Pro
D.
Pro
Answers
Suggested answer: D

Explanation:

The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is Windows 10 Pro. Windows 10 Pro includes Remote Desktop, which allows users to connect to a remote computer and access its desktop, files, and applications. Windows 10 Home does not includeRemote Desktop, while Windows 10 Pro for Workstations and Windows 10 Enterprise are more expensive versions of Windows 10 that include additional features for businesses

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

A.
Install and run Linux and the required application in a PaaS cloud environment
A.
Install and run Linux and the required application in a PaaS cloud environment
Answers
B.
Install and run Linux and the required application as a virtual machine installed under the Windows OS
B.
Install and run Linux and the required application as a virtual machine installed under the Windows OS
Answers
C.
Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed
C.
Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed
Answers
D.
Set up a dual boot system by selecting the option to install Linux alongside Windows
D.
Set up a dual boot system by selecting the option to install Linux alongside Windows
Answers
Suggested answer: B

Explanation:

The user should install and run Linux and the required application as a virtual machine installed under the Windows OS. This solution would allow for parallel execution of the Linux application and Windows applications2. The MOST efficient solution that allows for parallel execution of the Linux application and Windows applications is to install and run Linux and the required application as a virtual machine installedunder the Windows OS. This is because it allows you to run both Linux and Windows together without the need to keep the Linux portion confined to a VM window3.

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

A.
Change the DNS address to 1.1.1.1
A.
Change the DNS address to 1.1.1.1
Answers
B.
Update Group Policy
B.
Update Group Policy
Answers
C.
Add the site to the client's exceptions list
C.
Add the site to the client's exceptions list
Answers
D.
Verity the software license is current.
D.
Verity the software license is current.
Answers
Suggested answer: C

Explanation:

The technician should add the update site to the client’s exceptions list to bypass the proxy. This can be done through the client’s web browser settings, where the proxy settings can be configured. By adding the update site to the exceptions list, the client will be able to access the site and download the software update.

Total 755 questions
Go to page: of 76