ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

A.
MSRA
A.
MSRA
Answers
B.
VNC
B.
VNC
Answers
C.
VPN
C.
VPN
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: C

Explanation:

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. The technician should implement VPN

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

A.
Brute force
A.
Brute force
Answers
B.
Zero day
B.
Zero day
Answers
C.
Denial of service
C.
Denial of service
Answers
D.
On-path
D.
On-path
Answers
Suggested answer: B

Explanation:

A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerabilityConfiguring AAA Services. Retrieved from https:// www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 0/security/configuration/guide/sc40crsbook_chapter1.html

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.
FAT32
A.
FAT32
Answers
B.
ext4
B.
ext4
Answers
C.
NTFS
C.
NTFS
Answers
D.
exFAT
D.
exFAT
Answers
Suggested answer: D

Explanation:

exFAT is a file system that is supported by both Linux and Windows and can handle large files1.

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

A.
macOS
A.
macOS
Answers
B.
Linux
B.
Linux
Answers
C.
Chrome OS
C.
Chrome OS
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: C

Explanation:

4. Chrome OS. Retrieved from https://en.wikipedia.org/wiki/Chrome_OS 5. What is Chrome OS?Retrieved from https://www.google.com/chromebook/chrome-os/A netbook with a web-based, proprietary operating system is most likely running Chrome OS.Chrome OS is a web-based operating system developed by Google that is designed to work with web applications and cloud storage. It is optimized for netbooks and other low-power devices and is designed to be fast, secure, and easy to use.

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

A.
Uninstall and reinstall the application
A.
Uninstall and reinstall the application
Answers
B.
Reset the phone to factory settings
B.
Reset the phone to factory settings
Answers
C.
Install an alternative application with similar functionality
C.
Install an alternative application with similar functionality
Answers
D.
Clear the application cache.
D.
Clear the application cache.
Answers
Suggested answer: D

Explanation:

The systems administrator should clear the application cache12 If clearing the application cache does not work, the systems administrator should uninstall and reinstall the application12Resetting the phone to factory settings is not necessary at this point12 Installing an alternative application with similar functionality is not necessary at this point12

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

A.
Rights management
A.
Rights management
Answers
B.
Audit trail
B.
Audit trail
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
Data integrity
D.
Data integrity
Answers
Suggested answer: C

Explanation:

The process of documenting who had possession of evidence at every step of the process is called chain of custody

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

A.
Advise the user to run a complete system scan using the OS anti-malware application
A.
Advise the user to run a complete system scan using the OS anti-malware application
Answers
B.
Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
B.
Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
Answers
C.
Have the user check for recently installed applications and outline those installed since the link in the email was clicked
C.
Have the user check for recently installed applications and outline those installed since the link in the email was clicked
Answers
D.
Instruct the user to disconnect the Ethernet connection to the corporate network.
D.
Instruct the user to disconnect the Ethernet connection to the corporate network.
Answers
Suggested answer: D

Explanation:

First thing you want to do is quarantine/disconnect the affected system from the network so whatever malicious software doesn't spread

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

A.
Degaussing
A.
Degaussing
Answers
B.
Low-level formatting
B.
Low-level formatting
Answers
C.
Recycling
C.
Recycling
Answers
D.
Shredding
D.
Shredding
Answers
Suggested answer: D

Explanation:

Shredding is the most effective method to securely dispose of data stored on optical discs12 Reference: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek. Retrieved from https://www.howtogeek.com/174307/how- can-i-safely-destroy-sensitive-data-cdsdvds/ 5. Disposal — UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data- management/store-your-data/disposal/

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

A.
Multifactor authentication will be forced for Wi-Fi
A.
Multifactor authentication will be forced for Wi-Fi
Answers
B.
All Wi-Fi traffic will be encrypted in transit
B.
All Wi-Fi traffic will be encrypted in transit
Answers
C.
Eavesdropping attempts will be prevented
C.
Eavesdropping attempts will be prevented
Answers
D.
Rogue access points will not connect
D.
Rogue access points will not connect
Answers
Suggested answer: A

Explanation:

Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be used for Wi-Fi access for all devices in an organization

Reference:CompTIA Security+ (Plus) Practice Test Questions | CompTIA. Retrieved from https://www.comptia.org/training/resources/comptia-security-practice-tests

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

A.
Guards
A.
Guards
Answers
B.
Bollards
B.
Bollards
Answers
C.
Motion sensors
C.
Motion sensors
Answers
D.
Access control vestibule
D.
Access control vestibule
Answers
Suggested answer: B

Explanation:

Bollards are the best solution to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers4Reference: 2. Bollards. Retrieved from https://en.wikipedia.org/wiki/

Bollard

Total 755 questions
Go to page: of 76