ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 10

List of questions

Question 91

Report Export Collapse

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

MSRA
MSRA
VNC
VNC
VPN
VPN
SSH
SSH
Suggested answer: C
Explanation:

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. The technician should implement VPN

asked 02/10/2024
FOTIS FOURLIAS
48 questions

Question 92

Report Export Collapse

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

Brute force
Brute force
Zero day
Zero day
Denial of service
Denial of service
On-path
On-path
Suggested answer: B
Explanation:

A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerabilityConfiguring AAA Services. Retrieved from https:// www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 0/security/configuration/guide/sc40crsbook_chapter1.html

asked 02/10/2024
G.C. Helweg
38 questions

Question 93

Report Export Collapse

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

FAT32
FAT32
ext4
ext4
NTFS
NTFS
exFAT
exFAT
Suggested answer: D
Explanation:

exFAT is a file system that is supported by both Linux and Windows and can handle large files1.

asked 02/10/2024
Eduardo Bravo
42 questions

Question 94

Report Export Collapse

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?

macOS
macOS
Linux
Linux
Chrome OS
Chrome OS
Windows
Windows
Suggested answer: C
Explanation:

4. Chrome OS. Retrieved from https://en.wikipedia.org/wiki/Chrome_OS 5. What is Chrome OS?Retrieved from https://www.google.com/chromebook/chrome-os/A netbook with a web-based, proprietary operating system is most likely running Chrome OS.Chrome OS is a web-based operating system developed by Google that is designed to work with web applications and cloud storage. It is optimized for netbooks and other low-power devices and is designed to be fast, secure, and easy to use.

asked 02/10/2024
Oscar Luis Garza Ruiz
42 questions

Question 95

Report Export Collapse

An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?

Uninstall and reinstall the application
Uninstall and reinstall the application
Reset the phone to factory settings
Reset the phone to factory settings
Install an alternative application with similar functionality
Install an alternative application with similar functionality
Clear the application cache.
Clear the application cache.
Suggested answer: D
Explanation:

The systems administrator should clear the application cache12 If clearing the application cache does not work, the systems administrator should uninstall and reinstall the application12Resetting the phone to factory settings is not necessary at this point12 Installing an alternative application with similar functionality is not necessary at this point12

asked 02/10/2024
Adam Burdett
38 questions

Question 96

Report Export Collapse

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Rights management
Rights management
Audit trail
Audit trail
Chain of custody
Chain of custody
Data integrity
Data integrity
Suggested answer: C
Explanation:

The process of documenting who had possession of evidence at every step of the process is called chain of custody

asked 02/10/2024
Wojciech Romaldowski
47 questions

Question 97

Report Export Collapse

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Advise the user to run a complete system scan using the OS anti-malware application
Advise the user to run a complete system scan using the OS anti-malware application
Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present
Have the user check for recently installed applications and outline those installed since the link in the email was clicked
Have the user check for recently installed applications and outline those installed since the link in the email was clicked
Instruct the user to disconnect the Ethernet connection to the corporate network.
Instruct the user to disconnect the Ethernet connection to the corporate network.
Suggested answer: D
Explanation:

First thing you want to do is quarantine/disconnect the affected system from the network so whatever malicious software doesn't spread

asked 02/10/2024
Thabo Sebola
45 questions

Question 98

Report Export Collapse

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Degaussing
Degaussing
Low-level formatting
Low-level formatting
Recycling
Recycling
Shredding
Shredding
Suggested answer: D
Explanation:

Shredding is the most effective method to securely dispose of data stored on optical discs12 Reference: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek. Retrieved from https://www.howtogeek.com/174307/how- can-i-safely-destroy-sensitive-data-cdsdvds/ 5. Disposal — UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data- management/store-your-data/disposal/

asked 02/10/2024
Oliver Lüthi
44 questions

Question 99

Report Export Collapse

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Multifactor authentication will be forced for Wi-Fi
Multifactor authentication will be forced for Wi-Fi
All Wi-Fi traffic will be encrypted in transit
All Wi-Fi traffic will be encrypted in transit
Eavesdropping attempts will be prevented
Eavesdropping attempts will be prevented
Rogue access points will not connect
Rogue access points will not connect
Suggested answer: A
Explanation:

Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be used for Wi-Fi access for all devices in an organization

Reference:CompTIA Security+ (Plus) Practice Test Questions | CompTIA. Retrieved from https://www.comptia.org/training/resources/comptia-security-practice-tests

asked 02/10/2024
FARIZA MANNAN
42 questions

Question 100

Report Export Collapse

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

Guards
Guards
Bollards
Bollards
Motion sensors
Motion sensors
Access control vestibule
Access control vestibule
Suggested answer: B
Explanation:

Bollards are the best solution to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers4Reference: 2. Bollards. Retrieved from https://en.wikipedia.org/wiki/

Bollard

asked 02/10/2024
Dirk Prinsloo
38 questions
Total 769 questions
Go to page: of 77
Search

Related questions