ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

A.
Disable unused ports.
A.
Disable unused ports.
Answers
B.
Remove the guest network
B.
Remove the guest network
Answers
C.
Add a password to the guest network
C.
Add a password to the guest network
Answers
D.
Change the network channel.
D.
Change the network channel.
Answers
Suggested answer: D

Explanation:

Changing the network channel is the best solution to minimize the issue of employees and patients not being the only people on the Wi-Fi network5Reference: 3. Sample CompTIA Security+ exam questions and answers. Retrieved from

https://www.techtarget.com/searchsecurity/quiz/Sample-CompTIA-Security-exam-questions-and- answers

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

A.
The UEFI settings need to be changed.
A.
The UEFI settings need to be changed.
Answers
B.
The RAM has compatibility issues with Windows 10.
B.
The RAM has compatibility issues with Windows 10.
Answers
C.
Some of the RAM is defective.
C.
Some of the RAM is defective.
Answers
D.
The newly installed OS is x86.
D.
The newly installed OS is x86.
Answers
Suggested answer: D

Explanation:

The newly installed OS is x86. The x86 version of Windows 10 can only use up to 4GB of RAM. Thex64 version of Windows 10 can use up to 2TB of RAM1.

Which of the following is a data security standard for protecting credit cards?

A.
PHI
A.
PHI
Answers
B.
NIST
B.
NIST
Answers
C.
PCI
C.
PCI
Answers
D.
GDPR
D.
GDPR
Answers
Suggested answer: C

Explanation:


The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.

Which of the following should be used to control security settings on an Android phone in a domain environment?

A.
MDM
A.
MDM
Answers
B.
MFA
B.
MFA
Answers
C.
ACL
C.
ACL
Answers
D.
SMS
D.
SMS
Answers
Suggested answer: A

Explanation:

The best answer to control security settings on an Android phone in a domain environment is to use “Mobile Device Management (MDM)”. MDM is a type of software that is used to manage and secure mobile devices such as smartphones and tablets. MDM can be used to enforce security policies, configure settings, and remotely wipe data from devices. In a domain environment, MDM can beused to manage Android phones and enforce security policies such as password requirements, encryption, and remote wipe capabilities12

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

A.
ipconfig /all
A.
ipconfig /all
Answers
B.
hostname
B.
hostname
Answers
C.
netstat /?
C.
netstat /?
Answers
D.
nslookup localhost
D.
nslookup localhost
Answers
E.
arp —a
E.
arp —a
Answers
F.
ping :: 1
F.
ping :: 1
Answers
Suggested answer: A, B

Explanation:

The user can use the following commands to give the technician the correct information: ipconfig /all and hostname 1. The ipconfig /all command displays the IP address, subnet mask, and default gateway for all adapters on the computer 1. The hostname command displays the name of the computer 1.

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

A.
Device Manager
A.
Device Manager
Answers
B.
Indexing Options
B.
Indexing Options
Answers
C.
File Explorer
C.
File Explorer
Answers
D.
Administrative Tools
D.
Administrative Tools
Answers
Suggested answer: C

Explanation:

The technician should use the File Explorer application to assist the user with hiding the file 1. Theuser can right-click the file and select Properties. In the Properties dialog box, select the Hiddencheck box, and then click OK 1.

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

A.
.py
A.
.py
Answers
B.
.js
B.
.js
Answers
C.
.vbs
C.
.vbs
Answers
D.
.sh
D.
.sh
Answers
Suggested answer: D

Explanation:


https://www.educba.com/shell-scripting-in-linux/

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

A.
taskschd.msc
A.
taskschd.msc
Answers
B.
perfmon.msc
B.
perfmon.msc
Answers
C.
lusrmgr.msc
C.
lusrmgr.msc
Answers
D.
Eventvwr.msc
D.
Eventvwr.msc
Answers
Suggested answer: A

Explanation:

The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically launch a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule tasks to run automatically at specified times or in response to certain events.

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

A.
Installer_x64.exe
A.
Installer_x64.exe
Answers
B.
Installer_Files.zip
B.
Installer_Files.zip
Answers
C.
Installer_32.msi
C.
Installer_32.msi
Answers
D.
Installer_x86.exe
D.
Installer_x86.exe
Answers
E.
Installer_Win10Enterprise.dmg
E.
Installer_Win10Enterprise.dmg
Answers
Suggested answer: D

Explanation:

The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit installer. The “x86” in the file name refers to the 32-bit architecture. https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating- systems/

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

A.
Roll back the updates.
A.
Roll back the updates.
Answers
B.
Increase the page file.
B.
Increase the page file.
Answers
C.
Update the drivers.
C.
Update the drivers.
Answers
D.
Rebuild the profile.
D.
Rebuild the profile.
Answers
Suggested answer: D

Explanation:

The issue is specific to the user’s profile, so the technician should rebuild the profile. Rebuilding theprofile will create a new profile and transfer the user’s data to the new profile1

Total 755 questions
Go to page: of 76