ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report Export Collapse

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Disable unused ports.
Disable unused ports.
Remove the guest network
Remove the guest network
Add a password to the guest network
Add a password to the guest network
Most voted
(1)
Most voted
Change the network channel.
Change the network channel.
Suggested answer: D
Explanation:

Changing the network channel is the best solution to minimize the issue of employees and patients not being the only people on the Wi-Fi network5Reference: 3. Sample CompTIA Security+ exam questions and answers. Retrieved from

https://www.techtarget.com/searchsecurity/quiz/Sample-CompTIA-Security-exam-questions-and- answers

asked 02/10/2024
Aboudou-Razakou KONI
39 questions

Question 102

Report Export Collapse

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

The UEFI settings need to be changed.
The UEFI settings need to be changed.
The RAM has compatibility issues with Windows 10.
The RAM has compatibility issues with Windows 10.
Some of the RAM is defective.
Some of the RAM is defective.
The newly installed OS is x86.
The newly installed OS is x86.
Suggested answer: D
Explanation:

The newly installed OS is x86. The x86 version of Windows 10 can only use up to 4GB of RAM. Thex64 version of Windows 10 can use up to 2TB of RAM1.

asked 02/10/2024
Mathijn Smit
36 questions

Question 103

Report Export Collapse

Which of the following is a data security standard for protecting credit cards?

PHI
PHI
NIST
NIST
PCI
PCI
GDPR
GDPR
Suggested answer: C
Explanation:


The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.

asked 02/10/2024
Jorge Fontes
47 questions

Question 104

Report Export Collapse

Which of the following should be used to control security settings on an Android phone in a domain environment?

MDM
MDM
MFA
MFA
ACL
ACL
SMS
SMS
Suggested answer: A
Explanation:

The best answer to control security settings on an Android phone in a domain environment is to use “Mobile Device Management (MDM)”. MDM is a type of software that is used to manage and secure mobile devices such as smartphones and tablets. MDM can be used to enforce security policies, configure settings, and remotely wipe data from devices. In a domain environment, MDM can beused to manage Android phones and enforce security policies such as password requirements, encryption, and remote wipe capabilities12

asked 02/10/2024
Vageesh Shanmukha
52 questions

Question 105

Report Export Collapse

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

ipconfig /all
ipconfig /all
hostname
hostname
netstat /?
netstat /?
nslookup localhost
nslookup localhost
arp —a
arp —a
ping :: 1
ping :: 1
Suggested answer: A, B
Explanation:

The user can use the following commands to give the technician the correct information: ipconfig /all and hostname 1. The ipconfig /all command displays the IP address, subnet mask, and default gateway for all adapters on the computer 1. The hostname command displays the name of the computer 1.

asked 02/10/2024
ayodele fakayode
43 questions

Question 106

Report Export Collapse

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Device Manager
Device Manager
Indexing Options
Indexing Options
File Explorer
File Explorer
Administrative Tools
Administrative Tools
Suggested answer: C
Explanation:

The technician should use the File Explorer application to assist the user with hiding the file 1. Theuser can right-click the file and select Properties. In the Properties dialog box, select the Hiddencheck box, and then click OK 1.

asked 02/10/2024
Mohammedsaleh Ibrahim
43 questions

Question 107

Report Export Collapse

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

.py
.py
.js
.js
.vbs
.vbs
.sh
.sh
Suggested answer: D
Explanation:


https://www.educba.com/shell-scripting-in-linux/

asked 02/10/2024
SCOTTIE EASTER
46 questions

Question 108

Report Export Collapse

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?

taskschd.msc
taskschd.msc
perfmon.msc
perfmon.msc
lusrmgr.msc
lusrmgr.msc
Eventvwr.msc
Eventvwr.msc
Suggested answer: A
Explanation:

The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically launch a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule tasks to run automatically at specified times or in response to certain events.

asked 02/10/2024
laurence peterson
45 questions

Question 109

Report Export Collapse

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Installer_x64.exe
Installer_x64.exe
Installer_Files.zip
Installer_Files.zip
Installer_32.msi
Installer_32.msi
Installer_x86.exe
Installer_x86.exe
Installer_Win10Enterprise.dmg
Installer_Win10Enterprise.dmg
Suggested answer: D
Explanation:

The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit installer. The “x86” in the file name refers to the 32-bit architecture. https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating- systems/

asked 02/10/2024
rita whitfield
40 questions

Question 110

Report Export Collapse

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

Roll back the updates.
Roll back the updates.
Increase the page file.
Increase the page file.
Update the drivers.
Update the drivers.
Rebuild the profile.
Rebuild the profile.
Suggested answer: D
Explanation:

The issue is specific to the user’s profile, so the technician should rebuild the profile. Rebuilding theprofile will create a new profile and transfer the user’s data to the new profile1

asked 02/10/2024
Robert Endicott
47 questions
Total 769 questions
Go to page: of 77
Search

Related questions