ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is an example of MFA?

A.
Fingerprint scan and retina scan
A.
Fingerprint scan and retina scan
Answers
B.
Password and PIN
B.
Password and PIN
Answers
C.
Username and password
C.
Username and password
Answers
D.
Smart card and password
D.
Smart card and password
Answers
Suggested answer: D

Explanation:

Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or more authentication factors. Smart card and password isan example of two-factor authentication (2FA)

Which of the following command-line tools will delete a directory?

A.
md
A.
md
Answers
B.
del
B.
del
Answers
C.
dir
C.
dir
Answers
D.
rd
D.
rd
Answers
E.
cd
E.
cd
Answers
Suggested answer: D

Explanation:


To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you can remove files and subdirectories from it using the /s switch. You can also use the /q switch to suppress confirmation messages (quiet mode).

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A.
Use a key combination to lock the computer when leaving.
A.
Use a key combination to lock the computer when leaving.
Answers
B.
Ensure no unauthorized personnel are in the area.
B.
Ensure no unauthorized personnel are in the area.
Answers
C.
Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
C.
Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
Answers
D.
Turn off the monitor to prevent unauthorized visibility of information.
D.
Turn off the monitor to prevent unauthorized visibility of information.
Answers
Suggested answer: A

Explanation:

The BEST way to secure the workstation quickly when walking away is to use a key combination to lock the computer when leaving1

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

A.
Encrypt the workstation hard drives.
A.
Encrypt the workstation hard drives.
Answers
B.
Lock the workstations after five minutes of inactivity.
B.
Lock the workstations after five minutes of inactivity.
Answers
C.
Install privacy screens.
C.
Install privacy screens.
Answers
D.
Log off the users when their workstations are not in use.
D.
Log off the users when their workstations are not in use.
Answers
Suggested answer: B

Explanation:

The BEST solution for preventing data theft within the call center in this scenario would be to lock the workstations after a period of inactivity. This would prevent unauthorized individuals from accessing patient data if call center agents were

to step away from their workstations without logging out.

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.
Differential backup
A.
Differential backup
Answers
B.
Off-site backup
B.
Off-site backup
Answers
C.
Incremental backup
C.
Incremental backup
Answers
D.
Full backup
D.
Full backup
Answers
Suggested answer: D

Explanation:

To accomplish this task, the technician should use a Full backup method1 A full backup only requires two sets of tapes to restore because it backs up all the data from theworkstation. With a differential backup, the backups need to be taken multiple times over a period of time, so more tapes would be needed to restore the data

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

A.
SFTP
A.
SFTP
Answers
B.
SSH
B.
SSH
Answers
C.
VNC
C.
VNC
Answers
D.
MSRA
D.
MSRA
Answers
Suggested answer: B

Explanation:


A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

A.
Bridge the LAN connection between the laptop and the desktop.
A.
Bridge the LAN connection between the laptop and the desktop.
Answers
B.
Set the laptop configuration to DHCP to prevent conflicts.
B.
Set the laptop configuration to DHCP to prevent conflicts.
Answers
C.
Remove the static IP configuration from the desktop.
C.
Remove the static IP configuration from the desktop.
Answers
D.
Replace the network card in the laptop, as it may be defective.
D.
Replace the network card in the laptop, as it may be defective.
Answers
Suggested answer: C

Explanation:

The new laptop was set up with the static IP it needs to connect to the software. The old desktop is still configured with that IP, hence the conflict.

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.

Which of the following backup methods should the technician MOST likely implement?

A.
Full
A.
Full
Answers
B.
Mirror
B.
Mirror
Answers
C.
Incremental
C.
Incremental
Answers
D.
Differential
D.
Differential
Answers
Suggested answer: C

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company's web server to become unavailable to the general public. Which of the following attacks is occurring?

A.
Zero day
A.
Zero day
Answers
B.
SOL injection
B.
SOL injection
Answers
C.
Cross-site scripting
C.
Cross-site scripting
Answers
D.
Distributed denial of service
D.
Distributed denial of service
Answers
Suggested answer: D

Explanation:

The company is experiencing a distributed denial of service (DDoS) attack. A DDoS attack is a type of cyber attack in which multiple compromised systems are used to target a single system, causing a denial of service for users of the targeted system.

While browsing a website, a staff member received a message that the website could not be trusted.

Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues.

Which of the following is MOST likely the cause of this issue?

A.
A bad antivirus signature update was installed.
A.
A bad antivirus signature update was installed.
Answers
B.
A router was misconfigured and was blocking traffic.
B.
A router was misconfigured and was blocking traffic.
Answers
C.
An upstream internet service provider was flapping.
C.
An upstream internet service provider was flapping.
Answers
D.
The time or date was not in sync with the website.
D.
The time or date was not in sync with the website.
Answers
Suggested answer: D

Explanation:


Total 755 questions
Go to page: of 76