ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 12

List of questions

Question 111

Report Export Collapse

Which of the following is an example of MFA?

Fingerprint scan and retina scan
Fingerprint scan and retina scan
Password and PIN
Password and PIN
Username and password
Username and password
Smart card and password
Smart card and password
Suggested answer: D
Explanation:

Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or more authentication factors. Smart card and password isan example of two-factor authentication (2FA)

asked 02/10/2024
Maria Lockhart
29 questions

Question 112

Report Export Collapse

Which of the following command-line tools will delete a directory?

md
md
del
del
dir
dir
rd
rd
cd
cd
Suggested answer: D
Explanation:


To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you can remove files and subdirectories from it using the /s switch. You can also use the /q switch to suppress confirmation messages (quiet mode).

asked 02/10/2024
Karoy Bandi
38 questions

Question 113

Report Export Collapse

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Use a key combination to lock the computer when leaving.
Use a key combination to lock the computer when leaving.
Ensure no unauthorized personnel are in the area.
Ensure no unauthorized personnel are in the area.
Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
Turn off the monitor to prevent unauthorized visibility of information.
Turn off the monitor to prevent unauthorized visibility of information.
Suggested answer: A
Explanation:

The BEST way to secure the workstation quickly when walking away is to use a key combination to lock the computer when leaving1

asked 02/10/2024
Konstantinos Lagoudakis
32 questions

Question 114

Report Export Collapse

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Encrypt the workstation hard drives.
Encrypt the workstation hard drives.
Lock the workstations after five minutes of inactivity.
Lock the workstations after five minutes of inactivity.
Install privacy screens.
Install privacy screens.
Log off the users when their workstations are not in use.
Log off the users when their workstations are not in use.
Suggested answer: B
Explanation:

The BEST solution for preventing data theft within the call center in this scenario would be to lock the workstations after a period of inactivity. This would prevent unauthorized individuals from accessing patient data if call center agents were

to step away from their workstations without logging out.

asked 02/10/2024
Yuriy Kitsis
38 questions

Question 115

Report Export Collapse

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Differential backup
Differential backup
Off-site backup
Off-site backup
Incremental backup
Incremental backup
Full backup
Full backup
Suggested answer: D
Explanation:

To accomplish this task, the technician should use a Full backup method1 A full backup only requires two sets of tapes to restore because it backs up all the data from theworkstation. With a differential backup, the backups need to be taken multiple times over a period of time, so more tapes would be needed to restore the data

asked 02/10/2024
Yener Yuksel
41 questions

Question 116

Report Export Collapse

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

SFTP
SFTP
SSH
SSH
VNC
VNC
MSRA
MSRA
Suggested answer: B
Explanation:


asked 02/10/2024
Robert L Swafford
43 questions

Question 117

Report Export Collapse

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

Bridge the LAN connection between the laptop and the desktop.
Bridge the LAN connection between the laptop and the desktop.
Set the laptop configuration to DHCP to prevent conflicts.
Set the laptop configuration to DHCP to prevent conflicts.
Remove the static IP configuration from the desktop.
Remove the static IP configuration from the desktop.
Replace the network card in the laptop, as it may be defective.
Replace the network card in the laptop, as it may be defective.
Suggested answer: C
Explanation:

The new laptop was set up with the static IP it needs to connect to the software. The old desktop is still configured with that IP, hence the conflict.

asked 02/10/2024
Vasyl Basaraba
29 questions

Question 118

Report Export Collapse

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.

Which of the following backup methods should the technician MOST likely implement?

Full
Full
Mirror
Mirror
Incremental
Incremental
Differential
Differential
Suggested answer: C
asked 02/10/2024
Manuel Guerrero Rojas
38 questions

Question 119

Report Export Collapse

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company's web server to become unavailable to the general public. Which of the following attacks is occurring?

Zero day
Zero day
SOL injection
SOL injection
Cross-site scripting
Cross-site scripting
Distributed denial of service
Distributed denial of service
Suggested answer: D
Explanation:

The company is experiencing a distributed denial of service (DDoS) attack. A DDoS attack is a type of cyber attack in which multiple compromised systems are used to target a single system, causing a denial of service for users of the targeted system.

asked 02/10/2024
rafael Flores
55 questions

Question 120

Report Export Collapse

While browsing a website, a staff member received a message that the website could not be trusted.

Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues.

Which of the following is MOST likely the cause of this issue?

A bad antivirus signature update was installed.
A bad antivirus signature update was installed.
A router was misconfigured and was blocking traffic.
A router was misconfigured and was blocking traffic.
An upstream internet service provider was flapping.
An upstream internet service provider was flapping.
The time or date was not in sync with the website.
The time or date was not in sync with the website.
Suggested answer: D
Explanation:


asked 02/10/2024
Grip op IT
43 questions
Total 769 questions
Go to page: of 77
Search

Related questions