ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

Owners can be notified a change is being made and can monitor it for performance impact. Most Voted
Owners can be notified a change is being made and can monitor it for performance impact. Most Voted
A risk assessment can be performed to determine if the software is needed.
A risk assessment can be performed to determine if the software is needed.
End users can be aware of the scope of the change.
End users can be aware of the scope of the change.
A rollback plan can be implemented in case the software breaks an application.
A rollback plan can be implemented in case the software breaks an application.
Suggested answer: A
Explanation:

change management process can help ensure that owners are notified of changes being made and can monitor them for performance impact (A). This can help prevent unexpected issues from arising.

asked 02/10/2024
ce temp2
50 questions

Question 122

Report Export Collapse

Which of the following should be done NEXT?

Send an email to Telecom to inform them of the issue and prevent reoccurrence.
Send an email to Telecom to inform them of the issue and prevent reoccurrence.
Close the ticket out.
Close the ticket out.
Tell the user to take time to fix it themselves next time.
Tell the user to take time to fix it themselves next time.
Educate the user on the solution that was performed.
Educate the user on the solution that was performed.
Suggested answer: D
Explanation:

educating the user on the solution that was performed is a good next step after resolving an issue.This can help prevent similar issues from happening again and empower users to solve problems on their own.

asked 02/10/2024
Josefa Vera Gago
42 questions

Question 123

Report Export Collapse

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

File Explorer
File Explorer
User Account Control
User Account Control
Windows Backup and Restore
Windows Backup and Restore
Windows Firewall
Windows Firewall
Windows Defender
Windows Defender
Most voted
(1)
Most voted
Network Packet Analyzer
Network Packet Analyzer
Most voted
(1)
Most voted
Suggested answer: A, E
Explanation:

The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in antivirus program that can detect and remove malicious software from a workstation. File Explorercan be used to locate and delete files associated with the malicious software

asked 02/10/2024
Kurt Woodfin
48 questions

Question 124

Report Export Collapse

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Educate the user on malware removal.
Educate the user on malware removal.
Educate the user on how to reinstall the laptop OS.
Educate the user on how to reinstall the laptop OS.
Educate the user on how to access recovery mode.
Educate the user on how to access recovery mode.
Educate the user on common threats and how to avoid them.
Educate the user on common threats and how to avoid them.
Suggested answer: D
Explanation:

educating the user on common threats and how to avoid them (D) would be a good step before returning the laptop to the user. This can help prevent similar issues from happening again

asked 02/10/2024
Ramon Vieira da Rocha
41 questions

Question 125

Report Export Collapse

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.

Which of the following backup methods should the technician MOST likely implement?

Full
Full
Mirror
Mirror
Incremental
Incremental
Differential
Differential
Suggested answer: C
Explanation:

The law firm wants to retain more versions of the backups when possible, so the best backup method for the technician to implement in this scenario would be Incremental backup. Incremental backups only save the changes made since the last backup, which allows for more frequent backups and minimizes the amount of storage required. This would allow the law firm to retain more than three versions of backups without risking backup failure.To retain more versions of backups, the technician should implement an Incremental backup method12An incremental backup method only backs up the data that has changed since the last backup, so it requires less storage space than a full backup

asked 02/10/2024
Madhanraj N
47 questions

Question 126

Report Export Collapse

Which of the following is the MOST basic version of Windows that includes BitLocker?

Home
Home
pro
pro
Enterprise
Enterprise
Pro for Workstations
Pro for Workstations
Suggested answer: B
Explanation:


asked 02/10/2024
MIGUEL PARADA VAZQUEZ
36 questions

Question 127

Report Export Collapse

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

The GPS application is installing software updates.
The GPS application is installing software updates.
The GPS application contains malware.
The GPS application contains malware.
The GPS application is updating its geospatial map data.
The GPS application is updating its geospatial map data.
The GPS application is conflicting with the built-in GPS.
The GPS application is conflicting with the built-in GPS.
Suggested answer: B
Explanation:

The GPS application contains malware. The third-party GPS application is likely the cause of the slow performance of the phone. The application may contain malware that is using up system resourcesand slowing down the phone. The user should uninstall the application and run a malware scan on the phone1

asked 02/10/2024
José Gonçalves
36 questions

Question 128

Report Export Collapse

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Differential backup
Differential backup
Off-site backup
Off-site backup
Incremental backup
Incremental backup
Full backup
Full backup
Suggested answer: D
Explanation:

A full backup involves creating a copy of all data on the workstation, including system files and usercreated data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that the data can be restored in the event of a system failure or data loss.

asked 02/10/2024
Nicolas GARCIA
37 questions

Question 129

Report Export Collapse

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
Delete the microphone from Device Manager and scan for new hardware,
Delete the microphone from Device Manager and scan for new hardware,
Replace the USB microphone with one that uses a traditional 3.5mm plug.
Replace the USB microphone with one that uses a traditional 3.5mm plug.
Suggested answer: B
Explanation:

In Windows 10, there are privacy settings that control access to certain devices, such as microphones, cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio.

The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP application to allow it to access the microphone.

Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5 mm plug is not recommended, as it would require purchasing a new microphone and may not solve the issue.

asked 02/10/2024
Deepak PSK
50 questions

Question 130

Report Export Collapse

A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?

PIN-based login
PIN-based login
Quarterly password changes
Quarterly password changes
Hard drive encryption
Hard drive encryption
A physical laptop lock
A physical laptop lock
Suggested answer: C
Explanation:

Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone without the correct encryption key. This is an important security measure for any laptop used by an employee who travels, as it helps to protect the data stored on the laptop from unauthorized access.

asked 02/10/2024
adnan ayyash
46 questions
Total 769 questions
Go to page: of 77
Search

Related questions