ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

A.
Owners can be notified a change is being made and can monitor it for performance impact. Most Voted
A.
Owners can be notified a change is being made and can monitor it for performance impact. Most Voted
Answers
B.
A risk assessment can be performed to determine if the software is needed.
B.
A risk assessment can be performed to determine if the software is needed.
Answers
C.
End users can be aware of the scope of the change.
C.
End users can be aware of the scope of the change.
Answers
D.
A rollback plan can be implemented in case the software breaks an application.
D.
A rollback plan can be implemented in case the software breaks an application.
Answers
Suggested answer: A

Explanation:

change management process can help ensure that owners are notified of changes being made and can monitor them for performance impact (A). This can help prevent unexpected issues from arising.

Which of the following should be done NEXT?

A.
Send an email to Telecom to inform them of the issue and prevent reoccurrence.
A.
Send an email to Telecom to inform them of the issue and prevent reoccurrence.
Answers
B.
Close the ticket out.
B.
Close the ticket out.
Answers
C.
Tell the user to take time to fix it themselves next time.
C.
Tell the user to take time to fix it themselves next time.
Answers
D.
Educate the user on the solution that was performed.
D.
Educate the user on the solution that was performed.
Answers
Suggested answer: D

Explanation:

educating the user on the solution that was performed is a good next step after resolving an issue.This can help prevent similar issues from happening again and empower users to solve problems on their own.

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

A.
File Explorer
A.
File Explorer
Answers
B.
User Account Control
B.
User Account Control
Answers
C.
Windows Backup and Restore
C.
Windows Backup and Restore
Answers
D.
Windows Firewall
D.
Windows Firewall
Answers
E.
Windows Defender
E.
Windows Defender
Answers
F.
Network Packet Analyzer
F.
Network Packet Analyzer
Answers
Suggested answer: A, E

Explanation:

The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in antivirus program that can detect and remove malicious software from a workstation. File Explorercan be used to locate and delete files associated with the malicious software

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

A.
Educate the user on malware removal.
A.
Educate the user on malware removal.
Answers
B.
Educate the user on how to reinstall the laptop OS.
B.
Educate the user on how to reinstall the laptop OS.
Answers
C.
Educate the user on how to access recovery mode.
C.
Educate the user on how to access recovery mode.
Answers
D.
Educate the user on common threats and how to avoid them.
D.
Educate the user on common threats and how to avoid them.
Answers
Suggested answer: D

Explanation:

educating the user on common threats and how to avoid them (D) would be a good step before returning the laptop to the user. This can help prevent similar issues from happening again

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.

Which of the following backup methods should the technician MOST likely implement?

A.
Full
A.
Full
Answers
B.
Mirror
B.
Mirror
Answers
C.
Incremental
C.
Incremental
Answers
D.
Differential
D.
Differential
Answers
Suggested answer: C

Explanation:

The law firm wants to retain more versions of the backups when possible, so the best backup method for the technician to implement in this scenario would be Incremental backup. Incremental backups only save the changes made since the last backup, which allows for more frequent backups and minimizes the amount of storage required. This would allow the law firm to retain more than three versions of backups without risking backup failure.To retain more versions of backups, the technician should implement an Incremental backup method12An incremental backup method only backs up the data that has changed since the last backup, so it requires less storage space than a full backup

Which of the following is the MOST basic version of Windows that includes BitLocker?

A.
Home
A.
Home
Answers
B.
pro
B.
pro
Answers
C.
Enterprise
C.
Enterprise
Answers
D.
Pro for Workstations
D.
Pro for Workstations
Answers
Suggested answer: B

Explanation:


A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

A.
The GPS application is installing software updates.
A.
The GPS application is installing software updates.
Answers
B.
The GPS application contains malware.
B.
The GPS application contains malware.
Answers
C.
The GPS application is updating its geospatial map data.
C.
The GPS application is updating its geospatial map data.
Answers
D.
The GPS application is conflicting with the built-in GPS.
D.
The GPS application is conflicting with the built-in GPS.
Answers
Suggested answer: B

Explanation:

The GPS application contains malware. The third-party GPS application is likely the cause of the slow performance of the phone. The application may contain malware that is using up system resourcesand slowing down the phone. The user should uninstall the application and run a malware scan on the phone1

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.
Differential backup
A.
Differential backup
Answers
B.
Off-site backup
B.
Off-site backup
Answers
C.
Incremental backup
C.
Incremental backup
Answers
D.
Full backup
D.
Full backup
Answers
Suggested answer: D

Explanation:

A full backup involves creating a copy of all data on the workstation, including system files and usercreated data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that the data can be restored in the event of a system failure or data loss.

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?

A.
Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
A.
Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
Answers
B.
Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
B.
Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
Answers
C.
Delete the microphone from Device Manager and scan for new hardware,
C.
Delete the microphone from Device Manager and scan for new hardware,
Answers
D.
Replace the USB microphone with one that uses a traditional 3.5mm plug.
D.
Replace the USB microphone with one that uses a traditional 3.5mm plug.
Answers
Suggested answer: B

Explanation:

In Windows 10, there are privacy settings that control access to certain devices, such as microphones, cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio.

The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP application to allow it to access the microphone.

Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5 mm plug is not recommended, as it would require purchasing a new microphone and may not solve the issue.

A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?

A.
PIN-based login
A.
PIN-based login
Answers
B.
Quarterly password changes
B.
Quarterly password changes
Answers
C.
Hard drive encryption
C.
Hard drive encryption
Answers
D.
A physical laptop lock
D.
A physical laptop lock
Answers
Suggested answer: C

Explanation:

Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone without the correct encryption key. This is an important security measure for any laptop used by an employee who travels, as it helps to protect the data stored on the laptop from unauthorized access.

Total 755 questions
Go to page: of 76