ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?

A.
A daily, incremental backup that is saved to the corporate file server
A.
A daily, incremental backup that is saved to the corporate file server
Answers
B.
An additional, secondary hard drive in a mirrored RAID configuration
B.
An additional, secondary hard drive in a mirrored RAID configuration
Answers
C.
A full backup of the data that is stored of site in cold storage
C.
A full backup of the data that is stored of site in cold storage
Answers
D.
Weekly, differential backups that are stored in a cloud-hosting provider
D.
Weekly, differential backups that are stored in a cloud-hosting provider
Answers
Suggested answer: C

Explanation:

According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a separate physical location, it is less likely to be affected by the same event that could cause data loss on the original system. Cold storage is a term used for data archiving, which typically refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for regulatory or compliance reasons.

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?

A.
Rearranging the monitor's position in display settings
A.
Rearranging the monitor's position in display settings
Answers
B.
Swapping the cables for the monitors
B.
Swapping the cables for the monitors
Answers
C.
Using the Ctrl+AIt+> to correct the display orientation
C.
Using the Ctrl+AIt+> to correct the display orientation
Answers
D.
Updating the display drivers for the video card
D.
Updating the display drivers for the video card
Answers
Suggested answer: B

Explanation:

The correct answer is B. Swapping the cables for the monitors. When the second monitor is connected with the HDMI port, it is necessary to swap the cables for the monitors so that the mouse can move from the original monitor to the new monitor. This is because the HDMI port is designed to only support one monitor, and the mouse will not be able to move from one to the other without the cables being swapped.

According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the cables used to connect the displays must be swapped between the displays. For example, if a monitor is connected to a system using a VGA cable, the VGA cable must be moved to the next display to allow the mouse to move between the two displays."

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

A.
acceptable use policy.
A.
acceptable use policy.
Answers
B.
regulatory compliance requirements.
B.
regulatory compliance requirements.
Answers
C.
non-disclosure agreement
C.
non-disclosure agreement
Answers
D.
incident response procedures
D.
incident response procedures
Answers
Suggested answer: A

Explanation:

Logging into a user's account without their explicit permission is a violation of the acceptable use policy, which outlines the rules and regulations by which a user must abide while using a computer system. By logging into the user's account without their permission, the technician would be violating this policy. Additionally, this action could be seen as a breach of confidentiality, as the technician would have access to information that should remain confidential.

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.
Implementing a support portal
A.
Implementing a support portal
Answers
B.
Creating a ticketing system
B.
Creating a ticketing system
Answers
C.
Commissioning an automated callback system
C.
Commissioning an automated callback system
Answers
D.
Submitting tickets through email
D.
Submitting tickets through email
Answers
Suggested answer: A

Explanation:

A support portal is an online system that allows customers to access customer service tools, submit requests and view status updates, as well as access information such as how-to guides, FAQs, and other self-service resources. This would be the best solution for the service desk, as it would allow them to easily manage the volume of requests by allowing customers to submit their own requests and view the status of their requests. Additionally, the portal would provide customers with selfservice resources that can help them resolve their own issues, reducing the amount of tickets that need to be handled by the service desk.

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

A.
incineration
A.
incineration
Answers
B.
Resale
B.
Resale
Answers
C.
Physical destruction
C.
Physical destruction
Answers
D.
Dumpster for recycling plastics
D.
Dumpster for recycling plastics
Answers
Suggested answer: D

Explanation:

When disposing of non-compliant Ethernet cards, the most environmentally friendly option is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials. Additionally, recycling plastics helps to reduce the amount of toxic chemicals that can be released into the environment.

According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials."

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date.

Which of the following steps should the technician take NEXT?

A.
Quarantine the computer.
A.
Quarantine the computer.
Answers
B.
use a previous restore point,
B.
use a previous restore point,
Answers
C.
Educate the end user about viruses
C.
Educate the end user about viruses
Answers
D.
Download the latest virus definitions
D.
Download the latest virus definitions
Answers
Suggested answer: D

Explanation:

This will ensure that the antivirus software is up-to-date, and can detect any new viruses that may have been released since the last virus definition update.

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains:

1.3 Explain the importance of security awareness and 2.2 Given a scenario, use secure data management and disaster recovery principles.

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

A.
Require the user to change the password at the next log-in.
A.
Require the user to change the password at the next log-in.
Answers
B.
Disallow tie user from changing the password.
B.
Disallow tie user from changing the password.
Answers
C.
Disable the account
C.
Disable the account
Answers
D.
Choose a password that never expires.
D.
Choose a password that never expires.
Answers
Suggested answer: A

Explanation:

This will ensure that the user is the only one who knows their password, and that the new password is secure.

The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use appropriate data destruction and disposal methods.

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take?

A.
Runa live disk clone.
A.
Runa live disk clone.
Answers
B.
Run a full antivirus scan.
B.
Run a full antivirus scan.
Answers
C.
Use a batch file to rename the files-
C.
Use a batch file to rename the files-
Answers
D.
Disconnect the machine from the network
D.
Disconnect the machine from the network
Answers
Suggested answer: D

Explanation:

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness.

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

A.
RDP through RD Gateway
A.
RDP through RD Gateway
Answers
B.
Apple Remote Desktop
B.
Apple Remote Desktop
Answers
C.
SSH access with SSH keys
C.
SSH access with SSH keys
Answers
D.
VNC with username and password
D.
VNC with username and password
Answers
Suggested answer: B

Explanation:


Apple Remote Desktop is a remote access solution that allows a user to access and control another macOS computer from their Windows workstation. It provides a graphical user interface so that the analyst can easily access the server software running on the macOS server. Apple Remote Desktop also supports file transfers, so the analyst can easily transfer files between the two computers.

Additionally, Apple Remote Desktop supports encryption, so data is secure during transmission.

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A.
Requiring strong passwords
A.
Requiring strong passwords
Answers
B.
Disabling cached credentials
B.
Disabling cached credentials
Answers
C.
Requiring MFA to sign on
C.
Requiring MFA to sign on
Answers
D.
Enabling BitLocker on all hard drives
D.
Enabling BitLocker on all hard drives
Answers
Suggested answer: D

Explanation:

BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop.

This will protect the data stored on the drive in the event that the laptop is lost or stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be configured to require a PIN or other authentication in order to unlock the drive, providing an additional layer of security.

Total 755 questions
Go to page: of 76