ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?

A daily, incremental backup that is saved to the corporate file server
A daily, incremental backup that is saved to the corporate file server
An additional, secondary hard drive in a mirrored RAID configuration
An additional, secondary hard drive in a mirrored RAID configuration
A full backup of the data that is stored of site in cold storage
A full backup of the data that is stored of site in cold storage
Weekly, differential backups that are stored in a cloud-hosting provider
Weekly, differential backups that are stored in a cloud-hosting provider
Suggested answer: C
Explanation:

According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a separate physical location, it is less likely to be affected by the same event that could cause data loss on the original system. Cold storage is a term used for data archiving, which typically refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for regulatory or compliance reasons.

asked 02/10/2024
Pablo Hilario
44 questions

Question 142

Report Export Collapse

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?

Rearranging the monitor's position in display settings
Rearranging the monitor's position in display settings
Most voted
(1)
Most voted
Swapping the cables for the monitors
Swapping the cables for the monitors
Using the Ctrl+AIt+> to correct the display orientation
Using the Ctrl+AIt+> to correct the display orientation
Updating the display drivers for the video card
Updating the display drivers for the video card
Suggested answer: B
Explanation:

The correct answer is B. Swapping the cables for the monitors. When the second monitor is connected with the HDMI port, it is necessary to swap the cables for the monitors so that the mouse can move from the original monitor to the new monitor. This is because the HDMI port is designed to only support one monitor, and the mouse will not be able to move from one to the other without the cables being swapped.

According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the cables used to connect the displays must be swapped between the displays. For example, if a monitor is connected to a system using a VGA cable, the VGA cable must be moved to the next display to allow the mouse to move between the two displays."

asked 02/10/2024
Alexander Castro
46 questions

Question 143

Report Export Collapse

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

acceptable use policy.
acceptable use policy.
regulatory compliance requirements.
regulatory compliance requirements.
non-disclosure agreement
non-disclosure agreement
incident response procedures
incident response procedures
Suggested answer: A
Explanation:

Logging into a user's account without their explicit permission is a violation of the acceptable use policy, which outlines the rules and regulations by which a user must abide while using a computer system. By logging into the user's account without their permission, the technician would be violating this policy. Additionally, this action could be seen as a breach of confidentiality, as the technician would have access to information that should remain confidential.

asked 02/10/2024
Rostyslav Skrypnyk
53 questions

Question 144

Report Export Collapse

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Implementing a support portal
Implementing a support portal
Creating a ticketing system
Creating a ticketing system
Commissioning an automated callback system
Commissioning an automated callback system
Submitting tickets through email
Submitting tickets through email
Suggested answer: A
Explanation:

A support portal is an online system that allows customers to access customer service tools, submit requests and view status updates, as well as access information such as how-to guides, FAQs, and other self-service resources. This would be the best solution for the service desk, as it would allow them to easily manage the volume of requests by allowing customers to submit their own requests and view the status of their requests. Additionally, the portal would provide customers with selfservice resources that can help them resolve their own issues, reducing the amount of tickets that need to be handled by the service desk.

asked 02/10/2024
TANVIR ANJUM
39 questions

Question 145

Report Export Collapse

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

incineration
incineration
Resale
Resale
Most voted
(1)
Most voted
Physical destruction
Physical destruction
Dumpster for recycling plastics
Dumpster for recycling plastics
Suggested answer: D
Explanation:

When disposing of non-compliant Ethernet cards, the most environmentally friendly option is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials. Additionally, recycling plastics helps to reduce the amount of toxic chemicals that can be released into the environment.

According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials."

asked 02/10/2024
Reece Scarley
46 questions

Question 146

Report Export Collapse

A technician has verified that a user's computer has a virus, and the antivirus software is out Of date.

Which of the following steps should the technician take NEXT?

Quarantine the computer.
Quarantine the computer.
Most voted
(1)
Most voted
use a previous restore point,
use a previous restore point,
Educate the end user about viruses
Educate the end user about viruses
Download the latest virus definitions
Download the latest virus definitions
Suggested answer: D
Explanation:

This will ensure that the antivirus software is up-to-date, and can detect any new viruses that may have been released since the last virus definition update.

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains:

1.3 Explain the importance of security awareness and 2.2 Given a scenario, use secure data management and disaster recovery principles.

asked 02/10/2024
Franziska Kreuz
44 questions

Question 147

Report Export Collapse

A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do?

Require the user to change the password at the next log-in.
Require the user to change the password at the next log-in.
Disallow tie user from changing the password.
Disallow tie user from changing the password.
Disable the account
Disable the account
Choose a password that never expires.
Choose a password that never expires.
Suggested answer: A
Explanation:

This will ensure that the user is the only one who knows their password, and that the new password is secure.

The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use appropriate data destruction and disposal methods.

asked 02/10/2024
SIDDIQI TARMIM
43 questions

Question 148

Report Export Collapse

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take?

Runa live disk clone.
Runa live disk clone.
Run a full antivirus scan.
Run a full antivirus scan.
Use a batch file to rename the files-
Use a batch file to rename the files-
Disconnect the machine from the network
Disconnect the machine from the network
Suggested answer: D
Explanation:

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness.

asked 02/10/2024
David Aghaegbuna
49 questions

Question 149

Report Export Collapse

An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?

RDP through RD Gateway
RDP through RD Gateway
Apple Remote Desktop
Apple Remote Desktop
SSH access with SSH keys
SSH access with SSH keys
VNC with username and password
VNC with username and password
Most voted
(1)
Most voted
Suggested answer: B
Explanation:


Apple Remote Desktop is a remote access solution that allows a user to access and control another macOS computer from their Windows workstation. It provides a graphical user interface so that the analyst can easily access the server software running on the macOS server. Apple Remote Desktop also supports file transfers, so the analyst can easily transfer files between the two computers.

Additionally, Apple Remote Desktop supports encryption, so data is secure during transmission.

asked 02/10/2024
SCOTTIE EASTER
46 questions

Question 150

Report Export Collapse

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Requiring strong passwords
Requiring strong passwords
Disabling cached credentials
Disabling cached credentials
Requiring MFA to sign on
Requiring MFA to sign on
Enabling BitLocker on all hard drives
Enabling BitLocker on all hard drives
Suggested answer: D
Explanation:

BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop.

This will protect the data stored on the drive in the event that the laptop is lost or stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be configured to require a PIN or other authentication in order to unlock the drive, providing an additional layer of security.

asked 02/10/2024
Marinus Johannes Klomp
45 questions
Total 769 questions
Go to page: of 77
Search

Related questions