ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

WPS
WPS
TKIP
TKIP
WPA3
WPA3
WEP
WEP
Suggested answer: C
Explanation:

WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the highest level of protection available. It is designed to protect against brute force password attempts and protect against eavesdropping and man- in-the-middle attacks. WPA3 also supports the use of stronger encryption algorithms, such as the Advanced Encryption Standard (AES), which provides additional protection for wireless networks. WPA3 should be implemented in order to ensure the best possible security for the new wireless router.

asked 02/10/2024
Rafael Pabon
54 questions

Question 152

Report Export Collapse

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

The SNTP server is offline.
The SNTP server is offline.
A user changed the time zone on a local machine.
A user changed the time zone on a local machine.
The Group Policy setting has disrupted domain authentication on the system,
The Group Policy setting has disrupted domain authentication on the system,
The workstations and the authentication server have a system clock difference.
The workstations and the authentication server have a system clock difference.
Suggested answer: D
Explanation:

The workstations and the authentication server have a system clock difference. If a Group Policy setting is applied that forces the workstations to use a specific SNTP server, but the system clock on the workstations and the authentication

server are out of sync, then this can cause authentication issues and users will be unable to log in. In this case, the most likely cause of the issue is a difference in system clocks and the technician should ensure that the clocks on the workstations and the authentication server are in sync.

asked 02/10/2024
AshokBabu Kumili
48 questions

Question 153

Report Export Collapse

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

Golden image
Golden image
Remote network install
Remote network install
In-place upgrade
In-place upgrade
Clean install
Clean install
Suggested answer: C
Explanation:

An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it will retain all user files and preferences, can be done locally, and can be done one station at a time. An in-place upgrade involves installing the new version of Windows over the existing version, and can be done quickly and easily.

asked 02/10/2024
Unai M
46 questions

Question 154

Report Export Collapse

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid.

Which of the following should be checked FIRST?

Services in Control Panel to check for overutilization
Services in Control Panel to check for overutilization
Performance Monitor to check for resource utilization
Performance Monitor to check for resource utilization
System File Checker to check for modified Windows files
System File Checker to check for modified Windows files
Event Viewer to identify errors
Event Viewer to identify errors
Suggested answer: C
Explanation:

System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows utility that can be used to scan for and restore corrupt Windows system files. SFC can be used to detect and fix any modified or corrupted system files on a computer, and thus should be checked first when a user reports that their computer has been running slowly since the installation of security applications [1][2]. By checking SFC, any modified or corrupted system files can be identified and fixed, potentially improving the overall performance of the computer.

asked 02/10/2024
Francis Sailer
49 questions

Question 155

Report Export Collapse

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Run the virus scanner in an administrative mode.
Run the virus scanner in an administrative mode.
Reinstall the operating system.
Reinstall the operating system.
Reboot the system in safe mode and rescan.
Reboot the system in safe mode and rescan.
Manually delete the infected files.
Manually delete the infected files.
Suggested answer: C
Explanation:

Rebooting the system in safe mode will limit the number of programs and processes running, allowing the antivirus system to more effectively identify and remove the malware. Rescanning the system will allow the antivirus system to identify and remove the malware while preserving the user's files.

asked 02/10/2024
Oleksandr Kondratchuk
37 questions

Question 156

Report Export Collapse

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.
The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.
The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
Suggested answer: D
Explanation:

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. This is the most common method of force quitting a program in macOS.

This can be done by clicking on the Apple icon in the top left of the screen, selecting Force Quit, selecting the frozen application in the list, and then clicking Force Quit. This will force the application to quit and the spinning round cursor will disappear.

asked 02/10/2024
Sweet Don
42 questions

Question 157

Report Export Collapse

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Device Manager
Device Manager
System
System
Ease of Access Center
Ease of Access Center
Programs and Features
Programs and Features
Suggested answer: C
Explanation:

The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of Access Center, the technician can turn on options like high contrast display, screen magnification, and screen reader software to help the user better interact with the computer.

asked 02/10/2024
Kanik Sachdeva
44 questions

Question 158

Report Export Collapse

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

Send a quick message regarding the delay to the next customer.
Send a quick message regarding the delay to the next customer.
Cut the current customer's lime short and rush to the next customer.
Cut the current customer's lime short and rush to the next customer.
Apologize to the next customer when arriving late.
Apologize to the next customer when arriving late.
Arrive late to the next meeting without acknowledging the lime.
Arrive late to the next meeting without acknowledging the lime.
Suggested answer: A
Explanation:

The support representative should send a quick message regarding the delay to the next customer.This will help the next customer understand the situation and adjust their schedule accordingly.

asked 02/10/2024
Volkan Ozsoy
40 questions

Question 159

Report Export Collapse

An administrator has received approval for a change request for an upcoming server deployment.

Which of the following steps should be completed NEXT?

Perform a risk analysis.
Perform a risk analysis.
Implement the deployment.
Implement the deployment.
Most voted
(1)
Most voted
Verify end user acceptance
Verify end user acceptance
Document the lessons learned.
Document the lessons learned.
Suggested answer: A
Explanation:

Before making any changes to the system, it is important to assess the risks associated with the change and determine whether it is worth implementing. Risk analysis involves identifying potential risks, assessing their likelihood and impact, and determining what steps can be taken to mitigate them. It is important to perform this step before making any changes, as this allows the administrator to make an informed decision about whether or not the change should be implemented. Once the risks have been assessed and the administrator has decided to go ahead with the change, the next step is to implement the deployment.

asked 02/10/2024
William Dalgo
35 questions

Question 160

Report Export Collapse

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions
Avoid distractions
Deal appropriately with customer's confidential material .
Deal appropriately with customer's confidential material .
Adhere to user privacy policy
Adhere to user privacy policy
Set and meet timelines
Set and meet timelines
Suggested answer: A
Explanation:

The technician's action of setting the phone to silent while troubleshooting the customer's PC is an example of avoiding distractions. By setting the phone to silent, the technician is ensuring that they are able to focus on the task at hand without any distractions that could potentially disrupt their workflow. This is an important practice when handling customer's confidential material, as it ensures that the technician is able to focus on the task and not be distracted by any external sources.

Furthermore, it also adheres to user privacy policies, as the technician is not exposing any confidential information to any external sources.

asked 02/10/2024
ERIK BURDETT
51 questions
Total 817 questions
Go to page: of 82
Search

Related questions