ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

A.
WPS
A.
WPS
Answers
B.
TKIP
B.
TKIP
Answers
C.
WPA3
C.
WPA3
Answers
D.
WEP
D.
WEP
Answers
Suggested answer: C

Explanation:

WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the highest level of protection available. It is designed to protect against brute force password attempts and protect against eavesdropping and man- in-the-middle attacks. WPA3 also supports the use of stronger encryption algorithms, such as the Advanced Encryption Standard (AES), which provides additional protection for wireless networks. WPA3 should be implemented in order to ensure the best possible security for the new wireless router.

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A.
The SNTP server is offline.
A.
The SNTP server is offline.
Answers
B.
A user changed the time zone on a local machine.
B.
A user changed the time zone on a local machine.
Answers
C.
The Group Policy setting has disrupted domain authentication on the system,
C.
The Group Policy setting has disrupted domain authentication on the system,
Answers
D.
The workstations and the authentication server have a system clock difference.
D.
The workstations and the authentication server have a system clock difference.
Answers
Suggested answer: D

Explanation:

The workstations and the authentication server have a system clock difference. If a Group Policy setting is applied that forces the workstations to use a specific SNTP server, but the system clock on the workstations and the authentication

server are out of sync, then this can cause authentication issues and users will be unable to log in. In this case, the most likely cause of the issue is a difference in system clocks and the technician should ensure that the clocks on the workstations and the authentication server are in sync.

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

A.
Golden image
A.
Golden image
Answers
B.
Remote network install
B.
Remote network install
Answers
C.
In-place upgrade
C.
In-place upgrade
Answers
D.
Clean install
D.
Clean install
Answers
Suggested answer: C

Explanation:

An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it will retain all user files and preferences, can be done locally, and can be done one station at a time. An in-place upgrade involves installing the new version of Windows over the existing version, and can be done quickly and easily.

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid.

Which of the following should be checked FIRST?

A.
Services in Control Panel to check for overutilization
A.
Services in Control Panel to check for overutilization
Answers
B.
Performance Monitor to check for resource utilization
B.
Performance Monitor to check for resource utilization
Answers
C.
System File Checker to check for modified Windows files
C.
System File Checker to check for modified Windows files
Answers
D.
Event Viewer to identify errors
D.
Event Viewer to identify errors
Answers
Suggested answer: C

Explanation:

System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows utility that can be used to scan for and restore corrupt Windows system files. SFC can be used to detect and fix any modified or corrupted system files on a computer, and thus should be checked first when a user reports that their computer has been running slowly since the installation of security applications [1][2]. By checking SFC, any modified or corrupted system files can be identified and fixed, potentially improving the overall performance of the computer.

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

A.
Run the virus scanner in an administrative mode.
A.
Run the virus scanner in an administrative mode.
Answers
B.
Reinstall the operating system.
B.
Reinstall the operating system.
Answers
C.
Reboot the system in safe mode and rescan.
C.
Reboot the system in safe mode and rescan.
Answers
D.
Manually delete the infected files.
D.
Manually delete the infected files.
Answers
Suggested answer: C

Explanation:

Rebooting the system in safe mode will limit the number of programs and processes running, allowing the antivirus system to more effectively identify and remove the malware. Rescanning the system will allow the antivirus system to identify and remove the malware while preserving the user's files.

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

A.
The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
A.
The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
Answers
B.
The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.
B.
The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.
Answers
C.
The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
C.
The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
Answers
D.
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
D.
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
Answers
Suggested answer: D

Explanation:

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. This is the most common method of force quitting a program in macOS.

This can be done by clicking on the Apple icon in the top left of the screen, selecting Force Quit, selecting the frozen application in the list, and then clicking Force Quit. This will force the application to quit and the spinning round cursor will disappear.

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

A.
Device Manager
A.
Device Manager
Answers
B.
System
B.
System
Answers
C.
Ease of Access Center
C.
Ease of Access Center
Answers
D.
Programs and Features
D.
Programs and Features
Answers
Suggested answer: C

Explanation:

The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of Access Center, the technician can turn on options like high contrast display, screen magnification, and screen reader software to help the user better interact with the computer.

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

A.
Send a quick message regarding the delay to the next customer.
A.
Send a quick message regarding the delay to the next customer.
Answers
B.
Cut the current customer's lime short and rush to the next customer.
B.
Cut the current customer's lime short and rush to the next customer.
Answers
C.
Apologize to the next customer when arriving late.
C.
Apologize to the next customer when arriving late.
Answers
D.
Arrive late to the next meeting without acknowledging the lime.
D.
Arrive late to the next meeting without acknowledging the lime.
Answers
Suggested answer: A

Explanation:

The support representative should send a quick message regarding the delay to the next customer.This will help the next customer understand the situation and adjust their schedule accordingly.

An administrator has received approval for a change request for an upcoming server deployment.

Which of the following steps should be completed NEXT?

A.
Perform a risk analysis.
A.
Perform a risk analysis.
Answers
B.
Implement the deployment.
B.
Implement the deployment.
Answers
C.
Verify end user acceptance
C.
Verify end user acceptance
Answers
D.
Document the lessons learned.
D.
Document the lessons learned.
Answers
Suggested answer: A

Explanation:

Before making any changes to the system, it is important to assess the risks associated with the change and determine whether it is worth implementing. Risk analysis involves identifying potential risks, assessing their likelihood and impact, and determining what steps can be taken to mitigate them. It is important to perform this step before making any changes, as this allows the administrator to make an informed decision about whether or not the change should be implemented. Once the risks have been assessed and the administrator has decided to go ahead with the change, the next step is to implement the deployment.

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.
Avoid distractions
A.
Avoid distractions
Answers
B.
Deal appropriately with customer's confidential material .
B.
Deal appropriately with customer's confidential material .
Answers
C.
Adhere to user privacy policy
C.
Adhere to user privacy policy
Answers
D.
Set and meet timelines
D.
Set and meet timelines
Answers
Suggested answer: A

Explanation:

The technician's action of setting the phone to silent while troubleshooting the customer's PC is an example of avoiding distractions. By setting the phone to silent, the technician is ensuring that they are able to focus on the task at hand without any distractions that could potentially disrupt their workflow. This is an important practice when handling customer's confidential material, as it ensures that the technician is able to focus on the task and not be distracted by any external sources.

Furthermore, it also adheres to user privacy policies, as the technician is not exposing any confidential information to any external sources.

Total 755 questions
Go to page: of 76