ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

A.
Escalate the ticket to Tier 2.
A.
Escalate the ticket to Tier 2.
Answers
B.
Run a virus scan.
B.
Run a virus scan.
Answers
C.
Utilize a Windows restore point.
C.
Utilize a Windows restore point.
Answers
D.
Reimage the computer.
D.
Reimage the computer.
Answers
Suggested answer: B

Explanation:

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives(3-0) When a user reports that their workstation is behaving strangely after opening a suspicious email, the first step a technician should take is to run a virus scan on the computer. This is because opening a suspicious email is a common way for viruses and malware to infect a computer. Running a virus scan can help identify and remove any infections that may be causing the computer to behave strangely.

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

A.
System time
A.
System time
Answers
B.
IP address
B.
IP address
Answers
C.
DNS servers
C.
DNS servers
Answers
D.
Windows updates
D.
Windows updates
Answers
Suggested answer: C

Explanation:

When a user experiences unexpected or erratic behavior while browsing the internet, it could be caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP addresses, which computers can use to communicate with web servers. If the DNS servers are not functioning correctly or have been compromised, it can result in the browser being redirected to unintended websites.

Which of the following is the STRONGEST wireless configuration?

A.
WPS
A.
WPS
Answers
B.
WPA3
B.
WPA3
Answers
C.
WEP
C.
WEP
Answers
D.
WMN
D.
WMN
Answers
Suggested answer: B

Explanation:

The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way to do the initial key exchange. At the same time, the session key size of WPA3 increases to 128-bit in WPA3-Personal mode and 192-bit in WPA3-Enterprise, which makes the password harder to crack than the previous Wi-Fi security standards

https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

A.
NTFS
A.
NTFS
Answers
B.
APFS
B.
APFS
Answers
C.
ext4
C.
ext4
Answers
D.
exFAT
D.
exFAT
Answers
Suggested answer: D

Explanation:

The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a file system that is designed to be used on flash drives like USB sticks and SD cards. It is supported by both Macs and Windows PCs, and it can handle large files and volumes

https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

A.
Enabling System Restore
A.
Enabling System Restore
Answers
B.
Educating the user
B.
Educating the user
Answers
C.
Booting into safe mode
C.
Booting into safe mode
Answers
D.
Scheduling a scan
D.
Scheduling a scan
Answers
Suggested answer: B

Explanation:

Although updating the anti-malware software and running scans are important steps in removing malware, they may not be sufficient to permanently remove the malware if the user keeps engaging in behaviors that leave the system vulnerable, such as downloading unknown files or visiting malicious websites. Therefore, educating the user on safe computing practices is the best way to prevent future infections and permanently remove the malware.

Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most efficient ways to permanently remove the malware. Enabling System Restore and Booting into safe mode may help in some cases, but they may not be sufficient to permanently remove the malware. Scheduling a scan is also important for detecting and removing malware, but it may not be sufficient to prevent future infections.

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives(3-0)

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

A.
Zero day
A.
Zero day
Answers
B.
Vishing
B.
Vishing
Answers
C.
DDoS
C.
DDoS
Answers
D.
Evil twin
D.
Evil twin
Answers
Suggested answer: D

Explanation:


Which of the following change management documents includes how to uninstall a patch?

A.
Purpose of change
A.
Purpose of change
Answers
B.
Rollback plan
B.
Rollback plan
Answers
C.
Scope of change
C.
Scope of change
Answers
D.
Risk analysis
D.
Risk analysis
Answers
Suggested answer: B

Explanation:

The change management document that includes how to uninstall a patch is called the "rollback plan". The rollback plan is a document that outlines the steps that should be taken to undo a change that has been made to a system. In the case of a patch, the rollback plan would include instructions on how to uninstall the patch if it causes problems or conflicts with other software12

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

A.
Multifactor authentication will be forced for Wi-Fi.
A.
Multifactor authentication will be forced for Wi-Fi.
Answers
B.
All Wi-Fi traffic will be encrypted in transit.
B.
All Wi-Fi traffic will be encrypted in transit.
Answers
C.
Eavesdropping attempts will be prevented.
C.
Eavesdropping attempts will be prevented.
Answers
D.
Rogue access points will not connect.
D.
Rogue access points will not connect.
Answers
Suggested answer: A

Explanation:


In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

A.
A new IT policy requires users to set up a lock screen PIN.
A.
A new IT policy requires users to set up a lock screen PIN.
Answers
B.
A user is overseas and wants to use a compatible international SIM Card.
B.
A user is overseas and wants to use a compatible international SIM Card.
Answers
C.
A user left the phone at home and wants to prevent children from gaining access to the phone.
C.
A user left the phone at home and wants to prevent children from gaining access to the phone.
Answers
D.
A user traded in the company phone for a cell carrier upgrade by mistake.
D.
A user traded in the company phone for a cell carrier upgrade by mistake.
Answers
E.
A user cannot locate the phone after attending a play at a theater.
E.
A user cannot locate the phone after attending a play at a theater.
Answers
F.
A user forgot the phone in a taxi, and the driver called the company to return the device.
F.
A user forgot the phone in a taxi, and the driver called the company to return the device.
Answers
Suggested answer: E, F

Explanation:

Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in situations where a device is lost or stolen, or when sensitive data needs to be removed from a device. Remote wipe capabilities are most likely to be used in the following scenarios:

1. A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the company to return the device1 In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device and to protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data on the device before it is returned to the user.

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.
Restore the device to factory settings.
A.
Restore the device to factory settings.
Answers
B.
Uninstall the unapproved application.
B.
Uninstall the unapproved application.
Answers
C.
Disable the ability to install applications from unknown sources.
C.
Disable the ability to install applications from unknown sources.
Answers
D.
Ensure the device is connected to the corporate WiFi network.
D.
Ensure the device is connected to the corporate WiFi network.
Answers
Suggested answer: B

Explanation:

The technician should disable the user's access to the device's command shell. This will prevent the user from accessing sensitive data and will help to prevent further data leaks. The technician should then investigate the unapproved application to determine if it is the cause of the data leak. If the application is found to be the cause of the leak, the technician should uninstall the application and restore the device to factory settings. If the application is not the cause of the leak, the technician should investigate further to determine the cause of the leak. Disabling the ability to install applications from unknown sources can help to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to this scenario1

Total 755 questions
Go to page: of 76