ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report Export Collapse

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Escalate the ticket to Tier 2.
Escalate the ticket to Tier 2.
Run a virus scan.
Run a virus scan.
Utilize a Windows restore point.
Utilize a Windows restore point.
Reimage the computer.
Reimage the computer.
Suggested answer: B
Explanation:

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives(3-0) When a user reports that their workstation is behaving strangely after opening a suspicious email, the first step a technician should take is to run a virus scan on the computer. This is because opening a suspicious email is a common way for viruses and malware to infect a computer. Running a virus scan can help identify and remove any infections that may be causing the computer to behave strangely.

asked 02/10/2024
Gary Corley
41 questions

Question 172

Report Export Collapse

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?

System time
System time
IP address
IP address
DNS servers
DNS servers
Windows updates
Windows updates
Suggested answer: C
Explanation:

When a user experiences unexpected or erratic behavior while browsing the internet, it could be caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP addresses, which computers can use to communicate with web servers. If the DNS servers are not functioning correctly or have been compromised, it can result in the browser being redirected to unintended websites.

asked 02/10/2024
Ages Handriyanto
34 questions

Question 173

Report Export Collapse

Which of the following is the STRONGEST wireless configuration?

WPS
WPS
WPA3
WPA3
WEP
WEP
WMN
WMN
Suggested answer: B
Explanation:

The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol and is the most secure choice. It replaces PSK with SAE, a more secure way to do the initial key exchange. At the same time, the session key size of WPA3 increases to 128-bit in WPA3-Personal mode and 192-bit in WPA3-Enterprise, which makes the password harder to crack than the previous Wi-Fi security standards

https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/

asked 02/10/2024
Laura Reyero
44 questions

Question 174

Report Export Collapse

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

NTFS
NTFS
APFS
APFS
ext4
ext4
exFAT
exFAT
Suggested answer: D
Explanation:

The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a file system that is designed to be used on flash drives like USB sticks and SD cards. It is supported by both Macs and Windows PCs, and it can handle large files and volumes

https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html

asked 02/10/2024
Michael Amann
42 questions

Question 175

Report Export Collapse

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

Enabling System Restore
Enabling System Restore
Educating the user
Educating the user
Booting into safe mode
Booting into safe mode
Most voted
(1)
Most voted
Scheduling a scan
Scheduling a scan
Suggested answer: B
Explanation:

Although updating the anti-malware software and running scans are important steps in removing malware, they may not be sufficient to permanently remove the malware if the user keeps engaging in behaviors that leave the system vulnerable, such as downloading unknown files or visiting malicious websites. Therefore, educating the user on safe computing practices is the best way to prevent future infections and permanently remove the malware.

Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most efficient ways to permanently remove the malware. Enabling System Restore and Booting into safe mode may help in some cases, but they may not be sufficient to permanently remove the malware. Scheduling a scan is also important for detecting and removing malware, but it may not be sufficient to prevent future infections.

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives(3-0)

asked 02/10/2024
Janina Loveria
46 questions

Question 176

Report Export Collapse

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Zero day
Zero day
Vishing
Vishing
DDoS
DDoS
Evil twin
Evil twin
Suggested answer: D
Explanation:


asked 02/10/2024
ayodele fakayode
43 questions

Question 177

Report Export Collapse

Which of the following change management documents includes how to uninstall a patch?

Purpose of change
Purpose of change
Rollback plan
Rollback plan
Scope of change
Scope of change
Risk analysis
Risk analysis
Suggested answer: B
Explanation:

The change management document that includes how to uninstall a patch is called the "rollback plan". The rollback plan is a document that outlines the steps that should be taken to undo a change that has been made to a system. In the case of a patch, the rollback plan would include instructions on how to uninstall the patch if it causes problems or conflicts with other software12

asked 02/10/2024
YASSIR EL GHAZY
61 questions

Question 178

Report Export Collapse

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

Multifactor authentication will be forced for Wi-Fi.
Multifactor authentication will be forced for Wi-Fi.
All Wi-Fi traffic will be encrypted in transit.
All Wi-Fi traffic will be encrypted in transit.
Eavesdropping attempts will be prevented.
Eavesdropping attempts will be prevented.
Rogue access points will not connect.
Rogue access points will not connect.
Suggested answer: A
Explanation:


asked 02/10/2024
Ranjan Gupta
35 questions

Question 179

Report Export Collapse

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

A new IT policy requires users to set up a lock screen PIN.
A new IT policy requires users to set up a lock screen PIN.
A user is overseas and wants to use a compatible international SIM Card.
A user is overseas and wants to use a compatible international SIM Card.
A user left the phone at home and wants to prevent children from gaining access to the phone.
A user left the phone at home and wants to prevent children from gaining access to the phone.
A user traded in the company phone for a cell carrier upgrade by mistake.
A user traded in the company phone for a cell carrier upgrade by mistake.
Most voted
(1)
Most voted
A user cannot locate the phone after attending a play at a theater.
A user cannot locate the phone after attending a play at a theater.
Most voted
(1)
Most voted
A user forgot the phone in a taxi, and the driver called the company to return the device.
A user forgot the phone in a taxi, and the driver called the company to return the device.
Suggested answer: E, F
Explanation:

Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in situations where a device is lost or stolen, or when sensitive data needs to be removed from a device. Remote wipe capabilities are most likely to be used in the following scenarios:

1. A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the company to return the device1 In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device and to protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data on the device before it is returned to the user.

asked 02/10/2024
Richard lavery
43 questions

Question 180

Report Export Collapse

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Restore the device to factory settings.
Restore the device to factory settings.
Uninstall the unapproved application.
Uninstall the unapproved application.
Disable the ability to install applications from unknown sources.
Disable the ability to install applications from unknown sources.
Ensure the device is connected to the corporate WiFi network.
Ensure the device is connected to the corporate WiFi network.
Suggested answer: B
Explanation:

The technician should disable the user's access to the device's command shell. This will prevent the user from accessing sensitive data and will help to prevent further data leaks. The technician should then investigate the unapproved application to determine if it is the cause of the data leak. If the application is found to be the cause of the leak, the technician should uninstall the application and restore the device to factory settings. If the application is not the cause of the leak, the technician should investigate further to determine the cause of the leak. Disabling the ability to install applications from unknown sources can help to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to this scenario1

asked 02/10/2024
Felipe Huichacura
36 questions
Total 769 questions
Go to page: of 77
Search

Related questions