ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 19

List of questions

Question 181

Report Export Collapse

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

Surge suppressor
Surge suppressor
Battery backup
Battery backup
CMOS battery
CMOS battery
Generator backup
Generator backup
Suggested answer: B
Explanation:

A battery backup, also known as an uninterruptible power supply (UPS), is a device that provides backup power during a power outage. When the power goes out, the battery backup provides a short amount of time (usually a few minutes up to an hour, depending on the capacity of the device) to save any work and safely shut down the equipment.

asked 02/10/2024
Camille Rudio
38 questions

Question 182

Report Export Collapse

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Use the application only on the home laptop because it contains the initial license.
Use the application only on the home laptop because it contains the initial license.
Use the application at home and contact the vendor regarding a corporate license.
Use the application at home and contact the vendor regarding a corporate license.
Use the application on any computer since the user has a license.
Use the application on any computer since the user has a license.
Use the application only on corporate computers.
Use the application only on corporate computers.
Suggested answer: B
Explanation:

Use the application at home and contact the vendor regarding a corporate license. The user should use the application only on the home laptop because it contains the initial license. The user should contact the vendor regarding a corporate license if they want to use the application on multiple computers on the corporate network1

asked 02/10/2024
Martijn Pollmann
38 questions

Question 183

Report Export Collapse

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

UEFI password
UEFI password
Secure boot
Secure boot
Account lockout
Account lockout
Restricted user permissions
Restricted user permissions
Suggested answer: B
Explanation:

A technician setting up a new laptop must ensure that users cannot install virtual machines as the company's security policy states One way to prevent users from enabling virtual technology is by implementing Secure Boot. Secure Boot is a feature of UEFI firmware that ensures the system only boots using firmware that is trusted by the manufacturer. It verifies the signature of all bootloaders, operating systems, and drivers before running them, preventing any unauthorized modifications to the boot process. This will help prevent users from installing virtual machines on the laptop without authorization.

asked 02/10/2024
Ibrahim mazou Ismael
52 questions

Question 184

Report Export Collapse

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Data usage limits
Data usage limits
Wi-Fi connection speed
Wi-Fi connection speed
Status of airplane mode
Status of airplane mode
System uptime
System uptime
Suggested answer: B
Explanation:

The technician should check the Wi-Fi connection speed first to troubleshoot this issue. Slow web browsing speed on a mobile phone can be caused by a slow Wi-Fi connection. The technician should check the Wi-Fi connection speed to ensure that it is fast enough to support web browsing. If the WiFi connection speed is slow, the technician should troubleshoot the Wi-Fi network to identify and resolve the issue.

asked 02/10/2024
Vimal Varughese
45 questions

Question 185

Report Export Collapse

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Rebuild the Windows profiles.
Rebuild the Windows profiles.
Restore the computers from backup.
Restore the computers from backup.
Reimage the computers.
Reimage the computers.
Run the System File Checker.
Run the System File Checker.
Suggested answer: D
Explanation:

The technician should run the System File Checker (SFC) first to correct file corruption errors on computers after a power outage. SFC is a command-line utility that scans for and repairs corrupted system files. It can be run from the command prompt or from the Windows Recovery Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging the computers are more drastic measures that should be taken only if SFC fails to correct the issue1

asked 02/10/2024
JEAN-MARIE HERMANT
60 questions

Question 186

Report Export Collapse

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

Reboot the computer.
Reboot the computer.
Reinstall the OS.
Reinstall the OS.
Configure a static 12
Configure a static 12
Check the computer's date and time.
Check the computer's date and time.
Suggested answer: D
Explanation:

The error message indicates that the security certificate presented by the website has either expired or is not yet valid. This can happen if the computer's clock has the wrong date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too much, it may cause the certificate to fail to validate. Therefore, the technician should check the computer's date and time and ensure that they are correct.

asked 02/10/2024
ahmed kehli
36 questions

Question 187

Report Export Collapse

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Drilling
Drilling
Degaussing
Degaussing
Low-level formatting
Low-level formatting
Erasing/wiping
Erasing/wiping
Suggested answer: D
Explanation:

Erasing/wiping the hard drives is the best method to dispose of the drives containing PII

asked 02/10/2024
Mita Balija
47 questions

Question 188

Report Export Collapse

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

Port forwarding
Port forwarding
Firmware updates
Firmware updates
IP filtering
IP filtering
Content filtering
Content filtering
Suggested answer: B
Explanation:

If customers are unable to access the company-hosted public website after installing a new SOHO router, the company should check for firmware updates1. Firmware updates can fix bugs and compatibility issues that may be preventing customers from accessing the website1. The company should also ensure that the router is properly configured to allow traffic to the website1. If the router is blocking traffic to the website, the company should configure the router to allow traffic to the website1.

asked 02/10/2024
Lawrence Acherman
48 questions

Question 189

Report Export Collapse

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

Adjusting the spam gateway
Adjusting the spam gateway
Updating firmware for the spam appliance
Updating firmware for the spam appliance
Adjusting AV settings
Adjusting AV settings
Providing user training
Providing user training
Suggested answer: D
Explanation:

The most effective method for dealing with spam messages in a small business is to provide user training1. Users should be trained to recognize spam messages and avoid opening them1. They should also be trained to report spam messages to the IT department so that appropriate action can be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from unknown sources1. By providing user training, the management team can reduce the risk of users opening spam messages and potentially infecting the network systems1.

asked 02/10/2024
Ramzi Smair
39 questions

Question 190

Report Export Collapse

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

resmon_exe
resmon_exe
dfrgui_exe
dfrgui_exe
msinf032exe
msinf032exe
msconfig_exe
msconfig_exe
Suggested answer: A
Explanation:

If a technician suspects high disk I/O, the technician should use the Resource Monitor (resmon.exe) to identify the process that is causing the high disk I/O1. Resource Monitor provides detailed information about the system's resource usage, including disk I/O1. The technician can use this information to identify the process that is causing the high disk I/O and take appropriate action1.

asked 02/10/2024
ATHANASIOS PAPALEXIOU
41 questions
Total 769 questions
Go to page: of 77
Search

Related questions