ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

A.
Surge suppressor
A.
Surge suppressor
Answers
B.
Battery backup
B.
Battery backup
Answers
C.
CMOS battery
C.
CMOS battery
Answers
D.
Generator backup
D.
Generator backup
Answers
Suggested answer: B

Explanation:

A battery backup, also known as an uninterruptible power supply (UPS), is a device that provides backup power during a power outage. When the power goes out, the battery backup provides a short amount of time (usually a few minutes up to an hour, depending on the capacity of the device) to save any work and safely shut down the equipment.

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

A.
Use the application only on the home laptop because it contains the initial license.
A.
Use the application only on the home laptop because it contains the initial license.
Answers
B.
Use the application at home and contact the vendor regarding a corporate license.
B.
Use the application at home and contact the vendor regarding a corporate license.
Answers
C.
Use the application on any computer since the user has a license.
C.
Use the application on any computer since the user has a license.
Answers
D.
Use the application only on corporate computers.
D.
Use the application only on corporate computers.
Answers
Suggested answer: B

Explanation:

Use the application at home and contact the vendor regarding a corporate license. The user should use the application only on the home laptop because it contains the initial license. The user should contact the vendor regarding a corporate license if they want to use the application on multiple computers on the corporate network1

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A.
UEFI password
A.
UEFI password
Answers
B.
Secure boot
B.
Secure boot
Answers
C.
Account lockout
C.
Account lockout
Answers
D.
Restricted user permissions
D.
Restricted user permissions
Answers
Suggested answer: B

Explanation:

A technician setting up a new laptop must ensure that users cannot install virtual machines as the company's security policy states One way to prevent users from enabling virtual technology is by implementing Secure Boot. Secure Boot is a feature of UEFI firmware that ensures the system only boots using firmware that is trusted by the manufacturer. It verifies the signature of all bootloaders, operating systems, and drivers before running them, preventing any unauthorized modifications to the boot process. This will help prevent users from installing virtual machines on the laptop without authorization.

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

A.
Data usage limits
A.
Data usage limits
Answers
B.
Wi-Fi connection speed
B.
Wi-Fi connection speed
Answers
C.
Status of airplane mode
C.
Status of airplane mode
Answers
D.
System uptime
D.
System uptime
Answers
Suggested answer: B

Explanation:

The technician should check the Wi-Fi connection speed first to troubleshoot this issue. Slow web browsing speed on a mobile phone can be caused by a slow Wi-Fi connection. The technician should check the Wi-Fi connection speed to ensure that it is fast enough to support web browsing. If the WiFi connection speed is slow, the technician should troubleshoot the Wi-Fi network to identify and resolve the issue.

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

A.
Rebuild the Windows profiles.
A.
Rebuild the Windows profiles.
Answers
B.
Restore the computers from backup.
B.
Restore the computers from backup.
Answers
C.
Reimage the computers.
C.
Reimage the computers.
Answers
D.
Run the System File Checker.
D.
Run the System File Checker.
Answers
Suggested answer: D

Explanation:

The technician should run the System File Checker (SFC) first to correct file corruption errors on computers after a power outage. SFC is a command-line utility that scans for and repairs corrupted system files. It can be run from the command prompt or from the Windows Recovery Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging the computers are more drastic measures that should be taken only if SFC fails to correct the issue1

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

A.
Reboot the computer.
A.
Reboot the computer.
Answers
B.
Reinstall the OS.
B.
Reinstall the OS.
Answers
C.
Configure a static 12
C.
Configure a static 12
Answers
D.
Check the computer's date and time.
D.
Check the computer's date and time.
Answers
Suggested answer: D

Explanation:

The error message indicates that the security certificate presented by the website has either expired or is not yet valid. This can happen if the computer's clock has the wrong date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too much, it may cause the certificate to fail to validate. Therefore, the technician should check the computer's date and time and ensure that they are correct.

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

A.
Drilling
A.
Drilling
Answers
B.
Degaussing
B.
Degaussing
Answers
C.
Low-level formatting
C.
Low-level formatting
Answers
D.
Erasing/wiping
D.
Erasing/wiping
Answers
Suggested answer: D

Explanation:

Erasing/wiping the hard drives is the best method to dispose of the drives containing PII

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

A.
Port forwarding
A.
Port forwarding
Answers
B.
Firmware updates
B.
Firmware updates
Answers
C.
IP filtering
C.
IP filtering
Answers
D.
Content filtering
D.
Content filtering
Answers
Suggested answer: B

Explanation:

If customers are unable to access the company-hosted public website after installing a new SOHO router, the company should check for firmware updates1. Firmware updates can fix bugs and compatibility issues that may be preventing customers from accessing the website1. The company should also ensure that the router is properly configured to allow traffic to the website1. If the router is blocking traffic to the website, the company should configure the router to allow traffic to the website1.

A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the following is the MOST effective method for dealing with this Issue?

A.
Adjusting the spam gateway
A.
Adjusting the spam gateway
Answers
B.
Updating firmware for the spam appliance
B.
Updating firmware for the spam appliance
Answers
C.
Adjusting AV settings
C.
Adjusting AV settings
Answers
D.
Providing user training
D.
Providing user training
Answers
Suggested answer: D

Explanation:

The most effective method for dealing with spam messages in a small business is to provide user training1. Users should be trained to recognize spam messages and avoid opening them1. They should also be trained to report spam messages to the IT department so that appropriate action can be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from unknown sources1. By providing user training, the management team can reduce the risk of users opening spam messages and potentially infecting the network systems1.

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

A.
resmon_exe
A.
resmon_exe
Answers
B.
dfrgui_exe
B.
dfrgui_exe
Answers
C.
msinf032exe
C.
msinf032exe
Answers
D.
msconfig_exe
D.
msconfig_exe
Answers
Suggested answer: A

Explanation:

If a technician suspects high disk I/O, the technician should use the Resource Monitor (resmon.exe) to identify the process that is causing the high disk I/O1. Resource Monitor provides detailed information about the system's resource usage, including disk I/O1. The technician can use this information to identify the process that is causing the high disk I/O and take appropriate action1.

Total 755 questions
Go to page: of 76