ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.
.deb
A.
.deb
Answers
B.
.vbs
B.
.vbs
Answers
C.
.exe
C.
.exe
Answers
D.
.app
D.
.app
Answers
Suggested answer: D

Explanation:

The file type that the technician will MOST likely use when installing new software on a macOScomputer is .app. This is because .app is the file extension for applications on macOS1.

Which of the following is the MOST important environmental concern inside a data center?

A.
Battery disposal
A.
Battery disposal
Answers
B.
Electrostatic discharge mats
B.
Electrostatic discharge mats
Answers
C.
Toner disposal
C.
Toner disposal
Answers
D.
Humidity levels
D.
Humidity levels
Answers
Suggested answer: D

Explanation:

One of the most important environmental concerns inside a data center is the level of humidity. High levels of humidity can cause condensation, which can result in corrosion of components and other equipment. Low levels of humidity can cause static electricity to build up, potentially leading to electrostatic discharge (ESD) and damage to components. Therefore, it is crucial to maintain a relative humidity range of 40-60% in a data center to protect the equipment and ensure proper operation.

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

A.
Power user account
A.
Power user account
Answers
B.
Standard account
B.
Standard account
Answers
C.
Guest account
C.
Guest account
Answers
D.
Administrator account
D.
Administrator account
Answers
Suggested answer: B

Explanation:

The account access level the user will need to access advanced features and configuration settings for several applications while adhering to corporate policy requiring a least privilege environment isa standard account. This is because a standard account allows the user to access advanced features and configuration settings for several applications while adhering to corporate policy requiring a least privilege environment1.

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

A.
End user acceptance
A.
End user acceptance
Answers
B.
Perform risk analysis
B.
Perform risk analysis
Answers
C.
Communicate to stakeholders
C.
Communicate to stakeholders
Answers
D.
Sandbox testing
D.
Sandbox testing
Answers
Suggested answer: A

Explanation:


A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

A.
Services
A.
Services
Answers
B.
Processes
B.
Processes
Answers
C.
Performance
C.
Performance
Answers
D.
Startup
D.
Startup
Answers
Suggested answer: B

Explanation:

Processes tab in Task Manager would contain the information a technician would use to identify the cause of this issue. The Processes tab in Task Manager displays all the processes running on the computer, including the CPU and memory usage of each process. The technician can use this tab toidentify the process that is causing the hard drive activity light to remain lit and the performance degradation1

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

A.
Scan the computer with the company-provided antivirus software
A.
Scan the computer with the company-provided antivirus software
Answers
B.
Install a new hard drive and clone the user's drive to it
B.
Install a new hard drive and clone the user's drive to it
Answers
C.
Deploy an ad-blocking extension to the browser.
C.
Deploy an ad-blocking extension to the browser.
Answers
D.
Uninstall the company-provided antivirus software
D.
Uninstall the company-provided antivirus software
Answers
E.
Click the link in the messages to pay for virus removal
E.
Click the link in the messages to pay for virus removal
Answers
F.
Perform a reset on the user's web browser
F.
Perform a reset on the user's web browser
Answers
Suggested answer: C, F

Explanation:

The most likely steps to resolve the issue are to deploy an ad-blocking extension to the browser and perform a reset on the user’s web browser. Ad-blocking extensions can help to prevent pop-ups and other unwanted content from appearing in the browser, and resetting the browser can help to remove any malicious extensions or settings that may be causing the issue.

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

A.
Enable multifactor authentication for each support account
A.
Enable multifactor authentication for each support account
Answers
B.
Limit remote access to destinations inside the corporate network
B.
Limit remote access to destinations inside the corporate network
Answers
C.
Block all support accounts from logging in from foreign countries
C.
Block all support accounts from logging in from foreign countries
Answers
D.
Configure a replacement remote-access tool for support cases.
D.
Configure a replacement remote-access tool for support cases.
Answers
E.
Purchase a password manager for remote-access tool users
E.
Purchase a password manager for remote-access tool users
Answers
F.
Enforce account lockouts after five bad password attempts
F.
Enforce account lockouts after five bad password attempts
Answers
Suggested answer: A, F

Explanation:

The best ways to limit the bank’s risk are to enable multifactor authentication for each support account and enforce account lockouts after five bad password attempts. Multifactor authentication adds an extra layer of security to the login process, making it more difficult for attackers to gain access to systems. Account lockouts after five bad password attempts can help to prevent brute force attacks by locking out accounts after a certain number of failed login attempts.

A technician is asked to resize a partition on the internal storage drive of a computer running macOS.

Which of the followings tools should the technician use to accomplish this task?

A.
Consoltf
A.
Consoltf
Answers
B.
Disk Utility
B.
Disk Utility
Answers
C.
Time Machine
C.
Time Machine
Answers
D.
FileVault
D.
FileVault
Answers
Suggested answer: B

Explanation:

The technician should use Disk Utility to resize a partition on the internal storage drive of a computer running macOS. Disk Utility is a built-in utility that allows users to manage disks, partitions, and volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to format disks and volumes.

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

A.
Deploy a secondary hard drive with encryption on the appropriate workstation
A.
Deploy a secondary hard drive with encryption on the appropriate workstation
Answers
B.
Configure a hardened SFTP portal for file transfers between file servers
B.
Configure a hardened SFTP portal for file transfers between file servers
Answers
C.
Require files to be individually password protected with unique passwords
C.
Require files to be individually password protected with unique passwords
Answers
D.
Enable BitLocker To Go with a password that meets corporate requirements
D.
Enable BitLocker To Go with a password that meets corporate requirements
Answers
Suggested answer: D

Explanation:

The BEST way to secure the current workflow of transferring sensitive personal information between offices when conducting business is to enable BitLocker To Go with a password that meets corporate requirements. This is because BitLocker To Go is a full-disk encryption feature that encrypts all data on a USB drive, which is what the company currently uses, and requires a password to access the data

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

A.
Encrypting File System
A.
Encrypting File System
Answers
B.
FileVault
B.
FileVault
Answers
C.
BitLocker
C.
BitLocker
Answers
D.
Encrypted LVM
D.
Encrypted LVM
Answers
Suggested answer: A

Explanation:

The encryption solution that the technician should choose when configuring a new Windows laptop and corporate policy requires that mobile devices make use of full disk encryption at all times is BitLocker. This is because BitLocker is a full-disk encryption feature that encrypts all data on a hard drive and is included with Window

Total 755 questions
Go to page: of 76