ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the

power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

Question 191
Correct answer: Question 191

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

A.
Dock
A.
Dock
Answers
B.
Spotlight
B.
Spotlight
Answers
C.
Mission Control
C.
Mission Control
Answers
D.
Launchpad
D.
Launchpad
Answers
Suggested answer: C

Explanation:

application that will allow a macOS user to create another virtual desktop space is Mission Control Mission Control lets you create additional desktops, called spaces, to organize the windows of your apps. You can create a space by entering Mission Control and clicking the Add button in the Spaces bar1. You can also assign apps to specific spaces and move between them easily1.

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.
Put on an ESD strap
A.
Put on an ESD strap
Answers
B.
Disconnect the power before servicing the PC.
B.
Disconnect the power before servicing the PC.
Answers
C.
Place the PC on a grounded workbench.
C.
Place the PC on a grounded workbench.
Answers
D.
Place components on an ESD mat.
D.
Place components on an ESD mat.
Answers
Suggested answer: B

Explanation:

The first step a technician should take when troubleshooting a computer with a suspected short in the power supply is B. Disconnect the power before servicing the PC. This is to prevent any electrical shock or damage to the components. A power supply can be dangerous even when unplugged, as capacitors can maintain a line voltage charge for a long time1. Therefore, it is important to disconnect the power cord and press the power button to discharge any residual power before opening the case2. The other steps are also important for safety and proper diagnosis, but they should be done after disconnecting the power.

A team of support agents will be using their workstations to store credit card dat a. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

A.
Encryption
A.
Encryption
Answers
B.
Antivirus
B.
Antivirus
Answers
C.
AutoRun
C.
AutoRun
Answers
D.
Guest accounts
D.
Guest accounts
Answers
E.
Default passwords
E.
Default passwords
Answers
F.
Backups
F.
Backups
Answers
Suggested answer: A, F

Explanation:

Encryption is a way of protecting cardholder data by transforming it into an unreadable format that can only be decrypted with a secret key1. Backups are a way of ensuring that cardholder data is not lost or corrupted in case of a disaster or system failure2. Both encryption and backups are part of the PCI DSS requirements that apply to any entity that stores, processes, or transmits cardholder data1. The other options are not directly related to credit card data security or compliance.

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months. Which of the following is causing the login issue?

A.
Expired certificate
A.
Expired certificate
Answers
B.
OS update failure
B.
OS update failure
Answers
C.
Service not started
C.
Service not started
Answers
D.
Application crash
D.
Application crash
Answers
E.
Profile rebuild needed
E.
Profile rebuild needed
Answers
Suggested answer: A

Explanation:

EAP-TLS is a method of authentication that uses certificates to establish a secure tunnel between the client and the server3. The certificates have a validity period and must be renewed before they expire1. If the user has been on an extended leave and has not logged in to the computer in several months, it is possible that the certificate on the client or the server has expired and needs to be renewed2. The other options are not directly related to EAP-TLS authentication or 802.1X network access.

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.
Signed system images
A.
Signed system images
Answers
B.
Antivirus
B.
Antivirus
Answers
C.
SSO
C.
SSO
Answers
D.
MDM
D.
MDM
Answers
Suggested answer: D

Explanation:

MDM stands for Mobile Device Management, and it is a way of remotely managing and securing mobile devices that are used for work purposes1. MDM can enforce policies and restrictions on the devices, such as preventing users from installing unauthorized apps, modifying system settings, or accessing root privileges2. MDM can also monitor device status, wipe data, lock devices, or locate lost or stolen devices1.

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

A.
Run the antivirus scan.
A.
Run the antivirus scan.
Answers
B.
Add the required snap-in.
B.
Add the required snap-in.
Answers
C.
Restore the system backup
C.
Restore the system backup
Answers
D.
use the administrator console.
D.
use the administrator console.
Answers
Suggested answer: B

Explanation:

Local Users and Groups is a Microsoft Management Console (MMC) snap-in that allows you to manage user accounts or groups on your computer1. If you cannot find it in the MMC console, you can add it manually by following these steps2:

Press Windows key + R to open the Run dialog box, or open the Command Prompt. Type mmc and hit Enter. This will open a blank MMC console.

Click File and then Add/Remove Snap-in.

In the Add or Remove Snap-ins window, select Local Users and Groups from the Available snap-ins list, and click Add.

In the Select Computer window, choose Local computer or Another computer, depending on which computer you want to manage, and click Finish.

Click OK to close the Add or Remove Snap-ins window. You should now see Local Users and Groups in the MMC console.

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

A.
ipconfig
A.
ipconfig
Answers
B.
ifconfig
B.
ifconfig
Answers
C.
arpa
C.
arpa
Answers
D.
ping
D.
ping
Answers
Suggested answer: B

Explanation:

ifconfig is a command-line utility that allows you to configure network interfaces on macOS and other Unix-like systems1. To set an IP address using ifconfig, you need to know the name of the network interface you want to configure (such as en0 or en1), and the IP address you want to assign (such as 192.168.0.150). You also need to use sudo to run the command with administrative privileges2. The syntax of the command is:

sudo ifconfig interface address

For example, to set the IP address of en1 to 192.168.0.150, you would type:

sudo ifconfig en1 192.168.0.150

You may also need to specify other parameters such as subnet mask, gateway, or DNS servers, depending on your network configuration3. The other commands are not directly related to setting an IP address on macOS. ipconfig is a similar command for Windows systems4, arpa is a domain name used for reverse DNS lookup, and ping is a command for testing network connectivity.

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

A.
If airplane mode is enabled
A.
If airplane mode is enabled
Answers
B.
If Bluetooth is disabled
B.
If Bluetooth is disabled
Answers
C.
If NFC is enabled
C.
If NFC is enabled
Answers
D.
If WiFi is enabled
D.
If WiFi is enabled
Answers
E.
If location services are disabled
E.
If location services are disabled
Answers
Suggested answer: C

Explanation:

NFC stands for Near Field Communication, and it is a wireless technology that allows your phone to act as a contactless payment device, among other things2. Payment applications that allow payments to be made with a mobile device usually rely on NFC to communicate with the payment terminal1. Therefore, if NFC is disabled on the phone, the payment will not work. To enable NFC on an Android phone, you need to follow these steps3:

On your Android device, open the Settings app.

Select Connected devices.

Tap on Connection preferences.

You should see the NFC option. Toggle it on.

The other options are not directly related to using a payment application with a mobile device. Airplane mode is a setting that disables all wireless communication on the phone, including NFC4, but it also affects calls, texts, and internet access. Bluetooth is a wireless technology that allows you to connect your phone with other devices such as headphones or speakers, but it is not used for contactless payments. Wi-Fi is a wireless technology that allows you to access the internet or a local network, but it is also not used for contactless payments. Location services are a feature that allows your phone to determine your geographic location using GPS or other methods, but they are not required for contactless payments.

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

A.
Power off the machine.
A.
Power off the machine.
Answers
B.
Run a full antivirus scan.
B.
Run a full antivirus scan.
Answers
C.
Remove the LAN card.
C.
Remove the LAN card.
Answers
D.
Install a different endpoint solution.
D.
Install a different endpoint solution.
Answers
Suggested answer: A

Explanation:

Ransomware is a type of malware that encrypts the files on a system and demands a ransom for their decryption1. Ransomware can also spread to other systems on the network or exfiltrate sensitive data to the attackers2. Therefore, it is important to isolate the infected machine as soon as possible to contain the infection and prevent further damage3. Powering off the machine is a quick and effective way of disconnecting it from the network and stopping any malicious processes running on it12. The other options are not directly related to preventing ransomware damage or may not be effective. Running a full antivirus scan may not be able to detect or remove the ransomware, especially if it is a new or unknown variant1. Removing the LAN card may disconnect the machine from the network, but it may not stop any malicious processes running on it or any data encryption or exfiltration that has already occurred2. Installing a different endpoint solution may not be possible or helpful if the system is already infected and locked by ransomware1.

Total 755 questions
Go to page: of 76