ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

A.
File Explorer
A.
File Explorer
Answers
B.
Startup Folder
B.
Startup Folder
Answers
C.
System Information
C.
System Information
Answers
D.
Programs and Features
D.
Programs and Features
Answers
E.
Task Scheduler
E.
Task Scheduler
Answers
F.
Device Manager
F.
Device Manager
Answers
Suggested answer: B, E

Explanation:

B. Startup Folder1: The Startup folder is a special folder that contains shortcuts to programs or scripts that will run automatically when a user logs on. The technician can create a shortcut to the script and place it in the Startup folder for the conference room computer or for all users.

E. Task Scheduler23: The Task Scheduler is a tool that allows you to create tasks that run at specified times or events. The technician can create a task that runs the script at logon for the conference room computer or for all users.

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

A.
Disable the SSID broadcast.
A.
Disable the SSID broadcast.
Answers
B.
Disable encryption settings.
B.
Disable encryption settings.
Answers
C.
Disable DHCP reservations.
C.
Disable DHCP reservations.
Answers
D.
Disable logging.
D.
Disable logging.
Answers
Suggested answer: A

Explanation:

A. Disable the SSID broadcast1: The SSID broadcast is a feature that allows a Wi-Fi network to be visible to nearby devices. Disabling the SSID broadcast can make the network harder to find by unauthorized users, but it does not prevent them from accessing it if they know the network name and password.

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

A.
Keylogger
A.
Keylogger
Answers
B.
Rootkit
B.
Rootkit
Answers
C.
Ransomware
C.
Ransomware
Answers
D.
Trojan
D.
Trojan
Answers
Suggested answer: C

Explanation:

Ransomware is a type of malware that encrypts the files on the victim’s computer and demands a ransom for their decryption. Ransomware can cause high disk throughput by encrypting large amounts of data in a short time.

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

A.
Convert the PC from a DHCP assignment to a static IP address.
A.
Convert the PC from a DHCP assignment to a static IP address.
Answers
B.
Run a speed test to ensure the advertised speeds are met.
B.
Run a speed test to ensure the advertised speeds are met.
Answers
C.
Test all network sharing and printing functionality the customer uses.
C.
Test all network sharing and printing functionality the customer uses.
Answers
D.
Change the default passwords on new network devices.
D.
Change the default passwords on new network devices.
Answers
Suggested answer: D

Explanation:

When a homeowner moves and sets up a new router for the new ISP it is important to take appropriate security measures to protect their network from potential security threats. The FIRST step that the homeowner should take after installation of all relevant cabling and hardware is to change the default passwords on new network devices.

Most modern routers come with default usernames and passwords that are widely known to potential attackers. If these defaults are not changed, it could make it easier for external attackers to gain unauthorized access to the network. Changing the passwords on new network devices is a simple but effective way to improve the security posture of the network.

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

A.
Recalibrating the magnetometer
A.
Recalibrating the magnetometer
Answers
B.
Recalibrating the compass
B.
Recalibrating the compass
Answers
C.
Recalibrating the digitizer
C.
Recalibrating the digitizer
Answers
D.
Recalibrating the accelerometer
D.
Recalibrating the accelerometer
Answers
Suggested answer: D

Explanation:

When a user rotates a cell phone horizontally to read emails and the display remains vertical, even though the settings indicate autorotate is on, this is typically due to a problem with the phone's accelerometer. The accelerometer is the sensor that detects changes in the phone's orientation and adjusts the display accordingly. If the accelerometer is not calibrated correctly, the display may not rotate as expected.

Recalibrating the accelerometer is the most likely solution to this issue. The process for recalibrating the accelerometer can vary depending on the specific device and operating system, but it typically involves going to the device's settings and finding the option to calibrate or reset the sensor. Users may need to search their device's documentation or online resources to find specific instructions for their device.

Which of the following is the proper way for a technician to dispose of used printer consumables?

A.
Proceed with the custom manufacturer's procedure.
A.
Proceed with the custom manufacturer's procedure.
Answers
B.
Proceed with the disposal of consumables in standard trash receptacles.
B.
Proceed with the disposal of consumables in standard trash receptacles.
Answers
C.
Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.
C.
Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.
Answers
D.
Proceed with the disposal of consumables in standard recycling bins.
D.
Proceed with the disposal of consumables in standard recycling bins.
Answers
Suggested answer: A

Explanation:

When it comes to disposing of used printer consumables , it is important to follow the manufacturer's instructions or guidelines for proper disposal, as different types of consumables may require different disposal procedures. Some manufacturers provide specific instructions for proper disposal, such as sending the used consumables back to the manufacturer or using special recycling programs.

Therefore, the proper way for a technician to dispose of used printer consumables is to proceed with the custom manufacturer's procedure , if provided. This option ensures that the disposal is handled in an environmentally friendly and safe manner.

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

A.
Home
A.
Home
Answers
B.
Pro
B.
Pro
Answers
C.
Pro for Workstations
C.
Pro for Workstations
Answers
D.
Enterprise
D.
Enterprise
Answers
Suggested answer: D

Explanation:

When selecting a new Windows operating system for a large company that needs built-in encryption and endpoint protection, the Enterprise edition is the most likely choice. This edition provides advanced security features such as Windows Defender Advanced Threat Protection (ATP), AppLocker, and BitLocker Drive Encryption. These features can help to protect the company's data and endpoints against malware attacks, unauthorized access, and data theft. The Home and Pro editions of Windows do not include some of the advanced security features provided by the Enterprise edition, such as Windows Defender ATP and AppLocker. The Pro for Workstations edition is designed for high-performance and high-end hardware configurations, but it does not provide additional security features beyond those provided by the Pro edition.

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

A.
Enable firewall ACLs.
A.
Enable firewall ACLs.
Answers
B.
Examine the localhost file entries.
B.
Examine the localhost file entries.
Answers
C.
Verify the routing tables.
C.
Verify the routing tables.
Answers
D.
Update the antivirus definitions.
D.
Update the antivirus definitions.
Answers
Suggested answer: B

Explanation:

A possible cause of the user being redirected to unexpected websites is that the localhost file entries have been modified by malware or hackers to point to malicious or unwanted websites. The localhost file is a text file that maps hostnames to IP addresses and can override DNS settings. By examining the localhost file entries, a technician can identify and remove any suspicious or unauthorized entries that may cause the redirection issue. Enabling firewall ACLs may not resolve the issue if the firewall rules do not block the malicious or unwanted websites. Verifying the routing tables may not resolve the issue if the routing configuration is correct and does not affect the web traffic. Updating the antivirus definitions may help prevent future infections but may not remove the existing malware or changes to the localhost file. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.3

A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?

A.
Add network content filtering.
A.
Add network content filtering.
Answers
B.
Disable the SSID broadcast.
B.
Disable the SSID broadcast.
Answers
C.
Configure port forwarding.
C.
Configure port forwarding.
Answers
D.
Change the default credentials.
D.
Change the default credentials.
Answers
Suggested answer: D

Explanation:

One of the most effective ways to defend against malicious actors targeting home routers for DDoS attacks is to change the default credentials of the router. The default credentials are often well- known or easily guessed by attackers, who can then access and compromise the router settings and firmware. By changing the default credentials to strong and unique ones, a technician can prevent unauthorized access and configuration changes to the router. Adding network content filtering may help block some malicious or unwanted websites but may not prevent attackers from exploiting router vulnerabilities or backdoors. Disabling the SSID broadcast may help reduce the visibility of the wireless network but may not prevent attackers from scanning or detecting it. Configuring port forwarding may help direct incoming traffic to specific devices or services but may not prevent attackers from sending malicious packets or requests to the router. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 3.3

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

A.
Disable System Restore.
A.
Disable System Restore.
Answers
B.
Schedule a malware scan.
B.
Schedule a malware scan.
Answers
C.
Educate the end user.
C.
Educate the end user.
Answers
D.
Run Windows Update.
D.
Run Windows Update.
Answers
Suggested answer: A

Explanation:

Before removing a Trojan virus from a workstation, a technician should disable System Restore. System Restore is a feature that allows users to restore their system to a previous state in case of problems or errors. However, System Restore can also restore infected files or registry entries that were removed by antivirus software or manual actions. By disabling System Restore, a technician can ensure that the Trojan virus is completely removed and does not reappear after a system restore operation. Scheduling a malware scan may help detect and remove some malware but may not be effective against all types of Trojan viruses. Educating the end user may help prevent future infections but does not address the current issue of removing the Trojan virus. Running Windows Update may help patch some security vulnerabilities but does not guarantee that the Trojan virus will be removed. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.3

Total 755 questions
Go to page: of 76