ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 26

List of questions

Question 251

Report Export Collapse

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

DHCP
DHCP
SMTP
SMTP
DNS
DNS
RDP
RDP
Suggested answer: A
Explanation:

DHCP stands for Dynamic Host Configuration Protocol and it is used to assign IP addresses and other network configuration parameters to devices on a network automatically. This is useful for devices that do not require the same private address each time they connect to the internet.

asked 02/10/2024
Karine Bashala
30 questions

Question 252

Report Export Collapse

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

Boot order
Boot order
Malware
Malware
Drive failure
Drive failure
Windows updates
Windows updates
Suggested answer: C
Explanation:

A S.M.A.R.T. error is a warning that a hard drive is about to fail or has failed. This means that the OS cannot be loaded from the drive and the user will see an error message indicating there is no OS found. The most likely cause of this issue is drive failure.

asked 02/10/2024
Marcel Janssen
40 questions

Question 253

Report Export Collapse

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Implementing password expiration
Implementing password expiration
Restricting user permissions
Restricting user permissions
Using screen locks
Using screen locks
Disabling unnecessary services
Disabling unnecessary services
Suggested answer: B
Explanation:

Restricting user permissions is a method of creating a more secure environment for the finance department in a non-domain environment. This means that users will only have access to the files and resources that they need to perform their tasks and will not be able to modify or delete other files or settings that could compromise security or functionality.

asked 02/10/2024
sailakshmi KM
45 questions

Question 254

Report Export Collapse

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Licensing agreements
Licensing agreements
Chain of custody
Chain of custody
Incident management documentation
Incident management documentation
Data integrity
Data integrity
Material safety data sheet
Material safety data sheet
Retention requirements
Retention requirements
Suggested answer: B
Explanation:

Chain of custody and data integrity are two options that should most likely be considered when preserving data from a hard drive for forensic analysis. Chain of custody refers to the documentation and tracking of who has access to the data and how it is handled, stored, and transferred. Data integrity refers to the assurance that the data has not been altered, corrupted, or tampered with during the preservation process

asked 02/10/2024
Eric De La Vega
44 questions

Question 255

Report Export Collapse

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

Inform the customer that the issue is not within the scope of this department.
Inform the customer that the issue is not within the scope of this department.
Apologize to the customer and escalate the issue to a manager.
Apologize to the customer and escalate the issue to a manager.
Ask the customer to explain the issue and then try to fix it independently.
Ask the customer to explain the issue and then try to fix it independently.
Respond that the issue is something the customer should be able to fix.
Respond that the issue is something the customer should be able to fix.
Suggested answer: B
Explanation:

Apologizing to the customer and escalating the issue to a manager is the best course of action for the support center representative to take. This shows empathy and professionalism and allows the manager to handle the situation and provide the appropriate service or resolution for the customer.

asked 02/10/2024
Patrick Duglay Piceda
37 questions

Question 256

Report Export Collapse

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

Rolling back video card drivers
Rolling back video card drivers
Restoring the PC to factory settings
Restoring the PC to factory settings
Repairing the Windows profile
Repairing the Windows profile
Reinstalling the Windows OS
Reinstalling the Windows OS
Suggested answer: A
Explanation:

Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a user’s newly issued PC. This means restoring the previous version of the drivers that were working fine before the software patch was deployed. The software patch may have caused compatibility issues or corrupted the drivers, resulting in display problems

asked 02/10/2024
Olive Wang
43 questions

Question 257

Report Export Collapse

A technician is installing a program from an ISO file. Which of the following steps should the technician take?

Mount the ISO and run the installation file.
Mount the ISO and run the installation file.
Copy the ISO and execute on the server.
Copy the ISO and execute on the server.
Copy the ISO file to a backup location and run the ISO file.
Copy the ISO file to a backup location and run the ISO file.
Unzip the ISO and execute the setup.exe file.
Unzip the ISO and execute the setup.exe file.
Suggested answer: A
Explanation:

Mounting the ISO and running the installation file is the correct way to install a program from an ISO file. An ISO file is an image of a disc that contains all the files and folders of a program. Mounting the ISO means creating a virtual drive that can access the ISO file as if it were a physical disc. Running the installation file means executing the setup program that will install the program on the computer

asked 02/10/2024
Massimo Cerqui
42 questions

Question 258

Report Export Collapse

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Security groups
Security groups
Access control list
Access control list
Group Policy
Group Policy
Login script
Login script
Suggested answer: C
Explanation:

Group Policy is the most likely tool to be used to change the security settings on a user’s device in a domain environment. Group Policy is a feature of Windows that allows administrators to manage and configure settings for multiple devices and users in a centralized way. Group Policy can be used to enforce security policies such as password complexity, account lockout, firewall rules, encryption settings, etc.

asked 02/10/2024
Dustin Roberts
48 questions

Question 259

Report Export Collapse

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Evil twin
Evil twin
Impersonation
Impersonation
Insider threat
Insider threat
Whaling
Whaling
Suggested answer: A
Explanation:

An evil twin is a type of social-engineering attack that involves setting up a rogue wireless access point that mimics a legitimate one. The attacker can then intercept or modify the traffic of the users who connect to the fake SSID. The attacker may also use phishing or malware to steal credentials or personal information from the users

asked 02/10/2024
christopher patrick
33 questions

Question 260

Report Export Collapse

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

apt-get
apt-get
CIFS
CIFS
Samba
Samba
greP
greP
Suggested answer: C
Explanation:

Samba is a software suite that allows Linux servers and desktops to integrate with Windows Active Directory environments. Samba can act as a domain controller, a file server, a print server, or a client for Windows networks. Samba can also provide authentication and authorization services for Linux users and devices using Active Directory.

asked 02/10/2024
Tolga Kesici
50 questions
Total 769 questions
Go to page: of 77
Search

Related questions