ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

A.
DHCP
A.
DHCP
Answers
B.
SMTP
B.
SMTP
Answers
C.
DNS
C.
DNS
Answers
D.
RDP
D.
RDP
Answers
Suggested answer: A

Explanation:

DHCP stands for Dynamic Host Configuration Protocol and it is used to assign IP addresses and other network configuration parameters to devices on a network automatically. This is useful for devices that do not require the same private address each time they connect to the internet.

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

A.
Boot order
A.
Boot order
Answers
B.
Malware
B.
Malware
Answers
C.
Drive failure
C.
Drive failure
Answers
D.
Windows updates
D.
Windows updates
Answers
Suggested answer: C

Explanation:

A S.M.A.R.T. error is a warning that a hard drive is about to fail or has failed. This means that the OS cannot be loaded from the drive and the user will see an error message indicating there is no OS found. The most likely cause of this issue is drive failure.

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

A.
Implementing password expiration
A.
Implementing password expiration
Answers
B.
Restricting user permissions
B.
Restricting user permissions
Answers
C.
Using screen locks
C.
Using screen locks
Answers
D.
Disabling unnecessary services
D.
Disabling unnecessary services
Answers
Suggested answer: B

Explanation:

Restricting user permissions is a method of creating a more secure environment for the finance department in a non-domain environment. This means that users will only have access to the files and resources that they need to perform their tasks and will not be able to modify or delete other files or settings that could compromise security or functionality.

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

A.
Licensing agreements
A.
Licensing agreements
Answers
B.
Chain of custody
B.
Chain of custody
Answers
C.
Incident management documentation
C.
Incident management documentation
Answers
D.
Data integrity
D.
Data integrity
Answers
E.
Material safety data sheet
E.
Material safety data sheet
Answers
F.
Retention requirements
F.
Retention requirements
Answers
Suggested answer: B

Explanation:

Chain of custody and data integrity are two options that should most likely be considered when preserving data from a hard drive for forensic analysis. Chain of custody refers to the documentation and tracking of who has access to the data and how it is handled, stored, and transferred. Data integrity refers to the assurance that the data has not been altered, corrupted, or tampered with during the preservation process

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.
Inform the customer that the issue is not within the scope of this department.
A.
Inform the customer that the issue is not within the scope of this department.
Answers
B.
Apologize to the customer and escalate the issue to a manager.
B.
Apologize to the customer and escalate the issue to a manager.
Answers
C.
Ask the customer to explain the issue and then try to fix it independently.
C.
Ask the customer to explain the issue and then try to fix it independently.
Answers
D.
Respond that the issue is something the customer should be able to fix.
D.
Respond that the issue is something the customer should be able to fix.
Answers
Suggested answer: B

Explanation:

Apologizing to the customer and escalating the issue to a manager is the best course of action for the support center representative to take. This shows empathy and professionalism and allows the manager to handle the situation and provide the appropriate service or resolution for the customer.

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

A.
Rolling back video card drivers
A.
Rolling back video card drivers
Answers
B.
Restoring the PC to factory settings
B.
Restoring the PC to factory settings
Answers
C.
Repairing the Windows profile
C.
Repairing the Windows profile
Answers
D.
Reinstalling the Windows OS
D.
Reinstalling the Windows OS
Answers
Suggested answer: A

Explanation:

Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a user’s newly issued PC. This means restoring the previous version of the drivers that were working fine before the software patch was deployed. The software patch may have caused compatibility issues or corrupted the drivers, resulting in display problems

A technician is installing a program from an ISO file. Which of the following steps should the technician take?

A.
Mount the ISO and run the installation file.
A.
Mount the ISO and run the installation file.
Answers
B.
Copy the ISO and execute on the server.
B.
Copy the ISO and execute on the server.
Answers
C.
Copy the ISO file to a backup location and run the ISO file.
C.
Copy the ISO file to a backup location and run the ISO file.
Answers
D.
Unzip the ISO and execute the setup.exe file.
D.
Unzip the ISO and execute the setup.exe file.
Answers
Suggested answer: A

Explanation:

Mounting the ISO and running the installation file is the correct way to install a program from an ISO file. An ISO file is an image of a disc that contains all the files and folders of a program. Mounting the ISO means creating a virtual drive that can access the ISO file as if it were a physical disc. Running the installation file means executing the setup program that will install the program on the computer

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

A.
Security groups
A.
Security groups
Answers
B.
Access control list
B.
Access control list
Answers
C.
Group Policy
C.
Group Policy
Answers
D.
Login script
D.
Login script
Answers
Suggested answer: C

Explanation:

Group Policy is the most likely tool to be used to change the security settings on a user’s device in a domain environment. Group Policy is a feature of Windows that allows administrators to manage and configure settings for multiple devices and users in a centralized way. Group Policy can be used to enforce security policies such as password complexity, account lockout, firewall rules, encryption settings, etc.

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

A.
Evil twin
A.
Evil twin
Answers
B.
Impersonation
B.
Impersonation
Answers
C.
Insider threat
C.
Insider threat
Answers
D.
Whaling
D.
Whaling
Answers
Suggested answer: A

Explanation:

An evil twin is a type of social-engineering attack that involves setting up a rogue wireless access point that mimics a legitimate one. The attacker can then intercept or modify the traffic of the users who connect to the fake SSID. The attacker may also use phishing or malware to steal credentials or personal information from the users

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?

A.
apt-get
A.
apt-get
Answers
B.
CIFS
B.
CIFS
Answers
C.
Samba
C.
Samba
Answers
D.
greP
D.
greP
Answers
Suggested answer: C

Explanation:

Samba is a software suite that allows Linux servers and desktops to integrate with Windows Active Directory environments. Samba can act as a domain controller, a file server, a print server, or a client for Windows networks. Samba can also provide authentication and authorization services for Linux users and devices using Active Directory.

Total 755 questions
Go to page: of 76