ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?

A.
System
A.
System
Answers
B.
Indexing Options
B.
Indexing Options
Answers
C.
Device Manager
C.
Device Manager
Answers
D.
Programs and Features
D.
Programs and Features
Answers
Suggested answer: A

Explanation:

System is the Control Panel utility that should be used to change the Path Environment Variable. The Path Environment Variable is a system variable that specifies the directories where executable files are located. To edit the Path Environment Variable, the technician should go to System > Advanced system settings > Environment Variables and then select Path from the list of system variables and click Edit.

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

A.
TKIP
A.
TKIP
Answers
B.
RADIUS
B.
RADIUS
Answers
C.
WPA2
C.
WPA2
Answers
D.
AES
D.
AES
Answers
Suggested answer: B

Explanation:

RADIUS stands for Remote Authentication Dial-In User Service and it is a protocol that provides centralized authentication, authorization, and accounting for network access. RADIUS can be used to implement a method of wireless security that requires both a user and the user’s computer to be in specific managed groups on the server in order to connect to Wi-Fi. This is also known as 802.1X authentication or EAP-TLS authentication

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

A.
Windows Professional
A.
Windows Professional
Answers
B.
Windows Education
B.
Windows Education
Answers
C.
Windows Enterprise
C.
Windows Enterprise
Answers
D.
Windows Home
D.
Windows Home
Answers
Suggested answer: D

Explanation:

Windows Home is the most likely edition of Windows installed on the machines that do not have the domain join option. Windows Home is a consumer-oriented edition that does not support joining a domain or using Group Policy. Only Windows Professional, Education, and Enterprise editions can join a domain

Which of the following macOS features provides the user with a high-level view of all open windows?

A.
Mission Control
A.
Mission Control
Answers
B.
Finder
B.
Finder
Answers
C.
Multiple Desktops
C.
Multiple Desktops
Answers
D.
Spotlight
D.
Spotlight
Answers
Suggested answer: A

Explanation:

Mission Control is the macOS feature that provides the user with a high-level view of all open windows. Mission Control allows the user to see and switch between multiple desktops, full-screen apps, and windows in a single screen. Mission Control can be accessed by swiping up with three or four fingers on the trackpad, pressing F3 on the keyboard, or moving the cursor to a hot corner

Which of the following should be used to secure a device from known exploits?

A.
Encryption
A.
Encryption
Answers
B.
Remote wipe
B.
Remote wipe
Answers
C.
Operating system updates
C.
Operating system updates
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: C

Explanation:

Operating system updates are used to secure a device from known exploits. Operating system updates are patches or fixes that are released by the vendor to address security vulnerabilities, bugs, or performance issues. Operating system updates can also provide new features or enhancements to the device. It is important to keep the operating system updated to prevent attackers from exploiting known flaws or weaknesses.

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

A.
Verify the Wi-Fi connection status.
A.
Verify the Wi-Fi connection status.
Answers
B.
Enable the NFC setting on the device.
B.
Enable the NFC setting on the device.
Answers
C.
Bring the device within Bluetooth range.
C.
Bring the device within Bluetooth range.
Answers
D.
Turn on device tethering.
D.
Turn on device tethering.
Answers
Suggested answer: C

Explanation:

Bringing the device within Bluetooth range is the best way to troubleshoot the issue of inconsistent audio when using wireless headphones and moving around. Bluetooth is a wireless technology that allows devices to communicate over short distances, typically up to 10 meters or 33 feet. If the device is too far from the headphones, the Bluetooth signal may be weak or interrupted, resulting in poor audio quality or loss of connection.

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

A.
Enable promiscuous mode.
A.
Enable promiscuous mode.
Answers
B.
Clear the browser cache.
B.
Clear the browser cache.
Answers
C.
Add a new network adapter.
C.
Add a new network adapter.
Answers
D.
Reset the network adapter.
D.
Reset the network adapter.
Answers
Suggested answer: D

Explanation:

Resetting the network adapter is the best way to apply the changes made to the hosts file on a few PCs. The hosts file is a text file that maps hostnames to IP addresses and can be used to block certain domains by redirecting them to invalid or local addresses. Resetting the network adapter will clear the DNS cache and force the PC to use the new entries in the hosts file.

A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?

A.
Wiping
A.
Wiping
Answers
B.
Low-level formatting
B.
Low-level formatting
Answers
C.
Shredding
C.
Shredding
Answers
D.
Erasing
D.
Erasing
Answers
Suggested answer: C

Explanation:

Shredding is the best method to use for the physical destruction of SSDs because it reduces them to small pieces that cannot be recovered or accessed. Wiping, low-level formatting, and erasing are not effective methods for destroying SSDs because they do not physically damage the flash memory chips that store data1.

After a failed update, an application no longer launches and generates the following error message:

Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

A.
Device Manager
A.
Device Manager
Answers
B.
Administrator Tools
B.
Administrator Tools
Answers
C.
Programs and Features
C.
Programs and Features
Answers
D.
Recovery
D.
Recovery
Answers
Suggested answer: D

Explanation:

Recovery is a Windows 10 utility that can be used to address the concern of a failed update that prevents an application from launching. Recovery allows the user to reset the PC, go back to a previous version of Windows, or use advanced startup options to troubleshoot and repair the system2. Device Manager, Administrator Tools, and Programs and Features are not Windows 10 utilities that can fix a failed update.

A technician receives a call (rom a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user's screen with the user. Which of the following would BEST accomplish this task?

A.
SSH
A.
SSH
Answers
B.
VPN
B.
VPN
Answers
C.
VNC
C.
VNC
Answers
D.
RDP
D.
RDP
Answers
Suggested answer: C

Explanation:

VNC (Virtual Network Computing) is a protocol that allows a technician to simultaneously view and control a user’s screen remotely. VNC uses a server-client model, where the user’s computer runs a VNC server and the technician’s computer runs a VNC client. VNC can work across different platforms and operating systems3. SSH (Secure Shell) is a protocol that allows a technician to access a user’s command-line interface remotely, but not their graphical user interface. VPN (Virtual Private Network) is a technology that creates a secure and encrypted connection over a public network, but does not allow screen sharing. RDP (Remote Desktop Protocol) is a protocol that allows a technician to access a user’s desktop remotely, but not simultaneously with the user.

Total 755 questions
Go to page: of 76