ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

A.
Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service
A.
Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service
Answers
B.
Flashing the BIOS, reformatting the drive, and then reinstalling the OS
B.
Flashing the BIOS, reformatting the drive, and then reinstalling the OS
Answers
C.
Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
C.
Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
Answers
D.
Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus
D.
Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus
Answers
Suggested answer: B

Explanation:

Flashing the BIOS, reformatting the drive, and then reinstalling the OS is the best method for returning a computer with a malware infection to service. Flashing the BIOS updates the firmware of the motherboard and can remove any malware that may have infected it. Reformatting the drive erases all data on it and can remove any malware that may have infected it. Reinstalling the OS restores the system files and settings to their original state and can remove any malware that may have modified them. Scanning the system with a Linux live disc may not detect or remove all malware infections. Degaussing the hard drive is an extreme method of destroying data that may damage the drive beyond repair. Reinstalling the OS before flashing the BIOS or scanning with antivirus may not remove malware infections that persist in the BIOS or other files.

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?

A.
The Windows 10 desktop has Windows 10 Home installed.
A.
The Windows 10 desktop has Windows 10 Home installed.
Answers
B.
The Windows 10 desktop does not have DHCP configured.
B.
The Windows 10 desktop does not have DHCP configured.
Answers
C.
The Windows 10 desktop is connected via Wi-Fi.
C.
The Windows 10 desktop is connected via Wi-Fi.
Answers
D.
The Windows 10 desktop is hibernating.
D.
The Windows 10 desktop is hibernating.
Answers
Suggested answer: A

Explanation:

The Windows 10 desktop has Windows 10 Home installed, which does not support RDP (Remote Desktop Protocol) as a host. Only Windows 10 Pro, Enterprise, and Education editions can act as RDP hosts and allow remote access to their desktops1. The Windows 10 desktop does not have DHCP configured, is connected via Wi-Fi, or is hibernating are not likely to prevent the RDP connection if the technician is able to ping the computer successfully.

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

A.
MFA
A.
MFA
Answers
B.
WPA2
B.
WPA2
Answers
C.
AES
C.
AES
Answers
D.
RADIUS
D.
RADIUS
Answers
Suggested answer: A

Explanation:

MFA (Multi-Factor Authentication) is a security measure that often uses an SMS or third-party application as a secondary method to access a system. MFA requires the user to provide two or more pieces of evidence to prove their identity, such as something they know (e.g., password), something they have (e.g., phone), or something they are (e.g., fingerprint)2. WPA2 (Wi-Fi Protected Access 2) is a security protocol for wireless networks that does not use SMS or third-party applications. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that does not use SMS or third- party applications. RADIUS (Remote Authentication Dial-In User Service) is a network protocol that provides centralized authentication and authorization for remote access clients, but does not use SMS or third-party applications.

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

A.
Password-protected Wi-Fi
A.
Password-protected Wi-Fi
Answers
B.
Port forwarding
B.
Port forwarding
Answers
C.
Virtual private network
C.
Virtual private network
Answers
D.
Perimeter network
D.
Perimeter network
Answers
Suggested answer: C

Explanation:

A virtual private network (VPN) is a technology that creates a secure and encrypted connection over a public network, such as the internet. A VPN allows remote employees to access the corporate intranet as if they were physically connected to the local network3. Password-protected Wi-Fi is a security measure for wireless networks that does not provide access to the corporate intranet. Port forwarding is a technique that allows external devices to access services on a private network through a router, but does not provide access to the corporate intranet. A perimeter network is a network segment that lies between an internal network and an external network, such as the internet, and provides an additional layer of security, but does not provide access to the corporate intranet.

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

A.
Access control list
A.
Access control list
Answers
B.
Acceptable use policy
B.
Acceptable use policy
Answers
C.
Incident report
C.
Incident report
Answers
D.
Standard operating procedure
D.
Standard operating procedure
Answers
Suggested answer: A

Explanation:

An access control list (ACL) is a list of permissions associated with a system resource (object), such as a website. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects1. A systems administrator can create an ACL to define the list of websites that users are allowed to access.

Reference: 1: Access-control list - Wikipedia (https://en.wikipedia.org/wiki/Access-control_list)

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

A.
Remote wipe
A.
Remote wipe
Answers
B.
Firewall
B.
Firewall
Answers
C.
Device encryption
C.
Device encryption
Answers
D.
Remote backup
D.
Remote backup
Answers
E.
Antivirus
E.
Antivirus
Answers
F.
Global Positioning System
F.
Global Positioning System
Answers
Suggested answer: A, C

Explanation:

Remote wipe is a feature that allows data to be deleted from a device or system remotely by an administrator or owner1. It is used to protect data from being compromised if the device is lost, stolen, or changed hands1. Device encryption is a feature that helps protect the data on a device by making it unreadable to unauthorized users2. It requires a key or a password to access the data2. Both features can help mitigate the risk of losing company trade secrets if a corporate phone is stolen.

Reference: 1: How to remote wipe Windows laptop (https://www.thewindowsclub.com/remote- wipe-windows-10) 2: Device encryption in Windows (https://support.microsoft.com/en- us/windows/device-encryption-in-windows-ad5dcf4b-dbe0-2331-228f-7925c2a3012d)

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.
Repair Windows.
A.
Repair Windows.
Answers
B.
Partition the hard disk.
B.
Partition the hard disk.
Answers
C.
Reimage the workstation.
C.
Reimage the workstation.
Answers
D.
Roll back the updates.
D.
Roll back the updates.
Answers
Suggested answer: A

Explanation:

The error “BOOTMGR is missing” indicates that the boot sector is damaged or missing1. The boot sector is a part of the hard disk that contains the code and information needed to start Windows1. To fix this error, one of the possible methods is to run Startup Repair from Windows Recovery Environment (WinRE)1. Startup Repair is a tool that can automatically diagnose and repair problems with the boot process2.

Reference: 1: “Bootmgr is missing Press Ctrl+Alt+Del to restart” error when you start Windows (https://support.microsoft.com/en-us/topic/-bootmgr-is-missing-press-ctrl-alt-del-to-restart-error- when-you-start-windows-8bc1b94b-d243-1027-5410-aeb04d5cd5e2) 2: Startup Repair: frequently asked questions (https://support.microsoft.com/en-us/windows/startup-repair-frequently-asked- questions-f5f412a0-19c4-8e0a-9f68-bb0f17f3daa0)

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.
System
A.
System
Answers
B.
Network and Sharing Center
B.
Network and Sharing Center
Answers
C.
User Accounts
C.
User Accounts
Answers
D.
Security and Maintenance
D.
Security and Maintenance
Answers
Suggested answer: C

Explanation:

User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on a workstation1. The technician can use User Accounts to grant local administrative access to a user by adding the user to the Administrators group1. The Administrators group has full control over the workstation and can perform tasks such as installing software, changing system settings, and accessing all files.

Reference: 1: User Accounts (Control Panel) (https://docs.microsoft.com/en- us/windows/win32/shell/user-accounts) : Local Users and Groups (https://docs.microsoft.com/en- us/windows-server/identity/ad-ds/plan/security-best-practices/local-users-and-groups)

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

A.
Proceed to the site.
A.
Proceed to the site.
Answers
B.
Use a different browser.
B.
Use a different browser.
Answers
C.
Report the error to the bank.
C.
Report the error to the bank.
Answers
D.
Reinstall the browser.
D.
Reinstall the browser.
Answers
Suggested answer: C

Explanation:

The error message “Your connection is not private. Authority invalid.” means that the web browser cannot verify the identity or security of the website’s SSL certificate. This could indicate that the website has been compromised, has a configuration error, or has an expired or invalid certificate. The user should not proceed to the site or use a different browser, as this could expose their sensitive information to potential attackers. The user should also not reinstall the browser, as this is unlikely to fix the error and could cause data loss. The best action for the user to take is to report the error to the bank and wait for them to resolve it.

Reference: : How to Fix “Your Connection Is Not Private” Errors (https://www.howtogeek.com/874436/how-to-fix-your-connection-is-not-private-errors/) : Fix connection errors (https://support.google.com/chrome/answer/6098869?hl=en)

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.
Trojan
A.
Trojan
Answers
B.
Rootkit
B.
Rootkit
Answers
C.
Cryptominer
C.
Cryptominer
Answers
D.
Keylogger
D.
Keylogger
Answers
Suggested answer: D

Explanation:

A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote attacker1. The attacker can use the captured information to steal passwords, credit card numbers, or other sensitive data. A keylogger can be installed on a computer by attaching a small USB drive that contains a malicious executable file, such as grabber.exe2. The output.txt file may contain the recorded keystrokes. The user should remove the USB drive and scan the computer for malware.

Reference: 2: What is grabber.exe? (https://www.freefixer.com/library/file/grabber.exe-55857/) 1:

What is a keylogger? (https://www.kaspersky.com/resource-center/definitions/keylogger)

Total 755 questions
Go to page: of 76