ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

A.
Adjust the content filtering.
A.
Adjust the content filtering.
Answers
B.
Unmap port forwarding.
B.
Unmap port forwarding.
Answers
C.
Disable unused ports.
C.
Disable unused ports.
Answers
D.
Reduce the encryption strength
D.
Reduce the encryption strength
Answers
Suggested answer: A

Explanation:

Content filtering is a process that manages or screens access to specific emails or webpages based on their content categories1. Content filtering can be used by organizations to control content access through their firewalls and enforce corporate policies around information system management2. A SOHO client may have content filtering enabled on their network and may need to adjust it to allow access to a corporate website that is blocked by default. The client can use a software program, a hardware device, or a subscription service to configure the content filtering settings and whitelist the desired website2.

Reference: 1: Web content filtering (https://learn.microsoft.com/en-us/microsoft- 365/security/defender-endpoint/web-content-filtering?view=o365-worldwide) 2: What is Content Filtering? Definition and Types of Content Filters

(https://www.fortinet.com/resources/cyberglossary/content-filtering)

Which of the following is used as a password manager in the macOS?

A.
Terminal
A.
Terminal
Answers
B.
FileVault
B.
FileVault
Answers
C.
Privacy
C.
Privacy
Answers
D.
Keychain
D.
Keychain
Answers
Suggested answer: D

Explanation:

Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential information for your Mac, apps, servers, and websites1. You can use the Keychain Access app on your Mac to view and manage your keychains and the items stored in them1. Keychain can also sync your passwords and other secure information across your devices using iCloud Keychain1. Keychain can be used as a password manager in macOS to help you keep track of and protect your passwords.

Reference: 1: Manage passwords using keychains on Mac (https://support.apple.com/guide/mac- help/use-keychains-to-store-passwords-mchlf375f392/mac)

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

A.
copy
A.
copy
Answers
B.
xcopy
B.
xcopy
Answers
C.
robocopy
C.
robocopy
Answers
D.
Copy-Item
D.
Copy-Item
Answers
Suggested answer: C

Explanation:

Robocopy is a command-line utility that can be used to mirror the source data for the backup. It can copy files and folders with various options, such as copying only changed files, preserving attributes and permissions, and retrying failed copies. Robocopy is more powerful and flexible than copy or xcopy, which are simpler commands that can only copy files and folders without mirroring or other advanced features. Copy-Item is a PowerShell cmdlet that can also copy files and folders, but it is not a native Windows utility and it requires PowerShell to run1.

Reference: 1: https://windowsreport.com/mirror-backup-software/

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

A.
Document the date and time of change.
A.
Document the date and time of change.
Answers
B.
Document the purpose of the change.
B.
Document the purpose of the change.
Answers
C.
Document the risk level.
C.
Document the risk level.
Answers
D.
Document findings of the sandbox test.
D.
Document findings of the sandbox test.
Answers
Suggested answer: A

Explanation:

After implementing a change authorized by the change advisory board (CAB), the technician should document the date and time of change as part of the post-implementation review. This helps to track the change history, verify the success of the change, and identify any issues or incidents caused by the change1. Documenting the purpose of the change, the risk level, and the findings of the sandbox test are all part of the pre-implementation activities that should be done before submitting the change request to the CAB2.

Reference: 2: https://www.manageengine.com/products/service-desk/itil-change-management/cab- change-advisory-board.html 1: https://www.servicenow.com/content/dam/servicenow- assets/public/en-us/doc-type/success/quick-answer/change-advisory-board-setup.pdf

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

A.
Ask coworkers to make sure no one touches the hard drive.
A.
Ask coworkers to make sure no one touches the hard drive.
Answers
B.
Leave the hard drive on the table; it will be okay while the other task is completed.
B.
Leave the hard drive on the table; it will be okay while the other task is completed.
Answers
C.
Place the hard drive in an antistatic bag and secure the area containing the hard drive.
C.
Place the hard drive in an antistatic bag and secure the area containing the hard drive.
Answers
D.
Connect an electrostatic discharge strap to the drive.
D.
Connect an electrostatic discharge strap to the drive.
Answers
Suggested answer: C

Explanation:

The technician should place the hard drive in an antistatic bag and secure the area containing the hard drive before leaving. This will protect the hard drive from electrostatic discharge (ESD), dust, moisture, and physical damage. Asking coworkers to make sure no one touches the hard drive is not a reliable or secure way to prevent damage. Leaving the hard drive on the table exposes it to ESD and other environmental hazards. Connecting an electrostatic discharge strap to the drive is not enough to protect it from dust, moisture, and physical damage.

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

A.
The system is missing updates.
A.
The system is missing updates.
Answers
B.
The systems utilizing a 32-bit OS.
B.
The systems utilizing a 32-bit OS.
Answers
C.
The system's memory is failing.
C.
The system's memory is failing.
Answers
D.
The system requires BIOS updates.
D.
The system requires BIOS updates.
Answers
Suggested answer: B

Explanation:

The most likely reason that the system is not utilizing all the available RAM is that it is running a 32- bit OS. A 32-bit OS can only address up to 4GB of RAM, and some of that is reserved for hardware and system use1. Therefore, even if the technician installed 8GB of RAM, the system can only use around 3.5GB of usable RAM. To use the full 8GB of RAM, the technician would need to install a 64- bit OS, which can address much more memory2. The system missing updates, the system’s memory failing, or the system requiring BIOS updates are not likely to cause this issue.

Reference: 2: https://support.microsoft.com/en-us/windows/windows-10-system-requirements- 6d4e9a79-66bf-7950-467c-795cf0386715 1: https://www.makeuseof.com/tag/unlock-64gb-ram-32- bit-windows-pae-patch/

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the technician perform to fix the issue?

A.
Disable the Windows Update service.
A.
Disable the Windows Update service.
Answers
B.
Check for updates.
B.
Check for updates.
Answers
C.
Restore hidden updates.
C.
Restore hidden updates.
Answers
D.
Rollback updates.
D.
Rollback updates.
Answers
Suggested answer: D

Explanation:

The technician should perform a rollback of the Windows update that caused the issue with the locally attached devices. A rollback is a process of uninstalling an update and restoring the previous version of the system. This can help to fix any compatibility or performance issues caused by the update1. To rollback an update, the technician can use the Settings app, the Control Panel, or the System Restore feature. The technician should also check for any device driver updates that might be needed after rolling back the update. Disabling the Windows Update service is not a good practice, as it can prevent the system from receiving important security and feature updates. Checking for updates might not fix the issue, as the update that caused the issue might still be installed. Restoring hidden updates is not relevant, as it only applies to updates that have been hidden by the user to prevent them from being installed2.

Reference: 1: https://www.windowscentral.com/how-uninstall-and-reinstall-updates-windows-10 2:

https://support.microsoft.com/en-us/windows/show-or-hide-updates-in-windows-10-9c9f0a4f- 9a6e-4c8e-8b44-afbc6b33f3cf

A macOS user is installing a new application. Which of the following system directories is the software MOST likely to install by default?

A.
/etc/services
A.
/etc/services
Answers
B.
/Applications
B.
/Applications
Answers
C.
/usr/bin
C.
/usr/bin
Answers
D.
C:\Program Files
D.
C:\Program Files
Answers
Suggested answer: B

Explanation:

The software is most likely to install by default in the /Applications directory, which is the standard location for macOS applications. This directory can be accessed from the Finder sidebar or by choosing Go > Applications from the menu bar. The /Applications directory contains all the applications that are available to all users on the system1. Some applications might also offer the option to install in the ~/Applications directory, which is a personal applications folder for a single user2. The /etc/services directory is a system configuration file that maps service names to port numbers and protocols3. The /usr/bin directory is a system directory that contains executable binaries for various commands and utilities4. The C:\Program Files directory is a Windows directory that does not exist on macOS.

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A.
Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.
A.
Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.
Answers
B.
Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.
B.
Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.
Answers
C.
Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.
C.
Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.
Answers
D.
Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.
D.
Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.
Answers
Suggested answer: B

Explanation:

The user can change the wallpaper using a Windows 10 Settings tool by following these steps12:

Open Settings by pressing the Windows key and typing Settings, or by clicking the gear icon in the Start menu.

Select Personalization from the left navigation menu.

On the right side of the window, click Background.

In the Background settings, click the drop-down menu and select Picture as the background type. Click Browse and then locate and open the image the user wants to use as the wallpaper. The other options are incorrect because they do not lead to the Background settings or they do not allow the user to browse for an image. Accounts, System, and Apps are not related to personalization settings. Your info, Display, and Apps & features are not related to wallpaper settings.

Reference: 1: https://support.microsoft.com/en-us/windows/change-your-desktop-background- image-175618be-4cf1-c159-2785-ec2238b433a8 2:

https://www.computerhope.com/issues/ch000592.htm

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

A.
Remote Assistance
A.
Remote Assistance
Answers
B.
Remote Desktop Protocol
B.
Remote Desktop Protocol
Answers
C.
Screen Sharing
C.
Screen Sharing
Answers
D.
Virtual Network Computing
D.
Virtual Network Computing
Answers
Suggested answer: C

Explanation:

Screen Sharing is the default system tool that can be used in macOS to allow the technician to view the screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their Mac screen with another Mac on the network. The user can enable screen sharing in the System Preferences > Sharing pane, and then allow other users to request or enter a password to access their screen1. The technician can launch the Screen Sharing app from the Spotlight search or the Finder sidebar, and then enter the user’s name, address, or Apple ID to connect to their screen2. Remote Assistance is a Windows feature that allows users to invite someone to help them with a problem on their PC3. Remote Desktop Protocol (RDP) is a protocol that allows users to connect to a remote computer over a network4. Virtual Network Computing (VNC) is a technology that allows users to share their screen with other devices using a VNC viewer app1. These are not default system tools in macOS, although they can be used with third-party software or settings.

Reference: 1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-macmh14066/mac 2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-withanother-mac/ 3: https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remoteconnection-b077e31a-16f4-2529-1a47-21f6a9040bf3 4: https://docs.microsoft.com/en-us/windowsserver/remote/remote-desktop-services/clients/remote-desktop-protocol

Total 755 questions
Go to page: of 76