ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

A.
Acceptable use
A.
Acceptable use
Answers
B.
Chain of custody
B.
Chain of custody
Answers
C.
Security policy
C.
Security policy
Answers
D.
Information management
D.
Information management
Answers
Suggested answer: B

Explanation:

The aspect of forensic evidence life cycle that must be maintained when dealing with a piece of evidence is chain of custody. This is because chain of custody is the documentation of the movement of evidence from the time it is collected to the time it is presented in court, and it is important to maintain the integrity of the evidence

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

A.
Avoid distractions
A.
Avoid distractions
Answers
B.
Deal appropriately with customer's confidential material
B.
Deal appropriately with customer's confidential material
Answers
C.
Adhere to user privacy policy
C.
Adhere to user privacy policy
Answers
D.
Set and meet timelines
D.
Set and meet timelines
Answers
Suggested answer: A

Explanation:

The technician has taken the appropriate action by not taking the call and setting the phone to silent in order to avoid any distractions and remain focused on the task at hand. This is a good example of how to maintain focus and productivity when working on a customer's PC, and will help to ensure that the job is completed in a timely and efficient manner.

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

A.
All updated software must be tested with alt system types and accessories
A.
All updated software must be tested with alt system types and accessories
Answers
B.
Extra technician hours must be budgeted during installation of updates
B.
Extra technician hours must be budgeted during installation of updates
Answers
C.
Network utilization will be significantly increased due to the size of CAD files
C.
Network utilization will be significantly increased due to the size of CAD files
Answers
D.
Large update and installation files will overload the local hard drives.
D.
Large update and installation files will overload the local hard drives.
Answers
Suggested answer: C

Explanation:

The IT manager is most likely to be concerned about network utilization being significantly increased due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a large amount of data being transferred over the network, which can cause network congestion and slow down other network traffic.

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs.

Which of the following can BEST resolve the interference?

A.
Changing channels
A.
Changing channels
Answers
B.
Modifying the wireless security
B.
Modifying the wireless security
Answers
C.
Disabling the SSIO broadcast
C.
Disabling the SSIO broadcast
Answers
D.
Changing the access point name
D.
Changing the access point name
Answers
Suggested answer: A

Explanation:

Changing channels can best resolve interference from other nearby SSIDs. Wireless networks operate on different channels, and changing the channel can help to avoid interference from other nearby networks.

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

A.
Application updates
A.
Application updates
Answers
B.
Anti-malware software
B.
Anti-malware software
Answers
C.
OS reinstallation
C.
OS reinstallation
Answers
D.
File restore
D.
File restore
Answers
Suggested answer: C

Explanation:

If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall the operating system. This is because rootkits are designed to be difficult to detect and remove, and they can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the operating systemhttps://www.minitool.com/backup-tips/how-to-get-rid-of-rootkit-windows-10.html

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A.
Install alternate open-source software in place of the applications with issues
A.
Install alternate open-source software in place of the applications with issues
Answers
B.
Run both CPU and memory tests to ensure that all hardware functionality is normal
B.
Run both CPU and memory tests to ensure that all hardware functionality is normal
Answers
C.
Check for any installed patches and roll them back one at a time until the issue is resolved
C.
Check for any installed patches and roll them back one at a time until the issue is resolved
Answers
D.
Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
D.
Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
Answers
Suggested answer: C

Explanation:

The first step in troubleshooting is to check for any installed patches and roll them back one at a time until the issue is resolved. This can help to identify any patches that may be causing the issue and allow them to be removed.

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.
Data-in-transit encryption
A.
Data-in-transit encryption
Answers
B.
File encryption
B.
File encryption
Answers
C.
USB drive encryption
C.
USB drive encryption
Answers
D.
Disk encryption
D.
Disk encryption
Answers
Suggested answer: D

Explanation:

Disk encryption should be used to secure the workstation in case of theft. Disk encryption can help to protect data on the hard drive by encrypting it so that it cannot be accessed without the correct encryption key

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

A.
Full
A.
Full
Answers
B.
Non-parity
B.
Non-parity
Answers
C.
Differential
C.
Differential
Answers
D.
Incremental
D.
Incremental
Answers
Suggested answer: A

Explanation:

The type of backup that should be completed FIRST after installing a new backup and recovery system is a full backup. This is because a full backup is a complete backup of all data and is the foundation for all other backups. After a full backup is completed, other types of backups, such as differential and incremental backups, can be performed.

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

A.
Have the user consider using an iPad if the user is unable to complete updates
A.
Have the user consider using an iPad if the user is unable to complete updates
Answers
B.
Have the user text the user's password to the technician.
B.
Have the user text the user's password to the technician.
Answers
C.
Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
C.
Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
Answers
D.
Advise the user to wait for an upcoming, automatic patch
D.
Advise the user to wait for an upcoming, automatic patch
Answers
Suggested answer: C

Explanation:

The technician should guide the user to update Windows through the built-in "Check for Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install them.

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

A.
Pretexting
A.
Pretexting
Answers
B.
Spoofing
B.
Spoofing
Answers
C.
Vishing
C.
Vishing
Answers
D.
Scareware
D.
Scareware
Answers
Suggested answer: C

Explanation:

Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data.

Total 755 questions
Go to page: of 76