ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Acceptable use
Acceptable use
Chain of custody
Chain of custody
Security policy
Security policy
Information management
Information management
Suggested answer: B
Explanation:

The aspect of forensic evidence life cycle that must be maintained when dealing with a piece of evidence is chain of custody. This is because chain of custody is the documentation of the movement of evidence from the time it is collected to the time it is presented in court, and it is important to maintain the integrity of the evidence

asked 02/10/2024
Luke Smith
37 questions

Question 22

Report Export Collapse

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Avoid distractions
Avoid distractions
Deal appropriately with customer's confidential material
Deal appropriately with customer's confidential material
Adhere to user privacy policy
Adhere to user privacy policy
Set and meet timelines
Set and meet timelines
Suggested answer: A
Explanation:

The technician has taken the appropriate action by not taking the call and setting the phone to silent in order to avoid any distractions and remain focused on the task at hand. This is a good example of how to maintain focus and productivity when working on a customer's PC, and will help to ensure that the job is completed in a timely and efficient manner.

asked 02/10/2024
Juan Manuel Lopez Ortega
33 questions

Question 23

Report Export Collapse

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

All updated software must be tested with alt system types and accessories
All updated software must be tested with alt system types and accessories
Extra technician hours must be budgeted during installation of updates
Extra technician hours must be budgeted during installation of updates
Network utilization will be significantly increased due to the size of CAD files
Network utilization will be significantly increased due to the size of CAD files
Large update and installation files will overload the local hard drives.
Large update and installation files will overload the local hard drives.
Suggested answer: C
Explanation:

The IT manager is most likely to be concerned about network utilization being significantly increased due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a large amount of data being transferred over the network, which can cause network congestion and slow down other network traffic.

asked 02/10/2024
Cornel Sasu
44 questions

Question 24

Report Export Collapse

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs.

Which of the following can BEST resolve the interference?

Changing channels
Changing channels
Modifying the wireless security
Modifying the wireless security
Disabling the SSIO broadcast
Disabling the SSIO broadcast
Changing the access point name
Changing the access point name
Suggested answer: A
Explanation:

Changing channels can best resolve interference from other nearby SSIDs. Wireless networks operate on different channels, and changing the channel can help to avoid interference from other nearby networks.

asked 02/10/2024
Rachana Kesarkar
36 questions

Question 25

Report Export Collapse

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Application updates
Application updates
Anti-malware software
Anti-malware software
OS reinstallation
OS reinstallation
File restore
File restore
Suggested answer: C
Explanation:

If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall the operating system. This is because rootkits are designed to be difficult to detect and remove, and they can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the operating systemhttps://www.minitool.com/backup-tips/how-to-get-rid-of-rootkit-windows-10.html

asked 02/10/2024
Matthew Montgomery
40 questions

Question 26

Report Export Collapse

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

Install alternate open-source software in place of the applications with issues
Install alternate open-source software in place of the applications with issues
Run both CPU and memory tests to ensure that all hardware functionality is normal
Run both CPU and memory tests to ensure that all hardware functionality is normal
Check for any installed patches and roll them back one at a time until the issue is resolved
Check for any installed patches and roll them back one at a time until the issue is resolved
Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
Suggested answer: C
Explanation:

The first step in troubleshooting is to check for any installed patches and roll them back one at a time until the issue is resolved. This can help to identify any patches that may be causing the issue and allow them to be removed.

asked 02/10/2024
eswar raj
38 questions

Question 27

Report Export Collapse

A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Data-in-transit encryption
Data-in-transit encryption
File encryption
File encryption
USB drive encryption
USB drive encryption
Disk encryption
Disk encryption
Suggested answer: D
Explanation:

Disk encryption should be used to secure the workstation in case of theft. Disk encryption can help to protect data on the hard drive by encrypting it so that it cannot be accessed without the correct encryption key

asked 02/10/2024
Asif Ali
39 questions

Question 28

Report Export Collapse

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Full
Full
Non-parity
Non-parity
Differential
Differential
Incremental
Incremental
Suggested answer: A
Explanation:

The type of backup that should be completed FIRST after installing a new backup and recovery system is a full backup. This is because a full backup is a complete backup of all data and is the foundation for all other backups. After a full backup is completed, other types of backups, such as differential and incremental backups, can be performed.

asked 02/10/2024
Owais Mansoor
45 questions

Question 29

Report Export Collapse

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Have the user consider using an iPad if the user is unable to complete updates
Have the user consider using an iPad if the user is unable to complete updates
Have the user text the user's password to the technician.
Have the user text the user's password to the technician.
Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
Advise the user to wait for an upcoming, automatic patch
Advise the user to wait for an upcoming, automatic patch
Suggested answer: C
Explanation:

The technician should guide the user to update Windows through the built-in "Check for Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install them.

asked 02/10/2024
Sharankumar Nadarajah
42 questions

Question 30

Report Export Collapse

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Pretexting
Pretexting
Spoofing
Spoofing
Vishing
Vishing
Scareware
Scareware
Suggested answer: C
Explanation:

Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data.

asked 02/10/2024
Robert Andrade
53 questions
Total 817 questions
Go to page: of 82
Search

Related questions