ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

A.
UAC
A.
UAC
Answers
B.
MDM
B.
MDM
Answers
C.
LDAP
C.
LDAP
Answers
D.
SSO
D.
SSO
Answers
Suggested answer: B

Explanation:

MDM stands for mobile device management, which is a type of software solution that allows remote management and security of mobile devices. MDM can help a company reduce data disclosure caused by malware that may infect these devices by enforcing security policies, such as encryption,

password protection, antivirus software, and remote wipe. MDM can also monitor and control the access of personal devices to corporate data and networks. UAC stands for user account control, which is a feature of Windows that prompts users for permission or an administrator password before making changes that affect the system. UAC may not be effective in preventing malware infection or data disclosure on personal devices. LDAP stands for lightweight directory access protocol, which is a protocol for accessing and managing information stored in a directory service,

such as user names and passwords. LDAP does not directly address the issue of malware infection or data disclosure on personal devices. SSO stands for single sign-on, which is a feature that allows users to access multiple applications or services with one set of credentials. SSO may not prevent

malware infection or data disclosure on personal devices, and may even increase the risk if the credentials are compromised.

https://www.nist.gov/news-events/news/2021/03/mobile-device-security-bring-your-own-devicebyod-draft-sp-1800-22

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

A.
Database system
A.
Database system
Answers
B.
Software management
B.
Software management
Answers
C.
Active Directory description
C.
Active Directory description
Answers
D.
Infrastructure as a Service
D.
Infrastructure as a Service
Answers
Suggested answer: A

Explanation:

A database system is a software application that allows storing, organizing, and managing data in a structured way. A database system can be used to register all employee badges and associated computer IDs by creating a table or a record for each employee that contains their badge number,

computer ID, name, and other relevant information. A database system can also facilitate searching, updating, and deleting data as needed. Software management is a general term that refers to the process of planning, developing, testing, deploying, and maintaining software applications. It does

not directly address the issue of registering employee badges and computer IDs. Active Directory description is a field in Active Directory that can be used to store additional information about an object, such as a user or a computer. It is not a software application that can be used to register

employee badges and computer IDs by itself. Infrastructure as a Service (IaaS) is a cloud computing model that provides servers, storage, networking, and software over the internet. It does not directly address the issue of registering employee badges and computer IDs either.

https://www.idcreator.com/

https://www.alphacard.com/photo-id-systems/card-type/employee-badges

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

A.
Login times
A.
Login times
Answers
B.
Screen lock
B.
Screen lock
Answers
C.
User permission
C.
User permission
Answers
D.
Login lockout attempts
D.
Login lockout attempts
Answers
Suggested answer: B

Explanation:

Screen lock is a feature that returns a computer to the login screen after a period of inactivity,

requiring the user to enter their credentials to resume their session. Screen lock can be configured using Group Policy settings, such as Screen saver timeout and Interactive logon: Machine inactivity limit. Screen lock can help prevent unauthorized access to a computer when the user is away from

their desk. Login times are not a feature that returns a computer to the login screen, but a measure of how long it takes for a user to log in to a system. User permission is not a feature that returns a computer to the login screen, but a set of rights and privileges that determine what a user can do on a system. Login lockout attempts are not a feature that returns a computer to the login screen, but a security policy that locks out a user account after a number of failed login attempts.

https://woshub.com/windows-lock-screen-after-idle-via-gpo/

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

A.
VPN
A.
VPN
Answers
B.
SMB
B.
SMB
Answers
C.
RMM
C.
RMM
Answers
D.
MSRA
D.
MSRA
Answers
Suggested answer: B

Explanation:

SMB stands for Server Message Block, which is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network. SMB is a built-in protocol in Windows operating systems and can be used to

transfer files between computers over a network. The technician can use SMB to access a file share on the user’s workstation and copy the file to or from it. VPN stands for virtual private network, which is a technology that creates a secure and encrypted connection over a public network. VPN is

not a built-in protocol in Windows operating systems and does not directly transfer files between computers. RMM stands for remote monitoring and management, which is a type of software solution that allows remote management and monitoring of devices and networks. RMM is not a

built-in protocol in Windows operating systems and does not directly transfer files between computers. MSRA stands for Microsoft Remote Assistance, which is a feature that allows a user to invite another user to view or control their computer remotely. MSRA is not a protocol, but an application that uses Remote Desktop Protocol (RDP) to establish a connection. MSRA does not directly transfer files between computers.

https://www.pcmag.com/picks/the-best-desktop-workstations

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

A.
Offer to wipe and reset the device for the customer.
A.
Offer to wipe and reset the device for the customer.
Answers
B.
Advise that the help desk will investigate and follow up at a later date.
B.
Advise that the help desk will investigate and follow up at a later date.
Answers
C.
Put the customer on hold and escalate the call to a manager.
C.
Put the customer on hold and escalate the call to a manager.
Answers
D.
Use open-ended questions to further diagnose the issue.
D.
Use open-ended questions to further diagnose the issue.
Answers
Suggested answer: D

Explanation:

Open-ended questions are questions that require more than a yes or no answer and encourage the customer to provide more details and information. Using open-ended questions can help the support technician to understand the problem better, identify the root cause, and find a suitable solution.

Some examples of open-ended questions are:

What exactly is not working on your machine?

When did you notice the problem?

How often does the problem occur?

What were you doing when the problem happened?

What have you tried to fix the problem?

Offering to wipe and reset the device for the customer is not a good option, as it may result in data loss and inconvenience for the customer. It should be used as a last resort only if other troubleshooting steps fail. Advising that the help desk will investigate and follow up at a later date is

not a good option, as it may leave the customer unsatisfied and frustrated. It should be used only if the problem requires further research or escalation and cannot be resolved on the first call. Putting the customer on hold and escalating the call to a manager is not a good option, as it may waste time

and resources. It should be used only if the problem is beyond the support technician’s scope or authority and requires managerial intervention.

Which of the following is MOST likely used to run .vbs files on Windows devices?

A.
winmgmt.exe
A.
winmgmt.exe
Answers
B.
powershell.exe
B.
powershell.exe
Answers
C.
cscript.exe
C.
cscript.exe
Answers
D.
explorer.exe
D.
explorer.exe
Answers
Suggested answer: C

Explanation:

A .vbs file is a Virtual Basic script written in the VBScript scripting language. It contains code that can be executed within Windows via the Windows-based script host (Wscript.exe), to perform certain admin and processing functions1. Cscript.exe is a command-line version of the Windows Script Host

that provides command-line options for setting script properties. Therefore, cscript.exe is most likely used to run .vbs files on Windows devices. Reference: 1: https://fileinfo.com/extension/vbs :

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cscript

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.
System
A.
System
Answers
B.
Network and Sharing Center
B.
Network and Sharing Center
Answers
C.
User Accounts
C.
User Accounts
Answers
D.
Security and Maintenance
D.
Security and Maintenance
Answers
Suggested answer: C

Explanation:

User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on a local computer. The technician can use this utility to add a user to the local administrators group, which grants the user local administrative access to the workstation. The other

options are not relevant for this task. Reference: : https://docs.microsoft.com/en-us/windowsserver/identity/ad-fs/operations/manage-user-accounts-and-groups

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

A.
Trojan
A.
Trojan
Answers
B.
Rootkit
B.
Rootkit
Answers
C.
Cryptominer
C.
Cryptominer
Answers
D.
Keylogger
D.
Keylogger
Answers
Suggested answer: D

Explanation:

A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote attacker. A keylogger can be used to steal passwords, credit card numbers, personal information, and other sensitive data. A keylogger can be delivered through a USB drive that contains a malicious executable file, such as grabber.exe, and an output file that stores the captured keystrokes, such as output.txt. The other options are not likely to use this method of attack. Reference: :

https://www.comptia.org/training/resources/exam-objectives/comptia-a-core-2-exam-objectives :

https://www.kaspersky.com/resource-center/definitions/keylogger

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

A.
Delete the application's cache.
A.
Delete the application's cache.
Answers
B.
Check for application updates.
B.
Check for application updates.
Answers
C.
Roll back the OS update.
C.
Roll back the OS update.
Answers
D.
Uninstall and reinstall the application.
D.
Uninstall and reinstall the application.
Answers
Suggested answer: B

Explanation:

Checking for application updates is the first troubleshooting step that the user should perform, because the application may not be compatible with the new OS version and may need an update to fix the issue. Deleting the application’s cache, rolling back the OS update, or uninstalling and

reinstalling the application are possible solutions, but they are more time-consuming and disruptive than checking for updates. Reference: : https://www.comptia.org/training/resources/examobjectives/comptia-a-core-2-exam-objectives

: https://www.lifewire.com/how-to-update-apps-onandroid-4173855

A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:

Index number of the Event Viewer issue

First command to resolve the issue

Second command to resolve the issue

BSOD

Commands:

Event Viewer:

System Error:


A.
See the answer below in explanation.
A.
See the answer below in explanation.
Answers
Suggested answer: A

Explanation:


The user is experiencing a system error that prevents them from using the Testing program. The error message indicates that the file MSVCP100.dll is missing from the computer. This file is part of the Microsoft Visual C++ 2010 Redistributable Package, which is required by some applications to run properly. The error may have occurred due to a corrupted or incomplete software deployment. To resolve this issue, the user needs to restore the missing file and register it in the system. One possible way to do this is to copy the file from another computer that has the Testing program installed and working, and then use the regsvr32 command to register it. The steps are as follows:

On another computer (User-PC02) that has the Testing program installed and working, locate the file MSVCP100.dll in the folder C:\Program Files\Testing.

Share the folder C:\Windows\System32 on User-PC02 by right-clicking on it, selecting Properties,

then Sharing, then Advanced Sharing, then checking Share this folder, then clicking OK.

On the user’s computer (User-PC01), open a command prompt as an administrator by clicking Start,

typing cmd, right-clicking on Command Prompt, and selecting Run as administrator.

In the command prompt, type the following command to copy the file MSVCP100.dll from User-PC02 to User-PC01: copy "C:\Program Files\Testing\msvcp100.dll" "\\User-PC02\C$\Windows\System32"

After the file is copied, type the following command to register it in the system: regsvr32 msvcp100.dll

Restart the user’s computer and try to run the Testing program again.

Therefore, based on the instructions given by the user, the correct answers are:

Select Event Viewer Issue: 2187

Select First Command: copy "C:\Program Files\Testing\msvcp100.dll" "\\UserPC02\C$\Windows\System32"

Select

Second Command: regsvr32 msvcp100.dll

Total 755 questions
Go to page: of 76