ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











A company is retiring old workstations and needs a certificate of destruction for all hard drives.

Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

A.
Standard formatting
A.
Standard formatting
Answers
B.
Drilling
B.
Drilling
Answers
C.
Erasing
C.
Erasing
Answers
D.
Recycling
D.
Recycling
Answers
E.
Incinerating
E.
Incinerating
Answers
F.
Low-level formatting
F.
Low-level formatting
Answers
Suggested answer: B, E

Explanation:

Drilling and incinerating are physical destruction methods that make the data on hard drives unrecoverable. Standard formatting, erasing and low-level formatting are logical methods that can be reversed with data recovery tools. Recycling is not a destruction method at all. Verified Reference:

https://www.comptia.org/blog/what-is-a-certificate-of-destruction

https://www.comptia.org/certifications/a

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

A.
Workgroup network
A.
Workgroup network
Answers
B.
Public network
B.
Public network
Answers
C.
Wide area network
C.
Wide area network
Answers
D.
Domain network
D.
Domain network
Answers
Suggested answer: A

Explanation:

A workgroup network is a peer-to-peer network where each PC can share files and resources with other PCs without a central server. A public network is a network that is accessible to anyone on the internet. A wide area network is a network that spans a large geographic area, such as a country or a continent. A domain network is a network where a server controls the access and security of the PCs.

Verified Reference: https://www.comptia.org/blog/network-types

https://www.comptia.org/certifications/a

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

A.
DNS
A.
DNS
Answers
B.
IPS
B.
IPS
Answers
C.
VPN
C.
VPN
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: C

Explanation:

A VPN (virtual private network) is a protocol that creates a secure tunnel between two devices over the internet, hiding their IP addresses and encrypting their traffic. DNS (domain name system) is a protocol that translates domain names to IP addresses. IPS (intrusion prevention system) is a device that monitors and blocks malicious network traffic. SSH (secure shell) is a protocol that allows remote access and command execution on another device. Verified Reference:

https://www.comptia.org/blog/what-is-a-vpn https://www.comptia.org/certifications/a

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

A.
Resource Monitor
A.
Resource Monitor
Answers
B.
Performance Monitor
B.
Performance Monitor
Answers
C.
Command Prompt
C.
Command Prompt
Answers
D.
System Information
D.
System Information
Answers
Suggested answer: A

Explanation:

Resource Monitor is a tool that shows the network activity of each process on a Windows machine, including the TCP connections and the sent and received bytes. Performance Monitor is a tool that shows the performance metrics of the system, such as CPU, memory, disk and network usage.

Command Prompt is a tool that allows running commands and scripts on a Windows machine.

System Information is a tool that shows the hardware and software configuration of a Windows machine. Verified Reference: https://www.comptia.org/blog/how-to-use-resource-monitor

https://www.comptia.org/certifications/a

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system Which of the following upgrades will MOST likely fix the issue?

A.
Processor
A.
Processor
Answers
B.
Hard drive
B.
Hard drive
Answers
C.
Memory
C.
Memory
Answers
D.
Video card
D.
Video card
Answers
Suggested answer: A

Explanation:

The processor is the component that determines if the system supports virtualization technology (VTx), which is required for running virtualization software. The hard drive, memory and video card are not directly related to VTx support, although they may affect the performance of the virtual machines. Verified Reference: https://www.comptia.org/blog/what-is-virtualization

https://www.comptia.org/certifications/a

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

A.
Fingerprint and pattern
A.
Fingerprint and pattern
Answers
B.
Facial recognition and PIN code
B.
Facial recognition and PIN code
Answers
C.
Primary account and password
C.
Primary account and password
Answers
D.
Secondary account and recovery code
D.
Secondary account and recovery code
Answers
Suggested answer: D

Explanation:

A secondary account and recovery code are used to reset the primary account and password on an iPhone after it has been locked due to failed login attempts. Fingerprint, pattern, facial recognition and PIN code are biometric or numeric methods that can be used to unlock an iPhone, but they are not helpful if the device has been permanently locked. Verified Reference:

https://support.apple.com/en-us/HT204306 https://www.comptia.org/certifications/a

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100%utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

A.
Spyware is redirecting browser searches.
A.
Spyware is redirecting browser searches.
Answers
B.
A cryptominer is verifying transactions.
B.
A cryptominer is verifying transactions.
Answers
C.
Files were damaged from a cleaned virus infection.
C.
Files were damaged from a cleaned virus infection.
Answers
D.
A keylogger is capturing user passwords.
D.
A keylogger is capturing user passwords.
Answers
Suggested answer: B

Explanation:

A cryptominer is a malicious program that uses the CPU resources of a computer to generate cryptocurrency, such as Bitcoin or Ethereum. This can cause the CPU to run at 100% utilization and slow down the system. Spyware, virus and keylogger are other types of malware, but they do not necessarily cause high CPU usage. Verified Reference: https://www.comptia.org/blog/what-iscryptomining

https://www.comptia.org/certifications/a

Which of the following physical security controls can prevent laptops from being stolen?

A.
Encryption
A.
Encryption
Answers
B.
LoJack
B.
LoJack
Answers
C.
Multifactor authentication
C.
Multifactor authentication
Answers
D.
Equipment lock
D.
Equipment lock
Answers
E.
Bollards
E.
Bollards
Answers
Suggested answer: D

Explanation:

An equipment lock is a physical security device that attaches a laptop to a fixed object, such as a desk or a table, with a cable and a lock. This can prevent the laptop from being stolen by unauthorized persons. Encryption, LoJack, multifactor authentication and bollards are other security measures, but they do not physically prevent theft. Verified Reference: https://www.comptia.org/blog/physicalsecurity

https://www.comptia.org/certifications/a

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

A.
Add a user account to the local administrator's group.
A.
Add a user account to the local administrator's group.
Answers
B.
Configure Windows Defender Firewall to allow access to all networks.
B.
Configure Windows Defender Firewall to allow access to all networks.
Answers
C.
Create a Microsoft account.
C.
Create a Microsoft account.
Answers
D.
Disable the guest account.
D.
Disable the guest account.
Answers
Suggested answer: A

Explanation:

A user account that belongs to the local administrator's group has the permission to install software on a Windows machine. If a user receives a UAC (user account control) prompt when trying to install software, it means the user does not have enough privileges and needs to enter an administrator's password or switch to an administrator's account. Adding the user account to the local administrator's group can resolve this issue. Configuring Windows Defender Firewall, creating a

Microsoft account and disabling the guest account are not related to this issue. Verified Reference:

https://www.comptia.org/blog/user-account-control https://www.comptia.org/certifications/a

Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

A.
TACACS+
A.
TACACS+
Answers
B.
Kerberos
B.
Kerberos
Answers
C.
Preshared key
C.
Preshared key
Answers
D.
WPA2/AES
D.
WPA2/AES
Answers
Suggested answer: D

Explanation:

WPA2/AES (Wi-Fi Protected Access 2/Advanced Encryption Standard) is a wireless security standard that supports enterprise mode, which allows a user to use login credentials (username and password) to authenticate to available corporate SSIDs (service set identifiers). TACACS+ (Terminal Access Controller Access-Control System Plus) and Kerberos are network authentication protocols, but they are not wireless security features. Preshared key is another wireless security feature, but it does not use login credentials. Verified Reference: https://www.comptia.org/blog/wireless-securitystandards

https://www.comptia.org/certifications/a

Total 755 questions
Go to page: of 76