ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











A user's permissions are limited to read on a shared network folder using NTFS security settings.

Which of the following describes this type of security control?

A.
SMS
A.
SMS
Answers
B.
MFA
B.
MFA
Answers
C.
ACL
C.
ACL
Answers
D.
MDM
D.
MDM
Answers
Suggested answer: C

Explanation:

ACL (access control list) is a security control that describes what permissions a user or group has on a shared network folder using NTFS (New Technology File System) security settings. It can be used to grant or deny read, write, modify, delete or execute access to files and folders. SMS (short message service), MFA (multifactor authentication), MDM (mobile device management) are not security controls that apply to shared network folders. Verified Reference:

https://www.comptia.org/blog/what-is-an-acl https://www.comptia.org/certifications/a

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.
Off-site
A.
Off-site
Answers
B.
Synthetic
B.
Synthetic
Answers
C.
Full
C.
Full
Answers
D.
Differential
D.
Differential
Answers
Suggested answer: B

Explanation:

A synthetic backup is a backup type that provides a backup for all data on the system while providing the lowest impact to the network. It combines a full backup with one or more incremental backups to create a single backup set, without requiring access to the original data source. Off-site is a backup location, not a backup type. Full and differential are backup types, but they have a higher impact on the network than synthetic. Verified Reference: https://www.comptia.org/blog/what-is-a-syntheticbackup

https://www.comptia.org/certifications/a

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

A.
Disk Cleanup
A.
Disk Cleanup
Answers
B.
Resource Monitor
B.
Resource Monitor
Answers
C.
Disk Defragment
C.
Disk Defragment
Answers
D.
Disk Management
D.
Disk Management
Answers
Suggested answer: A

Explanation:

Disk Cleanup is a tool that can free up some space on a system drive that is nearly full. It can delete temporary files, cached files, recycle bin files, old system files and other unnecessary data. Resource Monitor is a tool that shows the network activity of each process on a Windows machine. Disk Defragment is a tool that optimizes the performance of a hard drive by rearranging the data into contiguous blocks. Disk Management is a tool that allows creating, formatting, resizing and deleting partitions on a hard drive. Verified Reference: https://www.comptia.org/blog/how-to-use-diskcleanup

https://www.comptia.org/certifications/a

A technician needs to establish a remote access session with a user who has a Windows workstation.

The session must allow for simultaneous viewing of the workstation by both the user and technician.

Which of the following remote access technologies should be used?

A.
RDP
A.
RDP
Answers
B.
VPN
B.
VPN
Answers
C.
SSH
C.
SSH
Answers
D.
MSRA
D.
MSRA
Answers
Suggested answer: D

Explanation:

MSRA (Microsoft Remote Assistance) is a remote access technology that allows a technician to establish a session with a user who has a Windows workstation. The session allows for simultaneous viewing of the workstation by both the user and technician, as well as remote control and file transfer capabilities. RDP (remote desktop protocol) is another remote access technology, but it does not allow simultaneous viewing by default. VPN (virtual private network) and SSH (secure shell) are protocols that create secure tunnels between two devices over the internet, but they do not allow remote access sessions. Verified Reference: https://www.comptia.org/blog/what-is-msra

https://www.comptia.org/certifications/a

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

A.
Factory reset
A.
Factory reset
Answers
B.
System Restore
B.
System Restore
Answers
C.
In-place upgrade
C.
In-place upgrade
Answers
D.
Unattended installation
D.
Unattended installation
Answers
Suggested answer: D

Explanation:

An unattended installation is the fastest way to install Windows 10 on a newly built computer. It uses an answer file that contains all the configuration settings and preferences for the installation, such as language, product key, partition size, etc. It does not require any user interaction or input during the installation process. Factory reset, System Restore and in-place upgrade are not methods of installing Windows 10 on a new computer, but ways of restoring or updating an existing Windows installation.

Verified Reference: https://www.comptia.org/blog/what-is-an-unattended-installation

https://www.comptia.org/certifications/a

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

A.
Keylogger
A.
Keylogger
Answers
B.
Ransomware
B.
Ransomware
Answers
C.
Boot sector virus
C.
Boot sector virus
Answers
D.
Cryptomining malware
D.
Cryptomining malware
Answers
Suggested answer: D

Explanation:

Cryptomining malware is a type of malicious program that uses the CPU resources of a compromised server to generate cryptocurrency, such as Bitcoin or Ethereum. It can cause extremely high CPU utilization and network traffic to the IP address of the cryptocurrency service. Keylogger, ransomware and boot sector virus are other types of malware, but they do not cause the same symptoms as cryptomining malware. Verified Reference: https://www.comptia.org/blog/what-is-cryptomining

https://www.comptia.org/certifications/a

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

A.
The device does not have enough free space lo download the OS updates.
A.
The device does not have enough free space lo download the OS updates.
Answers
B.
The device needs domain administrator confirmation to update to a major release.
B.
The device needs domain administrator confirmation to update to a major release.
Answers
C.
The device is not compatible with the newest version of the OS.
C.
The device is not compatible with the newest version of the OS.
Answers
D.
The device is restricted from updating due to a corporate security policy.
D.
The device is restricted from updating due to a corporate security policy.
Answers
Suggested answer: D

Explanation:

A corporate security policy can restrict a corporate-managed mobile device from updating its OS automatically, even if the auto-update feature is turned on. This can be done to prevent compatibility issues, security risks or performance problems caused by untested or unwanted updates. The device administrator can control when and how the updates are applied to the device.

The device not having enough free space, needing domain administrator confirmation or being incompatible with the newest version of the OS are not likely causes of the issue, since the user would receive an error message or a notification in those cases. Verified Reference:

https://www.comptia.org/blog/mobile-device-management

https://www.comptia.org/certifications/a

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection. Which of the following should the technician check NEXT?

A.
Windows updates
A.
Windows updates
Answers
B.
DNS settings
B.
DNS settings
Answers
C.
Certificate store
C.
Certificate store
Answers
D.
Browser plug-ins
D.
Browser plug-ins
Answers
Suggested answer: D

Explanation:

Browser plug-ins are software components that add functionality to a web browser, such as playing videos, displaying animations, etc. However, some browser plug-ins can also be malicious or compromised and cause unwanted pop-up advertising messages while browsing the internet. A malware scan may not be able to locate the source of the infection if it is hidden in a browser plug-in.

Windows updates, DNS settings and certificate store are not likely sources of pop-up advertising messages. Verified Reference: https://www.comptia.org/blog/browser-security

https://www.comptia.org/certifications/a

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

A.
Testing
A.
Testing
Answers
B.
Rollback
B.
Rollback
Answers
C.
Risk
C.
Risk
Answers
D.
Acceptance
D.
Acceptance
Answers
Suggested answer: B

Explanation:

Rollback refers to the steps to be taken if an issue occurs during a change implementation. It means restoring the system to its previous state before the change was applied, using backup data or configuration files. It can minimize the impact and downtime caused by a failed change. Testing refers to the steps to be taken before a change implementation, to verify that the change works as expected and does not cause any errors or conflicts. Risk refers to the potential negative consequences of a change implementation, such as data loss, security breach, performance degradation, etc. Acceptance refers to the steps to be taken after a change implementation, to confirm that the change meets the requirements and expectations of the stakeholders. Verified Reference: https://www.comptia.org/blog/change-management-process

https://www.comptia.org/certifications/a

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally.

Which of the following Windows settings should be configured?

A.
Power Plans
A.
Power Plans
Answers
B.
Hibernate
B.
Hibernate
Answers
C.
Sleep/Suspend
C.
Sleep/Suspend
Answers
D.
Screensaver
D.
Screensaver
Answers
Suggested answer: A

Explanation:

Power Plans are Windows settings that allow a user to configure how a laptop's screen behaves when plugged in or running on battery power. They can adjust the screen brightness and the time before the screen turns off due to inactivity. Hibernate, Sleep/Suspend and Screensaver are other Windows settings that affect how a laptop's screen behaves, but they do not allow changing the screen brightness or turning off time. Verified Reference: https://www.comptia.org/blog/windowspower-plans https://www.comptia.org/certifications/a

Total 755 questions
Go to page: of 76