ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

A.
WPA3
A.
WPA3
Answers
B.
MAC filleting
B.
MAC filleting
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
TACACS+
D.
TACACS+
Answers
Suggested answer: A

Explanation:

WPA3 (Wi-Fi Protected Access 3) is a wireless security method that supports the majority of current

Wi-Fi-capable devices without sacrificing security. It is backward compatible with WPA2 devices and offers enhanced encryption and authentication features. MAC filtering is another wireless security method, but it can be easily bypassed by spoofing MAC addresses. RADIUS (Remote Authentication Dial-In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) are network authentication protocols, but they are not wireless security methods by themselves.

Verified Reference: https://www.comptia.org/blog/wireless-security-standards

https://www.comptia.org/certifications/a

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

A.
fdisk
A.
fdisk
Answers
B.
Diskpart
B.
Diskpart
Answers
C.
Disk Utility
C.
Disk Utility
Answers
D.
FileVault
D.
FileVault
Answers
Suggested answer: D

Explanation:

FileVault is a macOS utility that uses AES-128 (Advanced Encryption Standard) to encrypt the startup disk of a Mac computer. It protects the data from unauthorized access if the computer is lost or stolen. fdisk and Diskpart are disk partitioning utilities for Linux and Windows, respectively. Disk

Utility is another macOS utility that can perform disk management tasks, such as formatting, resizing, repairing, etc. Verified Reference: https://www.comptia.org/blog/what-is-filevault

https://www.comptia.org/certifications/a

Which of the following common security vulnerabilities can be mitigated by using input validation?

A.
Brute-force attack
A.
Brute-force attack
Answers
B.
Cross-site scripting
B.
Cross-site scripting
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Cross-site request forgery
D.
Cross-site request forgery
Answers
Suggested answer: B, C

Explanation:

Cross-site scripting (XSS) and SQL injection are common security vulnerabilities that can be mitigated by using input validation. Input validation is a technique that checks the user input for any malicious or unexpected characters or commands before processing it. XSS is an attack that injects malicious scripts into web pages to steal cookies, session tokens or other sensitive information from users or web servers. SQL injection is an attack that injects malicious SQL statements into web applications to manipulate databases, execute commands or access unauthorized data. Verified Reference:

https://www.comptia.org/blog/what-is-input-validation https://www.comptia.org/certifications/a

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

A.
compmgmt.msc
A.
compmgmt.msc
Answers
B.
regedit.exe
B.
regedit.exe
Answers
C.
explorer.exe
C.
explorer.exe
Answers
D.
taskmgt.exe
D.
taskmgt.exe
Answers
E.
gpmc.msc
E.
gpmc.msc
Answers
F.
services.msc
F.
services.msc
Answers
Suggested answer: F

Explanation:

services.msc is a tool that can be used to resolve the issue of "The Audio Driver is not running" on a

Windows machine. It allows a technician to view, start, stop and configure the services that run on the system, such as the Windows Audio service. compmgmt.msc, regedit.exe, explorer.exe, taskmgt.exe and gpmc.msc are other tools that can be used for different purposes on a Windows machine, but they are not related to audio drivers or services. Verified Reference:

https://www.comptia.org/blog/what-is-services-msc https://www.comptia.org/certifications/a

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place.

Which of the following would MOST likely prevent the stored data from being recovered?

A.
Biometrics
A.
Biometrics
Answers
B.
Full disk encryption
B.
Full disk encryption
Answers
C.
Enforced strong system password
C.
Enforced strong system password
Answers
D.
Two-factor authentication
D.
Two-factor authentication
Answers
Suggested answer: B

Explanation:

Full disk encryption is a security mechanism that encrypts the entire data on a hard drive, making it unreadable without the correct decryption key or password. It can prevent the stored data from being recovered by unauthorized persons who steal or access the laptop. Biometrics, enforced strong system password and two-factor authentication are other security mechanisms, but they only protect the login access to the laptop, not the data on the hard drive. Verified Reference:

https://www.comptia.org/blog/what-is-full-disk-encryption

https://www.comptia.org/certifications/a


A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

A.
Restart the mobile device.
A.
Restart the mobile device.
Answers
B.
Turn on airplane mode.
B.
Turn on airplane mode.
Answers
C.
Check that the accessory is ready to pair.
C.
Check that the accessory is ready to pair.
Answers
D.
Clear all devices from the phone's Bluetooth settings.
D.
Clear all devices from the phone's Bluetooth settings.
Answers
Suggested answer: C

Explanation:

The first step in troubleshooting a Bluetooth connection issue is to check that the accessory is ready to pair with the mobile device. Some accessories may have a button or a switch that needs to be pressed or turned on to initiate pairing mode. If the accessory is not ready to pair, the mobile device will not be able to detect it.

Reference: CompTIA A+ Core 2 Exam Objectives, Section 2.4

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

A.
Differential
A.
Differential
Answers
B.
Open file
B.
Open file
Answers
C.
Archive
C.
Archive
Answers
D.
Incremental
D.
Incremental
Answers
Suggested answer: D

Explanation:

Incremental backups are backups that only include the changes made since the last backup, whether it was a full or an incremental backup. Incremental backups minimize the capacity of storage used and are often used in conjunction with synthetic full backups, which are backups that combine a full backup and subsequent incremental backups into a single backup set.

Reference: CompTIA A+ Core 2 Exam Objectives, Section 3.3

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

A.
A forgotten keychain password
A.
A forgotten keychain password
Answers
B.
An employee's Apple ID used on the device
B.
An employee's Apple ID used on the device
Answers
C.
An operating system that has been jailbroken
C.
An operating system that has been jailbroken
Answers
D.
An expired screen unlock code
D.
An expired screen unlock code
Answers
Suggested answer: B

Explanation:

Activation Lock is a feature that prevents anyone from erasing or activating an iOS device without the owner's Apple ID and password. If a corporate-owned iOS device is linked to an employee's Apple ID, it will have an Activation Lock issue when the employee leaves the company or forgets their Apple ID credentials.

Reference: CompTIA A+ Core 2 Exam Objectives, Section 4.1

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

A.
Cryptominers
A.
Cryptominers
Answers
B.
Rootkit
B.
Rootkit
Answers
C.
Spear phishing
C.
Spear phishing
Answers
D.
Keylogger
D.
Keylogger
Answers
Suggested answer: D

Explanation:

A keylogger is a type of malware that captures user input, such as keystrokes, mouse clicks, and clipboard data, and sends it to a malicious actor. Keyloggers can be used to steal passwords, credit card numbers, personal information, and other sensitive data.

Reference: CompTIA A+ Core 2 Exam Objectives, Section 5.1

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

A.
FIP
A.
FIP
Answers
B.
MSRA
B.
MSRA
Answers
C.
RDP
C.
RDP
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

RDP (Remote Desktop Protocol) is a protocol that allows a user to connect to and control a remote computer over a network. RDP can be used to perform Windows updates on a department's servers without physically accessing them.

Reference: CompTIA A+ Core 2 Exam Objectives, Section 5.6

Total 755 questions
Go to page: of 76