ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 34

Add to Whishlist

List of questions

Question 331

Report Export Collapse

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

Become a Premium Member for full access
  Unlock Premium Member

Question 332

Report Export Collapse

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Become a Premium Member for full access
  Unlock Premium Member

Question 333

Report Export Collapse

Which of the following common security vulnerabilities can be mitigated by using input validation?

Become a Premium Member for full access
  Unlock Premium Member

Question 334

Report Export Collapse

A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:

The Audio Driver is not running.

Which of the following will MOST likely resolve the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 335

Report Export Collapse

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place.

Which of the following would MOST likely prevent the stored data from being recovered?

Become a Premium Member for full access
  Unlock Premium Member

Question 336

Report Export Collapse

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 337

Report Export Collapse

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

Become a Premium Member for full access
  Unlock Premium Member

Question 338

Report Export Collapse

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 339

Report Export Collapse

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Become a Premium Member for full access
  Unlock Premium Member

Question 340

Report Export Collapse

Windows updates need to be performed on a department's servers. Which of the following methods should be used to connect to the server?

Become a Premium Member for full access
  Unlock Premium Member
Total 817 questions
Go to page: of 82
Search

Related questions