ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

A.
Control Panel
A.
Control Panel
Answers
B.
Processes
B.
Processes
Answers
C.
Startup
C.
Startup
Answers
D.
Services
D.
Services
Answers
Suggested answer: D

Explanation:

The correct answer is D. Services. The print spooler is a service that manages the print queue and sends print jobs to the printer. To restart the print spooler, the salesperson can use the Services app, which allows them to stop and start the service. Alternatively, they can also use the Task Manager or the Command Prompt to restart the print spooler.

Reference and

The Services app is a tool that displays all the services that are running on the computer. It can be accessed by typing services.msc in the Run window or by searching for Services in the Start menu.

The Services app allows users to start, stop, restart, or configure any service, including the print spooler123.

The Task Manager is a tool that shows information about the processes, applications, and services that are running on the computer. It can be accessed by pressing Ctrl + Shift + Esc or by right-clicking on the taskbar and selecting Task Manager. The Task Manager allows users to start, stop, or restart any service by going to the Services tab and right-clicking on the service name12.

The Command Prompt is a tool that allows users to execute commands and perform tasks using text input. It can be accessed by typing cmd in the Run window or by searching for Command Prompt in the Start menu. The Command Prompt allows users to start, stop, or restart any service by using the net command with the service name. For example, to restart the print spooler, users can type net stop spooler and then net start spooler1.

The Control Panel is a tool that provides access to various settings and options for the computer. It can be accessed by typing control panel in the Run window or by searching for Control Panel in the Start menu. The Control Panel does not allow users to restart the print spooler directly, but it can be used to access other tools such as Devices and Printers, Troubleshooting, or Administrative Tools2.

The Processes tab is a part of the Task Manager that shows information about the processes that are running on the computer. It can be accessed by opening the Task Manager and selecting the Processes tab. The Processes tab does not allow users to restart the print spooler directly, but it can be used to end any process that is related to printing or causing problems with the print spooler2.

The Startup tab is a part of the Task Manager that shows information about the programs that run automatically when the computer starts. It can be accessed by opening the Task Manager and selecting the Startup tab. The Startup tab does not allow users to restart the print spooler directly, but it can be used to disable or enable any program that affects printing or interferes with the print spooler2.

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

A.
Document the date and time of change
A.
Document the date and time of change
Answers
B.
Document the purpose of the change
B.
Document the purpose of the change
Answers
C.
Document the risk level
C.
Document the risk level
Answers
D.
Document the findings of the sandbox test
D.
Document the findings of the sandbox test
Answers
Suggested answer: A

Explanation:

The correct answer is

A. Document the date and time of change. After implementing a change, the technician should document the date and time of change in the change log or record. This helps to track the change history, monitor the change performance, and identify any issues or incidents related to the change.

Documenting the date and time of change is also a good practice for auditing and compliance purposes.

Documenting the purpose of the change (B) and the risk level © are steps that should be done before implementing the change, not after. These are important information that help to justify, prioritize, and plan the change. The purpose of the change should explain why the change is needed and what benefits it will bring to the organization. The risk level should assess the potential impact and probability of the change causing any problems or disruptions to the business.

Documenting the findings of the sandbox test (D) is also a step that should be done before implementing the change, not after. A sandbox test is a way of testing the change in an isolated environment that mimics the production environment. This helps to verify that the change works as expected and does not cause any errors or conflicts with other systems or processes. The findings of the sandbox test should be documented and reviewed by the change advisory board (CAB) before approving the change for implementation.

Reference:

What is a Change Advisory Board? (Overview, Roles, and Responsibilities)

Best Practices in Change Management

10 Top change management best practices

Which of the following macOS features can help a user close an application that has stopped responding?

A.
Finder
A.
Finder
Answers
B.
Mission Control
B.
Mission Control
Answers
C.
System Preferences
C.
System Preferences
Answers
D.
Force Quit
D.
Force Quit
Answers
Suggested answer: D

Explanation:

The correct answer is D. Force Quit. Force Quit is a macOS feature that allows users to close an application that has stopped responding. To use Force Quit, users can press and hold Option (or Alt), Command, and Esc (Escape) keys together, or choose Force Quit from the Apple menu in the corner of the screen. A Force Quit window will open, where users can select the application that they want to close and click Force Quit123.

Reference and

The web search results provide information about how to force an app to quit on Mac using different methods, such as keyboard shortcuts, mouse clicks, or menu options. The results also explain what to do if the app cannot be forced to quit or if the Mac does not respond.

The first result1 is from the official Apple Support website and provides detailed instructions and screenshots on how to force an app to quit on Mac using the keyboard shortcut or the Apple menu. It also explains how to force quit the Finder app and how to restart or turn off the Mac if needed.

The second result2 is from the same website but for a different region (UK). It has the same content as the first result but with some minor differences in spelling and wording.

The third result4 is from a website called Lifehacker that provides tips and tricks for various topics, including technology. It compares how to close a program that is not responding on different operating systems, such as Windows, Mac, and Linux. It briefly mentions how to force quit an app on Mac using the keyboard shortcut or the mouse click.

The fourth result3 is from a website called Parallels that provides software solutions for running Windows on Mac. It focuses on how to force quit an app on Mac using the keyboard shortcut and provides a video tutorial and a screenshot on how to do it. It also suggests some alternative ways to close an app that is not responding, such as using Activity Monitor or Terminal commands.

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

A.
Document the date and time of the change.
A.
Document the date and time of the change.
Answers
B.
Submit a change request form
B.
Submit a change request form
Answers
C.
Determine the risk level of this change
C.
Determine the risk level of this change
Answers
D.
Request an unused IP address.
D.
Request an unused IP address.
Answers
Suggested answer: B

Explanation:

The correct answer is B. Submit a change request form. A change request form is a document that describes the proposed change, the reason for the change, the expected benefits and impacts, the risks and mitigation strategies, the implementation plan, and the approval process. A change request form is an essential part of change management best practices, as it helps to ensure that the change is well-planned, communicated, and authorized before it is implemented12.

A change request form should be submitted immediately before network use is authorized, because it provides the necessary information and justification for the change to the relevant stakeholders, such as the network administrator, the IT manager, and the department manager. The change request form also allows the stakeholders to review and approve or reject the change, or request more information or modifications. The change request form also serves as a record of the change history and status12.

APC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.
Installing additional RAM
A.
Installing additional RAM
Answers
B.
Removing the applications from startup
B.
Removing the applications from startup
Answers
C.
Installing a faster SSD
C.
Installing a faster SSD
Answers
D.
Running the Disk Cleanup utility
D.
Running the Disk Cleanup utility
Answers
E.
Defragmenting the hard drive
E.
Defragmenting the hard drive
Answers
F.
Ending the processes in the Task Manager
F.
Ending the processes in the Task Manager
Answers
Suggested answer: B, D

Explanation:

The best operations to do to resolve the issue of a long boot time at a minimal expense are B.

Removing the applications from startup and D. Running the Disk Cleanup utility. These are two simple and effective ways to speed up your PC's boot time without spending any money on hardware upgrades.

Removing the applications from startup means preventing unnecessary programs from launching automatically when you turn on your computer. This can reduce the load on your system resources and make the boot process faster. You can do this in Windows 10 by pressing Ctrl + Alt + Esc to open the Task Manager, and going to the Startup tab. There, you can see a list of programs that start with your computer, and their impact on the startup performance. You can disable any program that you don't need by right-clicking on it and choosing Disable12.

Running the Disk Cleanup utility means deleting temporary files, system files, and other unnecessary data that may be taking up space and slowing down your computer. This can free up some disk space and improve the performance of your system. You can do this in Windows 10 by typing disk cleanup in the search box and selecting the Disk Cleanup app. There, you can choose which files you want to delete, such as Recycle Bin, Temporary Internet Files, Thumbnails, etc. You can also click on Clean up system files to delete more files, such as Windows Update Cleanup, Previous Windows installation(s), etc34.

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic

Which of the following types of infections are the workstations most likely experiencing? (Select two)

A.
Zombies
A.
Zombies
Answers
B.
Keylogger
B.
Keylogger
Answers
C.
Adware
C.
Adware
Answers
D.
Botnet
D.
Botnet
Answers
E.
Ransomvvare
E.
Ransomvvare
Answers
F.
Spyware
F.
Spyware
Answers
Suggested answer: A, D

Explanation:

The correct answers are A and D. Zombies and botnets are types of infections that allow malicious actors to remotely control infected computers and use them to launch distributed denial-of-service (DDoS) attacks against a target. A DDoS attack is a type of cyberattack that aims to overwhelm a server or a network with a large volume of traffic from multiple sources, causing it to slow down or crash.

A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote server, often for the purpose of stealing passwords, credit card numbers, or other sensitive information.

Adware is a type of software that displays unwanted advertisements on a user's computer, often in the form of pop-ups, banners, or redirects. Adware can also collect user data and compromise the security and performance of the system.

Ransomware is a type of malware that encrypts the files or locks the screen of a user's computer and demands a ransom for their restoration. Ransomware can also threaten to delete or expose the user's data if the ransom is not paid.

Spyware is a type of software that covertly monitors and collects information about a user's online activities, such as browsing history, search queries, or personal dat a. Spyware can also alter the settings or functionality of the user's system without their consent.

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor's performance?

A.
Amount of system RAM
A.
Amount of system RAM
Answers
B.
NIC performance
B.
NIC performance
Answers
C.
Storage IOPS
C.
Storage IOPS
Answers
D.
Dedicated GPU
D.
Dedicated GPU
Answers
Suggested answer: A

Explanation:

The correct answer is A. Amount of system RAM. A Type 2 hypervisor is a virtualization software that runs on top of a host operating system, which means it shares the system resources with the host OS and other applications. Therefore, increasing the amount of system RAM can improve the performance of the hypervisor and the virtual machines running on it. RAM is used to store data and instructions that are frequently accessed by the CPU, and having more RAM can reduce the need for swapping data to and from the storage device, which is slower than RAM.

NIC performance, storage IOPS, and dedicated GPU are not as relevant for improving the hypervisor's performance in this scenario. NIC performance refers to the speed and quality of the network interface card, which is used to connect the computer to a network. Storage IOPS refers to the number of input/output operations per second that can be performed by the storage device, which is a measure of its speed and efficiency. Dedicated GPU refers to a separate graphics processing unit that can handle complex graphics tasks, such as gaming or video editing. These components may affect other aspects of the computer's performance, but they are not directly related to the hypervisor's ability to compile new source code.

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.
Factory reset
A.
Factory reset
Answers
B.
System Restore
B.
System Restore
Answers
C.
In-place upgrade
C.
In-place upgrade
Answers
D.
Unattended installation
D.
Unattended installation
Answers
Suggested answer: D

Explanation:

The correct answer is D. Unattended installation. An unattended installation is a way of installing Windows 10 without requiring any user input or interaction. It uses a configuration file called answer file that contains the settings and preferences for the installation, such as the product key, language, partition, and network settings. An unattended installation can be performed by using a bootable USB flash drive or DVD that contains the Windows 10 installation files and the answer file1. This is the fastest way for the technician to install Windows 10 on a newly built computer, as it automates the whole process and saves time.

A factory reset is a way of restoring a computer to its original state by deleting all the data and applications and reinstalling the operating system. A factory reset can be performed by using the recovery partition or media that came with the computer, or by using the Reset this PC option in Windows 10 settings2. A factory reset is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system to be present.

A system restore is a way of undoing changes to a computer's system files and settings by using a restore point that was created earlier. A system restore can be performed by using the System Restore option in Windows 10 settings or by using the Advanced Startup Options menu3. A system restore is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system and restore points to be present.

An in-place upgrade is a way of upgrading an existing operating system to a newer version without losing any data or applications. An in-place upgrade can be performed by using the Windows 10 Media Creation Tool or by running the Setup.exe file from the Windows 10 installation medi a. An in-place upgrade is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system to be present.

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

A.
Security and Maintenance
A.
Security and Maintenance
Answers
B.
Network and Sharing Center
B.
Network and Sharing Center
Answers
C.
Windows Defender Firewall
C.
Windows Defender Firewall
Answers
D.
Internet Options
D.
Internet Options
Answers
Suggested answer: D

Explanation:

Explore The correct answer is D. Internet Options. The Internet Options utility in Windows allows you to configure various settings related to your internet connection, including the proxy server settings. To access the Internet Options utility, you can either open the Control Panel and click on Internet Options, or open any web browser and click on the Tools menu and then on Internet Options. In the Internet Options window, go to the Connections tab and click on the LAN settings button. Here, you can enable or disable the use of a proxy server, as well as enter the address and port number of the proxy server you want to use12.

Security and Maintenance is a utility in Windows that allows you to view and manage the security and maintenance status of your computer, such as firewall, antivirus, backup, troubleshooting, and recovery settings. It does not have any option to configure proxy server settings.

Network and Sharing Center is a utility in Windows that allows you to view and manage your network connections, such as Wi-Fi, Ethernet, VPN, or dial-up. It also allows you to change network settings, such as network discovery, file and printer sharing, homegroup, and adapter settings. It does not have any option to configure proxy server settings.

Windows Defender Firewall is a utility in Windows that allows you to enable or disable the firewall protection for your computer, as well as configure firewall rules for inbound and outbound traffic. It does not have any option to configure proxy server settings.

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space While analyzing the phone, the technician does not discover any third-party' applications or photos.

Which of the following is the best way to resolve the issue?

A.
Exchange the device for a newer one.
A.
Exchange the device for a newer one.
Answers
B.
Upgrade the onboard storage
B.
Upgrade the onboard storage
Answers
C.
Allocate more space by removing factory applications
C.
Allocate more space by removing factory applications
Answers
D.
Move factory applications to external memory.
D.
Move factory applications to external memory.
Answers
Suggested answer: D

Explanation:

The best way to resolve the issue is to move factory applications to external memory. This will free up some space on the phone's internal storage, which is required for updating the phone. To do this, you can follow these steps1:

Insert a microSD card into your phone if you don't have one already.

Go to Settings > Apps and tap on the app you want to move.

Tap on Storage and then on Change.

Select the SD card option and tap on Move.

You may need to repeat this process for multiple apps until you have enough space to update your phone. Alternatively, you can also clear the cache and data of some apps, or uninstall the apps that you don't use frequently. You can find more information on how to fix insufficient storage error on your phone in these articles234. I hope this helps.

Total 755 questions
Go to page: of 76