ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation_ Which of the following actions should be taken to prevent this Incident from happening again? (Select two).

A.
Install a host-based IDS
A.
Install a host-based IDS
Answers
B.
Restrict log-in times.
B.
Restrict log-in times.
Answers
C.
Enable a BIOS password
C.
Enable a BIOS password
Answers
D.
Update the password complexity
D.
Update the password complexity
Answers
E.
Disable AutoRun.
E.
Disable AutoRun.
Answers
F.
Update the antivirus definitions.
F.
Update the antivirus definitions.
Answers
G.
Restrict user permissions.
G.
Restrict user permissions.
Answers
Suggested answer: E, F

Explanation:

The correct answers are E and F. Disabling AutoRun and updating the antivirus definitions are two actions that should be taken to prevent the incident from happening again.

AutoRun is a feature of Windows that automatically executes a predetermined action when a removable media such as a USB drive is inserted in a computer. For example, AutoRun can launch or install a new program on the media, or open the file in File Explorer. However, this feature can also be exploited by malicious software that can run without the user's consent or knowledge. Therefore, disabling AutoRun can help prevent accidental installation of viruses and other malware from USB drives123.

Updating the antivirus definitions is another important action that can help prevent malware infections from USB drives. Antivirus definitions are files that contain information about the latest known threats and how to detect and remove them. By updating the antivirus definitions regularly, you can ensure that your antivirus software can recognize and block any malicious software that may be on the USB drive before it can harm your computer45.

A host-based IDS is a system that monitors and analyzes the activity on a single computer or device for any signs of intrusion or malicious behavior. A host-based IDS can help detect and prevent malware infections from USB drives, but it is not a sufficient action by itself. A host-based IDS needs to be complemented by other security measures, such as disabling AutoRun and updating the antivirus definitions6.

Restricting login times, enabling a BIOS password, and updating the password complexity are all actions that can help improve the security of a computer or device, but they are not directly related to preventing malware infections from USB drives. These actions can help prevent unauthorized access to the computer or device, but they do not affect how the computer or device interacts with the USB drive or its contents.

Restricting user permissions is an action that can help limit the damage that malware can cause on a computer or device, but it does not prevent the malware from being installed in the first place.

Restricting user permissions means limiting what actions a user can perform on the computer or device, such as installing or deleting programs, modifying system settings, or accessing certain files or folders. By restricting user permissions, you can reduce the impact of malware infections by preventing them from affecting other users or system components7.

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

A.
Hibernate
A.
Hibernate
Answers
B.
Sleep/suspend
B.
Sleep/suspend
Answers
C.
Choose what closing the lid does
C.
Choose what closing the lid does
Answers
D.
Turn on fast startup
D.
Turn on fast startup
Answers
Suggested answer: C

Explanation:

The correct answer is C. Choose what closing the lid does. This option allows you to configure how the laptop behaves when you close the lid, such as whether it goes to sleep, hibernates, shuts down, or does nothing. To access this option, you can follow these steps :

Go to Settings > System > Power & sleep.

Click on Additional power settings on the right side.

Click on Choose what closing the lid does on the left side.

Under When I close the lid, select Do nothing for both On battery and Plugged in.

Click on Save changes.

This will prevent the laptop from going to sleep when you close the lid while it is connected to the docking station and the external monitor.

Hibernate, sleep/suspend, and turn on fast startup are not the options that should be configured to fix the issue. Hibernate and sleep/suspend are both power-saving modes that allow you to resume your work without losing any dat a. However, they also turn off the display and other components of the laptop, which means you will not be able to use the external monitor when the laptop is closed. Turn on fast startup is a feature that reduces the boot time of Windows by saving some system information to a file when you shut down. It does not affect how the laptop behaves when you close the lid .

A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting?

A.
System
A.
System
Answers
B.
Power Options
B.
Power Options
Answers
C.
Devices and Printers
C.
Devices and Printers
Answers
D.
Ease of Access
D.
Ease of Access
Answers
Suggested answer: B

Explanation:

The correct answer is B. Power Options. The Power Options utility in the Control Panel allows you to configure various settings related to how your computer uses and saves power, such as the power plan, the sleep mode, the screen brightness, and the battery status. To access the Power Options utility, you can follow these steps:

Go to Control Panel > Hardware and Sound > Power Options.

Click on Change plan settings for the power plan you are using.

Click on Change advanced power settings.

Expand the USB settings category and then the USB selective suspend setting subcategory.

Set the option to Disabled for both On battery and Plugged in.

Click on OK and then on Save changes.

This will prevent the operating system from suspending the USB devices to save power .

System, Devices and Printers, and Ease of Access are not the utilities that should be used to configure the setting. System is a utility that provides information about your computer's hardware and software, such as the processor, memory, operating system, device manager, and system protection.

Devices and Printers is a utility that allows you to view and manage the devices and printers connected to your computer, such as adding or removing devices, changing device settings, or troubleshooting problems. Ease of Access is a utility that allows you to customize your computer's accessibility options, such as the narrator, magnifier, high contrast, keyboard, mouse, and speech recognition. None of these utilities have any option to configure the USB selective suspend setting.

Which of the following filesystem types does macOS use?

A.
ext4
A.
ext4
Answers
B.
exFAT
B.
exFAT
Answers
C.
NTFS
C.
NTFS
Answers
D.
APFS
D.
APFS
Answers
Suggested answer: D

Explanation:

APFS stands for Apple File System and it is the default filesystem type for macOS since High Sierra (10.13) version1. APFS is optimized for flash storage and supports features such as encryption, snapshots, cloning, and space sharing1.

A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue.

Which of the following should the technician do before modifying the registry keys?

A.
Update the anti-malware software.
A.
Update the anti-malware software.
Answers
B.
Create a restore point.
B.
Create a restore point.
Answers
C.
Run the PC in sate mode.
C.
Run the PC in sate mode.
Answers
D.
Roll back the system updates.
D.
Roll back the system updates.
Answers
Suggested answer: B

Explanation:

A restore point is a snapshot of the system settings and configuration at a specific point in time2. Creating a restore point before modifying the registry keys allows the technician to revert the system back to a previous state if something goes wrong or causes instability2. Updating the antimalware software, running the PC in safe mode, and rolling back the system updates are not necessary steps before modifying the registry keys.

A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?

A.
Network and Sharing Center
A.
Network and Sharing Center
Answers
B.
net use
B.
net use
Answers
C.
User Accounts
C.
User Accounts
Answers
D.
regedit
D.
regedit
Answers
E.
Group Policy
E.
Group Policy
Answers
Suggested answer: E

Explanation:

Group Policy is a feature of Windows that allows administrators to centrally manage and apply policies and settings to computers and users on a domain3. Group Policy can be used to configure network drives, printers, security settings, desktop preferences, and other configurations for all users' workstations3. Network and Sharing Center, net use, User Accounts, and regedit are not tools that can accomplish this task.

A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?

A.
Disk Management
A.
Disk Management
Answers
B.
Device Manager
B.
Device Manager
Answers
C.
Disk Cleanup
C.
Disk Cleanup
Answers
D.
Disk Defragmenter
D.
Disk Defragmenter
Answers
Suggested answer: A

Explanation:

Disk Management is a tool that allows users to create, format, delete, shrink, extend, and manage partitions on hard drives. If the external hard drive is not formatted or has an incompatible filesystem type, Disk Management can be used to format it with a supported filesystem type such as NTFS, FAT32, or exFAT. Device Manager, Disk Cleanup, and Disk Defragmenter are not tools that can format a hard drive.

A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company's risk to avoid any issues. Which of the following items should the technician implement?

A.
Screened subnet
A.
Screened subnet
Answers
B.
Firewall
B.
Firewall
Answers
C.
Anti-phishing training
C.
Anti-phishing training
Answers
D.
Antivirus
D.
Antivirus
Answers
Suggested answer: C

Explanation:

Anti-phishing training is a method of educating users on how to identify and avoid phishing attacks, which are attempts to trick users into revealing sensitive information or performing malicious actions by impersonating legitimate entities or persons. Whaling attacks are a specific type of phishing attack that target high-level executives or influential individuals within an organization. Anti-phishing training can help users recognize the signs of whaling attacks and prevent them from falling victim to them. Screened subnet, firewall, and antivirus are not items that can directly address the issue of whaling attacks.

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?

A.
SSL key
A.
SSL key
Answers
B.
Preshared key
B.
Preshared key
Answers
C.
WPA2 key
C.
WPA2 key
Answers
D.
Recovery key
D.
Recovery key
Answers
Suggested answer: D

Explanation:

A recovery key is a code that can be used to unlock a BitLocker-encrypted drive when the normal authentication methods (such as password or PIN) are not available or have been forgotten.

BitLocker is a feature of Windows that encrypts the entire drive to protect data from unauthorized access. If a technician is trying to repair a Windows 10 OS that has BitLocker enabled, they will need the recovery key to access the drive and continue the OS repair. SSL key, preshared key, and WPA2 key are not keys that are related to BitLocker or OS repair.

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

A.
Quarantine the computer.
A.
Quarantine the computer.
Answers
B.
Disable System Restore.
B.
Disable System Restore.
Answers
C.
Update the antivirus software definitions.
C.
Update the antivirus software definitions.
Answers
D.
Boot to safe mode.
D.
Boot to safe mode.
Answers
Suggested answer: A

Explanation:

Quarantining the computer means isolating it from the network and other devices to prevent the spread of malware or ransomware. Ransomware is a type of malware that encrypts the files on a computer and demands payment (usually in cryptocurrency) to restore them. If a technician sees a file that is requesting payment to a cryptocurrency address, it is likely that the computer has been infected by ransomware. Quarantining the computer should be the first step to contain the infection and prevent further damage. Disabling System Restore, updating the antivirus software definitions, and booting to safe mode are not steps that should be done before quarantining the computer.

Total 755 questions
Go to page: of 76