ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

A.
AAA
A.
AAA
Answers
B.
SSH
B.
SSH
Answers
C.
RDP
C.
RDP
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

RDP stands for Remote Desktop Protocol and it is a protocol that allows a user to remotely access and control another computer over a network. A technician can use RDP to assist a user who is in a different building but on the same network by connecting to the user's computer and viewing their screen, keyboard, and mouse. AAA, SSH, and VPN are not protocols that can be used to assist a user with a program feature.

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

A.
Battery backup
A.
Battery backup
Answers
B.
Thermal paste
B.
Thermal paste
Answers
C.
ESD strap
C.
ESD strap
Answers
D.
Consistent power
D.
Consistent power
Answers
Suggested answer: C

Explanation:

An ESD strap, also known as an antistatic wrist strap, is a device that prevents electrostatic discharge (ESD) from damaging sensitive electronic components such as RAM. ESD is the sudden flow of electricity between two objects with different electrical charges, which can cause permanent damage or malfunction to electronic devices. An ESD strap connects the technician's wrist to a grounded surface, such as a metal case or a mat, and equalizes the electrical potential between the technician and the device. Battery backup, thermal paste, and consistent power are not devices that can protect against ESD.

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

A.
Screen resolution
A.
Screen resolution
Answers
B.
Screen zoom
B.
Screen zoom
Answers
C.
Screen timeout
C.
Screen timeout
Answers
D.
Screen brightness
D.
Screen brightness
Answers
E.
Screen damage
E.
Screen damage
Answers
F.
Screen motion smoothness
F.
Screen motion smoothness
Answers
Suggested answer: C, D

Explanation:

Screen timeout is the setting that determines how long the screen stays on after the user stops interacting with the phone. Screen brightness is the setting that determines how much light the screen emits. Both of these settings affect the battery life of the phone, as keeping the screen on longer and brighter consumes more power than turning it off sooner and dimmer. A technician should check these settings first to troubleshoot the issue of low battery life and adjust them accordingly. Screen resolution, screen zoom, screen damage, and screen motion smoothness are not settings that directly affect the battery life or the screen staying on for a long time.

A hard drive that previously contained PI I needs to be repurposed for a public access workstation.

Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

A.
Shredding
A.
Shredding
Answers
B.
Degaussing
B.
Degaussing
Answers
C.
Low-level formatting
C.
Low-level formatting
Answers
D.
Recycling
D.
Recycling
Answers
Suggested answer: A

Explanation:

Shredding is a data destruction method that physically destroys the hard drive by cutting it into small pieces using a machine. Shredding ensures that data is completely removed from the hard drive and cannot be recovered by any means. Shredding is suitable for hard drives that contain PII (personally identifiable information), which is any information that can be used to identify, contact, or locate an individual. Degaussing, low-level formatting, and recycling are not data destruction methods that can guarantee complete data removal from a hard drive.

Which of the following best describes when to use the YUM command in Linux?

A.
To add functionality
A.
To add functionality
Answers
B.
To change folder permissions
B.
To change folder permissions
Answers
C.
To show documentation
C.
To show documentation
Answers
D.
To list file contents
D.
To list file contents
Answers
Suggested answer: A

Explanation:

YUM stands for Yellowdog Updater Modified and it is a command-line tool that allows users to install, update, remove, and manage software packages in Linux. YUM can be used to add functionality to a Linux system by installing new software packages or updating existing ones. To change folder permissions, show documentation, or list file contents, other commands such as chmod, man, or ls can be used in Linux.

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

A.
Install the software in safe mode.
A.
Install the software in safe mode.
Answers
B.
Attach the external hardware token.
B.
Attach the external hardware token.
Answers
C.
Install OS updates.
C.
Install OS updates.
Answers
D.
Restart the workstation after installation.
D.
Restart the workstation after installation.
Answers
Suggested answer: B

Explanation:

A hardware token is a physical device that provides an additional layer of security for software authorization. Some specialized software may require a hardware token to be attached to the workstation in order to run. A hardware token may contain a cryptographic key, a password, or a onetime code that verifies the user's identity or permission. Installing the software in safe mode, installing OS updates, and restarting the workstation after installation are not likely to resolve the issue of software authorization.

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

A.
gpupdate
A.
gpupdate
Answers
B.
net use
B.
net use
Answers
C.
hostname
C.
hostname
Answers
D.
dir
D.
dir
Answers
Suggested answer: B

Explanation:

Net use is a command-line tool that can be used to map a drive in Windows. Mapping a drive means assigning a drive letter to a network location or a local folder, which allows the user to access it more easily and quickly. Net use can also be used to disconnect a mapped drive, display information about mapped drives, or connect to shared resources on another computer. Gpupdate, hostname, and dir are not command-line tools that can be used to map a drive.

A desktop technician has received reports that a user's PC is slow to load programs and saved files.

The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

A.
Disk Management
A.
Disk Management
Answers
B.
Disk Defragment
B.
Disk Defragment
Answers
C.
Disk Cleanup
C.
Disk Cleanup
Answers
D.
Device Manager
D.
Device Manager
Answers
Suggested answer: B

Explanation:

Disk Defragment is a tool that can be used to improve the performance of a hard disk drive (HDD). HDDs store data in sectors and clusters on spinning platters. Over time, as data is written, deleted, and moved, the data may become fragmented, meaning that it is spread across different locations on the disk. This causes the HDD to take longer to access and load data, resulting in slower performance. Disk Defragment consolidates the fragmented data and rearranges it in a contiguous manner, which reduces the seek time and increases the speed of the HDD. Disk Management, Disk Cleanup, and Device Manager are not tools that can alleviate the issue of slow HDD performance.

A user wants to back up a Windows 10 device. Which of the following should the user select?

A.
Devices and Printers
A.
Devices and Printers
Answers
B.
Email and Accounts
B.
Email and Accounts
Answers
C.
Update and Security
C.
Update and Security
Answers
D.
Apps and Features
D.
Apps and Features
Answers
Suggested answer: C

Explanation:

Update and Security is the section in Windows 10 Settings that allows the user to back up their device. Backing up a device means creating a copy of the data and settings on the device and storing it in another location, such as an external drive or a cloud service. Backing up a device can help the user restore their data and settings in case of data loss, corruption, or theft. Devices and Printers, Email and Accounts, and Apps and Features are not sections in Windows 10 Settings that allow the user to back up their device.

Which of the following would most likely be used in a small office environment?

A.
Print server
A.
Print server
Answers
B.
Virtualization
B.
Virtualization
Answers
C.
Domain access
C.
Domain access
Answers
D.
Workgroup
D.
Workgroup
Answers
Suggested answer: D

Explanation:

A workgroup is a network configuration that allows computers to communicate and share resources with each other without requiring a centralized server or domain controller. A workgroup is suitable for small office environments where there are only a few computers and users who need simple file and printer sharing. A workgroup does not have centralized management or security policies, which may be desirable for larger or more complex networks. Print server, virtualization, and domain access are not network configurations that are most likely used in a small office environment.

Total 755 questions
Go to page: of 76