ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer; thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

A.
Document the date and time of the change.
A.
Document the date and time of the change.
Answers
B.
Submit a change request form.
B.
Submit a change request form.
Answers
C.
Determine the risk level of this change.
C.
Determine the risk level of this change.
Answers
D.
Request an unused IP address.
D.
Request an unused IP address.
Answers
Suggested answer: B

Explanation:


A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the most efficient way for the technician to complete this task?

A.
Access control
A.
Access control
Answers
B.
Authentication application
B.
Authentication application
Answers
C.
Group Policy
C.
Group Policy
Answers
D.
Folder redirection
D.
Folder redirection
Answers
Suggested answer: C

Explanation:

Group Policy is a feature of Windows that allows administrators to centrally manage and apply policies and settings to computers and users on a domain. Group Policy can be used to create user profiles that include home directories and network printers for several new users, as well as other configurations such as security settings, desktop preferences, and software installation. Group Policy can save time and effort for the administrator by applying the same settings to multiple users at once. Access control, authentication application, and folder redirection are not the most efficient ways to create user profiles that include home directories and network printers for several new users.

A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Select two).

A.
Install a host-based IDS.
A.
Install a host-based IDS.
Answers
B.
Restrict log-in times.
B.
Restrict log-in times.
Answers
C.
Enable a BIOS password.
C.
Enable a BIOS password.
Answers
D.
Update the password complexity.
D.
Update the password complexity.
Answers
E.
Disable AutoRun.
E.
Disable AutoRun.
Answers
F.
Update the antivirus definitions.
F.
Update the antivirus definitions.
Answers
G.
Restrict user permissions.
G.
Restrict user permissions.
Answers
Suggested answer: E, G

Explanation:

AutoRun is a feature of Windows that automatically executes a program or file when a removable media such as a USB drive is inserted into the computer. Disabling AutoRun can prevent a USB drive containing malicious software from covertly installing malware on a workstation, as it would require the user to manually open the drive and run the file. Restricting user permissions can also prevent a USB drive containing malicious software from covertly installing malware on a workstation, as it would limit the user's ability to execute or install unauthorized programs or files. Installing a hostbased IDS, restricting log-in times, enabling a BIOS password, updating the password complexity, and updating the antivirus definitions are not actions that can directly prevent this incident from happening again.

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

A.
System
A.
System
Answers
B.
Power Options
B.
Power Options
Answers
C.
Devices and Printers
C.
Devices and Printers
Answers
D.
Ease of Access
D.
Ease of Access
Answers
Suggested answer: B

Explanation:

Power Options is a Control Panel utility that allows users to configure the power settings of their computer, such as when to turn off the display, when to put the computer to sleep, and how to manage the battery life. Power Options also allows users to configure the USB selective suspend setting, which is a feature that automatically suspends the power supply to USB devices that are not in use, in order to save energy. A user can disable this setting if they want to ensure that USB devices are not suspended by the operating system. System, Devices and Printers, and Ease of Access are not Control Panel utilities that can be used to configure the USB selective suspend setting.

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.
Installing additional RAM
A.
Installing additional RAM
Answers
B.
Removing the applications from startup
B.
Removing the applications from startup
Answers
C.
Installing a faster SSD
C.
Installing a faster SSD
Answers
D.
Running the Disk Cleanup utility
D.
Running the Disk Cleanup utility
Answers
E.
Defragmenting the hard drive
E.
Defragmenting the hard drive
Answers
F.
Ending the processes in the Task Manager
F.
Ending the processes in the Task Manager
Answers
Suggested answer: B, D

Explanation:

Removing the applications from startup can improve the boot time of a PC by reducing the number of programs that load automatically when the PC starts. Some applications may add themselves to the startup list without the user's knowledge or consent, which can slow down the PC's performance. Running the Disk Cleanup utility can also improve the boot time of a PC by deleting unnecessary or temporary files that take up disk space and affect the PC's speed. Disk Cleanup can also remove old system files that may cause conflicts or errors during booting. Installing additional RAM, installing a faster SSD, defragmenting the hard drive, and ending the processes in the Task Manager are not operations that would be best to do to resolve the issue of slow boot time at a minimal expense, as they may require purchasing new hardware or software, or may have negative impacts on other aspects of the PC's performance.

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

A.
Personal use license
A.
Personal use license
Answers
B.
Corporate use license
B.
Corporate use license
Answers
C.
Open-source license
C.
Open-source license
Answers
D.
Non-expiring license
D.
Non-expiring license
Answers
Suggested answer: B

Explanation:

A corporate use license, also known as a volume license, is a type of software license that allows an organization to purchase and use multiple copies of a software product with a single license key. A corporate use license can help validate compliance with an application's EULA (end-user license agreement), which is a legal contract that defines the terms and conditions of using the software. A corporate use license can also reduce the number of licenses to manage, as it eliminates the need to activate and track individual licenses for each copy of the software. Personal use license, open-source license, and non-expiring license are not types of licenses that can best accomplish this goal.

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

A.
Factory reset
A.
Factory reset
Answers
B.
System Restore
B.
System Restore
Answers
C.
In-place upgrade
C.
In-place upgrade
Answers
D.
Unattended installation
D.
Unattended installation
Answers
Suggested answer: D

Explanation:

An unattended installation is a method of installing Windows 10 that does not require any user input or interaction during the installation process. An unattended installation can be performed by using an answer file, which is a file that contains all the configuration settings and preferences for the installation, such as the product key, the language, the partition size, and the user accounts. An unattended installation can be the fastest way to install Windows 10, as it automates and streamlines the installation process. Factory reset, System Restore, and in-place upgrade are not methods of installing Windows 10.

Which of the following allows access to the command line in macOS?

A.
PsExec
A.
PsExec
Answers
B.
command.com
B.
command.com
Answers
C.
Terminal
C.
Terminal
Answers
D.
CMD
D.
CMD
Answers
Suggested answer: C

Explanation:

Terminal is an application that allows access to the command line in macOS. The command line is an interface that allows users to interact with the operating system and perform various tasks by typing commands and arguments. Terminal can be used to launch programs, manage files and folders, configure settings, troubleshoot issues, and run scripts in macOS. PsExec, command.com, and CMD are not applications that allow access to the command line in macOS.

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

A.
Synchronize the browser data.
A.
Synchronize the browser data.
Answers
B.
Enable private browsing mode.
B.
Enable private browsing mode.
Answers
C.
Mark the site as trusted.
C.
Mark the site as trusted.
Answers
D.
Clear the cached file.
D.
Clear the cached file.
Answers
Suggested answer: D

Explanation:

Clearing the cached file is an action that can help resolve the issue of not seeing the latest patch notes on a game vendor's website. A cached file is a copy of a web page or file that is stored locally on the user's browser or device for faster loading and offline access. However, sometimes a cached file may become outdated or corrupted and prevent the user from seeing the most recent or accurate version of a web page or file. Clearing the cached file can force the browser to download and display the latest version from the server instead of using the old copy from the cache.

Synchronizing the browser data, enabling private browsing mode, and marking the site as trusted are not actions that can help resolve this issue.

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the dat a. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

A.
Preserving chain of custody
A.
Preserving chain of custody
Answers
B.
Implementing data protection policies
B.
Implementing data protection policies
Answers
C.
Informing law enforcement
C.
Informing law enforcement
Answers
D.
Creating a summary of the incident
D.
Creating a summary of the incident
Answers
Suggested answer: A

Explanation:

Preserving chain of custody is a concept that refers to the documentation and tracking of who handled, accessed, modified, or transferred a piece of evidence, when, where, why, and how.

Preserving chain of custody can help establish the authenticity, integrity, and reliability of the evidence, as well as prevent tampering, alteration, or loss of the evidence. An administrator who documented the movement of the evidence demonstrated the concept of preserving chain of custody. Implementing data protection policies, informing law enforcement, and creating a summary of the incident are not concepts that describe the action of documenting the movement of the evidence.

Total 755 questions
Go to page: of 76