ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Which of the following threats will the use of a privacy screen on a computer help prevent?

A.
Impersonation
A.
Impersonation
Answers
B.
Shoulder surfing
B.
Shoulder surfing
Answers
C.
Whaling
C.
Whaling
Answers
D.
Tailgating
D.
Tailgating
Answers
Suggested answer: B

Explanation:

Shoulder surfing is a threat that involves someone looking over another person's shoulder to observe their screen, keyboard, or other sensitive information. Shoulder surfing can be used to steal passwords, personal identification numbers (PINs), credit card numbers, or other confidential data.

The use of a privacy screen on a computer can help prevent shoulder surfing by limiting the viewing angle of the screen and making it harder for someone to see the screen from the side or behind.

Impersonation, whaling, and tailgating are not threats that can be prevented by using a privacy screen on a computer.

Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files. Which of the following will MOST likely allow all users to access the new folders?

A.
Assigning share permissions
A.
Assigning share permissions
Answers
B.
Enabling inheritance
B.
Enabling inheritance
Answers
C.
Requiring multifactor authentication
C.
Requiring multifactor authentication
Answers
D.
Removing archive attribute
D.
Removing archive attribute
Answers
Suggested answer: B

Explanation:

Enabling inheritance is a method that allows new subfolders to inherit the permissions and settings from their parent folder. If users can access files in the department share, but not in the new subfolders created by other users, it may indicate that inheritance is disabled and that each new subfolder has its own permissions and settings that restrict access to only the creator. Enabling inheritance can help resolve this issue by allowing all users to access the new subfolders with the same permissions and settings as the department share. Assigning share permissions, requiring multifactor authentication, and removing archive attribute are not methods that can most likely allow all users to access the new folders.

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license.

The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

A.
Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.
A.
Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.
Answers
B.
Redeem the included activation key card for a product key.
B.
Redeem the included activation key card for a product key.
Answers
C.
Insert a Windows USB hardware dongle and initiate activation.
C.
Insert a Windows USB hardware dongle and initiate activation.
Answers
D.
Activate with the digital license included with the device hardware.
D.
Activate with the digital license included with the device hardware.
Answers
Suggested answer: B

Explanation:

Redeeming the included activation key card for a product key is the correct way to apply a Windows 10 Pro license to a computer that has Windows 10 Home installed. The activation key card is a physical or digital card that contains a 25-digit code that can be used to activate Windows 10 Pro online or by phone. Copying the windows.lie file, inserting a Windows USB hardware dongle and activating with the digital license are not valid methods of applying a Windows 10 Pro license.

Verified Reference: https://www.comptia.org/blog/how-to-upgrade-windows-10-home-to-pro

https://www.comptia.org/certifications/a

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

A.
Quarantine the host in the antivirus system.
A.
Quarantine the host in the antivirus system.
Answers
B.
Run antivirus scan tor malicious software.
B.
Run antivirus scan tor malicious software.
Answers
C.
Investigate how malicious software was Installed.
C.
Investigate how malicious software was Installed.
Answers
D.
Reimage the computer.
D.
Reimage the computer.
Answers
Suggested answer: B

Explanation:

Running an antivirus scan for malicious software is the first step that a support technician should do when a user reports a virus on a PC. The antivirus scan can detect and remove the virus, as well as prevent further damage or infection. Quarantining the host, investigating how the malware was installed and reimaging the computer are possible steps that can be done after running the antivirus scan, depending on the situation and the results of the scan. Verified Reference:

https://www.comptia.org/blog/how-to-remove-a-virus https://www.comptia.org/certifications/a

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

A.
Request form
A.
Request form
Answers
B.
Rollback plan
B.
Rollback plan
Answers
C.
End-user acceptance
C.
End-user acceptance
Answers
D.
Sandbox testing
D.
Sandbox testing
Answers
Suggested answer: D

Explanation:

Sandbox testing is a method of identifying potential issues with a proposed change prior to implementation. It involves creating a simulated or isolated environment that mimics the real system and applying the change to it. This can help to verify that the change works as expected and does not cause any errors or conflicts. Request form, rollback plan and end-user acceptance are other components of a change management process, but they do not involve identifying issues with a change. Verified Reference: https://www.comptia.org/blog/what-is-sandbox-testing

https://www.comptia.org/certifications/a

Which of the following operating systems is considered closed source?

A.
Ubuntu
A.
Ubuntu
Answers
B.
Android
B.
Android
Answers
C.
CentOS
C.
CentOS
Answers
D.
OSX
D.
OSX
Answers
Suggested answer: D

Explanation:

OSX (now macOS) is an operating system that is considered closed source, meaning that its source code is not publicly available or modifiable by anyone except its developers. It is owned and maintained by Apple Inc. Ubuntu, Android and CentOS are operating systems that are considered open source, meaning that their source code is publicly available and modifiable by anyone who wants to contribute or customize them. Verified Reference: https://www.comptia.org/blog/opensource-vs-closed-source-software https://www.comptia.org/certifications/a

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

A.
Open-source software
A.
Open-source software
Answers
B.
EULA
B.
EULA
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
AUP
D.
AUP
Answers
Suggested answer: C

Explanation:

Chain of custody is a process that documents how evidence is collected, handled, stored and transferred during a cybercrime investigation. It ensures that the evidence is authentic, reliable and admissible in court. If the chain of custody is violated during an investigation, it can compromise the integrity of the evidence and lead to the case being dismissed. Open-source software, EULA (enduser license agreement) and AUP (acceptable use policy) are not related to cybercrime investigations or evidence handling. Verified Reference: https://www.comptia.org/blog/what-is-chain-of-custody

https://www.comptia.org/certifications/a

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

A.
Screen-sharing software
A.
Screen-sharing software
Answers
B.
Secure shell
B.
Secure shell
Answers
C.
Virtual private network
C.
Virtual private network
Answers
D.
File transfer software
D.
File transfer software
Answers
Suggested answer: A

Explanation:

Screen-sharing software is a tool that allows a technician to remotely view and control a user's screen over the internet. It can be used to troubleshoot issues with accessing an online share, as well as other problems that require visual inspection or guidance. Secure shell (SSH) is a protocol that allows remote access and command execution on another device, but it does not allow screensharing.

Virtual private network (VPN) is a protocol that creates a secure tunnel between two devices over the internet, but it does not allow remote troubleshooting. File transfer software is a tool that allows transferring files between two devices over the internet, but it does not allow screen-sharing.

Verified Reference: https://www.comptia.org/blog/what-is-screen-sharing-software

https://www.comptia.org/certifications/a

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

A.
Uninstall one antivirus software program and install a different one.
A.
Uninstall one antivirus software program and install a different one.
Answers
B.
Launch Windows Update, and then download and install OS updates
B.
Launch Windows Update, and then download and install OS updates
Answers
C.
Activate real-time protection on both antivirus software programs
C.
Activate real-time protection on both antivirus software programs
Answers
D.
Enable the quarantine feature on both antivirus software programs.
D.
Enable the quarantine feature on both antivirus software programs.
Answers
E.
Remove the user-installed antivirus software program.
E.
Remove the user-installed antivirus software program.
Answers
Suggested answer: E

Explanation:

Removing the user-installed antivirus software program is the best way to resolve the issue of extremely slow performance caused by installing additional real-time protection antivirus software on a PC. Having more than one antivirus software program running at the same time can cause conflicts, resource consumption and performance degradation. Uninstalling one antivirus software program and installing a different one, activating real-time protection on both antivirus software programs, enabling the quarantine feature on both antivirus software programs and launching Windows Update are not effective ways to resolve the issue. Verified Reference:

https://www.comptia.org/blog/why-you-shouldnt-run-multiple-antivirus-programs-at-the-sametime

https://www.comptia.org/certifications/a

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.
Boot into safe mode.
A.
Boot into safe mode.
Answers
B.
Perform a malware scan.
B.
Perform a malware scan.
Answers
C.
Restart the machine.
C.
Restart the machine.
Answers
D.
Reinstall the browser
D.
Reinstall the browser
Answers
Suggested answer: A, B

Explanation:

Booting into safe mode and performing a malware scan are the steps that a technician should perform when troubleshooting an issue with pop-up advertising messages on a PC. Safe mode is a diagnostic mode that starts the PC with minimal drivers and services, which can prevent the pop-up malware from running. Malware scan is a tool that can detect and remove the pop-up malware, as well as prevent further infection or damage. Investigating how the malware was installed, reinstalling the browser and restarting the machine are possible steps that can be done after booting into safe mode and performing a malware scan, depending on the situation and the results of the scan.

Verified Reference: https://www.comptia.org/blog/how-to-boot-into-safe-mode

https://www.comptia.org/certifications/a

Total 755 questions
Go to page: of 76