ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











A systems administrator is experiencing Issues connecting from a laptop to the corporate network using PKI. Which to the following tools can the systems administrator use to help remediate the issue?

A.
certmgr.msc
A.
certmgr.msc
Answers
B.
msconfig.exe
B.
msconfig.exe
Answers
C.
lusrmgr.msc
C.
lusrmgr.msc
Answers
D.
perfmon.msc
D.
perfmon.msc
Answers
Suggested answer: A

Explanation:

certmgr.msc is a tool that can be used to troubleshoot issues with PKI (public key infrastructure) on a Windows machine. It allows a system administrator to view, manage and import certificates, as well as check their validity, expiration and revocation status. msconfig.exe, lusrmgr.msc and perfmon.msc are other tools that can be used for different purposes on a Windows machine, but they are not related to PKI. Verified Reference: https://www.comptia.org/blog/what-is-certmgr-msc

https://www.comptia.org/certifications/a

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

A.
AUP
A.
AUP
Answers
B.
EULA
B.
EULA
Answers
C.
EOL
C.
EOL
Answers
D.
UAC
D.
UAC
Answers
Suggested answer: C

Explanation:

EOL (end-of-life) is a term that indicates a vendor no longer supports a product. It means that the product will no longer be sold, updated or patched by the vendor, and that the users should migrate to a newer version or alternative product. AUP (acceptable use policy), EULA (end-user license agreement) and UAC (user account control) are not terms that indicate a vendor no longer supports a product. Verified Reference: https://www.comptia.org/blog/what-is-end-of-life

https://www.comptia.org/certifications/a

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

A.
nslookup
A.
nslookup
Answers
B.
net use
B.
net use
Answers
C.
netstat
C.
netstat
Answers
D.
net user
D.
net user
Answers
Suggested answer: C

Explanation:

netstat is a tool that can be used to investigate connections on a Windows machine. It displays information about the active TCP connections, listening ports, routing tables, network statistics, etc.

nslookup is a tool that can be used to query DNS servers and resolve domain names to IP addresses.

net use is a tool that can be used to connect or disconnect network drives or printers. net user is a tool that can be used to create or modify user accounts on a Windows machine. Verified Reference:

https://www.comptia.org/blog/what-is-netstat https://www.comptia.org/certifications/a

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

A.
VPN
A.
VPN
Answers
B.
RDP
B.
RDP
Answers
C.
RMM
C.
RMM
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: B

Explanation:

One of the possible ways to access the user's computer remotely is to use RDP, which stands for Remote Desktop Protocol. RDP is a protocol that allows a user to connect to another computer over a network and use its graphical interface. RDP is commonly used for remote desktop software, such as Microsoft Remote Desktop Connection1. To use RDP, the user's computer must run RDP server software, and the technician must run RDP client software. The technician can then enter the user's IP address or hostname, and provide the appropriate credentials to log in to the user's computer.

Once connected, the technician can view and control the user's desktop, and review the Outlook settings.

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

A.
Run an AV scan.
A.
Run an AV scan.
Answers
B.
Reinstall the operating system
B.
Reinstall the operating system
Answers
C.
Install a software firewall.
C.
Install a software firewall.
Answers
D.
Perform a system restore.
D.
Perform a system restore.
Answers
E.
Comply with the on-screen instructions.
E.
Comply with the on-screen instructions.
Answers
Suggested answer: B

Explanation:

The best way for a technician to return the device to service safely is to reinstall the operating system. This is because the device is infected by ransomware, which is a form of malware that encrypts files and demands payment for decryption. Reinstalling the operating system will erase the ransomware and restore the device to its original state. However, this will also delete any data that was not backed up before the infection. Therefore, it is important to have regular backups of critical data and protect them from ransomware attacks1.

The other options are not effective or safe for ransomware recovery. Running an AV scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Installing a software firewall may prevent future attacks, but it will not help with the current infection. Performing a system restore may not work if the ransomware has corrupted or deleted the restore points.

Complying with the on-screen instructions is not advisable, as it will encourage the attackers and there is no guarantee that they will provide the decryption key after receiving the payment.

To prevent and recover from ransomware attacks, it is recommended to follow some best practices, such as234:

Use strong passwords and multifactor authentication for all accounts and devices.

Keep all software and firmware updated with the latest security patches.

Avoid opening suspicious or unsolicited emails and attachments.

Educate users and staff on how to recognize and report phishing and social engineering attempts.

Use antivirus software and enable real-time protection.

Enable network segmentation and firewall rules to limit the spread of ransomware.

Implement a Zero Trust security model to verify all requests and devices before granting access.

Create and test backups of critical data and store them offline or in a separate network.

Recover safely by isolating the infected devices, identifying the ransomware variant, and restoring data from backups.

Report any ransomware incidents to law enforcement agencies and seek help from experts.

A customer has a USB-only printer attached to a computer. A technician is configuring an arrangement that allows other computers on the network to use the printer. In which of the following locations on the customer's desktop should the technician make this configuration?

A.
Printing Preferences/Advanced tab
A.
Printing Preferences/Advanced tab
Answers
B.
Printer Properties/Sharing tab
B.
Printer Properties/Sharing tab
Answers
C.
Printer Properties/Security tab
C.
Printer Properties/Security tab
Answers
D.
Printer Properties/Ports tab
D.
Printer Properties/Ports tab
Answers
Suggested answer: B

Explanation:

The correct answer is B. Printer Properties/Sharing tab. This is the location where the technician can enable printer sharing and assign a share name for the USB printer. This will allow other computers on the network to access the printer by using the share name or the IP address of the computer that has the printer attached1.

1: CompTIA A+ Certification Exam: Core 2 Objectives, page 15, section 1.9.

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

A.
Implementing data-at-rest encryption
A.
Implementing data-at-rest encryption
Answers
B.
Disabling AutoRun
B.
Disabling AutoRun
Answers
C.
Restricting user permissions
C.
Restricting user permissions
Answers
D.
Restricting log-in times
D.
Restricting log-in times
Answers
E.
Enabling a screen lockDisabling local administrator accounts
E.
Enabling a screen lockDisabling local administrator accounts
Answers
Suggested answer: D, E

Explanation:

The correct answers are D. Restricting log-in times and E. Enabling a screen lock. These are the security measures that can be used to prevent the computers from being accessed by unsupervised contractors in the building.

Restricting log-in times means setting a policy that allows users to log in only during certain hours, such as the regular working hours of the company. This will prevent unauthorized access by contractors who work at night1.

Enabling a screen lock means setting a policy that requires users to enter a password or a PIN to unlock their screens after a period of inactivity. This will prevent unauthorized access by contractors who might try to use the computers when the users are away2.

1: CompTIA A+ Certification Exam: Core 2 Objectives, page 19, section 2.3. 2: CompTIA A+ Certification Exam: Core 2 Objectives, page 20, section 2.4.

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

A.
Verify the DNS server settings.
A.
Verify the DNS server settings.
Answers
B.
Turn off the Windows firewall.
B.
Turn off the Windows firewall.
Answers
C.
Confirm the subnet mask is correct.
C.
Confirm the subnet mask is correct.
Answers
D.
Configure a static IP address.
D.
Configure a static IP address.
Answers
Suggested answer: A

Explanation:

The correct answer is

A. Verify the DNS server settings. This is because the DNS server is responsible for resolving domain names to IP addresses, which is necessary for accessing the internet or named network resources. If the DNS server settings are incorrect or the DNS server is down, the technician will not be able to access these resources even if they have a valid IP address and can ping the default gateway1.

1: CompTIA A+ Certification Exam: Core 2 Objectives, page 16, section 1.10.

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

A.
Installing additional RAM
A.
Installing additional RAM
Answers
B.
Removing the applications from startup
B.
Removing the applications from startup
Answers
C.
Installing a faster SSD
C.
Installing a faster SSD
Answers
D.
Running the Disk Cleanup utility
D.
Running the Disk Cleanup utility
Answers
E.
Defragmenting the hard drive
E.
Defragmenting the hard drive
Answers
F.
Ending the processes in the Task Manager
F.
Ending the processes in the Task Manager
Answers
Suggested answer: B, E

Explanation:

The correct answers are B. Removing the applications from startup and E. Defragmenting the hard drive. These are the operations that would be best to do to resolve the issue of a slow boot at a minimal expense.

Removing the applications from startup means disabling the programs that run automatically when the PC is turned on. This will reduce the load on the CPU and RAM and speed up the boot process1.

Defragmenting the hard drive means rearranging the files on the disk so that they are stored in contiguous blocks. This will improve the disk performance and reduce the time it takes to read and write data2.

1: CompTIA A+ Certification Exam: Core 2 Objectives, page 23, section 3.1. 2: CompTIA A+ Certification Exam: Core 2 Objectives, page 24, section 3.2.


The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

A.
Calibrate the phone sensors.
A.
Calibrate the phone sensors.
Answers
B.
Enable the touch screen.
B.
Enable the touch screen.
Answers
C.
Reinstall the operating system.
C.
Reinstall the operating system.
Answers
D.
Replace the screen.
D.
Replace the screen.
Answers
Suggested answer: A

Explanation:

Calibrating the phone sensors is a step that can troubleshoot the issue of screen not autorotating on a mobile device. Screen autorotation is a feature that automatically adjusts the screen orientation based on the device's position and movement. Screen autorotation relies on sensors such as accelerometer and gyroscope to detect the device's tilt and rotation. Calibrating the phone sensors can help fix any errors or inaccuracies in the sensor readings that may prevent screen autorotation from working properly. Enabling the touch screen, reinstalling the operating system, and replacing the screen are not steps that should be done next to troubleshoot this issue.

Total 755 questions
Go to page: of 76