ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would most likely be used to extend the life of a device?

A.
Battery backup
A.
Battery backup
Answers
B.
Electrostatic discharge mat
B.
Electrostatic discharge mat
Answers
C.
Proper ventilation
C.
Proper ventilation
Answers
D.
Green disposal
D.
Green disposal
Answers
Suggested answer: C

Explanation:

Proper ventilation is a factor that can extend the life of a device by preventing overheating and thermal damage to the device's components. Proper ventilation means ensuring that there is enough airflow around and inside the device to dissipate heat and maintain a suitable temperature for optimal performance. Proper ventilation can be achieved by using fans, heat sinks, vents, or liquid cooling systems, as well as avoiding placing the device near heat sources or in enclosed spaces. Battery backup, electrostatic discharge mat, and green disposal are not factors that can extend the life of a device.

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic.

Which of the following types of infections are the workstations most likely experiencing? (Select two).

A.
Zombies
A.
Zombies
Answers
B.
Keylogger
B.
Keylogger
Answers
C.
Adware
C.
Adware
Answers
D.
Botnet
D.
Botnet
Answers
E.
Ransomware
E.
Ransomware
Answers
F.
Spyware
F.
Spyware
Answers
Suggested answer: A, D

Explanation:

Zombies and botnets are terms that describe the types of infections that can cause internal workstations to participate in a DDoS (distributed denial-of-service) attack. A DDoS attack is a malicious attempt to disrupt the normal functioning of a website or a network by overwhelming it with a large amount of traffic from multiple sources. Zombies are infected computers that are remotely controlled by hackers without the owners' knowledge or consent. Botnets are networks of zombies that are coordinated by hackers to launch DDoS attacks or other malicious activities.

Keylogger, adware, ransomware, and spyware are not types of infections that can cause internal workstations to participate in a DDoS attack.

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

A.
Escalating the issue to Tier 2
A.
Escalating the issue to Tier 2
Answers
B.
Verifying warranty status with the vendor
B.
Verifying warranty status with the vendor
Answers
C.
Replacing the motherboard
C.
Replacing the motherboard
Answers
D.
Purchasing another PC
D.
Purchasing another PC
Answers
Suggested answer: B

Explanation:

Verifying warranty status with the vendor is the most logical next step in the remediation process after determining that a motherboard has failed. A warranty is a guarantee from the vendor that covers the repair or replacement of defective or faulty products within a specified period of time.

Verifying warranty status with the vendor can help the technician determine if the motherboard is eligible for warranty service and what steps to take to obtain it. Escalating the issue to Tier 2, replacing the motherboard, and purchasing another PC are not the most logical next steps in the remediation process.

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

A.
Data integrity form
A.
Data integrity form
Answers
B.
Valid operating system license
B.
Valid operating system license
Answers
C.
Documentation of an incident
C.
Documentation of an incident
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

Explanation:

Chain of custody is a process that helps ensure that a piece of evidence extracted from a PC is admissible in a court of law. Chain of custody refers to the documentation and tracking of who handled, accessed, modified, or transferred the evidence, when, where, why, and how. Chain of custody can help establish the authenticity, integrity, and reliability of the evidence, as well as prevent tampering, alteration, or loss of the evidence. Data integrity form, valid operating system license, and documentation of an incident are not processes that can ensure that a piece of evidence extracted from a PC is admissible in a court of law.

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

A.
Hard drive
A.
Hard drive
Answers
B.
Graphics card
B.
Graphics card
Answers
C.
Random-access memory
C.
Random-access memory
Answers
D.
Monitor
D.
Monitor
Answers
Suggested answer: B

Explanation:

A graphics card, also known as a video card or a GPU (graphics processing unit), is a component that can affect the performance of a computer game. A graphics card is responsible for rendering and displaying graphics on the screen, such as images, animations, and effects. A computer game may require a high level of graphics processing power to run smoothly and achieve high frame rates, which are the number of frames per second (FPS) that the game can display. Upgrading to a better graphics card can improve the performance of a computer game by increasing its graphics quality and frame rates. Hard drive, random-access memory, and monitor are not components that can directly improve the performance of a computer game.

A company would like to implement multifactor authentication for all employees at a minimal cost.

Which of the following best meets the company's requirements?

A.
Biometrics
A.
Biometrics
Answers
B.
Soft token
B.
Soft token
Answers
C.
Access control lists
C.
Access control lists
Answers
D.
Smart card
D.
Smart card
Answers
Suggested answer: B

Explanation:

A soft token, also known as a software token or an OTP (one-time password) app, is a type of multifactor authentication that generates a temporary code or password on a user's device, such as a smartphone or a tablet. The user must enter this code or password along with their username and password to access their account or service. A soft token can help improve security by adding an extra layer of verification and preventing unauthorized access even if the user's credentials are compromised. A soft token can also be implemented at a minimal cost, as it does not require any additional hardware or infrastructure. Biometrics, access control lists, and smart card are not types of multifactor authentication that can be implemented at a minimal cost.

During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?

A.
Performing annual network topology reviews
A.
Performing annual network topology reviews
Answers
B.
Requiring all network changes include updating the network diagrams
B.
Requiring all network changes include updating the network diagrams
Answers
C.
Allowing network changes once per year
C.
Allowing network changes once per year
Answers
D.
Routinely backing up switch configuration files
D.
Routinely backing up switch configuration files
Answers
Suggested answer: B

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place.

Which of the following would MOST likely prevent the stored data from being recovered?

A.
Biometrics
A.
Biometrics
Answers
B.
Full disk encryption
B.
Full disk encryption
Answers
C.
Enforced strong system password
C.
Enforced strong system password
Answers
D.
Two-factor authentication
D.
Two-factor authentication
Answers
Suggested answer: B

Explanation:


A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

A.
Implementing password expiration
A.
Implementing password expiration
Answers
B.
Restricting user permissions
B.
Restricting user permissions
Answers
C.
Using screen locks
C.
Using screen locks
Answers
D.
Disabling unnecessary services
D.
Disabling unnecessary services
Answers
Suggested answer: B

Explanation:


A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

A.
File Explorer
A.
File Explorer
Answers
B.
Startup Folder
B.
Startup Folder
Answers
C.
System Information
C.
System Information
Answers
D.
Programs and Features
D.
Programs and Features
Answers
E.
Task Scheduler
E.
Task Scheduler
Answers
F.
Device Manager
F.
Device Manager
Answers
Suggested answer: B, E

Explanation:

B. Startup Folder:

E. Task Scheduler

Total 755 questions
Go to page: of 76