ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

A.
Phishing
A.
Phishing
Answers
B.
Dumpster diving
B.
Dumpster diving
Answers
C.
Tailgating
C.
Tailgating
Answers
D.
Evil twin
D.
Evil twin
Answers
Suggested answer: A

Explanation:

Phishing is the correct answer for this question. Phishing is a type of attack that uses fraudulent emails or other messages to trick users into revealing sensitive information or installing malicious software. Phishing emails often impersonate legitimate entities or individuals and offer incentives or threats to lure users into clicking on malicious links or attachments. In this scenario, the user received a removable USB device in the mail as a prize, which could be a phishing attempt to infect the user’s computer with malware or gain access to the user’s data. Dumpster diving, tailgating, and evil twin are not correct answers for this question. Dumpster diving is a type of attack that involves

searching through trash bins or recycling containers to find discarded documents or devices that contain valuable information. Tailgating is a type of attack that involves following an authorized person into a restricted area without proper identification or authorization. Evil twin is a type of attack that involves setting up a rogue wireless access point that mimics a legitimate one to intercept or manipulate network traffic. Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25

[CompTIA Security+ SY0-601 Certification Study Guide], page 1004

An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?

A.
Image deployment
A.
Image deployment
Answers
B.
Recovery partition installation
B.
Recovery partition installation
Answers
C.
Remote network installation
C.
Remote network installation
Answers
D.
Repair installation
D.
Repair installation
Answers
Suggested answer: C

Explanation:

Remote network installation is the best option for configuring a new server that requires a baremetal installation without installation media on site. A remote network installation is a method of installing an operating system or an application over a network connection, such as LAN, WAN, or Internet. A remote network installation can use various protocols, such as PXE, HTTP, FTP, or SMB, to access the installation files from a server or a cloud service. A remote network installation can also use various tools, such as Windows Deployment Services, Microsoft Deployment Toolkit, or Red Hat Kickstart, to automate and customize the installation process. A remote network installation can save

time and resources by eliminating the need for physical media and allowing centralized management of multiple installations. Image deployment, recovery partition installation, and repair installation are not correct answers for this question. Image deployment is a method of installing an operating system or an application by copying a preconfigured image file to a target device. Image deployment requires an existing image file and a compatible device. Recovery partition installation is a method of restoring an operating system or an application from a hidden partition on the hard disk that contains the original factory settings. Recovery partition installation requires an existing recovery

partition and a functional hard disk. Repair installation is a method of fixing an operating system or an application that is corrupted or damaged by replacing or repairing the system files without affecting the user data or settings. Repair installation requires an existing operating system or application and a working device. Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 16

CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 106

A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?

A.
Group Policy Editor
A.
Group Policy Editor
Answers
B.
Local Users and Groups
B.
Local Users and Groups
Answers
C.
Device Manager
C.
Device Manager
Answers
D.
System Configuration
D.
System Configuration
Answers
Suggested answer: B

Explanation:

Local Users and Groups is the best option to accomplish this task. Local Users and Groups is a tool that allows managing the local user accounts and groups on a Windows workstation. The technician can use this tool to create a new user account with administrator privileges or add an existing user account to the Administrators group. This way, the technician can log in with the administrator account and make system changes without elevating permissions. Group Policy Editor, Device Manager, and System Configuration are not correct answers for this question. Group Policy Editor is a tool that allows configuring policies and settings for users and computers in a domain environment.

Device Manager is a tool that allows managing the hardware devices and drivers on a Windows workstation. System Configuration is a tool that allows modifying the startup options and services on a Windows workstation. None of these tools can directly grant administrator access to a user account. Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 13

CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

A.
Date and time
A.
Date and time
Answers
B.
User access control
B.
User access control
Answers
C.
UEFI boot mode
C.
UEFI boot mode
Answers
D.
Log-on times
D.
Log-on times
Answers
Suggested answer: A

Explanation:

Date and time is the most likely cause of the issue. The date and time settings on a workstation affect the validity of the certificates used by websites to establish secure connections. If the date and time are incorrect, the workstation may not recognize the certificate as valid and display an invalid certificate error. Other workstations on the same local network may not have this issue if their date and time are correct. User access control, UEFI boot mode, and log-on times are not likely causes of the issue. User access control is a feature that prevents unauthorized changes to the system by prompting for confirmation or credentials. UEFI boot mode is a firmware interface that controls the

boot process of the workstation. Log-on times are settings that restrict when a user can log in to the workstation. None of these factors affect the validity of the certificates used by websites. Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 14

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

A.
Degaussing
A.
Degaussing
Answers
B.
Standard formatting
B.
Standard formatting
Answers
C.
Low-level wiping
C.
Low-level wiping
Answers
D.
Deleting
D.
Deleting
Answers
Suggested answer: C

Explanation:

Low-level wiping is the best data destruction method for recycling old hard drives for reuse. Lowlevel wiping is a process that overwrites every bit of data on a hard drive with zeros or random patterns, making it impossible to recover any data from the drive. Low-level wiping also restores the drive to its factory state, removing any bad sectors or errors that may have accumulated over time.

Low-level wiping can be done using specialized software tools or hardware devices that connect to the drive. Degaussing, standard formatting, and deleting are not suitable data destruction methods for recycling old hard drives for reuse. Degaussing is a process that exposes a hard drive to a strong magnetic field, destroying both the data and the drive itself. Degaussing renders the drive unusable for reuse. Standard formatting is a process that erases the data on a hard drive by removing the file system structure, but it does not overwrite the data itself. Standard formatting leaves some data recoverable using forensic tools or software utilities. Deleting is a process that removes the data from a hard drive by marking it as free space, but it does not erase or overwrite the data itself.

Deleting leaves most data recoverable using undelete tools or software utilities. Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15

CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 105

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

A.
Turn off the machine.
A.
Turn off the machine.
Answers
B.
Run a full antivirus scan.
B.
Run a full antivirus scan.
Answers
C.
Remove the LAN card.
C.
Remove the LAN card.
Answers
D.
Install a different endpoint solution.
D.
Install a different endpoint solution.
Answers
Suggested answer: A

Explanation:

Turning off the machine is the first and most urgent step to prevent further damage to the host and other systems. Ransomware can encrypt files, steal data, and spread to other devices on the network if the infected machine remains online.Turning off the machine will stop the ransomware process and isolate the machine from the network12. The other options are either ineffective or risky. Running a full antivirus scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Removing the LAN card may disconnect the machine from the network, but it will not stop the ransomware from encrypting or deleting files on the local drive. Installing a different endpoint solution may not be possible or helpful if the ransomware has already compromised the system or blocked the installation.

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

A.
Corporate
A.
Corporate
Answers
B.
Open-source
B.
Open-source
Answers
C.
Personal
C.
Personal
Answers
D.
Enterprise
D.
Enterprise
Answers
Suggested answer: B

Explanation:

Open-source software is software that has its source code available for anyone to inspect, modify, and distribute. Open-source software is usually free of charge and does not require a license to use.Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The other license types are either not free or not suitable for a SOHO PC. Corporate and enterprise licenses are designed for large-scale organizations and networks, and they usually require a subscription fee. Personal licenses are for individual users and may have limited features or support.

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

A.
Risk analysis
A.
Risk analysis
Answers
B.
Sandbox testing
B.
Sandbox testing
Answers
C.
End user acceptance
C.
End user acceptance
Answers
D.
Lessons learned
D.
Lessons learned
Answers
Suggested answer: A

Explanation:

Risk analysis is the process of identifying and evaluating the potential threats and impacts of a change on the system, network, or service. It is an essential step before approving a change request, as it helps to determine the level of risk, the mitigation strategies, and the contingency plans.Risk analysis also helps to prioritize the change requests based on their urgency and importance12.

Which of the following statements describes the purpose of scripting languages?

A.
To access the hardware of the computer it is running on
A.
To access the hardware of the computer it is running on
Answers
B.
To automate tasks and reduce the amount of manual labor
B.
To automate tasks and reduce the amount of manual labor
Answers
C.
To abstract the complexity of the computer system
C.
To abstract the complexity of the computer system
Answers
D.
To compile the program into an executable file
D.
To compile the program into an executable file
Answers
Suggested answer: B

Explanation:

Scripting languages are used to write small to medium-sized programs that perform specific tasks.Some common uses of scripting languages are: automating repetitive processes, web development, system administration, data processing, multimedia and games, report generation, document and text processing, writing plugins and extensions for existing programs and applications1.

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

A.
.exe
A.
.exe
Answers
B.
.dmg
B.
.dmg
Answers
C.
.app
C.
.app
Answers
D.
.rpm
D.
.rpm
Answers
E.
.pkg
E.
.pkg
Answers
Suggested answer: C

Explanation:

.app files are application bundles that contain all the necessary files and resources for a Mac app.They can be easily deleted by dragging them to the Trash or using Launchpad12.Other file types, such as .exe, .dmg, .rpm, and .pkg, are either not compatible with macOS or require additional steps to uninstall34.

Total 755 questions
Go to page: of 76