ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

Related questions











An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

A.
Devices and Printers
A.
Devices and Printers
Answers
B.
Ease of Access
B.
Ease of Access
Answers
C.
Programs and Features
C.
Programs and Features
Answers
D.
Device Manager
D.
Device Manager
Answers
Suggested answer: B

Explanation:

Ease of Access is a utility in the Control Panel that allows users to adjust various accessibility settings on Windows, such as the on-screen keyboard, magnifier, narrator, high contrast, etc.The on-screen keyboard can be turned on by going to Ease of Access > Keyboard and toggling the switch to On12.Alternatively, the on-screen keyboard can be opened by pressing Windows + Ctrl + O keys or by typing osk.exe in the Run dialog box3.

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.
Run an antivirus and enable encryption.
A.
Run an antivirus and enable encryption.
Answers
B.
Restore the defaults and reimage the corporate OS.
B.
Restore the defaults and reimage the corporate OS.
Answers
C.
Back up the files and do a system restore.
C.
Back up the files and do a system restore.
Answers
D.
Undo the jailbreak and enable an antivirus.
D.
Undo the jailbreak and enable an antivirus.
Answers
Suggested answer: B

Explanation:

Jailbreaking a device exposes it to various security risks, such as malware, data theft, network attacks, and service disruption1234. Running an antivirus and enabling encryption may not be enough to remove the threats and restore the device's functionality. Undoing the jailbreak may not be possible or effective, depending on the method used. Backing up the files and doing a system restore may preserve the jailbreak and the associated problems. The best option is to erase the device and reinstall the original operating system that is compatible with the corporate policies and standards.This will ensure that the device is clean, secure, and compliant25.

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

A.
Copy the program file to a USB drive and install.
A.
Copy the program file to a USB drive and install.
Answers
B.
Burn the program file to a CD and install.
B.
Burn the program file to a CD and install.
Answers
C.
Format the HDD and then do the installation.
C.
Format the HDD and then do the installation.
Answers
D.
Replace the HDD and then do the installation.
D.
Replace the HDD and then do the installation.
Answers
Suggested answer: A

Explanation:

Copying the program file to a USB drive and installing it from there is the simplest and most reliable way to transfer the software from the network share to the Windows tablet. The other options are either unnecessary, risky, or impractical. Burning the program file to a CD requires a CD burner and a CD reader, which may not be available on the tablet. Formatting or replacing the HDD will erase all the data and settings on the tablet, which is not advisable unless there is a backup or a serious problem. Moreover, formatting or replacing the HDD will not solve the issue of copying the program file from the network share.

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

A.
cat
A.
cat
Answers
B.
chmod
B.
chmod
Answers
C.
pwd
C.
pwd
Answers
D.
cacls
D.
cacls
Answers
Suggested answer: B

Explanation:

The chmod command is used to change the permissions of files and directories in Linux. It can grant or revoke read, write, and execute permissions for the owner, the group, and others. To change the file permissions to only allow access to a certain group of users, the chmod command can use either the symbolic or the numeric mode. For example, to give read and write permissions to the group and no permissions to others, the command can be:

chmod g+rw,o-rwx filename

or

chmod 660 filename

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.
Dedicated GPU
A.
Dedicated GPU
Answers
B.
DDR5 SODIMM
B.
DDR5 SODIMM
Answers
C.
NVMe disk
C.
NVMe disk
Answers
D.
64-bit CPU
D.
64-bit CPU
Answers
Suggested answer: A

Explanation:

A dedicated GPU (graphics processing unit) is the most important component for rendering 3-D promotional movies, as it can handle the complex calculations and graphics operations required for creating realistic and high-quality images. A dedicated GPU has its own memory and processor, which are optimized for graphics tasks.A dedicated GPU can also support multiple monitors, high resolutions, and advanced features such as ray tracing12.

As a corporate technician, you are asked to evaluate several suspect email messages on a client's computer. Corporate policy requires he following:

. All phishing attempts must be reported.

. Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the following within the email:

. Classify the emails

. Identify suspicious items, if applicable, in each email

. Select the appropriate resolution

Report email to Information Security. The user should not click on the link, reply to the email, or provide any personal or account information. The user should forward the email to the Information Security team or use a professional email form to report the phishing attempt. The user should also delete the email from their inbox and trash folder. The suspicious items to select are: b) From address d) Hyperlinks These items indicate that the email is not from a legitimate source and that the link is potentially malicious. The other items are not suspicious in this case, as the to address is the user's own email and there are no attachments.

Classification: b) Spam This email is a spam email, as it is an unsolicited and unwanted message that tries to persuade the user to participate in a survey and claim a reward. Some suspicious items in this email are: The email offers a free wireless headphone as an incentive, which is too good to be true. The email does not provide any details about the survey company, such as its name, address, or contact information. The email contains an external survey link, which may lead to a malicious or fraudulent website. The email does not have an unsubscribe option, which is required by law for commercial emails. The appropriate resolution for this email is C. Unsubscribe. The user should look for an unsubscribe link or button at the bottom of the email and follow the instructions to opt out of receiving future emails from the sender. The user should also mark the email as spam or junk in their email client, which will help filter out similar emails in the future. The user should not click on the survey link, reply to the email, or provide any personal or financial information.

Classification: c) Legitimate This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no suspicious items in this email, as the from address, the to address, the attachment, and the email body are all consistent and relevant. The appropriate resolution for this email is B. Perform no additional actions. The user can open the attachment and review the orientation material as instructed. The user does not need to report, unsubscribe, or delete this email.

Classification: a) Phishing This email is a phishing attempt, as it tries to deceive the user into downloading and running a malicious attachment that could compromise their system or data. Some suspicious items in this email are: The email has a generic greeting and does not address the user by name or username. The email has an urgent tone and claims that a security patch needs to be installed immediately. The email has an attachment named ''patch1.exe'', which is an executable file that could contain malware or ransomware. The email does not match the official format or domain of CompTIA Information Security. The appropriate resolution for this email is A. Report email to Information Security. The user should not open the attachment, reply to the email, or provide any personal or account information. The user should forward the email to the Information Security team or use a professional email form to report the phishing attempt. The user should also delete the email from their inbox and trash folder.

Classification: c) Legitimate This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no suspicious items in this email, as the from address, the to address, and the email body are all consistent and relevant. The appropriate resolution for this email is B. Perform no additional actions. The user can reply to the email and thank the sender for the interview opportunity. The user does not need to report, unsubscribe, or delete this email.


A.
See the Full solution in Explanation below
A.
See the Full solution in Explanation below
Answers
Suggested answer: A

Explanation:

Classification: a) Phishing

This email is a phishing attempt, as it tries to trick the user into clicking on a malicious link that could compromise their account or personal information. Some suspicious items in this email are:

The email has a generic greeting and does not address the user by name.

The email has spelling errors, such as ''unusal'' and ''Locaked''.

The email uses a sense of urgency and fear to pressure the user into clicking on the link.

The email does not match the official format or domain of the IT Help Desk at CompTIA.

The email has two black bat icons, which are not related to CompTIA or IT support.

The appropriate resolution for this email is


An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

A.
Standard operating procedure
A.
Standard operating procedure
Answers
B.
Acceptable use policy
B.
Acceptable use policy
Answers
C.
Security protocols
C.
Security protocols
Answers
D.
Data flow diagram
D.
Data flow diagram
Answers
Suggested answer: B

Explanation:

An acceptable use policy (AUP) is a document that defines the rules and expectations for the users of a system, network, or service.It typically covers topics such as the purpose, scope, responsibilities, and restrictions of using the system, network, or service1. An AUP is a suitable place to publish the guidelines for the incorporation of generative AI solutions, as it can inform the users of the benefits, risks, and ethical implications of using such tools.It can also specify the conditions and limitations for using generative AI solutions, such as the types of data, content, and applications that are allowed or prohibited, the security and privacy requirements, the legal and regulatory compliance, and the accountability and reporting mechanisms23.

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

A.
Reinstall the application on the smartphone.
A.
Reinstall the application on the smartphone.
Answers
B.
Update the smartphone's OS.
B.
Update the smartphone's OS.
Answers
C.
Reset the smartphone to factory settings.
C.
Reset the smartphone to factory settings.
Answers
D.
Reboot the smartphone.
D.
Reboot the smartphone.
Answers
Suggested answer: D

Explanation:

Rebooting the smartphone is the first and simplest step to resolve the issue of frequent crashes and unresponsiveness. Rebooting clears the memory, closes the background apps, and refreshes the system.It can also fix minor glitches and bugs that may cause the calendar app or the smartphone to malfunction12. The other options are either too drastic or unnecessary. Reinstalling the application may not solve the problem if the issue is with the smartphone itself. Updating the smartphone's OS may not be possible or helpful if the device is unresponsive or incompatible. Resetting the smartphone to factory settings will erase all the data and settings on the device, which should be the last resort.

When visiting a particular website, a user receives a message stating, 'Your connection is not private.' Which of the following describes this issue?

A.
Certificate warning
A.
Certificate warning
Answers
B.
Malware
B.
Malware
Answers
C.
JavaScript error
C.
JavaScript error
Answers
D.
Missing OS update
D.
Missing OS update
Answers
Suggested answer: A

Explanation:

A certificate warning is a message that appears when a web browser cannot verify the identity or security of a website. It usually means that there is a problem with the website's SSL certificate, such as expiration, invalidity, or mismatch.A certificate warning can indicate that the website is unsafe or compromised, and that the user's connection is not private123.

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

A.
Temperature levels
A.
Temperature levels
Answers
B.
Location of the servers
B.
Location of the servers
Answers
C.
Humidity levels
C.
Humidity levels
Answers
D.
Noise levels
D.
Noise levels
Answers
E.
Lighting levels
E.
Lighting levels
Answers
F.
Cable management
F.
Cable management
Answers
Suggested answer: A, C

Explanation:

Temperature and humidity levels are the most important environmental factors to consider when planning the configuration of a data center, as they directly affect the performance, reliability, and energy efficiency of the IT equipment. Excessive heat or moisture can cause overheating, corrosion, condensation, or static electricity, which can damage the hardware and lead to data loss or service disruption.Therefore, data centers need to monitor and control the temperature and humidity levels within the recommended ranges by using various cooling systems, airflow management, and sensors12.

Total 755 questions
Go to page: of 76