ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

A.
Disable System Restore.
A.
Disable System Restore.
Answers
B.
Utilize a Linux live disc.
B.
Utilize a Linux live disc.
Answers
C.
Quarantine the infected system.
C.
Quarantine the infected system.
Answers
D.
Update the anti-malware.
D.
Update the anti-malware.
Answers
Suggested answer: C

Explanation:

Quarantining the infected system is the most appropriate way to remediate the issue of an infection that the antivirus software cannot remove. Quarantining means isolating the system from the network and other devices to prevent the infection from spreading or causing further damage. Quarantining also allows the technician to perform further analysis and removal of the infection without risking the security of other systems or data.

Some of the steps involved in quarantining an infected system are:

Disconnect the system from the internet and any local network connections, such as Wi-Fi, Ethernet, Bluetooth, or USB.

Disable any file-sharing or remote access services on the system, such as Windows File Sharing, Remote Desktop, or TeamViewer.

Use a separate device to download and update the antivirus software and any other tools that may be needed to remove the infection, such as malware scanners, rootkit removers, or bootable rescue disks.

Transfer the updated antivirus software and tools to the infected system using a removable media, such as a CD, DVD, or USB flash drive. Scan the removable media for any infections before and after using it on the infected system.

Run the antivirus software and tools on the infected system and follow the instructions to delete or quarantine the infection. If the infection is persistent or complex, it may require booting the system from a rescue disk or using a Linux live disc to access and clean the system files.

After the infection is removed, restore the system to a previous clean state using System Restore, backup, or recovery partition. Scan the system again to ensure that it is clean and secure. Reconnect the system to the network and update the system and the antivirus software.

How to Identify and Repair Malware or Virus Infected Computers, section 31

Uninstalling Antivirus Software, the Clean Way: 40 Removal Tools & Instructions, section 22

How to manually remove an infected file from a Windows computer3

The Official CompTIA A+ Core 2 Study Guide (220-1102), page 2194

A user's company phone was stolen. Which of the following should a technician do next?

A.
Perform a low-level format.
A.
Perform a low-level format.
Answers
B.
Remotely wipe the device.
B.
Remotely wipe the device.
Answers
C.
Degauss the device.
C.
Degauss the device.
Answers
D.
Provide the GPS location of the device.
D.
Provide the GPS location of the device.
Answers
Suggested answer: B

Explanation:

Remotely wiping the device is the best option to prevent unauthorized access to the company data stored on the phone. A low-level format, degaussing, or providing the GPS location of the device are not feasible or effective actions to take in this scenario.

Which of the following protocols supports fast roaming between networks?

A.
WEP
A.
WEP
Answers
B.
WPA
B.
WPA
Answers
C.
WPA2
C.
WPA2
Answers
D.
LEAP
D.
LEAP
Answers
E.
PEAP
E.
PEAP
Answers
Suggested answer: B

Explanation:

WPA2 is the only protocol among the options that supports fast roaming between networks.Fast roaming, also known as IEEE 802.11r or Fast BSS Transition (FT), enables a client device to roam quickly in environments implementing WPA2 Enterprise security, by ensuring that the client device does not need to re-authenticate to the RADIUS server every time it roams from one access point to another1. WEP, WPA, LEAP, and PEAP do not support fast roaming and require the client device to perform the full authentication process every time it roams, which can cause delays and interruptions in the network service.

The Official CompTIA A+ Core 2 Study Guide2, page 263.

WiFi Fast Roaming, Simplified3

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

A.
Network share
A.
Network share
Answers
B.
Group Policy
B.
Group Policy
Answers
C.
BitLocker
C.
BitLocker
Answers
D.
Static IP
D.
Static IP
Answers
Suggested answer: C

Explanation:

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1.BitLocker helps mitigate unauthorized data access by enhancing file and system protections, rendering data inaccessible when BitLocker-protected devices are decommissioned or recycled1. Network share, Group Policy, and Static IP are not features that can prevent unauthorized data access if a computer is lost or stolen.

BitLocker overview - Windows Security | Microsoft Learn1

The Official CompTIA A+ Core 2 Study Guide2, page 315.

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

A.
gpedit.msc
A.
gpedit.msc
Answers
B.
perfmon.msc
B.
perfmon.msc
Answers
C.
devmgmt.msc
C.
devmgmt.msc
Answers
Suggested answer: C

Explanation:

devmgmt.msc is the MMC snap-in that opens the Device Manager, a tool that allows the technician to view and manage the hardware devices and their drivers on the computer1. If the applications are not updating properly, it could be due to outdated, corrupted, or incompatible drivers that prevent the hardware from functioning normally.The technician can use the Device Manager to update, uninstall, rollback, or disable the drivers, as well as scan for hardware changes, troubleshoot problems, and view device properties2.

gpedit.msc is the MMC snap-in that opens the Group Policy Editor, a tool that allows the technician to configure the local or domain group policy settings for the computer or a group of computers3. Group policy settings can affect the security, performance, and functionality of the system, but they are not directly related to the application updates or the hardware drivers.

perfmon.msc is the MMC snap-in that opens the Performance Monitor, a tool that allows the technician to monitor and analyze the performance of the system and its components, such as processor, memory, disk, network, etc4.Performance Monitor can display real-time data or collect log data for later analysis, as well as generate reports and alerts based on the performance counters5. Performance Monitor can help the technician identify and diagnose performance issues, but it does not provide a way to manage the hardware drivers.

The Official CompTIA A+ Core 2 Study Guide6, page 223, 225, 227, 228.

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

A.
Network & Internet
A.
Network & Internet
Answers
B.
System
B.
System
Answers
C.
Personalization
C.
Personalization
Answers
D.
Accounts
D.
Accounts
Answers
Suggested answer: A

Explanation:

The Network & Internet settings in Windows 10 allow the user to input the SSID and password of a Wi-Fi network, as well as manage other network-related options, such as airplane mode, mobile hotspot, VPN, proxy, etc1.To access the Network & Internet settings, the user can select the Start button, then select Settings > Network & Internet2.Alternatively, the user can right-click the Wi-Fi icon on the taskbar and click 'Open Network & Internet Settings'3.

The System settings in Windows 10 allow the user to configure the display, sound, notifications, power, storage, and other system-related options1.The Personalization settings in Windows 10 allow the user to customize the background, colors, lock screen, themes, fonts, and other appearance-related options1.The Accounts settings in Windows 10 allow the user to manage the user accounts, sign-in options, sync settings, and other account-related options1. None of these settings can be used to input the SSID and password of a Wi-Fi network.

The Official CompTIA A+ Core 2 Study Guide1, page 221, 222, 223, 224.

Which of the following does MFA provide?

A.
Security enhancement
A.
Security enhancement
Answers
B.
Encryption
B.
Encryption
Answers
C.
Digital signature
C.
Digital signature
Answers
D.
Public key infrastructure
D.
Public key infrastructure
Answers
Suggested answer: A

Explanation:

MFA stands for multi-factor authentication, which is an electronic authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN1. MFA provides security enhancement by making it harder for attackers to compromise the user's identity or credentials, as they would need to obtain more than just the username and password.MFA can also prevent unauthorized access to sensitive data or resources, as well as reduce the risk of identity theft or fraud2.

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

A.
Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.
A.
Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.
Answers
B.
Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.
B.
Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.
Answers
C.
Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.
C.
Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.
Answers
D.
Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.
D.
Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.
Answers
Suggested answer: C

Explanation:

Installing new software on an organization's system or device can have various implications, such as compatibility, security, performance, licensing, and compliance issues.Therefore, it is important to follow the best practices for software installation, such as doing research on the software, checking the system requirements, scanning the installation file for malware, and obtaining the proper license345. The technician should not install the software without formal approval from the management team, as this could violate the organization's policies or regulations. The technician should also not install the software without investigating the software and its impact on the organization, as this could introduce potential risks or problems to the system or device.The technician should indicate to the developer that formal approval is needed, and then work with the IT team to evaluate the software and its suitability for the organization before installing it

A technician is unable to completely start up a system. The OS freezes when the desktop background appears, and the issue persists when the system is restarted. Which of the following should the technician do next to troubleshoot the issue?

A.
Disable applicable BIOS options.
A.
Disable applicable BIOS options.
Answers
B.
Load the system in safe mode.
B.
Load the system in safe mode.
Answers
C.
Start up using a flash drive OS and run System Repair.
C.
Start up using a flash drive OS and run System Repair.
Answers
D.
Enable Secure Boot and reinstall the system.
D.
Enable Secure Boot and reinstall the system.
Answers
Suggested answer: B

Explanation:

Loading the system in safe mode is a common troubleshooting step that allows the technician to isolate the problem by disabling unnecessary drivers and services. This can help determine if the issue is caused by a faulty device, a corrupted system file, or a malware infection.

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two).

A.
Install the latest GPU drivers.
A.
Install the latest GPU drivers.
Answers
B.
Reinstall the OS.
B.
Reinstall the OS.
Answers
C.
Increase the RAM.
C.
Increase the RAM.
Answers
D.
Increase the hard drive space.
D.
Increase the hard drive space.
Answers
E.
Uninstall unnecessary software.
E.
Uninstall unnecessary software.
Answers
F.
Disable scheduled tasks.
F.
Disable scheduled tasks.
Answers
Suggested answer: C, E

Explanation:

The most likely causes of the user's Windows computer performance degradation and freezing are insufficient RAM and excessive software running in the background. Therefore, the technician should do the following to resolve the issue:

Increase the RAM. RAM is the memory that the computer uses to store and run applications and processes. If the RAM is not enough to handle the workload, the computer will use the hard drive as a virtual memory, which is much slower and can cause performance issues. Increasing the RAM will allow the computer to run more applications and processes smoothly and avoid freezing. The technician should check the system requirements of the applications that the user needs to run, and install additional RAM modules that are compatible with the motherboard and the existing RAM.The technician should also make sure that the system is managing the page file size automatically, or adjust it manually to optimize the virtual memory usage12.

Uninstall unnecessary software. Software that the user does not need or use can take up valuable disk space and system resources, and can interfere with the performance of other applications. Some software may also run in the background or start automatically when the computer boots up, which can slow down the system and cause freezing. The technician should help the user to identify and uninstall unnecessary software from the control panel or the settings app, and disable unnecessary startup programs from the task manager or the system configuration tool.The technician should also check for and remove viruses and malware that may affect the system performance134.

1: Tips to improve PC performance in Windows - Microsoft Support12: How to Upgrade or Install RAM on Your Windows PC - Lifewire53: How to Uninstall Programs on Windows 10 - PCMag64: How to Fix a Windows Computer that Hangs or Freezes - wikiHow

Total 755 questions
Go to page: of 76