ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

A.
Disable the browser from sending notifications to the Action Center.
A.
Disable the browser from sending notifications to the Action Center.
Answers
B.
Run a full antivirus scan on the computer.
B.
Run a full antivirus scan on the computer.
Answers
C.
Disable all Action Center notifications.
C.
Disable all Action Center notifications.
Answers
D.
Move specific site notifications from Allowed to Block.
D.
Move specific site notifications from Allowed to Block.
Answers
Suggested answer: A

Explanation:

The best solution for a technician to implement is to disable the browser from sending notifications to the Action Center. This will prevent the random advertisement notifications from appearing in the Windows 10 Action Center, which can be annoying and distracting for the user.The technician can follow these steps to disable the browser notifications1:

Open the browser that is sending the notifications, such as Microsoft Edge, Google Chrome, or Mozilla Firefox.

Go to the browser settings or options menu, and look for the privacy and security section.

Find the option to manage site permissions or notifications, and click on it.

You will see a list of sites that are allowed or blocked from sending notifications to the browser and the Action Center. You can either block all sites from sending notifications, or select specific sites that you want to block or allow.

Save the changes and close the browser settings.

This solution is better than the other options because:

Running a full antivirus scan on the computer (B) is not necessary, as the advertisement notifications are not malicious or harmful, and they are not caused by a virus or malware infection. Running a scan will not stop the notifications from appearing, and it will consume system resources and time.

Disabling all Action Center notifications is not advisable, as the Action Center is a useful feature that shows notifications and alerts from various apps and system events, such as email, calendar, security, updates, etc. Disabling all notifications will make the user miss important information and reminders, and reduce the functionality of the Action Center.

Moving specific site notifications from Allowed to Block (D) is not the best solution, as it will only stop the notifications from some sites, but not from others. The user may still receive advertisement notifications from other sites that are not blocked, or from new sites that are added to the Allowed list. This solution will also require the user to manually manage the list of sites, which can be tedious and time-consuming.

1: How to Disable Annoying Browser Notifications - PCMag

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

A.
Disable System Restore.
A.
Disable System Restore.
Answers
B.
Remediate the system.
B.
Remediate the system.
Answers
C.
Educate the system user.
C.
Educate the system user.
Answers
D.
Quarantine the system.
D.
Quarantine the system.
Answers
Suggested answer: D

Explanation:

The first mitigation step that a technician should take when a machine is suspected to contain ransomware is to quarantine the system. This means isolating the infected machine from the network and other devices, to prevent the ransomware from spreading and encrypting more data.The technician can quarantine the system by disconnecting the network cable, turning off the wireless adapter, or using firewall rules to block the traffic from and to the machine12.

This step is more important than the other options because:

Disabling System Restore (A) is not a priority, as it will not stop the ransomware from running or spreading. System Restore is a feature that allows users to restore their system to a previous state, but it may not work if the ransomware has encrypted or deleted the restore points.Moreover, disabling System Restore may prevent the user from recovering some data or settings in the future13.

Remediating the system (B) is the ultimate goal, but it cannot be done before quarantining the system. Remediating the system means removing the ransomware, restoring the data, and fixing the vulnerabilities that allowed the attack. However, this process requires careful analysis, planning, and execution, and it may not be possible if the ransomware is still active and communicating with the attackers.Therefore, the technician should first isolate the system and then proceed with the remediation steps12.

Educating the system user is a preventive measure, but it is not a mitigation step. Educating the system user means raising awareness and providing training on how to avoid ransomware attacks, such as by recognizing phishing emails, avoiding suspicious links or attachments, and updating and patching the system regularly. However, this step will not help if the system is already infected, and it may not be effective if the user is not willing or able to follow the best practices.Therefore, the technician should focus on resolving the current incident and then educate the user as part of the recovery plan14.

1: How to Mitigate Ransomware Attacks in 10 Steps - Heimdal Security12: 3 steps to prevent and recover from ransomware | Microsoft Security Blog33: How to use System Restore on Windows 10 | Windows Central54: Ransomware Mitigation | Prevention and Mitigation Strategies - Delinea4

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

A.
Software firewall
A.
Software firewall
Answers
B.
Password complexity
B.
Password complexity
Answers
C.
Antivirus application
C.
Antivirus application
Answers
D.
Anti-malware scans
D.
Anti-malware scans
Answers
Suggested answer: A

Explanation:

A software firewall is a program that monitors and controls the incoming and outgoing network traffic on a computer or a server. A software firewall can help prevent unauthorized LAN devices from accessing stored files on a company file server by applying rules and policies that filter the network packets based on their source, destination, protocol, port, or content.A software firewall can also block or allow specific applications or services from communicating with the network, and alert the administrator of any suspicious or malicious activity12.

A software firewall is a better option than the other choices because:

Password complexity (B) is a good practice to protect the file server from unauthorized access, but it is not sufficient by itself. Password complexity refers to the use of strong passwords that are hard to guess or crack by attackers, and that are changed frequently and securely.Password complexity can prevent brute force attacks or credential theft, but it cannot stop network attacks that exploit vulnerabilities in the file server software or hardware, or that bypass the authentication process34.

Antivirus application and anti-malware scans (D) are important tools to protect the file server from viruses and malware that can infect, damage, or encrypt the stored files. However, they are not effective in preventing unauthorized LAN devices from accessing the files in the first place. Antivirus and anti-malware tools can only detect and remove known threats, and they may not be able to stop zero-day attacks or advanced persistent threats that can evade or disable them.Moreover, antivirus and anti-malware tools cannot control the network traffic or the file server permissions, and they may not be compatible with all file server platforms or configurations56.

1: What is a Firewall and How Does it Work?- Cisco12: How to Harden Your Windows Server - ServerMania23: Password Security: Complexity vs.Length - Norton74: Password Hardening: 5 Ways to Protect Your Passwords - Infosec5: What is Antivirus Software and How Does it Work?- Kaspersky6: What is Anti-Malware? - Malwarebytes

A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?

A.
Corporate
A.
Corporate
Answers
B.
Perpetual
B.
Perpetual
Answers
C.
Open-source
C.
Open-source
Answers
D.
Personal
D.
Personal
Answers
Suggested answer: A

Explanation:

A corporate EULA is a type of end-user license agreement that is designed for a large organization that needs to use proprietary software with vendor support for a multiuser environment. A corporate EULA typically grants the organization a volume license that allows it to install and use the software on multiple devices or servers, and to distribute the software to its employees or affiliates. A corporate EULA also usually provides the organization with technical support, maintenance, updates, and warranty from the software vendor, as well as some customization options and discounts.A corporate EULA may also include terms and conditions that specify the rights and obligations of both parties, such as confidentiality, liability, indemnification, termination, and dispute resolution12.

A corporate EULA is a better option than the other choices because:

A perpetual EULA (B) is a type of end-user license agreement that grants the user a permanent and irrevocable license to use the software, without any time limit or expiration date. However, a perpetual EULA does not necessarily include vendor support, updates, or warranty, and it may not allow the user to install the software on multiple devices or servers, or to distribute the software to other users.A perpetual EULA may also be more expensive than a corporate EULA, as it requires a one-time payment upfront, rather than a recurring subscription fee34.

An open-source EULA is a type of end-user license agreement that grants the user a license to use, modify, and redistribute the software, which is publicly available and free of charge. However, an open-source EULA does not provide any vendor support, maintenance, updates, or warranty, and it may impose some restrictions or obligations on the user, such as disclosing the source code, attributing the original author, or using a compatible license for derivative works.An open-source EULA may not be suitable for a large organization that needs proprietary software with vendor support for a multiuser environment56.

A personal EULA (D) is a type of end-user license agreement that grants the user a license to use the software for personal, non-commercial purposes only. A personal EULA may limit the number of devices or servers that the user can install the software on, and prohibit the user from distributing, copying, or reselling the software to other users. A personal EULA may also provide limited or no vendor support, maintenance, updates, or warranty, and it may have a fixed or renewable term.A personal EULA may not meet the needs of a large organization that needs proprietary software with vendor support for a multiuser environment7.

1: What is a Corporate License Agreement?- Definition from Techopedia12: Corporate License Agreement - Template - Word & PDF23: What is a Perpetual License?- Definition from Techopedia34: Perpetual vs.Subscription Software Licensing: Which Is Best for You?45: What is an Open Source License?- Definition from Techopedia56: Open Source Licenses: Which One Should You Use?67: What is a Personal License Agreement?- Definition from Techopedia7: Personal License Agreement - Template - Word & PDF

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in

A.
order to understand the issue?
A.
order to understand the issue?
Answers
B.
What is the error message?
B.
What is the error message?
Answers
C.
Does the program work on another computer?
C.
Does the program work on another computer?
Answers
D.
Did the program ever work?
D.
Did the program ever work?
Answers
E.
Is anyone else having this issue?
E.
Is anyone else having this issue?
Answers
Suggested answer: A

Explanation:

The most effective clarifying question for the help desk technician to ask the user in order to understand the issue is

A) What is the error message? This question will help the technician to identify the possible cause and solution of the problem, as the error message will provide specific information about the nature and location of the error, such as the server name, the port number, the protocol, the authentication method, or the network status. The error message will also help the technician to troubleshoot the issue by following the suggested steps or searching for the error code online .

This question is more effective than the other choices because:

B) Does the program work on another computer? is not a very helpful question, as it will not reveal the source of the error or how to fix it. The program may work on another computer for various reasons, such as different network settings, firewall rules, permissions, or software versions. However, this question will not tell the technician what is wrong with the user's computer or the remote server, or what needs to be changed or updated to make the program work.

C) Did the program ever work? is not a very relevant question, as it will not address the current issue or how to resolve it. The program may have worked in the past, but it may have stopped working due to changes in the network configuration, the server status, the software updates, or the user credentials. However, this question will not tell the technician what has changed or how to restore the program functionality.

D) Is anyone else having this issue? is not a very useful question, as it will not explain the reason or the solution for the error. The issue may affect only the user, or multiple users, depending on the scope and the impact of the error. However, this question will not tell the technician what is causing the error or how to fix it for the user or the others.

: How to Troubleshoot Terminal Emulation Problems - Techwalla : How to Read and Understand Windows Error Messages - Lifewire : How to Troubleshoot Network Connectivity Problems - How-To Geek : How to Troubleshoot Software Problems - dummies : How to Troubleshoot Common PC Issues For Users - MakeUseOf

Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?

A.
Run System Restore.
A.
Run System Restore.
Answers
B.
Place in recovery mode.
B.
Place in recovery mode.
Answers
C.
Schedule a scan.
C.
Schedule a scan.
Answers
D.
Restart the PC.
D.
Restart the PC.
Answers
Suggested answer: B

Explanation:

Recovery mode is a special boot option that allows the user to access advanced tools and features to troubleshoot and remove malware from the device. Recovery mode can also restore the system to a previous state or reset the device to factory settings. Running System Restore, scheduling a scan, or restarting the PC may not be effective in removing the malware, as it may still be active or hidden in the system files.

When trying to access a secure internal network, the user receives an error messaging stating, 'There is a problem with this website's security certificate.' The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?

A.
Reimage the system and install SSL.
A.
Reimage the system and install SSL.
Answers
B.
Install Trusted Root Certificate.
B.
Install Trusted Root Certificate.
Answers
C.
Select View Certificates and then Install Certificate.
C.
Select View Certificates and then Install Certificate.
Answers
D.
Continue to access the website.
D.
Continue to access the website.
Answers
Suggested answer: C

Explanation:

The error message indicates that the website's security certificate is not trusted by the user's device, which may prevent the user from accessing the secure internal network. To resolve this issue, the user can view the certificate details and install it on the device, which will add it to the trusted root certificate store. Reimaging the system and installing SSL, installing Trusted Root Certificate, or continuing to access the website are not recommended solutions, as they may compromise the security of the device or the network.

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.
Valid license
A.
Valid license
Answers
B.
Data retention requirements
B.
Data retention requirements
Answers
C.
Material safety data sheet
C.
Material safety data sheet
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

A.
Run one scan and schedule future scans.
A.
Run one scan and schedule future scans.
Answers
B.
Back up the uninfected files and reimage the computer.
B.
Back up the uninfected files and reimage the computer.
Answers
C.
Restore the clean backup copies of the infected files.
C.
Restore the clean backup copies of the infected files.
Answers
D.
Run repeated remediation scans until the malware is removed.
D.
Run repeated remediation scans until the malware is removed.
Answers
Suggested answer: D

Explanation:

Malware is malicious software that can cause damage or harm to a computer system or network4. A technician has verified a computer is infected with malware by observing unusual behavior, such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the anti-malware software to prevent further infection or spread of the malware. The next step is to run repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and removes malware from the system. Running one scan may not be enough to remove all traces of malware, as some malware may hide or regenerate itself.

Which of the following is the most likely reason a filtration system is critical for data centers?

A.
Plastics degrade over time.
A.
Plastics degrade over time.
Answers
B.
High humidity levels can rust metal.
B.
High humidity levels can rust metal.
Answers
C.
Insects can invade the data center.
C.
Insects can invade the data center.
Answers
D.
Dust particles can clog the machines.
D.
Dust particles can clog the machines.
Answers
Suggested answer: B

Explanation:

A filtration system is critical for data centers because it can control the humidity and temperature levels in the environment. High humidity levels can cause condensation and corrosion on the metal components of the servers and other equipment, leading to malfunction and damage. A filtration system can also prevent dust, dirt, and other contaminants from entering the data center and clogging the machines or causing overheating.

Total 755 questions
Go to page: of 76