ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 48

Question list
Search
Search

List of questions

Search

Related questions











A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

A.
Startup
A.
Startup
Answers
B.
Performance
B.
Performance
Answers
C.
Application history
C.
Application history
Answers
D.
Processes
D.
Processes
Answers
Suggested answer: D

Explanation:

The Processes tab in the Task Manager shows all the running processes on the computer, including applications and background services. The user can use this tab to identify the unresponsive application and end its process by right-clicking on it and selecting End task. This will free up the system resources and close the application. The other tabs in the Task Manager do not allow the user to address the situation. The Startup tab shows the programs that run when the computer starts, the Performance tab shows the system resource usage and statistics, and the Application history tab shows the resource usage of the applications over time

Which of the following involves sending arbitrary characters in a web page request?

A.
SMS
A.
SMS
Answers
B.
SSL
B.
SSL
Answers
C.
XSS
C.
XSS
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

XSS stands for cross-site scripting, which is a web security vulnerability that allows an attacker to inject malicious code into a web page that is viewed by other users1. XSS involves sending arbitrary characters in a web page request, such as a query string, a form field, a cookie, or a header, that contain a malicious script. The web server does not validate or encode the input, and returns it as part of the web page response.The browser then executes the script, which can perform various actions on behalf of the attacker, such as stealing cookies, session tokens, or other sensitive information, redirecting the user to a malicious site, or displaying fake content

Which of the following is the most likely to use NTFS as the native filesystem?

A.
macOS
A.
macOS
Answers
B.
Linux
B.
Linux
Answers
C.
Windows
C.
Windows
Answers
D.
Android
D.
Android
Answers
Suggested answer: C

Explanation:

NTFS stands for New Technology File System, which is a proprietary file system developed by Microsoft4.NTFS is the default file system for the Windows NT family of operating systems, which includes Windows 10, Windows Server 2019, and other versions5.NTFS provides features such as security, encryption, compression, journaling, and large volume support45.NTFS is not the native file system for other operating systems, such as macOS, Linux, or Android, although some of them can read or write to NTFS volumes with third-party drivers or tools

A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the company LAN. The security administrator asks the technician to utilize a single software solution that does not require an external internet connection. Which of the following remote access tools is the technician most likely to install?

A.
VNC
A.
VNC
Answers
B.
RMM
B.
RMM
Answers
C.
RDP
C.
RDP
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: A

Explanation:

VNC (Virtual Network Computing) is a remote access tool that allows the technician to access and control various Windows, Linux, and macOS desktops on the company LAN using a graphical user interface. VNC does not require an external internet connection, as it works over a local network or a VPN. VNC uses a client-server model, where the server runs on the remote desktop and the client connects to it from another device.VNC can transmit the keyboard and mouse events from the client to the server, and the screen updates from the server to the client, enabling the technician to interact with the remote desktop as if it were local12.

VNC is a better option than the other choices because:

RMM (Remote Monitoring and Management) (B) is not a single software solution, but a category of software solutions that enable IT professionals to remotely monitor, manage, and troubleshoot multiple devices and networks. RMM software may include remote access tools, but also other features such as patch management, backup and recovery, security, reporting, and automation.RMM software may require an external internet connection, as it often relies on cloud-based services or web-based consoles34.

RDP (Remote Desktop Protocol) is a remote access tool that allows the technician to access and control Windows desktops on the company LAN using a graphical user interface. However, RDP is not compatible with Linux or macOS desktops, unless they have third-party software installed that can emulate or translate the RDP protocol.RDP also has some security and performance issues, such as encryption vulnerabilities, bandwidth consumption, and latency problems56.

SSH (Secure Shell) (D) is a remote access tool that allows the technician to access and control various Windows, Linux, and macOS desktops on the company LAN using a command-line interface. SSH does not require an external internet connection, as it works over a local network or a VPN. SSH uses encryption and authentication to secure the communication between the client and the server.However, SSH does not provide a graphical user interface, which may limit the functionality and usability of the remote desktop7.

1: What is VNC?- Definition from Techopedia12: How VNC Works - RealVNC23: What is Remote Monitoring and Management (RMM)?- Definition from Techopedia34: What is RMM Software?- NinjaRMM45: What is Remote Desktop Protocol (RDP)?- Definition from Techopedia56: Remote Desktop Protocol: What it is and how to secure it - CSO Online67: What is Secure Shell (SSH)?- Definition from Techopedia7: How to Use SSH to Access a Remote Server in Linux or Windows - Hostinger Tutorials

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

A.
APFS
A.
APFS
Answers
B.
FAT32
B.
FAT32
Answers
C.
NTFS
C.
NTFS
Answers
D.
ext4
D.
ext4
Answers
Suggested answer: C

Explanation:

NTFS stands for New Technology File System and it is the preferred filesystem for Microsoft Windows OS since Windows NT 3.1 in 19931. NTFS replaced FAT (File Allocation Table) as the default filesystem for Windows because it offers many advantages over FAT, such as:

Support for larger volumes and files (up to 16 exabytes)2

Support for file compression, encryption, and permissions2

Support for journaling, which records changes to the filesystem and helps recover from errors2

Support for hard links, symbolic links, and mount points2

Support for long filenames and Unicode characters2

FAT32 is an improved version of FAT that supports larger volumes and files (up to 32 GB and 4 GB respectively) and is compatible with older versions of Windows and other operating systems3. However, FAT32 still has many limitations and drawbacks compared to NTFS, such as:

No support for file compression, encryption, and permissions3

No support for journaling, which makes it vulnerable to corruption and data loss3

No support for hard links, symbolic links, and mount points3

No support for long filenames and Unicode characters3

APFS (Apple File System) is the default filesystem for macOS, iOS, iPadOS, watchOS, and tvOS since 20174. APFS replaced HFS+ (Hierarchical File System Plus) as the preferred filesystem for Apple devices because it offers many advantages over HFS+, such as:

Support for larger volumes and files (up to 8 zettabytes)4

Support for file cloning, snapshots, and encryption4

Support for space sharing, which allows multiple volumes to share the same storage pool4

Support for fast directory sizing, which improves performance and efficiency4

ext4 (Fourth Extended Filesystem) is the default filesystem for most Linux distributions since 20085. ext4 replaced ext3 as the preferred filesystem for Linux because it offers many advantages over ext3, such as:

Support for larger volumes and files (up to 1 exabyte and 16 terabytes respectively)5

Support for extents, which reduce fragmentation and improve performance5

Support for journal checksumming, which improves reliability and reduces recovery time5

Support for delayed allocation, which improves efficiency and reduces metadata overhead5

1:NTFS - Wikipedia2: [NTFS vs FAT32 vs exFAT: What's the Difference?]3: [FAT32 - Wikipedia]4: [Apple File System - Wikipedia]5: [ext4 - Wikipedia] : NTFS vs FAT32 vs exFAT: What's the Difference? : FAT32 - Wikipedia : Apple File System - Wikipedia : ext4 - Wikipedia

A technician is trying to connect to a user's laptop in order to securely install updates. Given the following information about the laptop:

Which of the following should the technician do to connect via RDP?

A.
Confirm the user can ping the default gateway.
A.
Confirm the user can ping the default gateway.
Answers
B.
Change the IP address on the user's laptop.
B.
Change the IP address on the user's laptop.
Answers
C.
Change the subnet mask on the user's laptop.
C.
Change the subnet mask on the user's laptop.
Answers
D.
Open port 3389 on the Windows firewall.
D.
Open port 3389 on the Windows firewall.
Answers
Suggested answer: D

Explanation:

In order to connect to a user's laptop via RDP, the technician should open port 3389 on the Windows firewall.This is because RDP uses port 3389 for communication12. The other options are not necessary or relevant for establishing an RDP connection.

Confirming the user can ping the default gateway is not required for RDP, as it only tests the network connectivity between the user's laptop and the router.RDP works over the internet, so the technician should be able to ping the user's laptop directly using its IP address3.

Changing the IP address on the user's laptop is not needed for RDP, as long as the IP address is valid and not conflicting with another device on the network.The user's laptop has a valid IP address of 192.168.0.45, which belongs to the same subnet as the gateway (192.168.0.1) and the subnet mask (255.255.255.0)4.

Changing the subnet mask on the user's laptop is not required for RDP, as long as the subnet mask matches the network configuration.The user's laptop has a correct subnet mask of 255.255.255.0, which defines a network with 254 possible hosts4.

1: [What is RDP and How Does It Work?- CompTIA]2:CompTIA A+ Certification Exam Core 2 Objectives - CompTIA3: [Ping (networking utility) - Wikipedia]4: [IP address - Wikipedia] : What is RDP and How Does It Work? - CompTIA :CompTIA A+ Certification Exam Core 2 Objectives - CompTIA: Ping (networking utility) - Wikipedia) : IP address - Wikipedia

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:

SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture

The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

A.
1
A.
1
Answers
B.
53
B.
53
Answers
C.
110
C.
110
Answers
D.
445
D.
445
Answers
Suggested answer: D

Explanation:

The protocol that most likely allowed the data theft to occur is SMB over TCP port 445. SMB is a network file sharing protocol that enables access to files, printers, and other resources on a network. Port 445 is used by SMB to communicate directly over TCP without the need for NetBIOS, which is an older and less secure protocol. The security log shows that the source IP address 192.168.1.1 sent a file named secrets.zip using SMB protocol to the destination IP address 192.168.1.50, which captured the file. The Windows firewall information shows that port 445 is enabled for inbound and outbound traffic, which means that it is not blocked by the firewall. Therefore, port 445 is the most likely port that was exploited by the attacker to steal the data from the corporate laptop.

SMB port number: Ports 445, 139, 138, and 137 explained1

What is an SMB Port + Ports 445 and 139 Explained2

CompTIA A+ Certification Exam Core 2 Objectives3

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

A.
Connect to the company's Wi-Fi network.
A.
Connect to the company's Wi-Fi network.
Answers
B.
Change the settings on the phone to connect to a different cellular tower.
B.
Change the settings on the phone to connect to a different cellular tower.
Answers
C.
Install a cellular repeater at the office for this user.
C.
Install a cellular repeater at the office for this user.
Answers
D.
Update all applications on the phone.
D.
Update all applications on the phone.
Answers
Suggested answer: A

Explanation:

The best way to fix the issue of slow cellular connection in the office is to connect to the company's Wi-Fi network. This will allow the user's mobile phone to access the internet through a faster and more reliable wireless network, instead of relying on the cellular network. Connecting to the Wi-Fi network will also save the user's data usage and battery life.

Some of the factors that can affect the cellular connection speed are the distance from the cell tower, the obstructions between the phone and the tower, the network congestion, the network technology, and the features of the phone12. In the office, the user may experience a weak or unstable cellular signal due to the building structure, the location, or the interference from other devices. Therefore, switching to the Wi-Fi network can improve the performance of the phone's applications and web browsing.

CompTIA A+ Certification Exam Core 2 Objectives3

CompTIA A+ Core 2 (220-1102) Certification Study Guide4

Factors affecting the speed and quality of internet connection1

Why Is Your Mobile Data So Slow?How to Speed It Up in 10 Steps2

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

A.
Place the customer on hold until the customer calms down.
A.
Place the customer on hold until the customer calms down.
Answers
B.
Disconnect the call to avoid a confrontation.
B.
Disconnect the call to avoid a confrontation.
Answers
C.
Wait until the customer is done speaking and offer assistance.
C.
Wait until the customer is done speaking and offer assistance.
Answers
D.
Escalate the issue to a supervisor.
D.
Escalate the issue to a supervisor.
Answers
Suggested answer: C

Explanation:

The best way to deal with an angry customer who is yelling at a technician is to wait until the customer is done speaking and offer assistance. This shows respect, empathy, and professionalism, and allows the technician to understand the customer's problem and find a solution.According to the CompTIA A+ Core 2 (220-1102) Certification Study Guide1, some of the steps to handle angry customers are:

Stay calm and do not take it personally.

Listen actively and acknowledge the customer's feelings.

Apologize sincerely and offer to help.

Restate the customer's issue and ask for clarification if needed.

Explain the possible causes and solutions for the problem.

Provide clear and realistic expectations for the resolution.

Follow up with the customer until the issue is resolved.

The other options are not appropriate ways to deal with angry customers, as they may worsen the situation or damage the customer relationship. Placing the customer on hold may make them feel ignored or dismissed. Disconnecting the call may make them feel disrespected or abandoned. Escalating the issue to a supervisor may make them feel frustrated or powerless, unless the technician cannot resolve the issue or the customer requests to speak to a supervisor.

CompTIA A+ Certification Exam Core 2 Objectives2

CompTIA A+ Core 2 (220-1102) Certification Study Guide1

How To Deal with Angry Customers (With Examples and Tips)3

17 ways to deal with angry customers: Templates and examples4

Six Ways to Handle Angry Customers5

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

A.
Run an antivirus and enable encryption.
A.
Run an antivirus and enable encryption.
Answers
B.
Restore the defaults and reimage the corporate OS.
B.
Restore the defaults and reimage the corporate OS.
Answers
C.
Back up the files and do a system restore.
C.
Back up the files and do a system restore.
Answers
D.
Undo the jailbreak and enable an antivirus.
D.
Undo the jailbreak and enable an antivirus.
Answers
Suggested answer: B

Explanation:

The best course of action for the technician is to restore the defaults and reimage the corporate OS on the device. This will remove the jailbreak and any unauthorized or malicious apps that may have been installed on the device, as well as restore the security features and policies that the company has set for its devices. This will also ensure that the device can receive the latest updates and patches from the manufacturer and the company, and prevent any data leakage or compromise from the device.

Jailbreaking is a process of bypassing the built-in security features of a device to install software other than what the manufacturer has made available for that device1.Jailbreaking allows the device owner to gain full access to the root of the operating system and access all the features1. However, jailbreaking also exposes the device to various risks, such as:

The loss of warranty from the device manufacturers2.

Inability to update software until a jailbroken version becomes available2.

Increased security vulnerabilities32.

Decreased battery life2.

Increased volatility of the device2.

Some of the signs of a jailbroken device are:

A high number of ads, which may indicate the presence of adware or spyware on the device3.

Receiving data-usage limit notifications, which may indicate the device is sending or receiving data in the background without the user's knowledge or consent3.

Experiencing slow response, which may indicate the device is running unauthorized or malicious apps that consume resources or interfere with the normal functioning of the device3.

Finding apps or icons that the user did not install or recognize, such as Cydia, which is a storefront for jailbroken iOS devices1.

The other options are not sufficient or appropriate for dealing with a jailbroken device. Running an antivirus and enabling encryption may not detect or remove all the threats or vulnerabilities that the jailbreak has introduced, and may not restore the device to its original state or functionality. Backing up the files and doing a system restore may not erase the jailbreak or the unauthorized apps, and may also backup the infected or compromised files. Undoing the jailbreak and enabling an antivirus may not be possible or effective, as the jailbreak may prevent the device from updating or installing security software, and may also leave traces of the jailbreak or the unauthorized apps on the device.

CompTIA A+ Certification Exam Core 2 Objectives4

CompTIA A+ Core 2 (220-1102) Certification Study Guide5

What is Jailbreaking & Is it safe?- Kaspersky1

Is Jailbreaking Safe?The ethics, risks and rewards involved - Comparitech3

Jailbreaking : Security risks and moving past them2

Total 755 questions
Go to page: of 76