ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A department has the following technical requirements for a new application:

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

A.
CPU
A.
CPU
Answers
B.
Hard drive
B.
Hard drive
Answers
C.
RAM
C.
RAM
Answers
D.
Touch screen
D.
Touch screen
Answers
Suggested answer: C

Explanation:

After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully take advantage of the RAM of the computer. This is because a 64-bit operating system is able to use larger amounts of RAM compared to a 32-bit operating system, which may benefit the system’s overall performance if it has more than 4GB of RAM installed

Which of the following Wi-Fi protocols is the MOST secure?

A.
WPA3
A.
WPA3
Answers
B.
WPA-AES
B.
WPA-AES
Answers
C.
WEP
C.
WEP
Answers
D.
WPA-TKIP
D.
WPA-TKIP
Answers
Suggested answer: A

Explanation:


A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

A.
Cryptominer
A.
Cryptominer
Answers
B.
Phishing
B.
Phishing
Answers
C.
Ransomware
C.
Ransomware
Answers
D.
Keylogger
D.
Keylogger
Answers
Suggested answer: C

Explanation:

Ransomware is malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid. In this case, the user was able to access the files before without issue, and no changes have been made within the company, so it is likely that the computer was infected with ransomware.

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

A.
Run a startup script that removes files by name.
A.
Run a startup script that removes files by name.
Answers
B.
Provide a sample to the antivirus vendor.
B.
Provide a sample to the antivirus vendor.
Answers
C.
Manually check each machine.
C.
Manually check each machine.
Answers
D.
Monitor outbound network traffic.
D.
Monitor outbound network traffic.
Answers
Suggested answer: C

Explanation:

The most effective way to check other machines on the network for this unknown threat is to manually check each machine. This can help to identify any other machines that may be infected with the unknown virus and allow them to be cleaned.

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A.
Spyware
A.
Spyware
Answers
B.
Cryptominer
B.
Cryptominer
Answers
C.
Ransormvare
C.
Ransormvare
Answers
D.
Boot sector virus
D.
Boot sector virus
Answers
Suggested answer: B

Explanation:

The type of malware that is most likely to blame for a PC running more slowly than usual and having an extremely high GPU temperature is a “cryptominer”. Cryptominers are a type of malware that use the resources of a computer to mine cryptocurrency. This can cause the computer to run more slowly than usual and can cause the GPU temperature to rise. Spyware is a type of malware that is used to spy on a user’s activities, but it does not typically cause high GPU temperatures. Ransomware is a type of malware that encrypts a user’s files and demands payment to unlock them, but it does nottypically cause high GPU temperatures. Boot sector viruses are a type of malware that infects the boot sector of a hard drive, but they do not typically cause high GPU temperatures12

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?

A.
XSS verification
A.
XSS verification
Answers
B.
AES-256 verification
B.
AES-256 verification
Answers
C.
Hash verification
C.
Hash verification
Answers
D.
Digital signature verification
D.
Digital signature verification
Answers
Suggested answer: C

Explanation:

Hash verification is a process that verifies the integrity of a file by comparing the hash value of the downloaded file to the hash value provided by the source1

Which of the following OS types provides a lightweight option for workstations thai need an easy-touse browser-based interface?

A.
FreeBSD
A.
FreeBSD
Answers
B.
Chrome OS
B.
Chrome OS
Answers
C.
macOS
C.
macOS
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: B

Explanation:

Chrome OS provides a lightweight option for workstations that need an easy-to-use browser-based interface1

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

A.
Network and Sharing Center
A.
Network and Sharing Center
Answers
B.
Programs and Features
B.
Programs and Features
Answers
C.
Default Apps
C.
Default Apps
Answers
D.
Add or Remove Programs
D.
Add or Remove Programs
Answers
Suggested answer: C

Explanation:

Default Apps should be used to ensure all PDF files open in Adobe Reader

Which of the following provide the BEST way to secure physical access to a data cento server room?

(Select TWO).

A.
Biometric lock
A.
Biometric lock
Answers
B.
Badge reader
B.
Badge reader
Answers
C.
USB token
C.
USB token
Answers
D.
Video surveillance
D.
Video surveillance
Answers
E.
Locking rack
E.
Locking rack
Answers
F.
Access control vestibule
F.
Access control vestibule
Answers
Suggested answer: A, B

Explanation:

A biometric lock requires an authorized user to provide a unique biometric identifier, such as a fingerprint, in order to gain access to the server room. A badge reader requires an authorized user to swipe an access card in order to gain access. Both of these methods ensure that only authorized personnel are able to access the server room. Additionally, video surveillance and access control vestibules can be used to further secure the server room. Finally, a locking rack

can be used to physically secure the servers, so that they cannot be accessed without the appropriate key.

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

A.
set AirDrop so that transfers are only accepted from known contacts
A.
set AirDrop so that transfers are only accepted from known contacts
Answers
B.
completely disable all wireless systems during the flight
B.
completely disable all wireless systems during the flight
Answers
C.
discontinue using iMessage and only use secure communication applications
C.
discontinue using iMessage and only use secure communication applications
Answers
D.
only allow messages and calls from saved contacts
D.
only allow messages and calls from saved contacts
Answers
Suggested answer: A

Explanation:

To best resolve this issue, the executive should set AirDrop so that transfers are only accepted from known contacts (option A). AirDrop is a feature on iOS devices that allows users to share files, photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers from known contacts, the executive can ensure that unwanted files and photos are not sent to their device. Additionally, the executive should ensure that the AirDrop setting is only enabled when it is necessary, as this will protect their device from any unwanted files and photos.

Total 755 questions
Go to page: of 76