ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

A department has the following technical requirements for a new application:

CompTIA 220-1102 image Question 41 93319 10022024175017000000

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

CPU
CPU
Hard drive
Hard drive
RAM
RAM
Touch screen
Touch screen
Suggested answer: C
Explanation:

After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully take advantage of the RAM of the computer. This is because a 64-bit operating system is able to use larger amounts of RAM compared to a 32-bit operating system, which may benefit the system’s overall performance if it has more than 4GB of RAM installed

asked 02/10/2024
Alvaro Alejandro Zorrilla Tello
36 questions

Question 42

Report Export Collapse

Which of the following Wi-Fi protocols is the MOST secure?

WPA3
WPA3
WPA-AES
WPA-AES
WEP
WEP
WPA-TKIP
WPA-TKIP
Suggested answer: A
Explanation:


asked 02/10/2024
Cihad Yorulmaz
33 questions

Question 43

Report Export Collapse

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Cryptominer
Cryptominer
Phishing
Phishing
Ransomware
Ransomware
Keylogger
Keylogger
Suggested answer: C
Explanation:

Ransomware is malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid. In this case, the user was able to access the files before without issue, and no changes have been made within the company, so it is likely that the computer was infected with ransomware.

asked 02/10/2024
Javier Portabales
44 questions

Question 44

Report Export Collapse

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Run a startup script that removes files by name.
Run a startup script that removes files by name.
Provide a sample to the antivirus vendor.
Provide a sample to the antivirus vendor.
Manually check each machine.
Manually check each machine.
Monitor outbound network traffic.
Monitor outbound network traffic.
Suggested answer: C
Explanation:

The most effective way to check other machines on the network for this unknown threat is to manually check each machine. This can help to identify any other machines that may be infected with the unknown virus and allow them to be cleaned.

asked 02/10/2024
FRANK THYS
42 questions

Question 45

Report Export Collapse

A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?

Spyware
Spyware
Cryptominer
Cryptominer
Ransormvare
Ransormvare
Boot sector virus
Boot sector virus
Suggested answer: B
Explanation:

The type of malware that is most likely to blame for a PC running more slowly than usual and having an extremely high GPU temperature is a β€œcryptominer”. Cryptominers are a type of malware that use the resources of a computer to mine cryptocurrency. This can cause the computer to run more slowly than usual and can cause the GPU temperature to rise. Spyware is a type of malware that is used to spy on a user’s activities, but it does not typically cause high GPU temperatures. Ransomware is a type of malware that encrypts a user’s files and demands payment to unlock them, but it does nottypically cause high GPU temperatures. Boot sector viruses are a type of malware that infects the boot sector of a hard drive, but they do not typically cause high GPU temperatures12

asked 02/10/2024
Vangelis Gouloutis
44 questions

Question 46

Report Export Collapse

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string?

XSS verification
XSS verification
AES-256 verification
AES-256 verification
Hash verification
Hash verification
Digital signature verification
Digital signature verification
Suggested answer: C
Explanation:

Hash verification is a process that verifies the integrity of a file by comparing the hash value of the downloaded file to the hash value provided by the source1

asked 02/10/2024
Subhendu Bhattacharyya
43 questions

Question 47

Report Export Collapse

Which of the following OS types provides a lightweight option for workstations thai need an easy-touse browser-based interface?

FreeBSD
FreeBSD
Chrome OS
Chrome OS
macOS
macOS
Windows
Windows
Suggested answer: B
Explanation:

Chrome OS provides a lightweight option for workstations that need an easy-to-use browser-based interface1

asked 02/10/2024
Enayat Meer
40 questions

Question 48

Report Export Collapse

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Network and Sharing Center
Network and Sharing Center
Programs and Features
Programs and Features
Default Apps
Default Apps
Add or Remove Programs
Add or Remove Programs
Suggested answer: C
Explanation:

Default Apps should be used to ensure all PDF files open in Adobe Reader

asked 02/10/2024
Emmanuel Aminu
51 questions

Question 49

Report Export Collapse

Which of the following provide the BEST way to secure physical access to a data cento server room?

(Select TWO).

Biometric lock
Biometric lock
Badge reader
Badge reader
USB token
USB token
Video surveillance
Video surveillance
Locking rack
Locking rack
Access control vestibule
Access control vestibule
Suggested answer: A, B
Explanation:

A biometric lock requires an authorized user to provide a unique biometric identifier, such as a fingerprint, in order to gain access to the server room. A badge reader requires an authorized user to swipe an access card in order to gain access. Both of these methods ensure that only authorized personnel are able to access the server room. Additionally, video surveillance and access control vestibules can be used to further secure the server room. Finally, a locking rack

can be used to physically secure the servers, so that they cannot be accessed without the appropriate key.

asked 02/10/2024
Bryan Sprowls
36 questions

Question 50

Report Export Collapse

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:

set AirDrop so that transfers are only accepted from known contacts
set AirDrop so that transfers are only accepted from known contacts
completely disable all wireless systems during the flight
completely disable all wireless systems during the flight
discontinue using iMessage and only use secure communication applications
discontinue using iMessage and only use secure communication applications
only allow messages and calls from saved contacts
only allow messages and calls from saved contacts
Suggested answer: A
Explanation:

To best resolve this issue, the executive should set AirDrop so that transfers are only accepted from known contacts (option A). AirDrop is a feature on iOS devices that allows users to share files, photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers from known contacts, the executive can ensure that unwanted files and photos are not sent to their device. Additionally, the executive should ensure that the AirDrop setting is only enabled when it is necessary, as this will protect their device from any unwanted files and photos.

asked 02/10/2024
Robert Petty
56 questions
Total 769 questions
Go to page: of 77
Search

Related questions