ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

A.
Turn off the monitor.
A.
Turn off the monitor.
Answers
B.
Remove the power cord.
B.
Remove the power cord.
Answers
C.
Remove the PSU.
C.
Remove the PSU.
Answers
D.
Remove the RAM modules.
D.
Remove the RAM modules.
Answers
Suggested answer: B

Explanation:

Removing the power cord is the first step to ensure the safety of the technician and the PC components. This will prevent any electrical shock or damage that may occur if the PC is still connected to a power source. The technician should also press the power button to drain any residual power from the capacitors.

Which of the following operating systems is most commonly used in embedded systems?

A.
Chrome OS
A.
Chrome OS
Answers
B.
macOS
B.
macOS
Answers
C.
Windows
C.
Windows
Answers
D.
Linux
D.
Linux
Answers
Suggested answer: D

Explanation:

Linux is the most commonly used operating system in embedded systems because it is open source, free, customizable, and supports a wide range of architectures and devices. Linux also offers many advantages for embedded development, such as real-time capabilities, modularity, security, scalability, and reliability. Linux can run on embedded systems with limited resources, such as memory, storage, or power, and can be tailored to the specific needs of the application. Linux also has a large and active community of developers and users who contribute to its improvement and innovation.Some examples of embedded systems that use Linux are smart TVs, routers, drones, robots, smart watches, and IoT devices

Which of the following file extensions should a technician use for a PowerShell script?

A.
.ps1
A.
.ps1
Answers
B.
.py
B.
.py
Answers
C.
.sh
C.
.sh
Answers
D.
.bat
D.
.bat
Answers
E.
.cmd
E.
.cmd
Answers
Suggested answer: A

Explanation:

A PowerShell script is a plain text file that contains one or more PowerShell commands. Scripts have a .ps1 file extension and can be run on your computer or in a remote session. PowerShell scripts can be used to automate tasks and change settings on Windows devices. To create and run a PowerShell script, you need a text editor (such as Visual Studio Code or Notepad) and the PowerShell Integrated Scripting Environment (ISE) console.You also need to enable the correct execution policy to allow scripts to run on your system

A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?

A.
FTP
A.
FTP
Answers
B.
RDP
B.
RDP
Answers
C.
SSH
C.
SSH
Answers
D.
VNC
D.
VNC
Answers
Suggested answer: B

Explanation:

RDP stands for Remote Desktop Protocol, which is a proprietary protocol developed by Microsoft that allows a user to remotely access and control another computer over a network. RDP provides a secure session that encrypts the data between the client and the host, and allows the user to see and interact with the desktop and applications of the remote computer as if they were sitting in front of it. RDP also supports features such as audio, video, clipboard, printer, and file sharing, as well as multiple monitor support and session recording. To use RDP, the host computer must have Remote Desktop enabled and configured, and the client computer must have a Remote Desktop client software installed. The client can connect to the host by entering its IP address, hostname, or domain name, and providing the login credentials of a user account on the host.RDP is commonly used for remote administration, technical support, and remote work scenarios

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

A.
To determine which party had the machine and when.
A.
To determine which party had the machine and when.
Answers
B.
To remotely wipe sensitive data from the machine.
B.
To remotely wipe sensitive data from the machine.
Answers
C.
To gather the information needed to replace the machine.
C.
To gather the information needed to replace the machine.
Answers
D.
To alert the owner that the password needs to be changed.
D.
To alert the owner that the password needs to be changed.
Answers
Suggested answer: A

Explanation:

Chain of custody documentation is a record of the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence. It is important to maintain a chain of custody to ensure the integrity and authenticity of the evidence, and to prevent tampering or contamination. If a laptop that was in the evidence room of a police station is missing, the best reason to refer to chain of custody documentation is to determine which party had the machine and when.This can help to identify the possible suspects, locate the missing laptop, and verify if the evidence on the laptop was compromised or not

A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot be verified. Which of the following is the most appropriate action for a technician to take?

A.
Click proceed.
A.
Click proceed.
Answers
B.
Report the employee to the human resources department for violating company policy.
B.
Report the employee to the human resources department for violating company policy.
Answers
C.
Restore the computer from the last known backup.
C.
Restore the computer from the last known backup.
Answers
D.
Close the browser window and report the email to IT security.
D.
Close the browser window and report the email to IT security.
Answers
Suggested answer: D

Explanation:

A warning message in the user's browser stating the site's certificate cannot be verified indicates that the site may be insecure, fraudulent, or malicious. This could be a sign of a phishing attempt, where the sender of the email tries to trick the user into clicking a link that leads to a fake website that mimics a legitimate one, in order to steal the user's personal or financial information. The most appropriate action for a technician to take in this situation is to close the browser window and report the email to IT security, who can investigate the source and content of the email, and take the necessary steps to protect the user and the network from potential harm. Clicking proceed could expose the user to malware, identity theft, or data breach. Reporting the employee to the human resources department for violating company policy is unnecessary and harsh, as the user may not have been aware of the phishing attempt or the company policy.Restoring the computer from the last known backup is premature and ineffective, as the user may not have been infected by anything, and the backup may not remove the email or the link from the user's inbox

After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network. Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?

A.
Enable System Restore.
A.
Enable System Restore.
Answers
B.
Disable System Restore.
B.
Disable System Restore.
Answers
C.
Enable antivirus.
C.
Enable antivirus.
Answers
D.
Disable antivirus.
D.
Disable antivirus.
Answers
E.
Educate the user.
E.
Educate the user.
Answers
Suggested answer: B

Explanation:

System Restore is a feature that allows the user to revert the system to a previous state. However, this can also restore the malware that was removed by the technician. Disabling System Restore can prevent the operating system from automatically returning to an infected state. Enabling antivirus, educating the user, and enabling System Restore are good preventive measures, but they do not address the question. Disabling antivirus can make the system more vulnerable to malware attacks

A technician wants to install Developer Mode on a Windows laptop but is receiving a 'failed to install package' message. Which of the following should the technician do first?

A.
Ensure internet connectivity.
A.
Ensure internet connectivity.
Answers
B.
Check for Windows updates.
B.
Check for Windows updates.
Answers
C.
Enable SSH.
C.
Enable SSH.
Answers
D.
Reboot computer.
D.
Reboot computer.
Answers
Suggested answer: A

Explanation:

Developer Mode on Windows 10 is a feature that allows developers to test and debug their applications on their devices, as well as sideload apps and access other developer tools12.To enable Developer Mode, the user needs to go to the Settings app, select Update & Security, choose For Developers, and switch to Developer Mode123.However, enabling Developer Mode requires internet connectivity, as Windows will download and install a package of features, such as Windows Device Portal and SSH services, that are necessary for Developer Mode124.If the user does not have internet connectivity, they will receive a ''failed to install package'' message when trying to enable Developer Mode4.Therefore, the first thing that the technician should do is to ensure that the laptop has internet access, either through Wi-Fi or Ethernet, and then try to enable Developer Mode again4

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

A.
Delete the browser cookies and history.
A.
Delete the browser cookies and history.
Answers
B.
Reset all browser settings.
B.
Reset all browser settings.
Answers
C.
Change the browser default search engine.
C.
Change the browser default search engine.
Answers
D.
Install a trusted browser.
D.
Install a trusted browser.
Answers
Suggested answer: D

Explanation:

The customer's web browser is likely infected by a browser hijacker, which is a type of malware that changes the browser's settings and redirects the user to malicious websites. A browser hijacker can also steal the user's personal data, display unwanted ads, and install more malware on the device. To remove a browser hijacker, the user should first uninstall the browser from the Control Panel, then scan the device with an antivirus or anti-malware program, and finally install a trusted browser from a legitimate source.Deleting the browser cookies and history, resetting the browser settings, or changing the browser default search engine may not be enough to get rid of the browser hijacker, as it may have embedded itself into the system or other browser components.

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team implement?

A.
SSH
A.
SSH
Answers
B.
VNC
B.
VNC
Answers
C.
VPN
C.
VPN
Answers
D.
RDP
D.
RDP
Answers
Suggested answer: C

Explanation:

A VPN (Virtual Private Network) is a service that allows remote employees to access the company's network resources securely over the internet as if they were on premises. A VPN encrypts the data traffic between the employee's device and the VPN server, and assigns the employee a virtual IP address that belongs to the company's network. This way, the employee can access the local servers, files, printers, and other resources without exposing them to the public internet. A VPN also protects the employee's privacy and identity by masking their real IP address and location.

Total 755 questions
Go to page: of 76