ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

Related questions











Which of the following environments allows for the testing of critical systems without the risk of them being negatively impacted by changes?

A.
Regression
A.
Regression
Answers
B.
Cloud
B.
Cloud
Answers
C.
Production
C.
Production
Answers
D.
Sandbox
D.
Sandbox
Answers
Suggested answer: D

Explanation:

A sandbox is an isolated environment that allows for the testing of critical systems without the risk of them being negatively impacted by changes. A sandbox can be used to simulate real-world scenarios, experiment with new features, debug errors, or evaluate the performance and security of a system. A sandbox can be created using virtualization, emulation, or containerization technologies. A sandbox prevents any changes made in the testing environment from affecting the production environment, which is the actual system that is used by the end users.

https://www.comptia.org/training/books/a-core-2-220-1102-study-guide

A technician is modifying the default home page of all the workstations in a company. Which of the following will help to implement this change?

A.
Group Policy
A.
Group Policy
Answers
B.
Browser extension
B.
Browser extension
Answers
C.
System Configuration
C.
System Configuration
Answers
D.
Task Scheduler
D.
Task Scheduler
Answers
Suggested answer: A

Explanation:

Group Policy is a feature of Windows that allows administrators to centrally manage and configure the settings of computers and users in a domain network. Group Policy can be used to modify the default home page of all the workstations in a company by creating and applying a policy that specifies the desired URL for the home page. This way, the change will be automatically applied to all the workstations that are joined to the domain and receive the policy.

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

A.
Isolate the machine from the network.
A.
Isolate the machine from the network.
Answers
B.
Scan the system for hidden files.
B.
Scan the system for hidden files.
Answers
C.
Disable unused ports.
C.
Disable unused ports.
Answers
D.
Install antivirus software.
D.
Install antivirus software.
Answers
E.
Reconfigure the firewall.
E.
Reconfigure the firewall.
Answers
Suggested answer: A

Explanation:

Isolating the machine from the network is a good practice when troubleshooting a PC that is suspected of being infected with malware. This can prevent the malware from spreading to other devices on the network or communicating with external servers that may control or exploit the malware. Isolating the machine can be done by disconnecting the network cable, disabling the wireless adapter, or blocking the network traffic with a firewall.

A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the user turned the computer back on, everything was functioning properly, including the headset. Which of the following Microsoft tools would most likely be used to determine the root cause?

A.
Event Viewer
A.
Event Viewer
Answers
B.
System Configuration
B.
System Configuration
Answers
C.
Device Manager
C.
Device Manager
Answers
D.
Performance Monitor
D.
Performance Monitor
Answers
Suggested answer: A

Explanation:

Event Viewer is a Microsoft tool that records and displays system events, errors, warnings, and information. Event Viewer can help troubleshoot and diagnose problems, such as unexpected shutdowns, by showing the details of what happened before, during, and after the incident. Event Viewer can also show the source of the event, such as an application, a service, a driver, or a hardware device. By using Event Viewer, a technician can identify the root cause of the unexpected shutdown, such as a power failure, a thermal event, a driver conflict, or a malware infection.

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

A.
Fingerprint and pattern
A.
Fingerprint and pattern
Answers
B.
Facial recognition and PIN code
B.
Facial recognition and PIN code
Answers
C.
Primary account and password
C.
Primary account and password
Answers
D.
Recovery contact and recovery key
D.
Recovery contact and recovery key
Answers
Suggested answer: D

Explanation:

If a user's iPhone is permanently locked after several failed log-in attempts, the user will need to use the recovery contact and recovery key to restore access, applications, and data to the device. The recovery contact is a trusted person who can receive a verification code from Apple and share it with the user. The recovery key is a 28-character code that the user created when setting up two-factor authentication for their Apple ID. The user will need to enter both the verification code and the recovery key on another device or computer to unlock their iPhone.This method will erase the iPhone and restore it from the iCloud backup

A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.

Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?

A.
Uninstall the new program.
A.
Uninstall the new program.
Answers
B.
Check the HOSTS file.
B.
Check the HOSTS file.
Answers
C.
Restore from a previous backup.
C.
Restore from a previous backup.
Answers
D.
Clear the web browser cache.
D.
Clear the web browser cache.
Answers
Suggested answer: A

Explanation:

The symptoms that the user's Windows computer is experiencing suggest that the new software program that the user installed from an external website may be malicious or incompatible with the system. The program may be consuming a lot of CPU resources, slowing down the performance of other programs and files. The program may also be altering the browser settings or the HOSTS file, causing the web redirection to an unauthorized site. The first step that the technician should do is to uninstall the new program from the Control Panel or the Settings app, and then restart the computer. This may resolve the issue and restore the normal functionality of the computer.If the problem persists, the technician may need to perform additional steps, such as scanning for malware, checking the HOSTS file, clearing the web browser cache, or restoring from a previous backup

Which of the following should be documented to ensure that the change management plan is followed?

A.
Scope of the change
A.
Scope of the change
Answers
B.
Purpose of the change
B.
Purpose of the change
Answers
C.
Change rollback plan
C.
Change rollback plan
Answers
D.
Change risk analysis
D.
Change risk analysis
Answers
Suggested answer: A

Explanation:

The scope of the change is one of the elements that should be documented to ensure that the change management plan is followed. The scope of the change defines the boundaries and limitations of the change, such as what is included and excluded, what are the deliverables and outcomes, what are the assumptions and constraints, and what are the dependencies and risks. The scope of the change helps to clarify the expectations and objectives of the change, as well as to prevent scope creep or deviation from the original plan.The scope of the change also helps to measure the progress and success of the change, as well as to communicate the change to the stakeholders and the team

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.
Password and PIN
A.
Password and PIN
Answers
B.
Password and swipe
B.
Password and swipe
Answers
C.
Fingerprint and password
C.
Fingerprint and password
Answers
D.
Swipe and PIN
D.
Swipe and PIN
Answers
Suggested answer: C

Explanation:

Mobile device multifactor authentication (MFA) is a method of verifying a user's identity by requiring two or more factors, such as something the user knows (e.g., password, PIN, security question), something the user has (e.g., smartphone, OTP app, security key), or something the user is (e.g., fingerprint, face, iris)12. The combination of fingerprint and password meets the requirements for mobile device MFA because it uses two different factors: something the user is (fingerprint) and something the user knows (password). The other combinations do not meet the requirements because they use only one factor: something the user knows (password or PIN) or something the user does (swipe).

Reference 1: Set up the Microsoft Authenticator app as your verification method 2: What is Multi-Factor Authentication (MFA)? | OneLogin

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

A.
Professional
A.
Professional
Answers
B.
Home
B.
Home
Answers
C.
Enterprise
C.
Enterprise
Answers
D.
Embedded
D.
Embedded
Answers
Suggested answer: A

Explanation:

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1.BitLocker is available on supported devices running Windows 10 or 11 Pro, Enterprise, or Education2.Windows 10 Home does not support BitLocker3, and Windows 10 Embedded is designed for specialized devices and does not offer BitLocker as a feature4. Therefore, the most appropriate Windows 10 edition for a single user who wants to encrypt a hard drive with BitLocker is Professional.

Reference 1: BitLocker overview - Windows Security | Microsoft Learn 2: Device encryption in Windows - Microsoft Support 3: Can You Turn on BitLocker on Windows 10 Home? 4: How to enable device encryption on Windows 10 Home

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.
Configure the firewall.
A.
Configure the firewall.
Answers
B.
Restore the system from backups.
B.
Restore the system from backups.
Answers
C.
Educate the end user
C.
Educate the end user
Answers
D.
Update the antivirus program.
D.
Update the antivirus program.
Answers
Suggested answer: C

Explanation:

Malware is software that infects computer systems to damage, disable or exploit the computer or network for various malicious purposes5.Malware is typically distributed via email attachments, fake internet ads, infected applications or websites, and often relies on user interaction to execute6.Therefore, one of the most effective ways to prevent malware infections is to educate the end user about the common signs and sources of malware, and how to avoid them7. Configuring the firewall, restoring the system from backups, and updating the antivirus program are also important security measures, but they do not address the root cause of the user's repeated infections, which is likely due to a lack of awareness or caution.

Reference 5: Malware: what it is, how it works, and how to stop it - Norton 6: How to Prevent Malware: 15 Best Practices for Malware Prevention 7: 10 Security Tips for How to Prevent Malware Infections - Netwrix

Total 755 questions
Go to page: of 76