ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 53

Question list
Search
Search

List of questions

Search

Related questions











A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

A.
The user is in a poor signal area.
A.
The user is in a poor signal area.
Answers
B.
The user has too many processes running.
B.
The user has too many processes running.
Answers
C.
The smartphone has malware on it.
C.
The smartphone has malware on it.
Answers
D.
The smartphone has been jailbroken.
D.
The smartphone has been jailbroken.
Answers
Suggested answer: B

Explanation:

One of the common reasons for a slow smartphone performance is having too many apps installed and running in the background. These apps consume the device's memory (RAM) and CPU resources, which can affect the speed and responsiveness of the phone. Rebooting the phone can temporarily clear the RAM and stop some background processes, but they may resume after a while. Connecting to a different network does not affect the performance of the phone, unless the network is congested or has a poor signal.The user can improve the phone's performance by uninstalling unused apps, clearing app caches, and restricting background activities12.Malware can also slow down a phone, but it is not the most likely cause in this scenario, as the user does not report any other symptoms of infection, such as pop-ups, battery drain, or data usage spikes3. Jailbreaking a phone can also affect its performance, but it is not a cause, rather a consequence, of the user's actions.Jailbreaking is the process of removing the manufacturer's restrictions on a phone, which allows the user to install unauthorized apps, customize the system, and access root privileges4.However, jailbreaking also exposes the phone to security risks, voids the warranty, and may cause instability or compatibility issues5.

Reference 1: Speed up a slow Android device - Android Help - Google Help 2: Why your phone slows down over time and what you can do to stop it | TechRadar 3: How to tell if your phone has a virus | Norton 4: What is Jailbreaking?- Definition from Techopedia 5: What is Jailbreaking an iPhone? - Lifewire



A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?

A.
c: \minutes
A.
c: \minutes
Answers
B.
dir
B.
dir
Answers
C.
rmdir
C.
rmdir
Answers
D.
md
D.
md
Answers
Suggested answer: D

Explanation:

The commandmdstands formake directoryand is used to create a new directory or folder in the current location. In this case, the technician can usemd minutesto create a folder named minutes in the C: drive. The other commands are not relevant for this task.c: \minutesis not a command but a path to a folder.diris used to display a list of files and folders in the current directory.rmdiris used to remove or delete an existing directory or folder.

A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?

A.
VNC
A.
VNC
Answers
B.
SSH
B.
SSH
Answers
C.
VPN
C.
VPN
Answers
D.
RMM
D.
RMM
Answers
Suggested answer: D

Explanation:

The best tool to use to assist the user with viewing the email isRMM, which stands forremote monitoring and management. This is a software that allows the technician to remotely access, monitor, and manage the user's computer and applications. The technician can use RMM to view the user's screen, control the mouse and keyboard, and troubleshoot the email issue. The other tools are not suitable for this task.VNCis a software that allows remote desktop sharing, but it requires the user to install and configure it on their computer, which may not be feasible or convenient.SSHis a protocol that allows secure remote access to a command-line interface, but it is not useful for viewing graphical applications such as email.VPNis a technology that creates a secure and encrypted connection over a public network, but it does not provide remote access or control of the user's computer.

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

A.
Ask the user for the model number of the hardware.
A.
Ask the user for the model number of the hardware.
Answers
B.
Offer a temporary replacement device to the user.
B.
Offer a temporary replacement device to the user.
Answers
C.
Submit the issue to the manufacturer.
C.
Submit the issue to the manufacturer.
Answers
D.
Remotely install updates to the device driver.
D.
Remotely install updates to the device driver.
Answers
Suggested answer: A

Explanation:

The first step in troubleshooting a hardware issue is to identify the hardware device that is causing the problem. Asking the user for the model number of the hardware can help the help desk technician to find the specifications, manuals, drivers, and other relevant information for the device. This can also help the technician to determine if the device is compatible with the user's system, if it has any known issues or defects, and if it is covered by warranty or support contract.Asking the user for the model number of the hardware is a help desk best practice that can save time and effort in resolving the issue

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

A.
USB
A.
USB
Answers
B.
PXE
B.
PXE
Answers
C.
Optical media
C.
Optical media
Answers
D.
Partition
D.
Partition
Answers
E.
Boot record
E.
Boot record
Answers
F.
SMB
F.
SMB
Answers
Suggested answer: A, C

Explanation:

A technician needs to reimage a desktop in an area without network access, which means that the technician cannot use network-based methods such as PXE or SMB to deploy the image. Therefore, the technician should use offline methods that involve removable media such as USB or optical media. USB and optical media are common ways to store and transfer system images, and they can be used to boot the desktop and initiate the reimaging process. The technician will need to create a bootable USB or optical media that contains the system image and the imaging software, and then insert it into the desktop and change the boot order in the BIOS or UEFI settings.The technician can then follow the instructions on the screen to reimage the desktop

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a 'low memory' warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

A.
Reimage the computer.
A.
Reimage the computer.
Answers
B.
Replace the system RAM.
B.
Replace the system RAM.
Answers
C.
Reinstall and update the failing software.
C.
Reinstall and update the failing software.
Answers
D.
Decrease the page file size.
D.
Decrease the page file size.
Answers
Suggested answer: C

Explanation:

The most likely cause of the intermittent crashes is that the proprietary software is incompatible, outdated, or corrupted. Reinstalling and updating the software can fix these issues and ensure the software runs smoothly. Reimaging the computer or replacing the system RAM are too drastic and unnecessary steps. Decreasing the page file size can worsen the low memory problem and affect the performance of other applications.

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.
Investigate the firewall logs.
A.
Investigate the firewall logs.
Answers
B.
Isolate the machine from the network.
B.
Isolate the machine from the network.
Answers
C.
Inspect the Windows Event Viewer.
C.
Inspect the Windows Event Viewer.
Answers
D.
Take a physical inventory of the device.
D.
Take a physical inventory of the device.
Answers
Suggested answer: B

Explanation:

Isolating the machine from the network is the best way to identify the source of the attack, because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating the machine can also help preserve the evidence of the attack, such as the malware files, the network connections, the registry entries, or the system logs. By isolating the machine, a technician can safely analyze the machine and determine the source of the attack, such as a phishing email, a compromised website, a removable media, or a network vulnerability.

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

A.
Content filter
A.
Content filter
Answers
B.
Screened subnet
B.
Screened subnet
Answers
C.
Port forwarding
C.
Port forwarding
Answers
D.
Access control list
D.
Access control list
Answers
Suggested answer: A

Explanation:

A content filter is a device or software that blocks or allows access to web pages based on predefined criteria, such as keywords, categories, or ratings. A content filter can also create a log of the blocked or allowed web requests, which can help the management team monitor and audit the web usage of their employees. A content filter is different from the other options because:

A screened subnet is a network segment that is protected by two firewalls, one facing the internet and one facing the internal network. A screened subnet can isolate servers or hosts that need to be accessed from both sides, such as a web server or a bastion host. A screened subnet does not filter web content based on predefined criteria, but rather on network addresses, ports, and protocols.

Port forwarding is a technique that allows a router to forward packets from one port to another port, usually on a different device. Port forwarding can enable remote access to services or applications that are hosted on a private network, such as a web server or a game server. Port forwarding does not filter web content based on predefined criteria, but rather on destination ports and addresses.

An access control list (ACL) is a set of rules that defines which packets are allowed or denied on a network device, such as a router or a firewall. An ACL can filter packets based on source and destination addresses, ports, protocols, and other criteria. An ACL can also create a log of the matched or unmatched packets, which can help the management team troubleshoot and secure their network. An ACL does not filter web content based on predefined criteria, but rather on packet headers and fields.

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

A.
Installing a VPN
A.
Installing a VPN
Answers
B.
Implementing location tracking
B.
Implementing location tracking
Answers
C.
Configuring remote wipe
C.
Configuring remote wipe
Answers
D.
Enabling backups
D.
Enabling backups
Answers
Suggested answer: C

Explanation:

Configuring remote wipe allows the device owner or administrator to erase all the data on the device remotely, in case it is lost or stolen. This prevents unauthorized access to confidential data and reduces the risk of data breaches. Installing a VPN, implementing location tracking, and enabling backups are useful features, but they do not directly limit the loss of data if the device is compromised.Reference:CompTIA A+ Certification Exam Core 2 Objectives, Domain 2.0: Security, Objective 2.5: Given a scenario, use methods to secure mobile devices.

Which of the following are mobile operating systems used on smartphones? (Select two).

A.
macOS
A.
macOS
Answers
B.
Windows
B.
Windows
Answers
C.
Chrome OS
C.
Chrome OS
Answers
D.
Linux
D.
Linux
Answers
E.
iOS
E.
iOS
Answers
F.
Android
F.
Android
Answers
Suggested answer: E, F

Explanation:

iOS and Android are the two most popular and widely used mobile operating systems for smartphones. They are both based on Unix-like kernels and provide a variety of features and applications for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as iPhones and iPads. Android is developed by Google and runs on a range of devices from different manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.

Total 755 questions
Go to page: of 76