ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 55

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

A.
Multifactor authentication
A.
Multifactor authentication
Answers
B.
Encryption
B.
Encryption
Answers
C.
Increased password complexity
C.
Increased password complexity
Answers
D.
Secure password vault
D.
Secure password vault
Answers
Suggested answer: A

Explanation:

Multifactor authentication (MFA) significantly enhances security by requiring two or more forms of verification before granting access to an account or system. This method is highly effective against brute-force attacks, where attackers attempt to guess a user's password through repeated trials. By implementing MFA, even if a password is compromised, unauthorized access is still prevented without the additional authentication factor(s), such as a code from a smartphone app, a fingerprint, or a physical security token.

Multifactor authentication: Provides an additional layer of security beyond just the password, making it much harder for attackers to gain unauthorized access through brute-force methods, as they would need to compromise more than one authentication factor.

Encryption (B) is crucial for protecting data at rest and in transit, but it does not directly prevent brute-force login attempts. Increased password complexity (C) can deter brute-force attacks by making passwords harder to guess, but it is not as effective as MFA in preventing access when passwords are compromised. A secure password vault (D) helps users manage and store their passwords securely, which can indirectly contribute to security by allowing users to keep more complex passwords, but it does not directly prevent brute-force attacks on accounts.

A company using Active Directory wants to change the location of all users' 'Documents' to a file server on the network. Which of the following should the company set up to accomplish this task?

A.
Security groups
A.
Security groups
Answers
B.
Folder redirection
B.
Folder redirection
Answers
C.
Organizational unit structure
C.
Organizational unit structure
Answers
D.
Access control list
D.
Access control list
Answers
Suggested answer: B

Explanation:

Folder redirection is a feature in Windows that allows administrators to change the default location of certain special folders within the user profile, such as the 'Documents' folder, to a different location, typically on a network server. This is commonly used in organizational environments to centralize file storage, simplify backups, and ensure data is stored on network drives with potentially more robust security measures and redundancy.

Folder redirection: By implementing folder redirection through Group Policy in Active Directory, a company can ensure that all users' 'Documents' folders are stored on a specified file server on the network, allowing for centralized management and backup of important user files.

Security groups (A) are used to manage user and computer access to shared resources, but they don't directly enable the relocation of user folders. Organizational unit structure (C) helps in managing and applying policies within Active Directory but is not directly related to the physical location of files. Access control lists (D) are used to define permissions for files and directories, but they do not govern where those files and directories should be located.

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

A.
Personal identification number
A.
Personal identification number
Answers
B.
Username/password
B.
Username/password
Answers
C.
One-time-use token
C.
One-time-use token
Answers
D.
Cryptographic device
D.
Cryptographic device
Answers
Suggested answer: A

Explanation:

Windows Hello is a biometric-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services, and networks with just a look or a touch. If users have difficulty using the facial recognition feature, Windows Hello also supports a Personal Identification Number (PIN) as a secondary feature for logging in. The PIN is tied to the specific device on which it is set up, adding a layer of security even if the PIN is obtained by someone else.

Personal identification number: The PIN serves as an alternative to the facial recognition feature, allowing users to quickly and securely access their devices without relying solely on biometric authentication.

Username/password (B) is the traditional method of authentication but is not specifically a secondary feature of Windows Hello. One-time-use token (C) and cryptographic device (D) could be part of an MFA setup but are not directly related to Windows Hello's alternate authentication options.

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

A.
Make office attendance mandatory for one day per week so that updates can be installed.
A.
Make office attendance mandatory for one day per week so that updates can be installed.
Answers
B.
Ask users to ensure that they run updates on devices and reboot computers on a regular basis.
B.
Ask users to ensure that they run updates on devices and reboot computers on a regular basis.
Answers
C.
Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.
C.
Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.
Answers
D.
Configure cloud-based endpoint management software to automatically manage computer updates.
D.
Configure cloud-based endpoint management software to automatically manage computer updates.
Answers
Suggested answer: D

Explanation:

For a company with geographically dispersed staff and the need to keep devices updated, using cloud-based endpoint management software is the most efficient method. This type of software allows IT administrators to remotely manage and push updates to company devices, regardless of their location. It ensures that all devices remain up to date with the latest security patches and software updates without requiring physical access or user intervention. This approach is scalable, reduces the risk of unpatched vulnerabilities, and is convenient for both the IT department and the end-users.

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

A.
Internet connection
A.
Internet connection
Answers
B.
Product key
B.
Product key
Answers
C.
Sufficient storage space
C.
Sufficient storage space
Answers
D.
UEFI firmware
D.
UEFI firmware
Answers
E.
Legacy BIOS
E.
Legacy BIOS
Answers
Suggested answer: C

Explanation:

Before starting a bare-metal installation of Windows 10, ensuring that there is sufficient storage space on the system's hard drive or SSD is crucial. This is because the installation files need enough room to be copied and for the operating system to be installed and function properly. Without adequate storage, the installation process can fail or the operating system might not perform optimally. Other prerequisites like internet connection, product key, and specific firmware types might be necessary at different stages of installation or activation, but the fundamental requirement is enough storage space to accommodate the new OS.

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

A.
Devices and Printers
A.
Devices and Printers
Answers
B.
Administrative Tools
B.
Administrative Tools
Answers
C.
Network and Sharing Center
C.
Network and Sharing Center
Answers
D.
Programs and Features
D.
Programs and Features
Answers
Suggested answer: C

Explanation:

The Network and Sharing Center in the Control Panel is the central place to manage network connections and settings in Windows. When facing issues with accessing a mapped drive, this utility allows users to review and adjust network settings, making it possible to resolve connectivity problems. It provides options to view network status, set up new connections, change adapter settings, and troubleshoot network problems, which can help in enabling connectivity to the mapped drive on the Windows XP machine.

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.
Examine the event logs
A.
Examine the event logs
Answers
B.
Connect to the network.
B.
Connect to the network.
Answers
C.
Document the findings.
C.
Document the findings.
Answers
D.
Update the definitions.
D.
Update the definitions.
Answers
E.
Reimage the computer.
E.
Reimage the computer.
Answers
F.
Enable the firewall.
F.
Enable the firewall.
Answers
Suggested answer: A, D

Explanation:

When a virus is suspected and an initial scan with Windows Defender does not reveal any infections, the next steps involve a deeper investigation into the system's activities and ensuring the antivirus software is fully equipped to detect threats.

Examine the event logs: This action involves checking the system's event logs to look for any suspicious activity or anomalies that could indicate malicious behavior. Event logs can provide detailed information about system events, including errors, warnings, and other significant occurrences, which might offer clues about the potential infection.

Update the definitions: Antivirus software relies on a database of definitions (signatures) to identify and neutralize threats. Regularly updating these definitions ensures that the software can recognize the latest viruses and malware. If the definitions are outdated, the software might not detect newer threats, making this step crucial in the troubleshooting process.

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

A.
Enable boot logging on the system.
A.
Enable boot logging on the system.
Answers
B.
Launch the last known-good configuration.
B.
Launch the last known-good configuration.
Answers
C.
Check the system resource usage in Task Manager.
C.
Check the system resource usage in Task Manager.
Answers
D.
Run the sfc /scannow command.
D.
Run the sfc /scannow command.
Answers
E.
Use the Event Viewer to open the application log
E.
Use the Event Viewer to open the application log
Answers
Suggested answer: A

Explanation:

When troubleshooting a Windows system that is experiencing issues during the OS loading phase at startup, enabling boot logging is a practical step. Boot logging creates a record of all drivers and services that are loaded (or attempted to be loaded) during the startup process. This record, typically named ntbtlog.txt, can be reviewed to identify any drivers or services that failed to load, which could be contributing to the startup issues. This diagnostic step helps pinpoint the problematic component(s) and facilitates targeted troubleshooting to resolve the OS loading issues.

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

A.
Uninstall the game application.
A.
Uninstall the game application.
Answers
B.
Perform a factory reset of the device.
B.
Perform a factory reset of the device.
Answers
C.
Connect the device to an external charger.
C.
Connect the device to an external charger.
Answers
D.
Install the latest security patches.
D.
Install the latest security patches.
Answers
E.
Clear the application's cache.
E.
Clear the application's cache.
Answers
F.
Enable the device's built-in anti-malware protection.
F.
Enable the device's built-in anti-malware protection.
Answers
Suggested answer: A, D

Explanation:

When an Android device starts exhibiting issues like frequent crashes and rapid battery drain after downloading an application, the first step should be to address the immediate cause:

Uninstall the game application: Since the issues started after the game application was installed, removing it is a logical first step. Unwanted or malicious applications can cause such symptoms by running harmful processes in the background or exploiting system resources.

Install the latest security patches: Keeping the device updated with the latest security patches is crucial for protecting against vulnerabilities that could be exploited by malicious software. Updating can resolve existing security flaws and improve device stability.

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

A.
Use System Restore to recover the OS files.
A.
Use System Restore to recover the OS files.
Answers
B.
Wipe the computer and install a new copy of the OS.
B.
Wipe the computer and install a new copy of the OS.
Answers
C.
Identify whether the disk partition table has been reduced in size.
C.
Identify whether the disk partition table has been reduced in size.
Answers
D.
Perform a full-system, antivirus scan and check browser notifications.
D.
Perform a full-system, antivirus scan and check browser notifications.
Answers
Suggested answer: D

Explanation:

For issues related to constant, unwanted pop-ups and browser window problems, a careful approach that minimizes impact to the user's data and productivity is advisable:

Perform a full-system, antivirus scan: This step involves using antivirus software to scan the entire system for malware or adware that might be causing the pop-ups and browser issues.

Check browser notifications: Some unwanted pop-ups may result from browser notification permissions inadvertently granted to malicious or spammy websites. Reviewing and adjusting these settings can help stop the pop-ups.

Total 755 questions
Go to page: of 76