ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 56

Question list
Search
Search

List of questions

Search

Related questions











A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

A.
Degaussing
A.
Degaussing
Answers
B.
Shredding
B.
Shredding
Answers
C.
Erasing
C.
Erasing
Answers
D.
Drilling
D.
Drilling
Answers
Suggested answer: B

Explanation:

For securely disposing of SSDs, physical destruction methods like shredding are considered most effective:

Shredding: This method involves physically breaking the SSD into small pieces, making data recovery practically impossible. It's a recommended practice for ensuring that sensitive data on SSDs is irretrievably destroyed.

Which of the following combinations meets the requirements for mobile device multifactor authentication?

A.
Password and PIN
A.
Password and PIN
Answers
B.
Password and swipe
B.
Password and swipe
Answers
C.
Fingerprint and password
C.
Fingerprint and password
Answers
D.
Swipe and PIN
D.
Swipe and PIN
Answers
Suggested answer: C

Explanation:

Multifactor authentication (MFA) requires the use of two or more verification factors to gain access to a resource such as an application, online account, or a VPN. The factors are categorized into something you know (like a password or PIN), something you have (like a security token or a smartphone), and something you are (like a biometric verification such as a fingerprint).

Fingerprint and password: This combination meets the criteria for MFA as it uses two different categories of authentication factors: 'something you are' (fingerprint) and 'something you know' (password). This enhances security by combining two distinct methods of authentication.

Other combinations mentioned:

Password and PIN: Both of these factors fall under the same category of 'something you know,' and hence, do not constitute multifactor authentication.

Password and swipe: Swiping a pattern is similar to a password in that it is something you know, so this does not qualify as multifactor authentication.

Swipe and PIN: Again, both of these are 'something you know' and do not qualify as multifactor authentication since they fall under the same category.

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

A.
Trojan
A.
Trojan
Answers
B.
Boot sector virus
B.
Boot sector virus
Answers
C.
Spyware
C.
Spyware
Answers
D.
Rootkit
D.
Rootkit
Answers
Suggested answer: B

Explanation:

A boot sector virus infects the master boot record (MBR) of a hard drive, the sector that contains information required to start the operating system after the computer is turned on. This type of virus is particularly insidious because it loads into memory immediately upon booting and before most antivirus programs start. This makes it possible for the virus to evade detection and removal, and can easily reinfect a system even after the operating system is reinstalled if the boot sector is not cleaned.

Boot sector virus: Given that the malware infection returned after the OS reinstallation, it's likely that the virus was not removed from the boot sector during the reinstallation process. Reinstalling the OS without cleaning the boot sector won't remove the infection, allowing the virus to continue to affect the system.

Other options:

Trojan: A Trojan is a type of malware that disguises itself as legitimate software. While Trojans can be persistent, the reinstallation of the OS should remove any Trojans unless they are reintroduced after installation.

Spyware: Spyware is designed to gather information about a person or organization without their knowledge. Like Trojans, spyware should be removed with an OS reinstallation unless it is reintroduced in some way.

Rootkit: Rootkits are designed to enable continued privileged access to a computer while actively hiding their presence. While a rootkit could potentially survive an OS reinstall if it infects the firmware or certain areas outside the OS, the scenario described points more specifically to a boot sector virus, especially considering the immediate return of the infection after OS reinstallation.

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

A.
Windows 10
A.
Windows 10
Answers
B.
macOS
B.
macOS
Answers
C.
Linux
C.
Linux
Answers
D.
Chrome OS
D.
Chrome OS
Answers
E.
iOS
E.
iOS
Answers
Suggested answer: C

Explanation:

Linux is known for its high degree of customizability and flexibility, making it an ideal choice for organizations looking to deploy a customizable operating system. Unlike proprietary operating systems, Linux allows users to modify or replace almost any part of the system, from the kernel to the desktop environment and applications, to suit their specific needs.

Linux: This open-source operating system provides access to the source code, enabling extensive customization. Organizations can tailor Linux distributions to fit specific requirements, making it a popular choice for servers, specialized workstation environments, and embedded systems.

Windows 10 (A) and macOS (B) offer some level of customization but are more restricted due to their proprietary nature. Chrome OS (D) is designed for simplicity and security, focusing on web applications, which limits deep system-level customizations. iOS (E) is designed for Apple's mobile devices and is not applicable for organizational deployment beyond mobile and tablet devices; it also offers limited customization compared to Linux.

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

A.
Cross-site scripting
A.
Cross-site scripting
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Brute-force attack
C.
Brute-force attack
Answers
D.
DDoS attack
D.
DDoS attack
Answers
Suggested answer: B

Explanation:

SQL injection is a type of attack that takes advantage of vulnerabilities in a web application's database query software, allowing an attacker to send malicious SQL commands through the application to the database. These commands can manipulate the database and can lead to unauthorized data access or manipulation.

SQL injection: In the scenario described, the malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website, which is a classic example of an SQL injection attack. This type of attack exploits vulnerabilities in the database layer of an application to execute unauthorized SQL commands.

Cross-site scripting (A) involves injecting malicious scripts into content from otherwise trusted websites. A brute-force attack (C) is an attempt to gain access to a system by systematically checking all possible keys or passwords until the correct one is found. A DDoS attack (D) is an attempt to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

A.
Internal antenna connections
A.
Internal antenna connections
Answers
B.
Static IP settings
B.
Static IP settings
Answers
C.
Airplane mode
C.
Airplane mode
Answers
D.
Digitizer calibration
D.
Digitizer calibration
Answers
Suggested answer: A

Explanation:

Given that the smartphone's screen was recently repaired and now experiences issues with Wi-Fi connectivity, despite showing that it is connected to a network, the problem could be related to the internal antenna connections that might have been disturbed or disconnected during the repair process.

Internal Antenna Connections: Smartphones use internal antennas for Wi-Fi and cellular connections. If these antennas are not properly connected, the device may show as connected to a Wi-Fi network but fail to transmit data effectively, resulting in no internet access.

Checking static IP settings (B) would be relevant if the device were not obtaining an IP address at all, but the device does have an IP address. Airplane mode (C) would prevent the device from connecting to Wi-Fi networks entirely. Digitizer calibration (D) is related to the touchscreen functionality and would not affect Wi-Fi connectivity.

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?

A.
Family Options
A.
Family Options
Answers
B.
Update & Security
B.
Update & Security
Answers
C.
Ease of Access
C.
Ease of Access
Answers
D.
Network & Internet
D.
Network & Internet
Answers
E.
Privacy
E.
Privacy
Answers
Suggested answer: A

Explanation:

Windows 10 includes a set of parental controls within the 'Family Options' section of the Windows settings. This feature allows parents to manage their children's computing activities, including setting time limits on device use, filtering web content, managing privacy and online safety settings, and viewing activity reports.

Family Options: By enabling and configuring Family Options, the user can set specific times when their children can use the device and access the internet, effectively limiting their overall screen time and internet usage.

Update & Security (B) mainly deals with Windows updates and security features but does not directly provide settings for time management. Ease of Access (C) is focused on accessibility settings and does not include time management options. Network & Internet (D) settings control network connectivity and do not offer parental controls or time limits. Privacy (E) settings manage which applications can access device features and user data but do not include time management options.

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

A.
DNS settings
A.
DNS settings
Answers
B.
Static IP
B.
Static IP
Answers
C.
WWAN
C.
WWAN
Answers
D.
Metered connection
D.
Metered connection
Answers
Suggested answer: B

Explanation:

Configuring a static IP address for a network printer in a SOHO (Small Office/Home Office) environment ensures that the printer maintains the same IP address over time. This consistency is crucial for networked devices like printers, as computers and other devices rely on this specific address to connect to the printer. If the printer's IP address were to change (as it might with DHCP), devices would no longer be able to communicate with it without reconfiguration.

Static IP: Assigning a static IP address to the printer ensures it always uses the same IP, making it reliably accessible to all computers in the house regardless of network changes or router reboots.

DNS settings (A) are generally not necessary to configure directly on most network printers unless you're dealing with advanced network configurations or using the printer for scanning to email functions. WWAN (C) stands for Wireless Wide Area Network, which is not typically relevant for a standard network printer setup in a home or small office. Metered connection (D) is a Windows feature that helps reduce data usage on a connection, it's not relevant to configuring a printer's network settings.

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

A.
Action Center
A.
Action Center
Answers
B.
Task Manager
B.
Task Manager
Answers
C.
Resource Monitor
C.
Resource Monitor
Answers
D.
Security Configuration Wizard
D.
Security Configuration Wizard
Answers
E.
Event Viewer
E.
Event Viewer
Answers
Suggested answer: B

Explanation:

When a computer is running slower than usual and experiences long startup times, the first tool to use is:

Task Manager: This utility provides real-time data on the processes and applications consuming system resources like CPU, memory, and disk usage. By identifying resource-heavy processes, a technician can take steps to optimize performance or identify malicious software.

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

A.
Configure MAC filtering.
A.
Configure MAC filtering.
Answers
B.
Disable DHCP.
B.
Disable DHCP.
Answers
C.
Configure port forwarding.
C.
Configure port forwarding.
Answers
D.
Disable guest access.
D.
Disable guest access.
Answers
Suggested answer: A

Explanation:

For a SOHO (Small Office/Home Office) router setup where the goal is to only allow specific computers on the network, MAC filtering is the appropriate solution:

Configure MAC filtering: This security measure involves creating a list of allowed device MAC (Media Access Control) addresses in the router's settings. Only devices with MAC addresses on this list will be able to connect to the network, effectively restricting access to authorized computers only.

Total 755 questions
Go to page: of 76