ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

A.
Device
A.
Device
Answers
B.
Business
B.
Business
Answers
C.
Network
C.
Network
Answers
D.
Operation
D.
Operation
Answers
Suggested answer: B

Explanation:

The IT manager's caution regarding the new applications not having a detrimental effect on company finances points directly to concerns about the business impact. This encompasses potential costs associated with upgrading legacy systems, compatibility issues that might arise from running new applications on old infrastructure, and the risks of system downtime or reduced performance affecting business operations. The focus here is on ensuring that the integration of new applications into the legacy system does not incur unexpected expenses or disrupt critical business processes.

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

A.
Incremental backup
A.
Incremental backup
Answers
B.
System image
B.
System image
Answers
C.
System restore point
C.
System restore point
Answers
D.
Differential backup
D.
Differential backup
Answers
Suggested answer: B

Explanation:

A system image is a complete snapshot of everything on a device's storage at a given point in time, including the operating system, installed programs, system settings, and all user files. This method is the best way to back up the OS and data comprehensively because it allows for the restoration of a system to its exact state at the time the image was taken. This is particularly useful in disaster recovery scenarios where it's crucial to restore a system quickly and efficiently to minimize downtime.

A company wants to take advantage of modern technology and transition away from face-to-face meetings. Which of the following types of software would benefit the company the most? (Select two).

A.
Videoconferencing
A.
Videoconferencing
Answers
B.
File transfer
B.
File transfer
Answers
C.
Screen-sharing
C.
Screen-sharing
Answers
D.
Financial
D.
Financial
Answers
E.
Remote access
E.
Remote access
Answers
F.
Record-keeping
F.
Record-keeping
Answers
Suggested answer: A, C

Explanation:

For a company looking to transition away from face-to-face meetings, videoconferencing and screen-sharing software would be most beneficial.

Videoconferencing software allows participants to conduct virtual meetings with audio and video capabilities, effectively simulating a face-to-face interaction without the need for physical presence. This can greatly reduce travel costs and time while maintaining the personal touch of meetings.

Screen-sharing enables participants in a virtual meeting to view one another's computer screens in real time. This is particularly useful for presentations, collaborative work, and troubleshooting, as it allows for a more interactive and engaging meeting experience.

Both technologies support the company's goal of leveraging modern technology to enhance communication and collaboration while reducing reliance on physical meetings.

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

A.
Keys
A.
Keys
Answers
B.
Token
B.
Token
Answers
C.
Password
C.
Password
Answers
D.
RootCA
D.
RootCA
Answers
Suggested answer: A

Explanation:

When an email is encrypted and the recipient cannot open it, the issue typically revolves around the need for encryption keys. Encryption keys are used to encode and decode the email content, ensuring that only authorized recipients with the correct key can access the information. In this scenario, the user would need to receive the appropriate decryption key from the sender to unlock and read the encrypted email. This exchange ensures that sensitive information remains secure during transmission and is only accessible to intended recipients.

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

A.
Configure the firewall.
A.
Configure the firewall.
Answers
B.
Restore the system from backups.
B.
Restore the system from backups.
Answers
C.
Educate the end user.
C.
Educate the end user.
Answers
D.
Update the antivirus program.
D.
Update the antivirus program.
Answers
Suggested answer: C

Explanation:

When a computer keeps getting infected with malware despite multiple removals, it often indicates a gap in the user's understanding of safe computing practices. Educating the end user about the risks associated with unsafe internet browsing, downloading files from unreliable sources, and opening email attachments from unknown senders can significantly reduce the risk of future infections. Training should include best practices for password management, recognizing phishing attempts, and the importance of keeping software up to date. Empowering the user with this knowledge not only addresses the immediate issue but also contributes to the overall security posture of the organization.

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

A.
cat
A.
cat
Answers
B.
df
B.
df
Answers
C.
grep
C.
grep
Answers
D.
ps
D.
ps
Answers
E.
dig
E.
dig
Answers
F.
find
F.
find
Answers
G.
top
G.
top
Answers
Suggested answer: C, F

Explanation:

To locate a missing file with only a partial name known, the best tools to use in a Linux environment would be grep and find.

grep: This command is used to search the contents of files for a specific pattern. While grep itself might not be the first choice for finding file names, it can be combined with other commands (like ls or find) to search within file lists or contents.

find: This command is used to search for files in a directory hierarchy based on various criteria like name, size, modification date, etc. find can be used to search for files by partial name by using wildcards in the search pattern.

cat (A) is used to concatenate and display the content of files. df (B) displays the amount of disk space used and available on filesystems. ps (D) shows information about active processes. dig (E) is used for querying DNS name servers. top (G) displays Linux tasks and system performance information. None of these tools are directly suited for finding files by partial names.

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

A.
Replacing non-mobile users' laptops with wired desktop systems
A.
Replacing non-mobile users' laptops with wired desktop systems
Answers
B.
Increasing the wireless network adapter metric
B.
Increasing the wireless network adapter metric
Answers
C.
Adding wireless repeaters throughout the building
C.
Adding wireless repeaters throughout the building
Answers
D.
Upgrading the current mesh network to support the 802.11 n specification
D.
Upgrading the current mesh network to support the 802.11 n specification
Answers
Suggested answer: D

Explanation:

When a WAP (Wireless Access Point) mesh network is experiencing a higher than anticipated amount of traffic, leading to degraded network service, upgrading the network to a more advanced wireless standard can help alleviate the problem. The 802.11n specification, also known as Wireless-N, offers significant improvements over earlier standards like 802.11b/g in terms of speed, range, and reliability. It allows for increased data throughput and better coverage, which can support a higher number of wireless users effectively.

Upgrading to 802.11n: This involves replacing existing WAPs with those that support the 802.11n standard or higher. The upgrade can result in improved network performance by accommodating more wireless connections with higher data rates, reducing congestion and improving overall network efficiency.

Replacing non-mobile users' laptops with wired desktop systems (A) could reduce wireless traffic but may not be feasible or desirable for all users. Increasing the wireless network adapter metric (B) would affect route priority but not overall network capacity. Adding wireless repeaters (C) can extend the range but might also introduce additional latency and does not necessarily increase the network's capacity to handle more users efficiently.

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

A.
NDA
A.
NDA
Answers
B.
AUP
B.
AUP
Answers
C.
VPN
C.
VPN
Answers
D.
SOP
D.
SOP
Answers
Suggested answer: B

Explanation:

An AUP, or Acceptable Use Policy, is a set of rules applied by the owner, creator, or administrator of a network, website, or service that restricts the ways in which the network, website, or system may be used. In this scenario, the administrator is likely referring to the company's AUP, which outlines what employees can and cannot do on the company's network, including restrictions on accessing certain types of websites, such as sports teams' sites, for non-work-related purposes.

AUP (Acceptable Use Policy): This policy typically includes rules designed to maintain the security of the network, ensure the productivity of employees, and comply with legal regulations. Blocking access to specific websites is a common practice enforced through an AUP to align with these goals.

An NDA (Non-Disclosure Agreement) (A) is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties. A VPN (Virtual Private Network) (C) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. SOP (Standard Operating Procedures) (D) are a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations, which wouldn't typically include website access guidelines.

A technician wants to improve password security after several users admitted to using very simple passwords. Which of the following is the best way to resolve this issue?

A.
Requiring four character types
A.
Requiring four character types
Answers
B.
Decreasing the password expiration times
B.
Decreasing the password expiration times
Answers
C.
Enabling an automatic lock timer
C.
Enabling an automatic lock timer
Answers
D.
Adding two characters to the minimum password length
D.
Adding two characters to the minimum password length
Answers
Suggested answer: A

Explanation:

Improving password security is crucial to protect user accounts from unauthorized access. Requiring passwords to include four character types---uppercase letters, lowercase letters, numbers, and special characters---significantly enhances password complexity. This diversity in characters makes passwords much harder to guess or crack using common methods like brute force attacks, thereby improving overall security.

Requiring four character types: This approach forces users to create more complex and less predictable passwords, reducing the risk of simple passwords that are easy to exploit.

Decreasing the password expiration times (B) can encourage users to change their passwords more frequently but does not directly address the issue of password complexity. Enabling an automatic lock timer (C) can add a layer of security by locking accounts after a period of inactivity, but it does not improve the strength of the passwords themselves. Adding two characters to the minimum password length (D) can help to some extent by making passwords longer, but without requiring a mix of character types, passwords might still remain relatively easy to guess or crack.

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

A.
See the Explanation for the solution
A.
See the Explanation for the solution
Answers
Suggested answer: A

Explanation:

Host 2 and Media Server put them to Quarantine.


Total 755 questions
Go to page: of 76