ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

Related questions











An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

A.
Degauss
A.
Degauss
Answers
B.
Delete
B.
Delete
Answers
C.
Incinerate
C.
Incinerate
Answers
D.
Recycle
D.
Recycle
Answers
E.
Format
E.
Format
Answers
F.
Shred
F.
Shred
Answers
Suggested answer: C, F

Explanation:

Disposing of SSDs (Solid State Drives) containing sensitive data requires methods that ensure the data cannot be recovered. SSDs store data on flash memory, which makes traditional data destruction methods like degaussing ineffective, as degaussing relies on demagnetizing the magnetic media found in traditional hard drives.

Incineration: This method ensures the complete destruction of the SSD by burning it at high temperatures. This process is effective as it physically destroys the flash memory chips, making data recovery impossible.

Shredding: Shredding involves physically breaking the SSD into small pieces. Specialized shredding machines designed for electronic media can cut the SSD into pieces small enough to render the data unrecoverable.

Other listed options such as Degaussing (A) is ineffective on SSDs because they don't use magnetic storage. Simple Deletion (B) and Formatting (E) are not secure methods for data destruction as the data can potentially be recovered using specialized software. Recycling (D) is environmentally friendly but does not guarantee data destruction if the drive is not physically destroyed first.

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/Port Action Direction

1 Allow Out

445 Block Out

53 Block Out

123 Block Out

80 Block Out

Which of the following ports should be opened to allow for DNS recursion?

A.
1
A.
1
Answers
B.
53
B.
53
Answers
C.
80
C.
80
Answers
D.
123
D.
123
Answers
E.
445
E.
445
Answers
Suggested answer: B

Explanation:

DNS (Domain Name System) lookups are essential for translating human-friendly domain names into IP addresses that computers use to communicate. DNS typically uses port 53 for its communication.

In the provided firewall output, various ports are either allowed or blocked for outgoing traffic. For DNS recursion, which is the process of resolving domain names to IP addresses, port 53 must be open.

Port 53: This is the standard port used by DNS for queries and responses. The fact that it is currently blocked (as per the firewall output) is the reason why DNS lookups are failing. Opening port 53 will allow the DNS requests to pass through the firewall, enabling the resolution of domain names to IP addresses.

Other ports mentioned in the output are used for different services and protocols:

Port 1 is generally not used for standard services.

Port 445 is associated with SMB (Server Message Block) for file sharing in Windows environments.

Port 123 is used by NTP (Network Time Protocol) for time synchronization.

Port 80 is used for HTTP traffic, which is web traffic but not related to DNS lookups.

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

A.
Application permissions
A.
Application permissions
Answers
B.
Available storage space
B.
Available storage space
Answers
C.
Battery charge level
C.
Battery charge level
Answers
D.
Wi-Fi connection speed
D.
Wi-Fi connection speed
Answers
Suggested answer: B

Explanation:

When a smartphone is unable to download and install the latest OS update and is operating slower than expected, one of the first things to check is the available storage space. Operating system updates often require a significant amount of free space for downloading and installing, and insufficient space can prevent the update process from initiating or completing.

Available Storage Space: Smartphones use their internal storage to hold the OS, apps, user data, and temporary files needed for updates. If the storage is nearly full, the device can slow down due to the lack of space for writing temporary files and may not have enough space to download and install updates. Clearing up space can resolve these issues.

Checking application permissions (A) might be relevant for specific app-related issues but is less likely to affect OS updates. The battery charge level (C) can affect the initiation of an update, as some devices require a minimum charge level to start the update process, but it doesn't typically cause slow operation. While a stable Wi-Fi connection (D) is necessary for downloading updates, it's less likely to be the cause of slowed operation and update issues compared to insufficient storage space.:

Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?

A.
Authenticator application
A.
Authenticator application
Answers
B.
Access control lists
B.
Access control lists
Answers
C.
Biometrics
C.
Biometrics
Answers
D.
Smart card readers
D.
Smart card readers
Answers
Suggested answer: A

Explanation:

Authenticator applications are designed to enhance security by generating temporary, time-sensitive passcodes used in two-factor authentication (2FA) processes. These passcodes are used in conjunction with traditional credentials (like usernames and passwords) to grant access to systems or applications. This extra layer of security ensures that even if primary login credentials are compromised, unauthorized access is still prevented without the dynamically generated code from the authenticator app.

A technician receives a high-priority ticket about sensitive information collected from an end user's workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

A.
Reimage the workstation.
A.
Reimage the workstation.
Answers
B.
Inform the user of the investigation.
B.
Inform the user of the investigation.
Answers
C.
Recover and secure the workstation.
C.
Recover and secure the workstation.
Answers
D.
Back up the workstation
D.
Back up the workstation
Answers
Suggested answer: C

Explanation:

In the context of a forensic investigation, especially involving sensitive information, preserving the integrity and the chain of custody of the potential evidence is crucial. The step to 'Recover and secure the workstation' involves physically securing the workstation to prevent any unauthorized access and logically securing the data by ensuring that no changes are made to the system or files. This step helps maintain the original state of the workstation, which is essential for a legitimate forensic analysis and ensuring that the evidence is admissible in legal proceedings.

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

A.
Network & Internet
A.
Network & Internet
Answers
B.
System
B.
System
Answers
C.
Personalization
C.
Personalization
Answers
D.
Accounts
D.
Accounts
Answers
Suggested answer: A

Explanation:

In Windows 10, the 'Network & Internet' settings category is where users can manage all network-related configurations, including Wi-Fi connections. To connect to a Wi-Fi network, users need to input the network's SSID (Service Set Identifier) and the corresponding password. This section allows users to view available networks, enter credentials for secure networks, and manage other network features such as airplane mode, VPN, and mobile hotspot settings.

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.
Windows
A.
Windows
Answers
B.
Chrome OS
B.
Chrome OS
Answers
C.
Android
C.
Android
Answers
D.
iOS
D.
iOS
Answers
Suggested answer: A

Explanation:

Windows is the most likely operating system to be used for running an inventory management system in a factory setting. This is due to Windows' widespread compatibility with various business applications, including those used for inventory management. Windows OS is known for its robustness, extensive support for enterprise-level software, and compatibility with a wide range of hardware, making it a preferred choice for industrial and manufacturing environments that require reliable and efficient management systems.

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

A.
ipr
A.
ipr
Answers
B.
Ispool
B.
Ispool
Answers
C.
Ipstat
C.
Ipstat
Answers
D.
Ipoptions
D.
Ipoptions
Answers
Suggested answer: A

Explanation:

In Linux, the lp command is used to manage print jobs, including setting the default printer. The lp command allows users to send print jobs to a printer queue, check the status of print jobs, and cancel print jobs, among other functionalities. By using options and parameters with the lp command, a technician can specify a particular printer as the default for future print jobs, ensuring that documents are routed to the correct printer without needing to specify it each time.

Which of the following Linux commands would help to identify which directory the user is currently operating in?

A.
pwd
A.
pwd
Answers
B.
dig
B.
dig
Answers
C.
find
C.
find
Answers
D.
cat
D.
cat
Answers
Suggested answer: A

Explanation:

The pwd command, which stands for 'print working directory,' is used in Linux and Unix-like operating systems to display the current directory in which the user is operating. This command outputs the full pathname of the current working directory, helping users to understand their current location in the filesystem hierarchy.

pwd: When executed, it provides the absolute path of the directory you're currently in, which is useful for navigation and scripting purposes.

Other options listed:

dig: This command is used for querying DNS name servers for information about host addresses, mail exchanges, name servers, and related information.

find: This command is used to search for files in a directory hierarchy based on specified criteria (such as name, modification date, size, etc.).

cat: Short for 'concatenate,' this command is used to read the contents of files and output them to the terminal.

A user's workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions should the user take to remove the virus?

A.
Enable the system firewall.
A.
Enable the system firewall.
Answers
B.
Use bootable antivirus media to scan the system.
B.
Use bootable antivirus media to scan the system.
Answers
C.
Download software designed to specifically target the virus.
C.
Download software designed to specifically target the virus.
Answers
D.
Run the operating system update process.
D.
Run the operating system update process.
Answers
Suggested answer: B

Explanation:

Using bootable antivirus media to scan the system is an effective method for removing a persistent virus. Booting from external antivirus media allows the system to scan for and remove malware without the infected operating system running, which can prevent the virus from hiding or resisting removal efforts that might occur within the active OS environment.

Total 755 questions
Go to page: of 76