ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

Related questions











A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

A.
OS compatibility
A.
OS compatibility
Answers
B.
Quality of service
B.
Quality of service
Answers
C.
32- vs. 64-bit architecture
C.
32- vs. 64-bit architecture
Answers
D.
Storage requirements
D.
Storage requirements
Answers
Suggested answer: B

Explanation:

The performance degradation following the launch of a new external web server suggests that Quality of Service (QoS) considerations were overlooked. QoS settings help prioritize traffic to ensure that critical services like web servers receive the bandwidth they need without negatively impacting the overall network performance. Without proper QoS configuration, the new server's traffic could overwhelm the firewall, leading to widespread performance issues.

Which of the following macOS file types requires mounting before installation?

A.
.pkg
A.
.pkg
Answers
B.
.zip
B.
.zip
Answers
C.
.app
C.
.app
Answers
D.
.dmg
D.
.dmg
Answers
Suggested answer: D

Explanation:

The .dmg file type in macOS requires mounting before installation. .dmg files are disk image files used to distribute software on macOS. When opened, they mount a virtual disk on the desktop, from which the application can be installed. Other file types like .pkg, .zip, and .app have different processes for installation and do not require mounting in the same way.

A technician needs to configure security settings on a Windows 10 workstation. Which of the following should the technician configure to limit password attempts?

A.
Account Lockout Policy
A.
Account Lockout Policy
Answers
B.
User Access Control
B.
User Access Control
Answers
C.
System Protection
C.
System Protection
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: A

Explanation:

Configuring the Account Lockout Policy in Windows 10 is the appropriate action to limit password attempts. This security setting determines the number of failed login attempts that will trigger a lockout, preventing unauthorized access due to repeated password guessing. It is an effective measure to enhance security by deterring brute-force attacks.


A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

A.
Spam filtering
A.
Spam filtering
Answers
B.
Malware prevention software
B.
Malware prevention software
Answers
C.
End user education
C.
End user education
Answers
D.
Stateful firewall inspection
D.
Stateful firewall inspection
Answers
Suggested answer: C

Explanation:

To prevent ransomware attacks via email, the most effective way is End user education (C). Educating users about the dangers of phishing emails, how to recognize suspicious emails, and the importance of not clicking on unknown links or attachments can significantly reduce the risk of ransomware infections. Awareness and training can empower users to act as the first line of defense against such cyber threats

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

A.
Reviewing System Information
A.
Reviewing System Information
Answers
B.
Running Disk Cleanup
B.
Running Disk Cleanup
Answers
C.
Editing the Registry
C.
Editing the Registry
Answers
D.
Checking the Performance Monitor
D.
Checking the Performance Monitor
Answers
E.
Increasing the memory
E.
Increasing the memory
Answers
Suggested answer: B

An administrator needs to back up the following components of a single workstation:

* The installation of the operating system

* Applications

* User profiles

* System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

A.
Differential
A.
Differential
Answers
B.
Image
B.
Image
Answers
C.
Synthetic
C.
Synthetic
Answers
D.
Archive
D.
Archive
Answers
Suggested answer: B

Explanation:

An image backup captures a complete snapshot of the entire system at a specific point in time, including the operating system, installed applications, user profiles, and system settings. This method is most suitable for backing up the components listed in the question because it ensures that every aspect of the workstation, from the core OS to individual user settings, is preserved and can be restored in its entirety. This is crucial for quickly recovering a system to a fully operational state after a failure or when migrating to new hardware. Other methods like differential, synthetic, and archive backups do not provide the comprehensive one-step restoration capability that an image backup offers for the complete system recovery.

A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which of the following is the best solution?

A.
Windows Backup
A.
Windows Backup
Answers
B.
BitLocker
B.
BitLocker
Answers
C.
Shadow Copy
C.
Shadow Copy
Answers
D.
Trusted Platform Module
D.
Trusted Platform Module
Answers
Suggested answer: B

Explanation:

BitLocker is a full-disk encryption feature included with Windows Vista and later. It is designed to protect data by providing encryption for entire volumes. By encrypting the hard drive, BitLocker prevents unauthorized access to the data stored on the drive, securing it in case the laptop is lost or stolen. BitLocker is preferable over options like Windows Backup (which is for data recovery, not encryption), Shadow Copy (used for backup and does not encrypt data), and Trusted Platform Module (TPM, which is a hardware component used alongside BitLocker for securing encryption keys).

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

* The install phase must be scripted to run over the network * Each computer requires a new SSD as the system drive, * The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

A.
net use
A.
net use
Answers
B.
robocopy
B.
robocopy
Answers
C.
winver
C.
winver
Answers
D.
diskpart
D.
diskpart
Answers
E.
sfc
E.
sfc
Answers
F.
r.etstat
F.
r.etstat
Answers
G.
ping
G.
ping
Answers
H.
chkdsk
H.
chkdsk
Answers
Suggested answer: A, B, D

Explanation:

For scripted network installations requiring new SSDs and keeping HDDs as backup, the necessary tools are: 'net use' to connect to network shares, 'robocopy' to copy files efficiently from the network share to the local drive, and 'diskpart' to manage disk partitions, including initializing and formatting the new SSD. The other options are not relevant to the installation process as described.

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

A.
Move the application to the desktop and press delete
A.
Move the application to the desktop and press delete
Answers
B.
Identify the application in Finder and drag it to the trash can.
B.
Identify the application in Finder and drag it to the trash can.
Answers
C.
Use Spotlight to search for the application, and then run the application.
C.
Use Spotlight to search for the application, and then run the application.
Answers
D.
Use Time Machine to go back to the date before the installation.
D.
Use Time Machine to go back to the date before the installation.
Answers
Suggested answer: B

Explanation:

On macOS, uninstalling an application typically involves locating the app in Finder and dragging it to the Trash. This method is straightforward and commonly used for removing unwanted applications. The other options do not directly relate to the standard process of uninstalling applications on a Mac.

Which of the following commands lists running processes in Linux?

A.
top
A.
top
Answers
B.
apt-get
B.
apt-get
Answers
C.
Is
C.
Is
Answers
D.
cat
D.
cat
Answers
Suggested answer: A

Explanation:

The 'top' command in Linux is used to display the running processes along with information about system resources like CPU and memory usage. It provides a real-time view of the system's resource consumption, making it an essential tool for monitoring and managing system performance.

Total 755 questions
Go to page: of 76