ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 60

Question list
Search
Search

List of questions

Search

Related questions











An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first'?

A.
Wi-Fi
A.
Wi-Fi
Answers
B.
iCloud
B.
iCloud
Answers
C.
Antivirus
C.
Antivirus
Answers
D.
AirDrop
D.
AirDrop
Answers
Suggested answer: D

Which of the following features can a technician use to ensure users are following password length requirements?

A.
Group Policy
A.
Group Policy
Answers
B.
Log-on script
B.
Log-on script
Answers
C.
Access control list
C.
Access control list
Answers
D.
Security groups
D.
Security groups
Answers
Suggested answer: A

Explanation:

Group Policy is a feature in Windows that allows network administrators to manage and configure operating system, application settings, and user settings in an Active Directory environment. It can enforce password policies across the network, including password length requirements, making it the best tool for ensuring compliance with security policies.

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

A.
VDI
A.
VDI
Answers
B.
Mapped drives
B.
Mapped drives
Answers
C.
Wireless WAN
C.
Wireless WAN
Answers
D.
Domain
D.
Domain
Answers
Suggested answer: B

Explanation:

In a Small Office/Home Office (SOHO) setup, the technician is most likely to configure mapped drives on a new PC. Mapped drives allow for easy access to shared resources such as files and printers on the network. This setup facilitates file sharing and collaboration within a small network, making it an essential configuration for SOHO environments.

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

A.
System screen lock
A.
System screen lock
Answers
B.
Failed log-in lockout
B.
Failed log-in lockout
Answers
C.
Restricted user permissions
C.
Restricted user permissions
Answers
D.
Data-at-rest encryption
D.
Data-at-rest encryption
Answers
Suggested answer: B

Explanation:

To mitigate brute-force attacks, implementing a failed log-in lockout feature is effective. This security measure temporarily disables user accounts after a specified number of unsuccessful login attempts, preventing attackers from continuously trying different password combinations to gain unauthorized access.

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

A.
Acceptable use policy
A.
Acceptable use policy
Answers
B.
Incident report
B.
Incident report
Answers
C.
End user license agreement
C.
End user license agreement
Answers
D.
Standard operating procedures
D.
Standard operating procedures
Answers
Suggested answer: B

Explanation:

After successfully mitigating a malicious event caused by an infected email, the final step before considering the event closed is to complete an incident report. This document should detail the nature of the incident, the steps taken to resolve it, and any lessons learned to improve future responses to similar threats.

Which of the following best describes a rollback plan?

A.
A developer configures a process to return to the starting state upon completion.
A.
A developer configures a process to return to the starting state upon completion.
Answers
B.
A user asks to remove an unneeded fileshare.
B.
A user asks to remove an unneeded fileshare.
Answers
C.
An administrator applies new settings to a computer after the previous settings failed.
C.
An administrator applies new settings to a computer after the previous settings failed.
Answers
D.
A technician reverts the system to a previous state following a failed upgrade.
D.
A technician reverts the system to a previous state following a failed upgrade.
Answers
Suggested answer: D

Explanation:

A rollback plan describes the process of reverting a system to its previous state after a failed upgrade or change. This ensures system stability and functionality by restoring known good configurations and is a crucial part of change management to minimize disruptions in case of unsuccessful updates.

While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning Which of the following steps should a technician take next? (Select two).

A.
Isolate the computer from the network
A.
Isolate the computer from the network
Answers
B.
Enable the firewall service.
B.
Enable the firewall service.
Answers
C.
Update the endpoint protection software
C.
Update the endpoint protection software
Answers
D.
Use System Restore to undo changes.
D.
Use System Restore to undo changes.
Answers
E.
Delete the browser cookies
E.
Delete the browser cookies
Answers
F.
Run sfc /scannow.
F.
Run sfc /scannow.
Answers
Suggested answer: A

Explanation:

When encountering a warning about antivirus protection malfunctioning, the first step should be to isolate the computer from the network to prevent potential spread of malware. Updating the endpoint protection software is also crucial to ensure the latest virus definitions and security features are in place to effectively identify and remove the threat.

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

A.
Request physical media
A.
Request physical media
Answers
B.
Mount the ISO file.
B.
Mount the ISO file.
Answers
C.
Install a third-party software.
C.
Install a third-party software.
Answers
D.
Download an appropriate 32-bit/64-bit OS file.
D.
Download an appropriate 32-bit/64-bit OS file.
Answers
Suggested answer: B

Explanation:

If a technician is unable to run an OS installation file and receives a message indicating no software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

A.
Screen share
A.
Screen share
Answers
B.
MSRA
B.
MSRA
Answers
C.
Virtual network computer
C.
Virtual network computer
Answers
D.
RDP
D.
RDP
Answers
Suggested answer: B

Explanation:

To troubleshoot a user's computer remotely while the user is connected, the best option is Microsoft Remote Assistance (MSRA). MSRA allows the technician to view and control the user's screen with their permission, facilitating an effective troubleshooting session without disconnecting the user.

A technician needs to update the software on several hundred Mac laptops. Which of the following is the best method to complete the task?

A.
SSH
A.
SSH
Answers
B.
MDM
B.
MDM
Answers
C.
RDP
C.
RDP
Answers
D.
SFTP
D.
SFTP
Answers
Suggested answer: B

Explanation:

For updating software on several hundred Mac laptops, the best method is Mobile Device Management (MDM). MDM solutions allow administrators to remotely manage and update software across multiple devices efficiently, making it an ideal choice for handling software updates on a large scale.

Total 755 questions
Go to page: of 76