ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 61

Question list
Search
Search

List of questions

Search

Related questions











A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?

A.
WPA3
A.
WPA3
Answers
B.
MFA
B.
MFA
Answers
C.
TACACS+
C.
TACACS+
Answers
D.
RADIUS
D.
RADIUS
Answers
Suggested answer: C

Explanation:

To implement a system that handles both authentication and authorization, TACACS+ (Terminal Access Controller Access-Control System Plus) is the best option. TACACS+ is a security protocol that provides centralized Authentication, Authorization, and Accounting (AAA) services for networked access control, meeting the requirement for both authentication and authorization management.

A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed. Which of the following tools should the technician use to correct the issue?

A.
devmgmt.msc
A.
devmgmt.msc
Answers
B.
cleanmgr.exe
B.
cleanmgr.exe
Answers
C.
dfrgui.exe
C.
dfrgui.exe
Answers
D.
diskmgmt.mac
D.
diskmgmt.mac
Answers
Suggested answer: B

Explanation:

The correct tool to use for removing upgrade files and freeing up disk space on a Windows desktop is cleanmgr.exe, which stands for Disk Cleanup. Disk Cleanup is a maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive. The utility scans and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. It can delete temporary files, system files, empty the Recycle Bin, and remove a variety of system files and other items that you might no longer need.

A network administrator is setting up the security for a SOHO wireless network. Which of the following options should the administrator enable to secure the network?

A.
NAT
A.
NAT
Answers
B.
WPA3
B.
WPA3
Answers
C.
802.1X
C.
802.1X
Answers
D.
Static IP
D.
Static IP
Answers
Suggested answer: B

Explanation:

To secure a SOHO wireless network, enabling WPA3 is the recommended option. WPA3 (Wi-Fi Protected Access 3) is the latest security certification program developed by the Wi-Fi Alliance to secure wireless computer networks. It provides cutting-edge security protocols and cryptographic methods to enhance and replace its predecessors, WPA2 and WPA, offering improved protection against brute-force attacks and ensuring better privacy on public networks.

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message 'Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

A.
The graphics card driver needs to be updated
A.
The graphics card driver needs to be updated
Answers
B.
The application installer is 64-bit.
B.
The application installer is 64-bit.
Answers
C.
The installation requires administrative rights.
C.
The installation requires administrative rights.
Answers
D.
The disk space is inadequate.
D.
The disk space is inadequate.
Answers
Suggested answer: C

Explanation:

The most likely reason for an error message stating 'Not compatible with OS' during a software installation is that the installation requires administrative rights. Many software installations, especially those that affect system files or install drivers, require administrative privileges to execute correctly. Without these rights, the installer cannot make the necessary changes to the system, leading to such error messages.

Which of the following operating systems were designed for smartphones? (Select two).

A.
Ubuntu
A.
Ubuntu
Answers
B.
CentOS
B.
CentOS
Answers
C.
macOS
C.
macOS
Answers
D.
Chrome OS
D.
Chrome OS
Answers
E.
iOS
E.
iOS
Answers
F.
Android
F.
Android
Answers
Suggested answer: E, F

Explanation:

The operating systems designed for smartphones include iOS and Android. iOS is developed by Apple Inc. for its iPhone range, while Android, developed by Google, is used across a variety of devices from different manufacturers. Both operating systems are specifically tailored to provide a mobile computing experience, with interfaces, applications, and functionalities designed for touchscreen input and mobile hardware.

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

A.
Release notes
A.
Release notes
Answers
B.
Antivirus software
B.
Antivirus software
Answers
C.
Backup of critical data
C.
Backup of critical data
Answers
D.
Device drivers
D.
Device drivers
Answers
E.
Word processing software
E.
Word processing software
Answers
F.
Safe boot mode
F.
Safe boot mode
Answers
Suggested answer: C, D

Explanation:

To safely upgrade the Microsoft Windows 10 OS, it is essential to backup critical data (C) and ensure that you have the necessary device drivers (D). Backing up critical data protects against potential data loss during the upgrade process. Having the correct device drivers ensures that the hardware components function properly with the new OS version, preventing issues like loss of functionality or compatibility problems.

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

A.
diskpart
A.
diskpart
Answers
B.
chown
B.
chown
Answers
C.
gpupdate
C.
gpupdate
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: C

Explanation:

To enforce a security policy that prohibits USB drives on user workstations, the network administrator should run the gpupdate (C) command. This command forces a Group Policy update, which can include policies to disable USB drives. Group Policy is a feature in Microsoft Windows that allows for centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.

A user's company phone has several pending software updates. A technician completes the following steps:

* Rebooted the phone

* Connected to Wi-Fi

* Disabled metered data

Which of the following should the technician do next?

A.
Restore the factory settings.
A.
Restore the factory settings.
Answers
B.
Clean the browser history.
B.
Clean the browser history.
Answers
C.
Uninstall and reinstall the applications.
C.
Uninstall and reinstall the applications.
Answers
D.
Clear the cache.
D.
Clear the cache.
Answers
Suggested answer: D

Explanation:

After rebooting the phone, connecting to Wi-Fi, and disabling metered data, the next step the technician should take is to Clear the cache (D). Clearing the cache can resolve issues with the phone's performance and is often necessary before updating software to ensure that the updates can be downloaded and installed without issues. It removes temporary files that may be interfering with the update process.

Which of the following operating systems was the app file type designed to run under as an application file bundle?

A.
macOS
A.
macOS
Answers
B.
Chrome
B.
Chrome
Answers
C.
Windows
C.
Windows
Answers
D.
Linux
D.
Linux
Answers
Suggested answer: A

Explanation:

The app file type is designed to run under macOS as an application file bundle. macOS uses application bundles to store executable files and related resources, such as libraries, image files, and localized content, in a single directory hierarchy. This approach simplifies application management and execution within the macOS environment.

Which of the following environmental controls is most important to maintain the safety of a data center?

A.
Temperature control
A.
Temperature control
Answers
B.
Humidity control
B.
Humidity control
Answers
C.
Fire suppression control
C.
Fire suppression control
Answers
D.
Power management control
D.
Power management control
Answers
Suggested answer: A

Explanation:

The most important environmental control to maintain the safety of a data center is Temperature control (A). Proper temperature control is crucial to prevent overheating, which can lead to hardware failure, reduced performance, and shortened equipment lifespan. Data centers house high-density computing equipment that generates significant amounts of heat, making effective temperature management essential for maintaining operational stability and reliability.

Total 755 questions
Go to page: of 76