ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 62

Question list
Search
Search

List of questions

Search

Related questions











An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

A.
Configuring firewall settings
A.
Configuring firewall settings
Answers
B.
Implementing expiration policies
B.
Implementing expiration policies
Answers
C.
Defining complexity requirements
C.
Defining complexity requirements
Answers
D.
Updating antivirus definitions
D.
Updating antivirus definitions
Answers
Suggested answer: B

Explanation:

To prevent security issues related to an employee using the same password for multiple applications and websites, implementing expiration policies (B) is best. Password expiration policies require users to change their passwords at regular intervals, which helps to mitigate the risks associated with password reuse. Regularly changing passwords reduces the chances of unauthorized access from compromised credentials.

Which of the following languages is used for scripting the creation of Active Directory accounts?

A.
Bash
A.
Bash
Answers
B.
Structured Query Language
B.
Structured Query Language
Answers
C.
Hypertext Preprocessor
C.
Hypertext Preprocessor
Answers
D.
PowerShell
D.
PowerShell
Answers
Suggested answer: D

Explanation:

For scripting the creation of Active Directory accounts, PowerShell (D) is used. PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and the associated scripting language. It is built on the .NET framework and is particularly suited for automating and managing Windows-based systems, including Active Directory tasks.

A technician is following the ticketing system's best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

A.
Ask the user for clarification.
A.
Ask the user for clarification.
Answers
B.
Keep the user updated on the progress.
B.
Keep the user updated on the progress.
Answers
C.
Document the root cause.
C.
Document the root cause.
Answers
D.
Follow the system's escalation process.
D.
Follow the system's escalation process.
Answers
Suggested answer: A

Explanation:

When handling a user support request that contains insufficient information, the first step a technician should take is to Ask the user for clarification (A). This involves gathering more details about the issue to understand the problem better and provide an accurate resolution. Effective communication and asking the right questions are essential for diagnosing and resolving IT issues efficiently.

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

A.
Enable System Restore.
A.
Enable System Restore.
Answers
B.
Roll back the device drivers.
B.
Roll back the device drivers.
Answers
C.
Reinstall the OS.
C.
Reinstall the OS.
Answers
D.
Update the BIOS.
D.
Update the BIOS.
Answers
Suggested answer: B

Explanation:

To resolve a BSOD issue on a Windows 10 PC after installing optional Windows updates, the best approach is to Roll back the device drivers (B). BSODs can often be caused by incompatible or faulty drivers introduced during an update. Rolling back the drivers to a previous version can restore system stability and resolve the BSOD issue.

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

A.
Scan the system for malware.
A.
Scan the system for malware.
Answers
B.
Clear the web browser cache.
B.
Clear the web browser cache.
Answers
C.
Enroll the device in an MDM system.
C.
Enroll the device in an MDM system.
Answers
D.
Confirm the compatibility of the applications with the OS.
D.
Confirm the compatibility of the applications with the OS.
Answers
Suggested answer: A

Explanation:

When an Android device experiences slow boot times and application crashes after installing apps from a third-party website, scanning the system for malware is a critical first step. Third-party sources can often host malicious software that can compromise device performance and security. A malware scan can identify and remove such threats, potentially resolving the performance issues and application instability. Clearing the web browser cache, enrolling the device in an MDM system, and confirming app compatibility are useful steps but do not address the immediate concern of potential malware introduced by third-party app installations.

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

A.
NIC
A.
NIC
Answers
B.
CPU
B.
CPU
Answers
C.
PSU
C.
PSU
Answers
D.
KVM
D.
KVM
Answers
E.
RAM
E.
RAM
Answers
F.
DVI
F.
DVI
Answers
Suggested answer: A, B

Explanation:

The Hardware Compatibility List (HCL) is a list that indicates hardware components that are compatible with a specific software or operating system. If software installation fails due to incompliance with the HCL, it's most likely due to core hardware components like the Network Interface Card (NIC) or the Central Processing Unit (CPU) not being supported or not meeting the software's minimum hardware requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as defined by the HCL.

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

A.
netstat
A.
netstat
Answers
B.
ping
B.
ping
Answers
C.
format
C.
format
Answers
D.
tracert
D.
tracert
Answers
Suggested answer: D

Explanation:

The 'tracert' command is used to view the path that network traffic takes from a PC to a specified destination. It is helpful in identifying where along the path the traffic may be failing or experiencing delays. In the scenario where a customer service representative can't send jobs to a remote printer but can print locally, 'tracert' can help diagnose if there's a network routing issue affecting the connection to the remote branch office.

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.
Turn off inheritance on the requested folder only and set the requested permissions to each file manually.
A.
Turn off inheritance on the requested folder only and set the requested permissions to each file manually.
Answers
B.
Turn off inheritance at the top-level folder and remove all inherited permissions.
B.
Turn off inheritance at the top-level folder and remove all inherited permissions.
Answers
C.
Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.
C.
Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.
Answers
D.
Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.
D.
Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.
Answers
Suggested answer: D

Explanation:

Turning off inheritance on the specific folder requested by the manager and setting the requested permissions, followed by turning on inheritance under the child folders, ensures that only the immediate team has access to the confidential material while maintaining the broader permissions structure for other folders and files. This action isolates the folder's permissions from the top-level inheritance, providing a focused security measure for sensitive content.

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.
Ensure that the Windows Update Utility is the latest version.
A.
Ensure that the Windows Update Utility is the latest version.
Answers
B.
Refresh local WSUS settings on the computer.
B.
Refresh local WSUS settings on the computer.
Answers
C.
Delete the Windows Update cache.
C.
Delete the Windows Update cache.
Answers
D.
Run the System check to verify system files.
D.
Run the System check to verify system files.
Answers
E.
Reimage the operating system while retaining user files.
E.
Reimage the operating system while retaining user files.
Answers
F.
Reset WMI and re-register system .dlls.
F.
Reset WMI and re-register system .dlls.
Answers
Suggested answer: B, C

Explanation:

Refreshing local Windows Server Update Services (WSUS) settings and deleting the Windows Update cache are effective steps in resolving issues with Windows 10 not installing updates. These actions help in rectifying any corrupt update files and ensuring that the workstation is properly communicating with the update servers, which can resolve errors during manual and automatic update installations.

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

A.
The computer is running Windows Home.
A.
The computer is running Windows Home.
Answers
B.
The user did not sign the end user license agreement.
B.
The user did not sign the end user license agreement.
Answers
C.
The user disabled the User Account Control.
C.
The user disabled the User Account Control.
Answers
D.
An antivirus application is blocking access.
D.
An antivirus application is blocking access.
Answers
Suggested answer: A

Explanation:

The inability to launch the expected security policy snap-in is likely because the computer is running Windows Home edition, which does not include the Group Policy Editor or certain other administrative tools available in Professional, Enterprise, and Education editions. The Home edition is designed for general consumer use and lacks some of the advanced security and management features found in higher editions.

Total 755 questions
Go to page: of 76