ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 65

Question list
Search
Search

List of questions

Search

Related questions











Users report that they can log in to the web application during business hours, but none of the application's functions are working properly. Company policy does not allow for the server to be rebooted during business hours. Which of the following should a technician do to fix the web application and follow company policy?

A.
Restart services.
A.
Restart services.
Answers
B.
Roll back Windows updates.
B.
Roll back Windows updates.
Answers
C.
Perform a Windows repair.
C.
Perform a Windows repair.
Answers
D.
Add RAM to the server.
D.
Add RAM to the server.
Answers
Suggested answer: A

Explanation:

Restarting services can resolve issues with web applications without requiring a full server reboot, which aligns with the company policy.

Restart services: Likely to resolve issues with the web application by refreshing the necessary services.

Roll back Windows updates: Unnecessary if the issue is with the application services.

Perform a Windows repair: More disruptive and not typically needed for application service issues.

Add RAM to the server: Would require a reboot and is not immediately necessary for troubleshooting application issues.

An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data. Which of the following is the best way for a technician to protect the data on the phone?

A.
Remote lock
A.
Remote lock
Answers
B.
Remote wipe
B.
Remote wipe
Answers
C.
Remote access
C.
Remote access
Answers
D.
Remote encrypt
D.
Remote encrypt
Answers
Suggested answer: B

Explanation:

When a smartphone is lost, especially one that might contain sensitive or private data, the primary concern is to ensure that any data on the device cannot be accessed by unauthorized persons. Among the options provided:

Remote lock: This option will lock the device remotely, preventing access. However, it does not remove the data and might not be effective if the device is powered off or reset.

Remote wipe: This is the best option as it allows the technician to erase all data from the device remotely, ensuring that sensitive information is not accessible to anyone who finds or steals the device.

Remote access: This option would allow a technician to access the device remotely, but it would not directly prevent unauthorized access or data breaches.

Remote encrypt: Encrypting the device remotely might not be possible if the device is not accessible or turned on, and it does not remove existing data which could be at risk.

Which of the following operating systems uses the ext4 filesystem type?

A.
macOS
A.
macOS
Answers
B.
iOS
B.
iOS
Answers
C.
Linux
C.
Linux
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: C

Explanation:

The ext4 (fourth extended filesystem) is a journaling file system for Linux. It is widely used in many Linux distributions due to its performance, robustness, and advanced features like large file and volume support.

macOS: Uses filesystems like HFS+ or APFS.

iOS: Uses APFS (Apple File System).

Linux: Uses ext4 among other filesystems like ext3, XFS, Btrfs, etc.

Windows: Uses NTFS, FAT32, and exFAT, not ext4.

A Windows user wants a filesystem that protects confidential data from attackers who have physical access to the system. Which of the following should the user choose?

A.
ext
A.
ext
Answers
B.
APFS
B.
APFS
Answers
C.
FAT
C.
FAT
Answers
D.
EFS
D.
EFS
Answers
Suggested answer: D

Explanation:

EFS (Encrypting File System) is a feature of Windows that provides filesystem-level encryption. It is designed to encrypt files and folders to protect them from unauthorized access, even if an attacker has physical access to the computer.

ext: A filesystem type used primarily in Linux, without native encryption features for Windows.

APFS: Apple's filesystem, used in macOS and iOS.

FAT: A simple filesystem type with no encryption features.

EFS: The correct choice for a Windows user needing to encrypt data at the filesystem level to protect against unauthorized physical access.

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

A.
Valid license
A.
Valid license
Answers
B.
Data retention requirements
B.
Data retention requirements
Answers
C.
Material safety data sheet
C.
Material safety data sheet
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

Explanation:

In forensic investigations, maintaining the integrity of the evidence is crucial. The chain of custody is a process that ensures that evidence has been collected, preserved, and transferred in a manner that is legally defensible.

Valid license: Refers to software licensing, irrelevant in this context.

Data retention requirements: Policies for how long data should be kept, but not specifically related to tracking forensic evidence.

Material safety data sheet: Documentation for handling hazardous materials, not applicable here.

Chain of custody: The correct process for documenting the handling and transfer of evidence to maintain its integrity and admissibility in court.

A user in a SOHO asks an off-site, remote technician to connect securely to the user's laptop. The technician is able to connect to the VPN but is unable to connect to the user's laptop. Which of the following settings should the technician review?

A.
Wireless protocol
A.
Wireless protocol
Answers
B.
DHCP pool
B.
DHCP pool
Answers
C.
Content filtering
C.
Content filtering
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: D

Explanation:

When a technician is unable to connect to a laptop over a VPN, one of the most common reasons is that the firewall settings on either the laptop or the network are blocking the connection.

Wireless protocol: Unrelated, as the technician is already connected to the VPN.

DHCP pool: Unlikely to be the issue, as it deals with IP address assignment.

Content filtering: Typically involves filtering web content, not affecting direct connections.

Firewall: The correct setting to review, as it may block the necessary ports or services required for remote access.

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

A.
Non-disclosure agreement
A.
Non-disclosure agreement
Answers
B.
Certification of destruction
B.
Certification of destruction
Answers
C.
Low-level formatting
C.
Low-level formatting
Answers
D.
Shredding/drilling
D.
Shredding/drilling
Answers
Suggested answer: B

Explanation:

When disposing of e-waste, it is important to ensure that the data on the equipment is securely destroyed and that the disposal process complies with environmental regulations.

Non-disclosure agreement: Relates to confidentiality, not disposal.

Certification of destruction: The correct document verifying that the equipment has been disposed of in accordance with regulations and standards, ensuring data is irretrievably destroyed.

Low-level formatting: A method to wipe data but does not guarantee compliance with e-waste disposal regulations.

Shredding/drilling: Physical destruction methods that might be used, but certification of destruction is the documentation needed.

A technician is an administrator on a messaging application for a private work group of mixed departments. One of the technician's colleagues discloses to the group that their employer recently suffered a major security breach and shared details about the breach to the group Which of the following should the technician do first7

A.
Ignore the messages as all of the group members work for the same employer.
A.
Ignore the messages as all of the group members work for the same employer.
Answers
B.
Remove the colleague from the group and ask members to delete the messages.
B.
Remove the colleague from the group and ask members to delete the messages.
Answers
C.
Message the colleague privately and ask the colleague to delete the messages immediately.
C.
Message the colleague privately and ask the colleague to delete the messages immediately.
Answers
D.
Contact the supervisor and report the colleague with screen shots of the messages
D.
Contact the supervisor and report the colleague with screen shots of the messages
Answers
Suggested answer: D

Explanation:

In the case of a security breach disclosure, it's crucial to follow proper protocol to handle sensitive information responsibly:

Ignore the messages: Not appropriate as it disregards the potential impact and severity of the breach.

Remove the colleague and ask members to delete the messages: While it might limit the spread of the information, it doesn't address the breach reporting requirement.

Message the colleague privately: Might help in immediate removal of messages but does not follow the proper chain of command and reporting protocols.

Contact the supervisor: The correct action, as it ensures that the incident is handled by higher authorities who can take appropriate measures. Reporting with screenshots ensures that there is evidence of the disclosure.

SIMULATION

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after each response to continue the chat. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A.
See the solution below in Explanation
A.
See the solution below in Explanation
Answers
Suggested answer: A

Explanation:

A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time. Which of the following turns on this Ease of Access feature?

A.
Press the Shift key five times in a row.
A.
Press the Shift key five times in a row.
Answers
B.
Press Ctrl+Alt+Esc simultaneously.
B.
Press Ctrl+Alt+Esc simultaneously.
Answers
C.
Press Ctrl+Alt+Tab simultaneously.
C.
Press Ctrl+Alt+Tab simultaneously.
Answers
D.
Press the Windows key+Tab.
D.
Press the Windows key+Tab.
Answers
Suggested answer: A

Explanation:

The Ease of Access feature in Windows that allows a user to press keyboard shortcuts one key at a time is called 'Sticky Keys.' Sticky Keys is designed to assist users with disabilities who have difficulty pressing multiple keys simultaneously. To enable Sticky Keys:

Press the Shift key five times in a row: This is the quickest method to activate Sticky Keys. When you press the Shift key five times, a dialog box appears, asking if you want to turn on Sticky Keys. This method is widely documented as the default shortcut for enabling this feature.

Confirmation dialog: A confirmation dialog will appear asking if you want to turn on Sticky Keys. Click 'Yes' to enable it.

Control Panel or Settings: Alternatively, you can enable Sticky Keys through the Control Panel or the Settings app. Go to 'Ease of Access' settings, find the 'Keyboard' section, and turn on Sticky Keys from there.

CompTIA A+ 220-1102 Exam Objectives, Section 1.4: Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility.

Windows Ease of Access documentation.

Total 755 questions
Go to page: of 76