ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Related questions











An administrator's change was approved by the change management review board. Which of the following should the administrator do next?

A.
Perform risk analysis.
A.
Perform risk analysis.
Answers
B.
Assign a change coordinator.
B.
Assign a change coordinator.
Answers
C.
Implement the change.
C.
Implement the change.
Answers
D.
Verify testing results.
D.
Verify testing results.
Answers
Suggested answer: C

Explanation:

Once a change has been approved by the change management review board, the next step is to:

Implement the change: This involves carrying out the approved change in the system or environment according to the change plan.

Perform risk analysis: This should be done before the change is approved to assess potential impacts.

Assign a change coordinator: This role should be designated earlier in the process to oversee the change implementation.

Verify testing results: This should have been done before seeking approval from the review board.

CompTIA A+ 220-1102 Exam Objectives, Section 4.2: Explain basic change-management best practices.

Change management process documentation.

When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best explains this issue?

A.
Exceeded the data usage limit
A.
Exceeded the data usage limit
Answers
B.
Sluggish response time
B.
Sluggish response time
Answers
C.
Degraded network service
C.
Degraded network service
Answers
D.
High network traffic
D.
High network traffic
Answers
Suggested answer: D

Explanation:

When a user experiences slow web page loading on their phone while in the office, the most likely cause is:

High network traffic: In an office environment, many devices are often connected to the network simultaneously, which can lead to congestion and slow internet speeds. High network traffic means more devices are competing for the same bandwidth, causing delays.

Exceeded the data usage limit: This typically applies to cellular data plans, not Wi-Fi in an office setting.

Sluggish response time: This is a symptom rather than a cause and can result from high network traffic.

Degraded network service: While this could be a factor, it is broader and less specific than high network traffic, which is more directly related to the user's experience.

CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Given a scenario troubleshoot problems with wired and wireless networks.

Network performance troubleshooting documentation.

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

A.
NIC
A.
NIC
Answers
B.
USB
B.
USB
Answers
C.
GPU
C.
GPU
Answers
D.
HDMI
D.
HDMI
Answers
Suggested answer: C

Explanation:

For rendering video, the most critical component a customer should prioritize in a desktop is:

GPU (Graphics Processing Unit): The GPU is specifically designed to handle complex graphics and video rendering tasks. A powerful GPU will significantly improve performance in video rendering applications.

NIC (Network Interface Card): Important for network connectivity but irrelevant for video rendering.

USB: Useful for peripherals but does not impact video rendering capabilities.

HDMI: An important output interface for connecting monitors but not crucial for the rendering process itself.

CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes, including hardware components for specific tasks.

GPU importance in video rendering documentation.

Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?

A.
ping
A.
ping
Answers
B.
netstat
B.
netstat
Answers
C.
net
C.
net
Answers
D.
nslookup
D.
nslookup
Answers
Suggested answer: A

Explanation:

To confirm whether a network printer has connectivity issues, the technician should use:

ping: This command checks the connectivity to the printer by sending packets and measuring the response time. It helps determine if the printer is reachable on the network.

netstat: Provides statistics and current network connections but does not directly confirm connectivity to a specific device.

net: Used for network resources management but not specifically for checking connectivity.

nslookup: Used for querying DNS to obtain domain name or IP address mapping, not for checking connectivity.

CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario, use networking tools.

Network troubleshooting commands documentation.

A user reports the following issues:

* Their computer is constantly running slowly.

* The default home page of the web browser has changed to a suspicious search engine.

* They have been receiving pop-up ads on the screen.

Which of the following should a technician do first to address these issues?

A.
Update the antivirus program and run a full system scan.
A.
Update the antivirus program and run a full system scan.
Answers
B.
Uninstall the suspicious search engine and reset the home page.
B.
Uninstall the suspicious search engine and reset the home page.
Answers
C.
Install the latest updates for the operating system.
C.
Install the latest updates for the operating system.
Answers
D.
Block the pop-up ads using the web browser settings.
D.
Block the pop-up ads using the web browser settings.
Answers
Suggested answer: A

Explanation:

When a user reports slow performance, a changed home page, and pop-up ads, these are classic signs of malware infection. The first step should be:

Update the antivirus program and run a full system scan: This helps identify and remove any malware present on the system, addressing the root cause of the issues.

Uninstall the suspicious search engine and reset the home page: This addresses the symptom but not the underlying cause, which is likely malware.

Install the latest updates for the operating system: Important for security but secondary to removing malware.

Block the pop-up ads using the web browser settings: Again, addresses the symptom but not the root cause.

CompTIA A+ 220-1102 Exam Objectives, Section 3.3: Given a scenario use best practice procedures for malware removal.

Malware identification and removal documentation.

A user is attempting to access a shared drive from a company-issued laptop while working from home. The user is unable to access any files and notices a red X next to each shared drive. Which of the following needs to be configured in order to restore the user's access to the shared drives?

A.
IPv6
A.
IPv6
Answers
B.
VPN
B.
VPN
Answers
C.
IPS
C.
IPS
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: B

Explanation:

When a user is unable to access shared drives from a company-issued laptop while working from home, the likely requirement is:

VPN (Virtual Private Network): A VPN allows secure access to the company's network from a remote location. Without a VPN connection, the user cannot access network resources such as shared drives.

IPv6: Involves IP addressing and is not directly related to accessing shared drives.

IPS (Intrusion Prevention System): Provides network security but does not facilitate access to shared drives.

DNS: Manages domain name resolution and is not typically the issue when specific shared drives are inaccessible.

CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and embedded devices.

VPN configuration and remote access documentation.


A technician is implementing the latest application security updates for endpoints on an enterprise network. Which of the following solutions should the technician use to ensure device security on the network while adhering to industry best practices?

A.
Automate the patching process.
A.
Automate the patching process.
Answers
B.
Monitor the firewall configuration.
B.
Monitor the firewall configuration.
Answers
C.
Implement access control lists.
C.
Implement access control lists.
Answers
D.
Document all changes.
D.
Document all changes.
Answers
Suggested answer: A

Explanation:

To ensure device security on the network while adhering to industry best practices, the technician should:

Automate the patching process: This ensures that all devices receive the latest security updates in a timely manner without manual intervention, reducing the risk of vulnerabilities.

Monitor the firewall configuration: Important for network security but does not directly ensure all devices are patched.

Implement access control lists: Controls access to resources but does not ensure devices are patched.

Document all changes: Important for change management but does not directly impact the patching process.

CompTIA A+ 220-1102 Exam Objectives, Section 2.6: Given a scenario configure a workstation to meet best practices for security.

Best practices for application security updates and patch management.

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

A.
Using an agent-based cloud backup solution
A.
Using an agent-based cloud backup solution
Answers
B.
Implementing a grandfather-father-son backup rotation
B.
Implementing a grandfather-father-son backup rotation
Answers
C.
Automating backups to a local network share
C.
Automating backups to a local network share
Answers
D.
Saving files manually to an external drive
D.
Saving files manually to an external drive
Answers
Suggested answer: A

Explanation:

For ensuring data protection against local natural disasters and hardware failures, the best approach is to use an off-site solution that provides redundancy and is resilient to local disruptions.

Using an agent-based cloud backup solution: This method involves backing up data to a remote cloud server, providing protection against local disasters like floods, fires, or hardware failures since the data is stored off-site and can be accessed from anywhere.

Implementing a grandfather-father-son backup rotation: While effective for managing local backups, this method typically involves physical media which could still be vulnerable to local disasters.

Automating backups to a local network share: This keeps the backups within the same physical location, making them susceptible to local disasters.

Saving files manually to an external drive: This method is prone to human error and doesn't provide automated or off-site protection.

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.
Smart card
A.
Smart card
Answers
B.
Biometrics
B.
Biometrics
Answers
C.
Hard token
C.
Hard token
Answers
D.
One-time password
D.
One-time password
Answers
Suggested answer: B

Explanation:

For securing mobile devices with two authentication methods, combining something the user knows (a PIN) with something the user is (biometrics) enhances security by implementing multi-factor authentication.

Smart card: Generally requires additional hardware and is not commonly used in mobile devices.

Biometrics: Uses unique biological traits such as fingerprints or facial recognition, providing a convenient and secure second method of authentication.

Hard token: Involves additional physical devices which might not be practical for mobile devices.

One-time password: Usually used for specific applications rather than as a general device authentication method.

A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?

A.
Enabling Windows Firewall
A.
Enabling Windows Firewall
Answers
B.
Activating the email spam filter
B.
Activating the email spam filter
Answers
C.
Using a secure VPN connection
C.
Using a secure VPN connection
Answers
D.
Running vulnerability scans on a schedule
D.
Running vulnerability scans on a schedule
Answers
Suggested answer: B

Explanation:

Phishing attacks are typically delivered via email, so the most effective immediate measure is to filter out these malicious emails.

Enabling Windows Firewall: Helps protect against network threats but does not specifically address phishing emails.

Activating the email spam filter: Directly targets phishing attempts by filtering and blocking suspicious emails before they reach the user.

Using a secure VPN connection: Enhances secure communications but does not prevent phishing attacks.

Running vulnerability scans on a schedule: Identifies and mitigates vulnerabilities but does not address phishing emails directly.

Total 755 questions
Go to page: of 76