ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 68

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the weakest wireless security protocol?

A.
WEP
A.
WEP
Answers
B.
WPA2
B.
WPA2
Answers
C.
TKIP
C.
TKIP
Answers
D.
AES
D.
AES
Answers
Suggested answer: A

Explanation:

WEP (Wired Equivalent Privacy) is known to be the weakest wireless security protocol due to its vulnerabilities and ease of being compromised.

WEP: The oldest and weakest protocol, susceptible to various attacks and easily cracked.

WPA2: Much stronger security with AES encryption, currently one of the most secure standards.

TKIP: Used with WPA, stronger than WEP but weaker than WPA2 with AES.

AES: Advanced Encryption Standard, used in WPA2 and known for strong security.

Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician discovers the emails were sent from the following address:

[email protected]

Which of the following social engineering attacks is this an example of?

A.
Whaling
A.
Whaling
Answers
B.
Insider threat
B.
Insider threat
Answers
C.
Phishing
C.
Phishing
Answers
D.
Vishing
D.
Vishing
Answers
E.
Evil twin
E.
Evil twin
Answers
Suggested answer: C

Explanation:

Phishing involves tricking individuals into disclosing sensitive information or installing malware through deceptive emails.

Whaling: A specific type of phishing targeting high-profile individuals.

Insider threat: Malicious activities by someone within the organization.

Phishing: General deceptive emails to trick users into compromising information or installing malware.

Vishing: Voice phishing, conducted over the phone.

Evil twin: A rogue Wi-Fi access point mimicking a legitimate one to intercept data.

A company's help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

A.
Record the details in the ticketing system.
A.
Record the details in the ticketing system.
Answers
B.
Take screenshots and attach them to the root cause analysis.
B.
Take screenshots and attach them to the root cause analysis.
Answers
C.
Discuss the incident with the company's legal team.
C.
Discuss the incident with the company's legal team.
Answers
D.
List the details in the company's knowledge base.
D.
List the details in the company's knowledge base.
Answers
Suggested answer: A

Explanation:

In the event of a security breach, documenting the incident is crucial for tracking, analysis, and resolution. The appropriate steps should ensure thorough documentation and communication:

Option A: Record the details in the ticketing system. Correct Answer. The ticketing system is the primary tool for IT support to track incidents. Recording the details in the ticketing system ensures that all relevant information is documented systematically, can be easily accessed, and tracked through the resolution process.

This aligns with best practices in incident documentation and support systems information management as outlined in the CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.1.

Option B: Take screenshots and attach them to the root cause analysis. While screenshots can be useful, the first step should be to record the details in the ticketing system. Screenshots may be added later as supplementary information.

Option C: Discuss the incident with the company's legal team. Involving the legal team is important for certain aspects of a security breach, but the initial step should still be to document the incident in the ticketing system.

A workstation does not recognize a printer. However, the previous day. the printer successfully received a job from the workstation. Which of the following tools should a technician use to see what happened before the failure?

A.
Performance Monitor
A.
Performance Monitor
Answers
B.
Devices and Printers
B.
Devices and Printers
Answers
C.
Task Scheduler
C.
Task Scheduler
Answers
D.
Event Viewer
D.
Event Viewer
Answers
Suggested answer: D

Explanation:

When troubleshooting a printer that was previously working but is no longer recognized by a workstation, Event Viewer is the most appropriate tool to check for historical logs and events related to the printer and the system.

Option A: Performance Monitor Performance Monitor is used for monitoring system performance and resources in real-time and does not provide specific historical event logs related to device failures.

Option B: Devices and Printers Devices and Printers show the status and properties of connected devices but do not provide a historical log of events or errors.

Option C: Task Scheduler Task Scheduler manages and monitors scheduled tasks but does not log hardware events or errors.

Option D: Event Viewer Event Viewer logs system events, including errors, warnings, and information related to hardware and software. It is ideal for checking what happened prior to the printer failure.

CompTIA A+ 220-1102 Objective 3.1 (Troubleshoot common Windows OS problems), particularly using Event Viewer for diagnosing issues.

The company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.
Turn off inheritance on the requested folder only and set the requested permissions to each file manually.
A.
Turn off inheritance on the requested folder only and set the requested permissions to each file manually.
Answers
B.
Turn off inheritance at the top-level folder and remove all inherited permissions.
B.
Turn off inheritance at the top-level folder and remove all inherited permissions.
Answers
C.
Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.
C.
Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.
Answers
D.
Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.
D.
Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.
Answers
Suggested answer: D

Explanation:

For managing permissions where a specific folder needs to have different access controls than its parent, turning off inheritance for that specific folder is the correct approach.

Option A: Turn off inheritance on the requested folder only and set the requested permissions to each file manually This is partially correct, but setting permissions manually for each file is inefficient and error-prone.

Option B: Turn off inheritance at the top-level folder and remove all inherited permissions This action would disrupt permissions for all other folders and files, not just the confidential folder.

Option C: Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually This approach is overly broad and inefficient, impacting more than just the specific folder that needs restricted access.

Option D: Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders This ensures the specific folder has unique permissions while allowing those permissions to propagate to its children, maintaining security and ease of management.

CompTIA A+ 220-1102 Objective 2.5 (Manage and configure basic security settings in the Windows OS), particularly file and folder permissions and inheritance settings.

Which of the following provides disk encryption on computers running a Windows OS?

A.
FileVault
A.
FileVault
Answers
B.
BitLocker
B.
BitLocker
Answers
C.
Private Key
C.
Private Key
Answers
D.
PowerShell
D.
PowerShell
Answers
Suggested answer: B

Explanation:

BitLocker is a full-disk encryption feature included with certain editions of Windows, designed to protect data by providing encryption for entire volumes.

Option A: FileVault FileVault is a disk encryption program in macOS, not Windows.

Option B: BitLocker BitLocker is the correct tool for disk encryption on Windows operating systems, providing full disk encryption.

Option C: Private Key A private key is part of public key infrastructure (PKI) used in encryption, but it is not a tool for disk encryption by itself.

Option D: PowerShell PowerShell is a task automation and configuration management framework from Microsoft, not a tool for disk encryption.

CompTIA A+ 220-1102 Objective 2.5 (Manage and configure basic security settings in the Windows OS), particularly BitLocker for disk encryption.

Which of the following filesystems supports journaling?

A.
NTFS
A.
NTFS
Answers
B.
exFAT
B.
exFAT
Answers
C.
HFS
C.
HFS
Answers
D.
ext2
D.
ext2
Answers
Suggested answer: A

Explanation:

Journaling is a feature that helps maintain the integrity of the filesystem by keeping a record of changes not yet committed to the main file system. This feature is supported by various filesystems, but not all.

Option A: NTFS NTFS (New Technology File System) is a filesystem used by Windows that supports journaling. This makes it resilient to corruption from unexpected shutdowns or crashes by keeping a log of file changes.

Option B: exFAT exFAT (Extended File Allocation Table) does not support journaling. It is optimized for flash drives and large files but lacks advanced features like journaling.

Option C: HFS HFS (Hierarchical File System) is an older filesystem used by Apple. HFS+ (also known as Mac OS Extended) supports journaling, but HFS itself does not.

Option D: ext2 ext2 (Second Extended File System) is a filesystem for Linux that does not support journaling. Its successor, ext3, introduced journaling.

CompTIA A+ 220-1102 Objective 1.8 (Explain common OS types and their purposes), particularly filesystems and their features.

A technician is investigating a workstation that has not received the latest policy changes. Which of the following commands should the technician use to apply the latest domain policy changes?

A.
sfc /scannow
A.
sfc /scannow
Answers
B.
gpupdare /force
B.
gpupdare /force
Answers
C.
chkdsk /y
C.
chkdsk /y
Answers
D.
xcopy Zp
D.
xcopy Zp
Answers
Suggested answer: B

Explanation:

When a workstation has not received the latest policy changes, the gpupdate command is used to manually apply the latest group policies from the domain controller.

Option A: sfc /scannow This command is used to scan and repair corrupted system files, not to update group policies.

Option B: gpupdate /force This command forces the workstation to reapply all group policies, ensuring that the latest policies are applied immediately.

Option C: chkdsk /y This command checks the integrity of the file system and fixes logical file system errors, not to update group policies.

Option D: xcopy /Zp This command is used for copying files and directories, not for updating group policies.

CompTIA A+ 220-1102 Objective 1.6 (Configure Microsoft Windows networking features on a client/desktop), particularly managing and applying group policies.

Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who needs to access their computer remotely?

A.
Education
A.
Education
Answers
B.
Pro
B.
Pro
Answers
C.
Enterprise
C.
Enterprise
Answers
D.
Home
D.
Home
Answers
Suggested answer: B

Explanation:

For a single user who needs to access their computer remotely, the Windows 10 Pro edition is the most cost-effective and appropriate choice. It includes features such as Remote Desktop, which are essential for remote access.

Option A: Education This edition is designed for academic institutions and includes educational features. It is not the most cost-effective for a single user.

Option B: Pro Windows 10 Pro includes Remote Desktop and other business features. It is suitable and cost-effective for single users needing remote access.

Option C: Enterprise This edition includes advanced features for large organizations and is more expensive, making it less cost-effective for a single user.

Option D: Home While cost-effective, Windows 10 Home does not include the Remote Desktop feature, making it unsuitable for this requirement.

CompTIA A+ 220-1102 Objective 1.1 (Identify basic features of Microsoft Windows editions), particularly comparing editions based on features and cost.



A user is unable to access the company's internal network on a separate subnet. A help desk technician verifies the user's credentials, and the user has the appropriate permissions to access the network. The technician checks the network and finds the connection is stable. No other users are having this issue. Which of the following should the technician do next?

A.
Consult with the firewall team to see If the user's IP address Is blocked.
A.
Consult with the firewall team to see If the user's IP address Is blocked.
Answers
B.
Delete the user's credentials and create new ones.
B.
Delete the user's credentials and create new ones.
Answers
C.
Run a virus scan on the user's workstation.
C.
Run a virus scan on the user's workstation.
Answers
D.
Update the network drivers on the user's workstation.
D.
Update the network drivers on the user's workstation.
Answers
Suggested answer: A

Explanation:

In this scenario, the user cannot access a separate subnet, and all other checks (credentials, network stability, and permissions) have been verified. The next logical step is to check if the user's IP address is being blocked by a firewall.

Option A: Consult with the firewall team to see if the user's IP address is blocked Firewalls can block specific IP addresses, preventing access to certain network segments. Given the problem's nature and the steps already taken, this is the most logical next step to ensure the user's IP is not inadvertently blocked.

Option B: Delete the user's credentials and create new ones This step is unnecessary since the credentials have already been verified as correct.

Option C: Run a virus scan on the user's workstation While important for overall security, a virus scan is unlikely to resolve an issue specific to accessing a subnet if the problem does not affect other users.

Option D: Update the network drivers on the user's workstation If the network connection is stable and the issue is isolated to accessing a specific subnet, network drivers are unlikely to be the cause.

CompTIA A+ 220-1102 Objective 2.0 (Security), particularly firewall settings.

Total 755 questions
Go to page: of 76