ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











A user reports a computer is running stow. Which of the following tools will help a technician identify the issue?

A.
Disk Cleanup
A.
Disk Cleanup
Answers
B.
Group Policy Editor
B.
Group Policy Editor
Answers
C.
Disk Management
C.
Disk Management
Answers
D.
Resource Monitor
D.
Resource Monitor
Answers
Suggested answer: D

Explanation:


A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get

troubleshooting tools. Which of the following is the MOST likely cause of the issue?

A.
Time drift
A.
Time drift
Answers
B.
Dual in-line memory module failure
B.
Dual in-line memory module failure
Answers
C.
Application crash
C.
Application crash
Answers
D.
Filesystem errors
D.
Filesystem errors
Answers
Suggested answer: A

Explanation:

The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a computer is not synchronized with the clock on the domain controller. This can cause authentication problemswhen a user tries to log in to the domain. The fact that the technician is unable to browse to the secure intranet site to get troubleshooting tools suggests that there may be a problem with the network connection or the firewall settings on the desktop PC12

Which of the following could be used to implement secure physical access to a data center?

A.
Geofence
A.
Geofence
Answers
B.
Alarm system
B.
Alarm system
Answers
C.
Badge reader
C.
Badge reader
Answers
D.
Motion sensor
D.
Motion sensor
Answers
Suggested answer: C

Explanation:

Badge readers are used to implement secure physical access to a data center. They are used to readthe identification information on an employee’s badge and grant access to the data center if the employee is authorized2.This system requires individuals to have an access badge that contains their identification information or a unique code that can be scanned by a reader. After the badge is scanned, the system compares the information on the badge with the authorized personnel database to authenticate if the individual has the required clearance to enter that area. The other options listed, such as a geofence, alarm system, or motion sensor are security measures that may be used in conjunction with badge readers, but do not provide identification and authentication features.

A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?

A.
Language
A.
Language
Answers
B.
System
B.
System
Answers
C.
Personalization
C.
Personalization
Answers
D.
Ease of Access
D.
Ease of Access
Answers
Suggested answer: D

Explanation:

The user can enable speech recognition on a PC in the Ease of Access settings tool. To set up Speech Recognition on a Windows PC, the user should open Control Panel, click on Ease of Access, click on Speech Recognition, and click the Start Speech Recognition link. Language settings can be used to change the language of the speech recognition feature, but they will not enable the feature. System settings can be used to configure the hardware and software of the PC, but they will not enable thespeech recognition feature. Personalization settings can be used to customize the appearance and behavior of the PC, but they will not enable the speech recognition feature1Open up ease of access, click on speech, then there is an on and off button for speech recognition.

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

A.
Quarantining system files
A.
Quarantining system files
Answers
B.
Reimaging the workstation
B.
Reimaging the workstation
Answers
C.
Encrypting the hard drive
C.
Encrypting the hard drive
Answers
D.
Disabling TLS 1.0 support
D.
Disabling TLS 1.0 support
Answers
Suggested answer: C

Explanation:

Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a whole range of them including FAT32 and NTFS, it is highly recommended to format the partition or disk you want to share in either FAT32 or NTFS, but since FAT32 has a file size limit of 4.2 GB, if you happen to work with huge files, then it is better you use NTFS

A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

A.
FAT32
A.
FAT32
Answers
B.
ext4
B.
ext4
Answers
C.
NTFS
C.
NTFS
Answers
D.
exFAT
D.
exFAT
Answers
Suggested answer: D

Explanation:


A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.
Configure the network as private
A.
Configure the network as private
Answers
B.
Enable a proxy server
B.
Enable a proxy server
Answers
C.
Grant the network administrator role to the user
C.
Grant the network administrator role to the user
Answers
D.
Create a shortcut to public documents
D.
Create a shortcut to public documents
Answers
Suggested answer: A

Explanation:

The technician should configure the network as private to allow the user to access files on a drive shared from another desktop on the network1

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

A.
afc
A.
afc
Answers
B.
ehkdsk
B.
ehkdsk
Answers
C.
git clone
C.
git clone
Answers
D.
zobocopy
D.
zobocopy
Answers
Suggested answer: A

Explanation:

The technician should use afc to transfer a large number of files over an unreliable connection and be able to resume the process if the connection is interrupted1

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

A.
Encrypt the files
A.
Encrypt the files
Answers
B.
Clone any impacted hard drives
B.
Clone any impacted hard drives
Answers
C.
Contact the cyber insurance company
C.
Contact the cyber insurance company
Answers
D.
Inform law enforcement
D.
Inform law enforcement
Answers
Suggested answer: B

Explanation:

The incident handler should clone any impacted hard drives to preserve evidence for possible litigation1

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

A.
Update the browser's CRLs
A.
Update the browser's CRLs
Answers
B.
File a trouble ticket with the bank.
B.
File a trouble ticket with the bank.
Answers
C.
Contact the ISP to report the CFCs concern
C.
Contact the ISP to report the CFCs concern
Answers
D.
Instruct the CFO to exit the browser
D.
Instruct the CFO to exit the browser
Answers
Suggested answer: A

Explanation:

The technician should update the browser’s CRLs first. The error message indicates that the certificate revocation list (CRL) is not up to date. Updating the CRLs will ensure that the browser can verify the authenticity of the bank’s website.

Total 755 questions
Go to page: of 76