ExamGecko
Home / CompTIA / 220-1102 / List of questions
Ask Question

CompTIA 220-1102 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

A user reports a computer is running stow. Which of the following tools will help a technician identify the issue?

Disk Cleanup
Disk Cleanup
Group Policy Editor
Group Policy Editor
Disk Management
Disk Management
Resource Monitor
Resource Monitor
Suggested answer: D
Explanation:


asked 02/10/2024
Daniel Ramirez
51 questions

Question 62

Report Export Collapse

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get

troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Time drift
Time drift
Dual in-line memory module failure
Dual in-line memory module failure
Application crash
Application crash
Filesystem errors
Filesystem errors
Suggested answer: A
Explanation:

The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a computer is not synchronized with the clock on the domain controller. This can cause authentication problemswhen a user tries to log in to the domain. The fact that the technician is unable to browse to the secure intranet site to get troubleshooting tools suggests that there may be a problem with the network connection or the firewall settings on the desktop PC12

asked 02/10/2024
Ziyad Karadsheh
35 questions

Question 63

Report Export Collapse

Which of the following could be used to implement secure physical access to a data center?

Geofence
Geofence
Alarm system
Alarm system
Badge reader
Badge reader
Motion sensor
Motion sensor
Suggested answer: C
Explanation:

Badge readers are used to implement secure physical access to a data center. They are used to readthe identification information on an employee’s badge and grant access to the data center if the employee is authorized2.This system requires individuals to have an access badge that contains their identification information or a unique code that can be scanned by a reader. After the badge is scanned, the system compares the information on the badge with the authorized personnel database to authenticate if the individual has the required clearance to enter that area. The other options listed, such as a geofence, alarm system, or motion sensor are security measures that may be used in conjunction with badge readers, but do not provide identification and authentication features.

asked 02/10/2024
Matthew Cole
40 questions

Question 64

Report Export Collapse

A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option?

Language
Language
System
System
Personalization
Personalization
Ease of Access
Ease of Access
Suggested answer: D
Explanation:

The user can enable speech recognition on a PC in the Ease of Access settings tool. To set up Speech Recognition on a Windows PC, the user should open Control Panel, click on Ease of Access, click on Speech Recognition, and click the Start Speech Recognition link. Language settings can be used to change the language of the speech recognition feature, but they will not enable the feature. System settings can be used to configure the hardware and software of the PC, but they will not enable thespeech recognition feature. Personalization settings can be used to customize the appearance and behavior of the PC, but they will not enable the speech recognition feature1Open up ease of access, click on speech, then there is an on and off button for speech recognition.

asked 02/10/2024
jateen chibabhai
45 questions

Question 65

Report Export Collapse

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?

Quarantining system files
Quarantining system files
Reimaging the workstation
Reimaging the workstation
Most voted
(1)
Most voted
Encrypting the hard drive
Encrypting the hard drive
Disabling TLS 1.0 support
Disabling TLS 1.0 support
Suggested answer: C
Explanation:

Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a whole range of them including FAT32 and NTFS, it is highly recommended to format the partition or disk you want to share in either FAT32 or NTFS, but since FAT32 has a file size limit of 4.2 GB, if you happen to work with huge files, then it is better you use NTFS

asked 02/10/2024
Mina Shaker
50 questions

Question 66

Report Export Collapse

A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

FAT32
FAT32
ext4
ext4
NTFS
NTFS
exFAT
exFAT
Suggested answer: D
Explanation:


asked 02/10/2024
Anton Khodyakov
49 questions

Question 67

Report Export Collapse

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

Configure the network as private
Configure the network as private
Enable a proxy server
Enable a proxy server
Grant the network administrator role to the user
Grant the network administrator role to the user
Create a shortcut to public documents
Create a shortcut to public documents
Suggested answer: A
Explanation:

The technician should configure the network as private to allow the user to access files on a drive shared from another desktop on the network1

asked 02/10/2024
miquel martin leiva
46 questions

Question 68

Report Export Collapse

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

afc
afc
ehkdsk
ehkdsk
git clone
git clone
zobocopy
zobocopy
Most voted
(1)
Most voted
Suggested answer: A
Explanation:

The technician should use afc to transfer a large number of files over an unreliable connection and be able to resume the process if the connection is interrupted1

asked 02/10/2024
Ida Aasvistad
38 questions

Question 69

Report Export Collapse

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Encrypt the files
Encrypt the files
Clone any impacted hard drives
Clone any impacted hard drives
Contact the cyber insurance company
Contact the cyber insurance company
Inform law enforcement
Inform law enforcement
Suggested answer: B
Explanation:

The incident handler should clone any impacted hard drives to preserve evidence for possible litigation1

asked 02/10/2024
Vilfride Lutumba
44 questions

Question 70

Report Export Collapse

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

CompTIA 220-1102 image Question 70 93348 10022024175018000000

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

Update the browser's CRLs
Update the browser's CRLs
File a trouble ticket with the bank.
File a trouble ticket with the bank.
Contact the ISP to report the CFCs concern
Contact the ISP to report the CFCs concern
Instruct the CFO to exit the browser
Instruct the CFO to exit the browser
Most voted
(1)
Most voted
Suggested answer: A
Explanation:

The technician should update the browser’s CRLs first. The error message indicates that the certificate revocation list (CRL) is not up to date. Updating the CRLs will ensure that the browser can verify the authenticity of the bank’s website.

asked 02/10/2024
himanshu deshpande
41 questions
Total 769 questions
Go to page: of 77
Search

Related questions