ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 70

Question list
Search
Search

List of questions

Search

Related questions











Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?

A.

Network and Sharing Center

A.

Network and Sharing Center

Answers
B.

Internet Options

B.

Internet Options

Answers
C.

Firewall settings

C.

Firewall settings

Answers
D.

System settings

D.

System settings

Answers
Suggested answer: B

Explanation:

Detailed

The correct place to check proxy settings in Windows 10 is under Internet Options (Option B), specifically in the 'Connections' tab. Proxy configurations can affect internet speeds if misconfigured or if a proxy is being used unnecessarily.

Network and Sharing Center (Option A) provides information on network connections but doesn't handle proxy settings.

Firewall settings (Option C) manage network traffic rules but don't directly affect proxy settings.

System settings (Option D) contain general system configurations, not specific to proxy settings.

CompTIA A+ Core 2

Reference:

1.6 - Configure networking features in Windows, including proxy settings

Which of the following types of malware is designed to enable administrative access to a computer?

A.

Rootkit

A.

Rootkit

Answers
B.

Trojan

B.

Trojan

Answers
C.

Worm

C.

Worm

Answers
D.

Ransomware

D.

Ransomware

Answers
Suggested answer: A

Explanation:

Detailed

A rootkit (Option A) is a type of malware designed to gain administrative (root) access to a system while hiding its presence. Rootkits can manipulate system processes and files to remain undetected, making them particularly dangerous.

Trojan (Option B) is malware disguised as legitimate software but doesn't necessarily provide administrative access.

Worm (Option C) spreads across networks but doesn't grant administrative access.

Ransomware (Option D) encrypts data and demands a ransom but doesn't typically provide ongoing administrative access.

CompTIA A+ Core 2

Reference:

2.3 - Explain malware types, including rootkits and their purpose .

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?

A.

SQL

A.

SQL

Answers
B.

HTML

B.

HTML

Answers
C.

PowerShell

C.

PowerShell

Answers
D.

C#

D.

C#

Answers
Suggested answer: C

Explanation:

Detailed

PowerShell (Option C) is a powerful scripting language used in Windows environments for automating tasks, including the configuration of services across multiple systems. It is widely used by system administrators for scripting and automating administrative tasks.

SQL (Option A) is used for managing databases, not for scripting system configurations.

HTML (Option B) is a markup language for web development, not for automating services.

C# (Option D) is a general-purpose programming language but is not primarily used for administrative automation tasks.

CompTIA A+ Core 2

Reference:

4.8 - Basics of scripting, including PowerShell for automation

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

A.

format

A.

format

Answers
B.

netstat

B.

netstat

Answers
C.

diskpart

C.

diskpart

Answers
D.

net use

D.

net use

Answers
E.

rmdir

E.

rmdir

Answers
Suggested answer: D

Explanation:

Detailed

The net use (Option D) command is used to manage network drives in Windows. It can be used to display and disconnect mapped network drives, making it the correct choice for removing unused network drives.

format (Option A) is used to format disks, not for managing network drives.

netstat (Option B) displays network connections but doesn't manage network drives.

diskpart (Option C) is used for disk partitioning, not network drive management.

rmdir (Option E) is used to remove directories, not network drives.

CompTIA A+ Core 2

Reference:

1.2 - Use the appropriate Microsoft command-line tool, including net use for managing network drives .

A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?

A.

Enable cellular data.

A.

Enable cellular data.

Answers
B.

Increase data limits.

B.

Increase data limits.

Answers
C.

Disconnect the VPN.

C.

Disconnect the VPN.

Answers
D.

Reinstall the SIM card.

D.

Reinstall the SIM card.

Answers
Suggested answer: A

Explanation:

The most likely solution to this issue is to enable cellular data. After a business trip, the user may have disabled cellular data to avoid roaming charges, or the phone may have been set to Wi-Fi only for internet access. Enabling cellular data would restore internet access outside of Wi-Fi networks.

A computer is restarting automatically and displaying the following error message: 'Your PC ran into a problem and needs to restart. We're just collecting some error info, and then we'll restart for you. (0% complete).' Which of the following should the technician do first to diagnose the issue?

A.

Check the system event logs.

A.

Check the system event logs.

Answers
B.

Verify the hardware driver versions.

B.

Verify the hardware driver versions.

Answers
C.

Install Windows updates.

C.

Install Windows updates.

Answers
D.

Perform a RAM diagnostic.

D.

Perform a RAM diagnostic.

Answers
Suggested answer: A

Explanation:

The first step is to check the system event logs using tools like Event Viewer. This will allow the technician to identify any critical errors or warnings that occurred before the restart. Based on these logs, further troubleshooting can be done. Verifying driver versions and performing diagnostics can follow once the root cause is identified.

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

A.

End-user acceptance

A.

End-user acceptance

Answers
B.

Cost analysis

B.

Cost analysis

Answers
C.

Rollback plan

C.

Rollback plan

Answers
D.

Standard maintenance window

D.

Standard maintenance window

Answers
Suggested answer: C

Explanation:

A rollback plan is essential for a change to be approved by a change management review board. It outlines the steps to reverse a change in case something goes wrong, minimizing downtime and mitigating risk. Other items like end-user acceptance and cost analysis are important but not typically the deciding factor for approval.

Which of the following methods is a way to superficially delete files on a hard drive?

A.

Drilling

A.

Drilling

Answers
B.

Degaussing

B.

Degaussing

Answers
C.

Wiping

C.

Wiping

Answers
D.

Shredding

D.

Shredding

Answers
E.

Low-level formatting

E.

Low-level formatting

Answers
Suggested answer: A

Explanation:

Drilling is a method of physically damaging the hard drive by drilling holes through it, which renders the drive inoperable. However, it is not a secure method for ensuring data cannot be recovered. Methods such as wiping or degaussing are more secure.

A user reported that Windows has crashed several times during the day. A technician needs to check error messages to determine whether the issue pertains to the hardware or an application. Which of the following tools should the technician use?

A.

Event Viewer

A.

Event Viewer

Answers
B.

Resource Monitor

B.

Resource Monitor

Answers
C.

Performance Monitor

C.

Performance Monitor

Answers
D.

Device Manager

D.

Device Manager

Answers
Suggested answer: A

Explanation:

Detailed

Event Viewer (Option A) is the appropriate tool to check for system and application logs, including error messages and crash reports. It helps the technician determine the cause of the crashes by reviewing logged events.

Resource Monitor (Option B) tracks real-time usage of system resources but doesn't log errors.

Performance Monitor (Option C) monitors system performance but isn't primarily used for crash diagnostics.

Device Manager (Option D) manages hardware devices but doesn't provide crash logs.

CompTIA A+ Core 2

Reference:

3.1 - Troubleshoot common Windows OS problems using tools like Event Viewer


Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

A.

DoS

A.

DoS

Answers
B.

Spoofing

B.

Spoofing

Answers
C.

XSS

C.

XSS

Answers
D.

SQL injection

D.

SQL injection

Answers
Suggested answer: C

Explanation:

Detailed

Cross-site scripting (XSS) (Option C) allows attackers to inject malicious scripts into web pages viewed by users. When the user visits the compromised site, the script runs in the user's browser, potentially allowing the attacker to steal data or perform unauthorized actions. XSS is a common vulnerability in web applications that allows code execution.

DoS (Option A) disrupts services but doesn't involve executing code on a user's device.

Spoofing (Option B) involves impersonating another device or user but doesn't execute code.

SQL injection (Option D) attacks a database and is unrelated to executing code on the user's computer.

CompTIA A+ Core 2

Reference:

2.4 - Explain common social engineering attacks, including XSS.

Total 755 questions
Go to page: of 76