ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 72

Question list
Search
Search

List of questions

Search

Related questions











A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

A.

.msi

A.

.msi

Answers
B.

.iso

B.

.iso

Answers
C.

.zip

C.

.zip

Answers
D.

.exe

D.

.exe

Answers
Suggested answer: B

Explanation:

An .iso file is a disk image file that needs to be mounted or burned to a physical or virtual drive. When the technician is prompted to mount the drive, it indicates that the file is an ISO, and they must mount it to proceed with the installation.

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

A.

Unplug the extra hardware.

A.

Unplug the extra hardware.

Answers
B.

Delete unnecessary files.

B.

Delete unnecessary files.

Answers
C.

Update the driver software.

C.

Update the driver software.

Answers
D.

Restore the system files.

D.

Restore the system files.

Answers
E.

Uninstall unused desktop applications.

E.

Uninstall unused desktop applications.

Answers
F.

Add additional memory.

F.

Add additional memory.

Answers
Suggested answer: B, E

Explanation:

To free up space for the upgrade, the technician should delete unnecessary files and uninstall unused desktop applications. These actions will clear storage, making room for the update. Additional memory would not solve a storage issue, and driver updates are not relevant to the storage space problem.

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

A.

To ensure that all removable media is password protected in case of loss or theft

A.

To ensure that all removable media is password protected in case of loss or theft

Answers
B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

Answers
C.

To enforce VPN connectivity to be encrypted by hardware modules

C.

To enforce VPN connectivity to be encrypted by hardware modules

Answers
D.

To configure all laptops to use the TPM as an encryption factor for hard drives

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Answers
Suggested answer: A

Explanation:

Detailed Explanation with Core 2

Reference:

BitLocker To Go is a feature in Windows that allows for encryption of removable drives to protect sensitive information. Training staff on BitLocker To Go ensures that if a removable drive is lost or stolen, it will be password-protected and encrypted, making the data inaccessible to unauthorized individuals. This aligns with Core 2 objectives related to security measures for data-at-rest encryption and best practices for safeguarding information (CompTIA A+ Core 2 Objective 2.6).

Several computers have been infected with malware, causing the company network to slow down and sensitive company information to be lost. The IT department installs new antivirus software to remove the malware and needs to decide the best method to prevent future malware infections. Which of the following methods would be the most effective?

A.

Encrypting data at rest

A.

Encrypting data at rest

Answers
B.

Implementing firewalls

B.

Implementing firewalls

Answers
C.

Utilizing Intrusion detection systems

C.

Utilizing Intrusion detection systems

Answers
D.

Backing up data regularly

D.

Backing up data regularly

Answers
Suggested answer: C

Explanation:

Detailed Explanation with Core 2

Reference:

Intrusion Detection Systems (IDS) monitor network traffic for malicious activities and alert administrators, helping to prevent malware infections before they can impact the network significantly. CompTIA Core 2 emphasizes the importance of implementing preventive measures like IDS to proactively detect and respond to potential threats (Core 2 Objective 2.3).

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . : reddog.microsoft.com

Link-local IPv6 Address .......... : fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................: 10.203.10.16

Subnet Mask ...................... : 255.255.255.0

Default Gateway .................. : 10.203.10.1

Which of the following commands did the technician use?

A.

ipconfig

A.

ipconfig

Answers
B.

tracert

B.

tracert

Answers
C.

whoami

C.

whoami

Answers
D.

net use

D.

net use

Answers
Suggested answer: A

Explanation:

Detailed Explanation with Core 2

Reference:

The ipconfig command displays the IP address, subnet mask, and default gateway for all network adapters in a Windows computer. This output specifically shows details about an Ethernet adapter, which is directly tied to ipconfig. According to Core 2, understanding command-line tools like ipconfig is essential for network troubleshooting (Core 2 Objective 1.2).

A proxy server is required for internet access from a corporate network. Which of the following should a technician perform to manually configure a Windows 10 device for internet access?

A.

Add the proxy server's URL and IP address to the computer's hosts file under C:\windows\System32\drivers\etc.

A.

Add the proxy server's URL and IP address to the computer's hosts file under C:\windows\System32\drivers\etc.

Answers
B.

Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.

B.

Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.

Answers
C.

Open a command prompt and run ipconfig /release, followed by ipconfig /renew.

C.

Open a command prompt and run ipconfig /release, followed by ipconfig /renew.

Answers
D.

Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway.

D.

Set the proxy server as the default gateway under the computer's network connection IP settings by selecting Manual, then entering the proxy server's IP address under Gateway.

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Configuring a proxy server in Windows 10 can be done through the Internet Options under LAN settings, where the user can enable and enter a proxy server's address. This aligns with Core 2's objectives of configuring network settings in a Windows environment (Core 2 Objective 1.4).

A technician discovers a user's PC has a 'No OS found' error message. Which of the following steps should the technician take next?

A.

Remove external storage and reboot the PC.

A.

Remove external storage and reboot the PC.

Answers
B.

Replace the SSD and run disk defragmenter.

B.

Replace the SSD and run disk defragmenter.

Answers
C.

Start up in safe mode and roll back the latest security updates.

C.

Start up in safe mode and roll back the latest security updates.

Answers
D.

Back up personal data and rebuild the user profile.

D.

Back up personal data and rebuild the user profile.

Answers
Suggested answer: A

Explanation:

Detailed Explanation with Core 2

Reference:

A 'No OS found' message often occurs if the PC is trying to boot from an external storage device that does not contain an OS. Removing any external devices and rebooting can resolve this issue. This approach is part of troubleshooting boot-related problems, as emphasized in Core 2 (Core 2 Objective 3.1).

A technician is replacing the rack mount UPS. Which of the following should the technician consider?

A.

Determining the availability of compressed air

A.

Determining the availability of compressed air

Answers
B.

Getting assistance to lift the hardware

B.

Getting assistance to lift the hardware

Answers
C.

Checking local low-voltage regulations

C.

Checking local low-voltage regulations

Answers
D.

Testing the fire suppression system

D.

Testing the fire suppression system

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Rack-mounted UPS units are often heavy, so technicians should seek assistance to lift them to avoid injury, following safety procedures. Core 2 includes handling hardware safely as part of best practices (Core 2 Objective 4.4).

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?

A.

SQL

A.

SQL

Answers
B.

HTML

B.

HTML

Answers
C.

PowerShell

C.

PowerShell

Answers
D.

C#

D.

C#

Answers
Suggested answer: C

Explanation:

Detailed Explanation with Core 2

Reference:

PowerShell is a powerful scripting language used in Windows environments to automate administrative tasks and configure services across multiple systems. According to Core 2, understanding scripting languages like PowerShell is essential for automating administrative functions (Core 2 Objective 4.8).

A user is unable to open personal files on a PC on a home network. An on-screen message indicates the files are encrypted and demands payment to access the files. Which of the following should a technician recommend the user do first?

A.

Reinstall the OS.

A.

Reinstall the OS.

Answers
B.

Run the System Restore feature.

B.

Run the System Restore feature.

Answers
C.

Disconnect the PC from the network.

C.

Disconnect the PC from the network.

Answers
D.

Pay the amount demanded.

D.

Pay the amount demanded.

Answers
E.

Scan the PC with an anti-malware program.

E.

Scan the PC with an anti-malware program.

Answers
Suggested answer: C

Explanation:

Detailed Explanation with Core 2

Reference:

The PC is likely infected with ransomware. The immediate step should be to disconnect from the network to prevent the malware from spreading to other devices. Core 2 highlights steps to respond to malware incidents, such as disconnecting from the network as part of containment measures (Core 2 Objective 2.3).

Total 755 questions
Go to page: of 76