ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 73

Question list
Search
Search

List of questions

Search

Related questions











A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

A.

Transaction log

A.

Transaction log

Answers
B.

Incremental

B.

Incremental

Answers
C.

Synthetic

C.

Synthetic

Answers
D.

Differential

D.

Differential

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Incremental backups only save changes made since the last backup, significantly reducing storage space requirements compared to full backups. This approach is consistent with the Core 2 objective of understanding various backup methods and their space requirements (Core 2 Objective 4.3).

A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?

A.

Dynamic

A.

Dynamic

Answers
B.

Gateway

B.

Gateway

Answers
C.

NAT

C.

NAT

Answers
D.

DNS server

D.

DNS server

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

The default gateway directs network traffic to external networks. If the traffic is still going to the old firewall, updating the gateway setting will redirect it to the new firewall. This task is part of network configuration management covered in Core 2 (Core 2 Objective 2.5).

A user is unable to access the company's network. A technician learns the user's account became inaccessible after multiple unsuccessful login attempts. The user also changed their password before the issue started. Which of the following steps should the technician take to resolve the issue?

A.

Escalate the user's issue to the network team.

A.

Escalate the user's issue to the network team.

Answers
B.

Reset the user's password.

B.

Reset the user's password.

Answers
C.

Unlock the user's account.

C.

Unlock the user's account.

Answers
D.

Verify the user's login and password.

D.

Verify the user's login and password.

Answers
Suggested answer: C

Explanation:

Detailed Explanation with Core 2

Reference:

If multiple unsuccessful attempts led to the account being locked, the technician should unlock the account. Core 2 covers user account management practices, including unlocking accounts and managing failed login attempts (Core 2 Objective 2.5).

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

A.

Group Policy

A.

Group Policy

Answers
B.

Firewall

B.

Firewall

Answers
C.

Microsoft Management Control

C.

Microsoft Management Control

Answers
D.

MSConfig

D.

MSConfig

Answers
Suggested answer: A

Explanation:

Disabling guest accounts on domain-joined machines is done through Group Policy. Group Policy allows centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. By using the Group Policy Editor (gpedit.msc), administrators can enforce policies such as disabling the guest account across all machines within the domain. The other options (Firewall, Microsoft Management Console, MSConfig) do not provide functionality specific to managing user accounts in this context.

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

A.

Providing user awareness education

A.

Providing user awareness education

Answers
B.

Introducing a BYOD policy

B.

Introducing a BYOD policy

Answers
C.

Setting up SMTP filtering rules

C.

Setting up SMTP filtering rules

Answers
D.

Restricting emails from personal email addresses

D.

Restricting emails from personal email addresses

Answers
Suggested answer: A

Explanation:

User awareness education is the most effective method for reducing phishing attacks. Training users to recognize suspicious emails, links, and attachments can prevent them from falling for phishing attempts. Technical solutions like SMTP filtering (C) and restricting emails (D) can help but are not as effective without user vigilance. A BYOD policy (B) does not directly address phishing email threats.

Which of the following best describes XFS?

A.

A filesystem used by the Linux OS

A.

A filesystem used by the Linux OS

Answers
B.

A filesystem used by iOS

B.

A filesystem used by iOS

Answers
C.

A filesystem used by the Windows OS

C.

A filesystem used by the Windows OS

Answers
D.

A filesystem used by macOS

D.

A filesystem used by macOS

Answers
Suggested answer: A

Explanation:

XFS is a high-performance filesystem created by Silicon Graphics in 1994 and is commonly used by Linux operating systems. It supports large files and directories and is known for its robustness and scalability. Other filesystems like NTFS (Windows), APFS (macOS), and HFS (macOS) are used on different platforms.

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

A.

msi

A.

msi

Answers
B.

iso

B.

iso

Answers
C.

zip

C.

zip

Answers
D.

exe

D.

exe

Answers
Suggested answer: B

Explanation:

The file type ISO is a disk image format that contains everything from a CD, DVD, or Blu-ray disc in a single file. When an ISO file is accessed, the system prompts the user to mount it as a virtual drive, which is why the technician received a 'mount a drive' prompt. MSI (A) is for installing software, ZIP (C) is a compressed file, and EXE (D) is an executable file.

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

A.

Shut down and cold start the smartphone

A.

Shut down and cold start the smartphone

Answers
B.

Delete the email containing the attachment

B.

Delete the email containing the attachment

Answers
C.

Wipe the device and reset it to factory defaults

C.

Wipe the device and reset it to factory defaults

Answers
D.

Uninstall and reinstall the mobile browser

D.

Uninstall and reinstall the mobile browser

Answers
Suggested answer: C

Explanation:

In this case, abnormal behavior after opening a suspicious email suggests malware might have infected the device. A full factory reset is recommended to remove any persistent malware, especially when a restart does not resolve the issue. Deleting the email or reinstalling the browser will not remove the malware already on the device.

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

A.

Data-in-transit encryption

A.

Data-in-transit encryption

Answers
B.

File encryption

B.

File encryption

Answers
C.

USB drive encryption

C.

USB drive encryption

Answers
D.

Disk encryption

D.

Disk encryption

Answers
Suggested answer: D

Explanation:

Disk encryption is the best method for securing a workstation used in financial transactions, such as point-of-sale systems. It ensures that if the workstation is stolen, all data on the disk is encrypted and cannot be accessed without proper credentials. File encryption (B) only encrypts individual files, and USB drive encryption (C) only applies to removable storage. Data-in-transit encryption (A) is not relevant for physical security.

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled, and no other antivirus is installed on the PC. Which of the following would have caused this issue?

A.

Ransomware

A.

Ransomware

Answers
B.

Rootkit

B.

Rootkit

Answers
C.

Spyware

C.

Spyware

Answers
D.

Keylogger

D.

Keylogger

Answers
Suggested answer: B

Explanation:

Rootkits are particularly dangerous because they modify the operating system to hide their presence and can disable antivirus software like Windows Defender. Ransomware (A) encrypts files, but usually does not disable antivirus software. Spyware (C) and Keyloggers (D) typically do not directly disable antivirus programs either.

Total 755 questions
Go to page: of 76