CompTIA 220-1102 Practice Test - Questions Answers, Page 73
List of questions
Related questions
A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?
Transaction log
Incremental
Synthetic
Differential
A company is transitioning to a new firewall and discovers that one of the servers is still sending traffic to the old firewall. Which of the following IP address settings should a technician change to resolve this issue?
Dynamic
Gateway
NAT
DNS server
A user is unable to access the company's network. A technician learns the user's account became inaccessible after multiple unsuccessful login attempts. The user also changed their password before the issue started. Which of the following steps should the technician take to resolve the issue?
Escalate the user's issue to the network team.
Reset the user's password.
Unlock the user's account.
Verify the user's login and password.
A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?
Group Policy
Firewall
Microsoft Management Control
MSConfig
Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?
Providing user awareness education
Introducing a BYOD policy
Setting up SMTP filtering rules
Restricting emails from personal email addresses
Which of the following best describes XFS?
A filesystem used by the Linux OS
A filesystem used by iOS
A filesystem used by the Windows OS
A filesystem used by macOS
A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?
msi
iso
zip
exe
After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?
Shut down and cold start the smartphone
Delete the email containing the attachment
Wipe the device and reset it to factory defaults
Uninstall and reinstall the mobile browser
A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
Data-in-transit encryption
File encryption
USB drive encryption
Disk encryption
A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled, and no other antivirus is installed on the PC. Which of the following would have caused this issue?
Ransomware
Rootkit
Spyware
Keylogger
Question