ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 74

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is used to detect and record access to restricted areas?

A.

Bollards

A.

Bollards

Answers
B.

Video surveillance

B.

Video surveillance

Answers
C.

Badge readers

C.

Badge readers

Answers
D.

Fence

D.

Fence

Answers
Suggested answer: C

Explanation:

Badge readers are devices that scan employee or visitor credentials, logging entries and exits from restricted areas. Video surveillance (B) provides a visual record but does not directly control access. Bollards (A) and fences (D) provide physical security but cannot detect or record access events.

A technician is configuring a workstation's security settings, and the following options are available:

Account lockout policy

Group policy

Two-factor authentication

Password complexity requirements

Firewalls

User accounts

Access control lists

Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

A.

Account lockout policy

A.

Account lockout policy

Answers
B.

Group policy

B.

Group policy

Answers
C.

Two-factor authentication

C.

Two-factor authentication

Answers
D.

Access control lists

D.

Access control lists

Answers
Suggested answer: B

Explanation:

Detailed

The technician should configure 'Group Policy' (Option B) to enforce password complexity across the enterprise. Group Policy in a Windows environment allows administrators to manage various settings, including password policies, at a domain level. This can include enforcing complexity requirements (such as minimum length, use of uppercase, lowercase, and special characters), expiration times, and other security measures.

Account lockout policy (Option A) controls how many failed login attempts trigger a lockout but does not handle password complexity.

Two-factor authentication (Option C) is an additional security measure requiring a second form of authentication, but it does not enforce password policies.

Access control lists (Option D) define which users or systems have access to resources, not how passwords are managed.

CompTIA A+ Core 2

Reference:

2.6 - Configure workstation security best practices, including password complexity and group policies.

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

A.

End-user license agreement

A.

End-user license agreement

Answers
B.

Non-disclosure agreement

B.

Non-disclosure agreement

Answers
C.

Regulatory compliance

C.

Regulatory compliance

Answers
D.

Acceptable use policy

D.

Acceptable use policy

Answers
Suggested answer: D

Explanation:

Detailed

The appropriate choice is 'Acceptable Use Policy' (Option D). This policy defines the rules for how users should use the system, including login expectations and proper behavior when using company resources. It's typically displayed as a splash screen to remind users of their responsibilities.

End-user license agreement (Option A) pertains to the terms of software usage.

Non-disclosure agreement (Option B) deals with confidentiality but is unrelated to login behavior.

Regulatory compliance (Option C) relates to adherence to laws and regulations, but it is not typically displayed on a splash screen for login expectations.

CompTIA A+ Core 2

Reference:

4.6 - Explain the importance of prohibited content/activity and acceptable use policies.

A technician is installing an operating system on a new computer. Which of the following is the first step of the process?

A.

Setting the boot order

A.

Setting the boot order

Answers
B.

Formatting the hard drive

B.

Formatting the hard drive

Answers
C.

Entering the product key

C.

Entering the product key

Answers
D.

Selecting the filesystem

D.

Selecting the filesystem

Answers
Suggested answer: A

Explanation:

Detailed

The first step in installing an operating system on a new computer is Setting the boot order (Option A). This ensures that the computer can boot from the installation media (USB, DVD, etc.). Once the boot order is configured, the system can start from the installation source, and the rest of the OS installation process can proceed.

Formatting the hard drive (Option B) comes later in the process, after the installation media is booted.

Entering the product key (Option C) and Selecting the filesystem (Option D) are subsequent steps during the installation process.

CompTIA A+ Core 2

Reference:

1.9 - Perform OS installations and upgrades, including setting boot methods and boot order.

A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?

A.

Storage cache

A.

Storage cache

Answers
B.

Malicious applications

B.

Malicious applications

Answers
C.

Privacy settings

C.

Privacy settings

Answers
D.

Permissions

D.

Permissions

Answers
Suggested answer: B

Explanation:

Detailed

Since both developer mode and the ability to install apps from unknown sources are enabled, the technician should check for Malicious applications (Option B). Unknown sources can allow unverified apps that may include malware or apps that use excessive background data without the user's knowledge. Checking for malicious apps is essential in this scenario.

Storage cache (Option A) would not typically cause high data usage.

Privacy settings (Option C) control data sharing and permissions but don't directly impact data usage.

Permissions (Option D) might help identify apps using data, but the focus should be on apps that could be malicious.

CompTIA A+ Core 2

Reference:

2.7 - Explain common methods for securing mobile devices, including detecting and preventing malware.

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

A.

End-user acceptance

A.

End-user acceptance

Answers
B.

Staff delegation

B.

Staff delegation

Answers
C.

Appropriate scoping

C.

Appropriate scoping

Answers
D.

Sandbox testing

D.

Sandbox testing

Answers
Suggested answer: D

Explanation:

Detailed

The issue could have been avoided if the developer had used Sandbox testing (Option D), which allows new software to be tested in a controlled environment before implementation. This process ensures that the software does not negatively impact system functionality, like stopping access to critical resources such as file servers.

End-user acceptance (Option A) ensures that users approve the software, but it wouldn't prevent the issue.

Staff delegation (Option B) relates to who is responsible but doesn't address testing.

Appropriate scoping (Option C) helps in defining the extent of changes but does not replace testing.

CompTIA A+ Core 2

Reference:

4.2 - Explain basic change management best practices, including testing in a sandbox environment.

Which of the following applications allows a user to create backups in macOS?

A.

Time Machine

A.

Time Machine

Answers
B.

FileVault

B.

FileVault

Answers
C.

Keychain

C.

Keychain

Answers
D.

Mission Control

D.

Mission Control

Answers
Suggested answer: A

Explanation:

Detailed

Time Machine (Option A) is macOS's built-in backup application. It allows users to automatically back up their entire system, including apps, music, photos, emails, and system files. Time Machine provides an easy way to restore files from a previous state or recover from a system failure.

FileVault (Option B) is used for encrypting data, not for backups.

Keychain (Option C) is a password management tool.

Mission Control (Option D) manages open windows and desktops but has no backup functionality.

CompTIA A+ Core 2

Reference:

1.10 - Features and tools of macOS, including backup options like Time Machine.

A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?

A.

Degauss the drives

A.

Degauss the drives

Answers
B.

Drill through the drives

B.

Drill through the drives

Answers
C.

Wipe the drives

C.

Wipe the drives

Answers
D.

Reimage the drives

D.

Reimage the drives

Answers
Suggested answer: C

Explanation:

Detailed

The appropriate method to prevent unauthorized access to sensitive data is to wipe the drives (Option C). Wiping ensures that all data is securely erased, preventing any possibility of recovery. This is essential when handling drives containing Personally Identifiable Information (PII).

Degaussing (Option A) erases data but is more commonly used for magnetic tapes.

Drilling through the drives (Option B) physically destroys the drives, which may not be necessary if they are being reused.

Reimaging (Option D) would overwrite the current data with new data but may not guarantee complete data destruction.

CompTIA A+ Core 2

Reference:

2.8 - Use common data destruction and disposal methods, including securely wiping drives.

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

A.

Disconnect external storage

A.

Disconnect external storage

Answers
B.

Flash the BIOS

B.

Flash the BIOS

Answers
C.

Replace the SATA cable

C.

Replace the SATA cable

Answers
D.

Turn on the device in safe mode

D.

Turn on the device in safe mode

Answers
Suggested answer: A

Explanation:

Detailed

The first step is to disconnect external storage (Option A). Sometimes, the system may be attempting to boot from an external drive or USB device instead of the internal hard drive. By removing the external storage, the system will attempt to boot from the correct drive.

Flashing the BIOS (Option B) is more complex and typically unnecessary for this issue.

Replacing the SATA cable (Option C) may help if there's a hardware issue, but it's not the first troubleshooting step.

Turning on the device in safe mode (Option D) would not work if no operating system is detected.

CompTIA A+ Core 2

Reference:

5.1 - Apply troubleshooting methodologies, including steps for resolving boot issues.

A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?

A.

AES

A.

AES

Answers
B.

RADIUS

B.

RADIUS

Answers
C.

TKIP

C.

TKIP

Answers
D.

WPA3

D.

WPA3

Answers
Suggested answer: B

Explanation:

Detailed

RADIUS (Remote Authentication Dial-In User Service) (Option B) is a network protocol that allows users to authenticate using their network credentials, such as usernames and passwords, typically stored in a central directory like Active Directory. It ensures that users can log in to the Wi-Fi using their existing network credentials.

AES (Option A) is an encryption standard but does not handle authentication.

TKIP (Option C) is a deprecated encryption protocol and not related to network login management.

WPA3 (Option D) is the latest Wi-Fi security standard but does not specifically handle centralized login management like RADIUS does.

CompTIA A+ Core 2

Reference:

2.2 - Compare and contrast wireless security protocols and authentication methods, including RADIUS.

Total 755 questions
Go to page: of 76