CompTIA 220-1102 Practice Test - Questions Answers, Page 74
List of questions
Related questions
Which of the following is used to detect and record access to restricted areas?
Bollards
Video surveillance
Badge readers
Fence
A technician is configuring a workstation's security settings, and the following options are available:
Account lockout policy
Group policy
Two-factor authentication
Password complexity requirements
Firewalls
User accounts
Access control lists
Antivirus software
Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?
Account lockout policy
Group policy
Two-factor authentication
Access control lists
A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?
End-user license agreement
Non-disclosure agreement
Regulatory compliance
Acceptable use policy
A technician is installing an operating system on a new computer. Which of the following is the first step of the process?
Setting the boot order
Formatting the hard drive
Entering the product key
Selecting the filesystem
A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?
Storage cache
Malicious applications
Privacy settings
Permissions
A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?
End-user acceptance
Staff delegation
Appropriate scoping
Sandbox testing
Which of the following applications allows a user to create backups in macOS?
Time Machine
FileVault
Keychain
Mission Control
A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?
Degauss the drives
Drill through the drives
Wipe the drives
Reimage the drives
The following error is displayed on a user's computer screen:
No operating system found
Which of the following is the first troubleshooting step a technician should complete?
Disconnect external storage
Flash the BIOS
Replace the SATA cable
Turn on the device in safe mode
A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?
AES
RADIUS
TKIP
WPA3
Question