CompTIA 220-1102 Practice Test - Questions Answers, Page 74
List of questions
Question 731

Which of the following is used to detect and record access to restricted areas?
Question 732

A technician is configuring a workstation's security settings, and the following options are available:
Account lockout policy
Group policy
Two-factor authentication
Password complexity requirements
Firewalls
User accounts
Access control lists
Antivirus software
Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?
Question 733

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?
Question 734

A technician is installing an operating system on a new computer. Which of the following is the first step of the process?
Question 735

A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?
Question 736

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?
Question 737

Which of the following applications allows a user to create backups in macOS?
Question 738

A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?
Question 739

The following error is displayed on a user's computer screen:
No operating system found
Which of the following is the first troubleshooting step a technician should complete?
Question 740

A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?
Question