CompTIA 220-1102 Practice Test - Questions Answers, Page 75
List of questions
Related questions
A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?
Disconnect the computer from the network
Run an antivirus scan
Reboot the computer
Educate the user about cybersecurity best practices
A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?
gpugdate
devmgmt
regedit
resmon
Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?
File Explorer Options
Ease of Access
Indexing Options
Administrative Tools
A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?
Wi-Fi
Nearby share
NFC
Bluetooth
A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?
Restore the computer from the last known-good backup
Reboot the computer into safe mode
Purchase a new endpoint protection tool
Use system recovery to prevent further infection
A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?
Port forwarding
Unused ports
SSID broadcast
Allow list
A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?
APK Source
Connectivity issues
Developer Mode
Jailbreak
Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?
Remote wipe
Mandatory screen locks
Location applications
Device data encryption
Which of the following is protected by government policy for end-user information?
DRM
EULA
PCI
PII
A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?
Schedule and perform an antivirus scan and system update
Educate the end user on internet usage
Perform a system scan to remove the malware
Create a system restore point
Question