ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 75

Question list
Search
Search

List of questions

Search

Related questions











A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?

A.

Disconnect the computer from the network

A.

Disconnect the computer from the network

Answers
B.

Run an antivirus scan

B.

Run an antivirus scan

Answers
C.

Reboot the computer

C.

Reboot the computer

Answers
D.

Educate the user about cybersecurity best practices

D.

Educate the user about cybersecurity best practices

Answers
Suggested answer: A

Explanation:

Detailed

The technician should disconnect the computer from the network (Option A) first to prevent any further spread of the infection or data loss. Once the machine is isolated from the network, the technician can safely investigate the malware without risking infection to other systems.

Running an antivirus scan (Option B) comes after isolating the system.

Rebooting the computer (Option C) could lead to the loss of critical information or make it harder to diagnose the issue.

Educating the user (Option D) is important but should happen after resolving the immediate issue.

CompTIA A+ Core 2

Reference:

3.3 - Best practices for malware removal, including isolating the system first.

A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?

A.

gpugdate

A.

gpugdate

Answers
B.

devmgmt

B.

devmgmt

Answers
C.

regedit

C.

regedit

Answers
D.

resmon

D.

resmon

Answers
Suggested answer: A

Explanation:

Detailed

The correct command is gpupdate (Option A), which refreshes Group Policy settings. To implement password requirements across domain-joined computers, the policy would be set via Group Policy, and then running the gpupdate command ensures that the new settings are applied to all systems.

devmgmt (Option B) opens Device Manager, which is unrelated to Group Policy.

regedit (Option C) opens the Windows Registry Editor, which is not used for group-wide password policy settings.

resmon (Option D) opens Resource Monitor, which helps monitor system resources, not Group Policy.

CompTIA A+ Core 2

Reference:

1.5 - Using appropriate Windows settings, including password policies via Group Policy.

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

A.

File Explorer Options

A.

File Explorer Options

Answers
B.

Ease of Access

B.

Ease of Access

Answers
C.

Indexing Options

C.

Indexing Options

Answers
D.

Administrative Tools

D.

Administrative Tools

Answers
Suggested answer: D

Explanation:

Detailed

The correct answer is Administrative Tools (Option D), which provides access to several system utilities, including those needed for managing system files and settings. Since the user already has local administrator privileges, this would allow them to edit system properties efficiently.

File Explorer Options (Option A) manage general file display settings but do not provide administrative access.

Ease of Access (Option B) is related to accessibility settings, not file management.

Indexing Options (Option C) control how files are indexed for search, but are unrelated to system file editing.

CompTIA A+ Core 2

Reference:

1.3 - Use features and tools of the Windows operating system, including Administrative Tools.

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

A.

Wi-Fi

A.

Wi-Fi

Answers
B.

Nearby share

B.

Nearby share

Answers
C.

NFC

C.

NFC

Answers
D.

Bluetooth

D.

Bluetooth

Answers
Suggested answer: C

Explanation:

Detailed

To enable contactless payment, NFC (Near Field Communication) (Option C) needs to be enabled. NFC is the technology used in most mobile payment systems to enable close-range communication between the phone and a payment terminal.

Wi-Fi (Option A) and Bluetooth (Option D) are unrelated to contactless payments.

Nearby share (Option B) is a file-sharing feature, not a payment technology.

CompTIA A+ Core 2

Reference:

2.7 - Explain common mobile device security settings, including enabling NFC for mobile payments.

A technician thinks that a computer on the network has been infected with malware. The technician attempts several times to use a malware removal tool, but the issue persists. Which of the following should the technician do next?

A.

Restore the computer from the last known-good backup

A.

Restore the computer from the last known-good backup

Answers
B.

Reboot the computer into safe mode

B.

Reboot the computer into safe mode

Answers
C.

Purchase a new endpoint protection tool

C.

Purchase a new endpoint protection tool

Answers
D.

Use system recovery to prevent further infection

D.

Use system recovery to prevent further infection

Answers
Suggested answer: B

Explanation:

Detailed

Rebooting the computer into safe mode (Option B) limits the processes and services that run, which can help in isolating and removing persistent malware that might be hiding in normal mode. Safe mode provides a cleaner environment to troubleshoot and remove malware.

Restoring from a backup (Option A) may work but should be considered after attempts to clean the infection.

Purchasing a new endpoint protection tool (Option C) is unnecessary at this stage since existing tools can be run in safe mode.

Using system recovery (Option D) could potentially remove the infection, but it's a more drastic step that may not be necessary yet.

CompTIA A+ Core 2

Reference:

3.3 - Best practices for malware removal, including booting into safe mode

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

A.

Port forwarding

A.

Port forwarding

Answers
B.

Unused ports

B.

Unused ports

Answers
C.

SSID broadcast

C.

SSID broadcast

Answers
D.

Allow list

D.

Allow list

Answers
Suggested answer: D

Explanation:

Detailed

Enabling an allow list (Option D) will limit access to the wireless network by only allowing devices with specified MAC addresses to connect. This is an effective method for minimizing Wi-Fi access in a crowded environment.

Port forwarding (Option A) controls traffic through specific ports but doesn't minimize wireless access.

Unused ports (Option B) could refer to physical network ports or firewall settings, unrelated to controlling Wi-Fi access.

Disabling SSID broadcast (Option C) might hide the network name but doesn't secure access.

CompTIA A+ Core 2

Reference:

2.9 - Configure security settings for SOHO networks, including MAC filtering .

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

A.

APK Source

A.

APK Source

Answers
B.

Connectivity issues

B.

Connectivity issues

Answers
C.

Developer Mode

C.

Developer Mode

Answers
D.

Jailbreak

D.

Jailbreak

Answers
Suggested answer: D

Explanation:

Detailed

A jailbroken iPhone (Option D) allows users to bypass Apple's restrictions to install unauthorized apps and modify system settings. This situation suggests the phone may have been compromised or tampered with, potentially voiding warranties and exposing the device to security vulnerabilities.

APK Source (Option A) refers to Android packages, not applicable to iPhones.

Connectivity issues (Option B) doesn't explain the comparison to an identical phone.

Developer Mode (Option C) is typically used for app development, not indicative of the situation.

CompTIA A+ Core 2

Reference:

2.7 - Explain mobile device security, including risks of jailbreaking

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

A.

Remote wipe

A.

Remote wipe

Answers
B.

Mandatory screen locks

B.

Mandatory screen locks

Answers
C.

Location applications

C.

Location applications

Answers
D.

Device data encryption

D.

Device data encryption

Answers
Suggested answer: D

Explanation:

Detailed

Device data encryption (Option D) ensures that even if the device is lost or stolen, its data cannot be accessed without proper credentials, even while offline. Encryption protects the data at rest, making it unreadable without the decryption key.

Remote wipe (Option A) requires the device to be online to receive the wipe command.

Mandatory screen locks (Option B) provide a layer of security but can be bypassed with physical access in some cases.

Location applications (Option C) help track the device but don't protect data.

CompTIA A+ Core 2

Reference:

2.7 - Explain methods for securing mobile devices, including encryption

Which of the following is protected by government policy for end-user information?

A.

DRM

A.

DRM

Answers
B.

EULA

B.

EULA

Answers
C.

PCI

C.

PCI

Answers
D.

PII

D.

PII

Answers
Suggested answer: D

Explanation:

Detailed

Personally Identifiable Information (PII) (Option D) is protected by government regulations. PII includes sensitive data such as names, addresses, social security numbers, and other information that can identify individuals. Various laws, such as GDPR and HIPAA, mandate the protection of PII.

DRM (Option A) refers to digital rights management, which controls access to digital media.

EULA (Option B) refers to software licensing agreements.

PCI (Option C) relates to payment card industry standards for handling cardholder information but is more specific to payment data than general PII.

CompTIA A+ Core 2

Reference:

4.6 - Explain prohibited content and privacy concepts, including the protection of PII.

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

A.

Schedule and perform an antivirus scan and system update

A.

Schedule and perform an antivirus scan and system update

Answers
B.

Educate the end user on internet usage

B.

Educate the end user on internet usage

Answers
C.

Perform a system scan to remove the malware

C.

Perform a system scan to remove the malware

Answers
D.

Create a system restore point

D.

Create a system restore point

Answers
Suggested answer: C

Explanation:

Detailed

The next step after isolating the system is to perform a system scan to remove the malware (Option C). Since ransomware is suspected, running a comprehensive malware scan can help identify and remove the malicious software. It is crucial to deal with the active threat before taking further actions.

Scheduling an antivirus scan and system update (Option A) may help, but the immediate concern is identifying and removing the ransomware.

Educating the end user (Option B) is important but should happen after the immediate threat is resolved.

Creating a system restore point (Option D) would not be useful at this point since the system is infected.

CompTIA A+ Core 2

Reference:

2.3 - Detect, remove, and prevent malware, including handling ransomware.

Total 755 questions
Go to page: of 76