ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 76

Question list
Search
Search

Related questions











A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing. Which of the following remote access technologies should the administrator use?

A.

RDP

A.

RDP

Answers
B.

MSRA

B.

MSRA

Answers
C.

SSH

C.

SSH

Answers
D.

VNC

D.

VNC

Answers
Suggested answer: C

Explanation:

Detailed Explanation with Core 2

Reference:

SSH allows for remote access to systems securely and discretely, suitable for verifying patch levels and other administrative tasks. This meets Core 2 objectives on using secure remote access tools (Core 2 Objective 4.9).

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled and no other antivirus is installed on the PC. Which of the following would have caused this issue?

A.

Ransomware

A.

Ransomware

Answers
B.

Rootkit

B.

Rootkit

Answers
C.

Spyware

C.

Spyware

Answers
D.

Keylogger

D.

Keylogger

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Rootkits can disable antivirus programs, including Windows Defender, as they operate at a low level within the OS to avoid detection. This issue falls under malware types and removal strategies in Core 2 (Core 2 Objective 2.3).

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

A.

Reenroll the user's mobile device to be used as an MFA token.

A.

Reenroll the user's mobile device to be used as an MFA token.

Answers
B.

Use a private browsing window to avoid local session conflicts.

B.

Use a private browsing window to avoid local session conflicts.

Answers
C.

Bypass single sign-on by directly authenticating to the application.

C.

Bypass single sign-on by directly authenticating to the application.

Answers
D.

Reset the device being used to factory defaults.

D.

Reset the device being used to factory defaults.

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Using a private browsing window can help resolve session conflicts by not relying on cached credentials, which might interfere with single sign-on processes. Core 2 objectives include troubleshooting authentication issues and resolving potential conflicts with single sign-on systems (Core 2 Objective 4.7).

Which of the following is a preventive physical security control?

A.

Video surveillance system

A.

Video surveillance system

Answers
B.

Bollards

B.

Bollards

Answers
C.

Alarm system

C.

Alarm system

Answers
D.

Motion sensors

D.

Motion sensors

Answers
Suggested answer: B

Explanation:

Detailed Explanation with Core 2

Reference:

Bollards are physical barriers that prevent unauthorized vehicle access to certain areas, providing a preventive measure against unauthorized entry and potential threats. Bollards are classified as a preventive control because they act to deter or block physical access to secured locations, as opposed to video surveillance or alarm systems, which are typically used for detection and monitoring. Core 2 highlights the importance of implementing various physical security controls to protect assets and infrastructure (Core 2 Objective 2.1).

A user's mobile phone battery does not last long and navigation is very slow. Which of the following should the technician do first to resolve the issue?

A.

Uninstall unused programs

A.

Uninstall unused programs

Answers
B.

Check running applications

B.

Check running applications

Answers
C.

Update the mobile OS

C.

Update the mobile OS

Answers
D.

Disable network services

D.

Disable network services

Answers
Suggested answer: B

Explanation:

Detailed

The first step is to check running applications (Option B). Applications running in the background could consume a lot of battery and processing power, causing slow performance and battery drain. By identifying and closing or uninstalling these apps, the technician can resolve the issue more effectively.

Uninstalling unused programs (Option A) might help, but checking active applications is more immediate.

Updating the mobile OS (Option C) can improve performance but is not the first step in this scenario.

Disabling network services (Option D) might help reduce battery drain but does not address potential app-related issues.

CompTIA A+ Core 2

Reference:

3.4 - Troubleshoot common mobile OS and application issues, including battery and performance concerns.

Total 755 questions
Go to page: of 76