CompTIA 220-1102 Practice Test - Questions Answers, Page 79

List of questions
Question 781

Which of the following file types should be used to install software on a macOS computer? (Select two).
Question 782

A technician is on-site dealing with an angry customer. The customer thinks the issues have not been addressed, while the technician thinks that the issue has been correctly resolved. Which of the following should the technician do to handle the situation?
Question 783

A technician is troubleshooting a connectivity issue and wants to verify that traffic is flowing to the correct upstream locations. Which of the following commands should the technician use?
Question 784

A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?
Question 785

After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists. Which of the following is the most likely way to resolve the issue?
Question 786

An application's performance is degrading over time. The application is slowing but never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?
Question 787

Which of the following commands should be used to display current processor activity on a Linux workstation?
Question 788

After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?
Question 789

A company has experienced a ransomware attack. Which of the following is the best way to recover from ransomware?
Question 790

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?
Question