ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT?

A.
Continue researching the issue
A.
Continue researching the issue
Answers
B.
Repeat the iterative processes
B.
Repeat the iterative processes
Answers
C.
Inform the CEO the repair will take a couple of weeks
C.
Inform the CEO the repair will take a couple of weeks
Answers
D.
Escalate the ticket
D.
Escalate the ticket
Answers
Suggested answer: D

Explanation:

The technician should escalate the ticket to ensure that the CEO’s device is returned as soon as possible1

A technician needs to exclude an application folder from being cataloged by a Windows 10 search.

Which of the following utilities should be used?

A.
Privacy
A.
Privacy
Answers
B.
Indexing Options
B.
Indexing Options
Answers
C.
System
C.
System
Answers
D.
Device Manager
D.
Device Manager
Answers
Suggested answer: B

Explanation:

To exclude an application folder from being cataloged by a Windows 10 search, the technician should use the Indexing Options utility1

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.
Encryption at rest
A.
Encryption at rest
Answers
B.
Account lockout
B.
Account lockout
Answers
C.
Automatic screen lock
C.
Automatic screen lock
Answers
D.
Antivirus
D.
Antivirus
Answers
Suggested answer: B

Explanation:

Account lockout would best mitigate the threat of a dictionary attack

As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?

A.
Use Settings to access Screensaver settings
A.
Use Settings to access Screensaver settings
Answers
B.
Use Settings to access Screen Timeout settings
B.
Use Settings to access Screen Timeout settings
Answers
C.
Use Settings to access General
C.
Use Settings to access General
Answers
D.
Use Settings to access Display.
D.
Use Settings to access Display.
Answers
Suggested answer: A

Explanation:

The systems administrator should use Settings to access Screensaver settings to configure each user’s Windows device to require a password when resuming from a period of sleep or inactivity

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

A.
Encryption
A.
Encryption
Answers
B.
Wi-Fi channel
B.
Wi-Fi channel
Answers
C.
Default passwords
C.
Default passwords
Answers
D.
Service set identifier
D.
Service set identifier
Answers
Suggested answer: C

Explanation:

the user should change the default passwords first when configuring a new SOHO Wi-Fi router1

An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?

A.
RDP
A.
RDP
Answers
B.
VNC
B.
VNC
Answers
C.
SSH
C.
SSH
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: B

Explanation:

VNC will allow a technician to see the issue along with the user when an organization is centralizing support functions and requires the ability to support a remote user’s desktop1

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

A.
Increase the paging file size
A.
Increase the paging file size
Answers
B.
Run the chkdsk command
B.
Run the chkdsk command
Answers
C.
Rebuild the user's profile
C.
Rebuild the user's profile
Answers
D.
Add more system memory.
D.
Add more system memory.
Answers
E.
Defragment the hard drive.
E.
Defragment the hard drive.
Answers
Suggested answer: C

Explanation:

Since the systems administrator has validated that the workstation functions normally and other users operate on the same workstation without any issues, the next step should be to rebuild the user’s profile. This will ensure that any corrupted files or settings are removed and the user’s profile is restored to its default state.

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

Which of the following should be done NEXT?

A.
Educate the user on the solution that was performed.
A.
Educate the user on the solution that was performed.
Answers
B.
Tell the user to take time to fix it themselves next time.
B.
Tell the user to take time to fix it themselves next time.
Answers
C.
Close the ticket out.
C.
Close the ticket out.
Answers
D.
Send an email to Telecom to inform them of the Issue and prevent reoccurrence.
D.
Send an email to Telecom to inform them of the Issue and prevent reoccurrence.
Answers
Suggested answer: A

Explanation:


Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


A.
See the Explanation below
A.
See the Explanation below
Answers
Suggested answer: A

Explanation:

Answer: A

Explanation:

Explanation below:

Explanation:

Click on 802.11 and Select ac

Click on SSID and select CORP

Click on Frequency and select 5GHz

At Wireless Security Mode, Click on Security Mode

Select the WPA2

Explanation:

Ann needs to connect to the BYOD SSID, using 2.4GHZ. The selected security method chose should be WPA PSK, and the password should be set to TotallySecret.

HOTSPOT

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Question 80
Correct answer: Question 80

Explanation:

Answer: A

Explanation:


Total 755 questions
Go to page: of 76