CompTIA 220-1102 v2023-02-27 q36
CompTIA 220-1102 v2023-02-27 q36
CompTIA 220-1102 v2023-02-27 q36
q36
NEW QUESTION: 1
A technician is configuring a SOHO device Company policy dictates that static IP
addresses cannot be used. The company wants the server to maintain the same IP
address at all times. Which of the following should the technician use?
A. DNS A record
B. NAT
C. Port forwarding
D. DHCP reservation
Answer: (SHOW ANSWER)
NEW QUESTION: 2
A technician is configuring a new Windows laptop Corporate policy requires that mobile
devices make use of full disk encryption at all limes Which of the following encryption
solutions should the technician choose?
A. BitLocker
B. Encrypting File System
C. Encrypted LVM
D. FileVault
Answer: (SHOW ANSWER)
NEW QUESTION: 3
A systems administrator is setting up a Windows computer for a new user Corporate policy
requires a least privilege environment. The user will need to access advanced features and
configuration settings for several applications. Which of the following BEST describes the
account access level the user will need?
A. Standard account
B. Administrator account
C. Guest account
D. Power user account
Answer: (SHOW ANSWER)
NEW QUESTION: 4
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all
devices m an organization The certificate will be used in conjunction with the user's
existing username and password Which of the following BEST describes the security
benefits realized after this deployment?
A. Rogue access points will not connect
B. Eavesdropping attempts will be prevented
C. Multifactor authentication will be forced for Wi-Fi
D. All Wi-Fi traffic will be encrypted in transit
Answer: (SHOW ANSWER)
NEW QUESTION: 5
A user contacted the help desk to report pop-ups on a company workstation indicating the
computer has been infected with 137 viruses and payment is needed to remove them. The
user thought the company-provided antivirus software would prevent this issue. The help
desk ticket states that the user only receives these messages when first opening the web
browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)
A. Scan the computer with the company-provided antivirus software
B. Deploy an ad-blocking extension to the browser.
C. Perform a reset on the user's web browser
D. Install a new hard drive and clone the user's drive to it
E. Uninstall the company-provided antivirus software
F. Click the link in the messages to pay for virus removal
Answer: (SHOW ANSWER)
NEW QUESTION: 6
A technician is installing new software on a macOS computer. Which of the following file
types will the technician MOST likely use?
A. .vbs
B. .app
C. .deb
D. .exe
Answer: (SHOW ANSWER)
NEW QUESTION: 7
A technician suspects a rootkit has been installed and needs to be removed. Which of the
following would BEST resolve the issue?
A. File restore
B. OS reinstallation
C. Anti-malware software
D. Application updates
Answer: (SHOW ANSWER)
NEW QUESTION: 8
A technician suspects the boot disk of a user's computer contains bad sectors. Which of
the following should the technician verify in the command prompt to address the issue
without making any changes?
A. Run sfc / scannow on the drive as the administrator.
B. Run dffrgui on
C. Run chkdsk on the drive as the administrator.
D. Run clearnmgr on the drive as the administrator
Answer: (SHOW ANSWER)
NEW QUESTION: 9
A user receives a notification indicating the antivirus protection on a company laptop is out
of date. A technician is able to ping the user's laptop. The technician checks the antivirus
parent servers and sees the latest signatures have been installed. The technician then
checks the user's laptop and finds the antivirus engine and definitions are current. Which
of the following has MOST likely occurred?
A. Adware
B. Ransomware
C. Missing system files
D. Failed OS updates
Answer: (SHOW ANSWER)
NEW QUESTION: 10
A. Brute force
B. Denial of service
C. On-path
D. Zero day
Answer: (SHOW ANSWER)
NEW QUESTION: 11
Which of the following Linux commands would be used to install an application?
A. sudo
B. yum
C. grep
D. Is
Answer: (SHOW ANSWER)
NEW QUESTION: 12
A user is unable to log in to the domain with a desktop PC, but a laptop PC is working
properly on the same network. A technician logs in lo the desktop PC with a local account
but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the
following is the MOST likely cause of the issue?
A. Filesystem errors
B. Time drift
C. Application crash
D. Dual in-line memory module failure
Answer: (SHOW ANSWER)
NEW QUESTION: 13
A technician is replacing the processor in a desktop computer prior to opening the
computer, the technician wants to ensure the internal components are protected. Which of
the following safety procedures would BEST protect the components in the PC? (Select
TWO).
A. Utilizing an ESD strap
B. Disconnecting the computer from the power source
C. Removing dust from the ventilation fans
D. Ensuring equipment is grounded
E. Ensuring proper ventilation
F. Placing the PSU in an antistatic bag
Answer: (SHOW ANSWER)
NEW QUESTION: 14
A user attempts to open some files, but a message appears stating that the files are
encrypted. The user was able to access these files before without receiving this message
and no changes have been made within the company. Which of the following has infected
the computer?
A. Cryptominer
B. Ransomware
C. Phishing
D. Keylogger
Answer: (SHOW ANSWER)
NEW QUESTION: 15
The Chief Executive Officer at a bark recently saw a news report about a high-profile
cybercrime where a remote-access tool that the bank uses for support was also used in
this crime. The report stated that attackers were able to brute force passwords to access
systems. Which of the following would BEST limit the bark's risk? (Select TWO)
A. Purchase a password manager for remote-access tool users
B. Configure a replacement remote-access tool for support cases.
C. Block all support accounts from logging in from foreign countries
D. Limit remote access to destinations inside the corporate network
E. Enforce account lockouts after five bad password attempts
F. Enable multifactor authentication for each support account
Answer: (SHOW ANSWER)
NEW QUESTION: 16
A technician is troubleshooting an issue involving programs on a Windows 10 machine that
are loading on startup but causing excessive boot times. Which of the following should the
technician do to selectively prevent programs from loading?
A. Manually disable all startup tasks currently listed as enabled and reboot checking for
issue resolution at startup
B. Right-click the Windows button, then select Run entering shell startup and clicking OK,
and then move items one by one to the Recycle Bin
C. Remark out entries listed
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
D. Open the Startup tab and methodically disable items currently listed as enabled and
reboot, checking for issue resolution at each startup.
Answer: (SHOW ANSWER)
Valid 220-1102 Dumps shared by TrainingDump for Helping Passing 220-1102 Exam!
TrainingDump now offer the newest 220-1102 exam dumps, the TrainingDump
220-1102 exam questions have been updated and answers have been corrected
get the newest TrainingDump 220-1102 dumps with Test Engine here:
https://www.trainingdump.com/CompTIA/220-1102-practice-exam-dumps.html (160
Q&As Dumps, 35%OFF Special Discount Code: freecram)
NEW QUESTION: 17
A user reports a PC is running slowly. The technician suspects it has a badly fragmented
hard drive. Which of the following tools should the technician use?
A. msconfig.extf
B. msmfo32.exe
C. dfrgui exe
D. resmon exe
Answer: (SHOW ANSWER)
NEW QUESTION: 18
A help desk technician is troubleshooting a workstation in a SOHO environment that is
running above normal system baselines. The technician discovers an unknown executable
with a random string name running on the system. The technician terminates the process,
and the system returns to normal operation. The technician thinks the issue was an
infected file, but the antivirus is not detecting a threat. The technician is concerned other
machines may be infected with this unknown virus. Which of the following is the MOST
effective way to check other machines on the network for this unknown threat?
A. Monitor outbound network traffic.
B. Provide a sample to the antivirus vendor.
C. Manually check each machine.
D. Run a startup script that removes files by name.
Answer: (SHOW ANSWER)
NEW QUESTION: 19
A user purchased a netbook that has a web-based, proprietary operating system. Which of
the following operating systems is MOST likely installed on the netbook?
A. macOS
B. Chrome OS
C. Windows
D. Linux
Answer: (SHOW ANSWER)
NEW QUESTION: 20
A. Alarm system
B. Geofence
C. Motion sensor
D. Badge reader
Answer: (SHOW ANSWER)
NEW QUESTION: 21
A technician receives a ticket indicating the user cannot resolve external web pages
However, specific IP addresses are working. Which of the following does the technician
MOST likely need to change on the workstation to resolve the issue?
A. Subnet mask
B. Default gateway
C. Name server
D. Host address
Answer: (SHOW ANSWER)
NEW QUESTION: 22
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The
laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables
Windows Hello on all computers in the environment. Which of the following options
describes how to set up Windows Hello Fingerprint foe the user?
A. Navigate to the Control Panel utility, select the Security and Maintenance submenu,
select Change Security and Maintenance settings, select Windows Hello Fingerprint, and
have the user place a fingerprint on the fingerprint reader repeatedly until Windows
indicates setup is complete
B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign
in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the
fingerprint reader repeatedly until Windows indicates setup is complete.
C. Navigate to the Windows 10 Settings menu, select the Update & Security submenu
select Windows Security, select Windows Hello Fingerprint and have the user place a
fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
D. Navigate to the Control Panel utility, select the Administrative Tools submenu, select the
user account in the list, select Windows Hello Fingerprint, and have the user place a
fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.
Answer: (SHOW ANSWER)
NEW QUESTION: 23
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following
settings should the user change FIRST?
A. Wi-Fi channel
B. Service set identifier
C. Default passwords
D. Encryption
Answer: (SHOW ANSWER)
NEW QUESTION: 24
A user's smartphone data usage is well above average. The user suspects an installed
application is transmitting data in the background. The user would like to be alerted when
an application attempts to communicate with the internet. Which of the following BEST
addresses the user's concern?
A. Operating system updates
B. Antivirus
C. Remote wipe
D. Firewall
Answer: (SHOW ANSWER)
NEW QUESTION: 25
A user corrects a laptop that is running Windows 10 to a docking station with external
monitors when working at a desk. The user would like to close the laptop when it is
docked, but the user reports it goes to sleep when it is closed. Which of the following is the
BEST solution to prevent the laptop from going to sleep when it is closed and on the
docking station?
A. Within the Power Options of the Control Panel utility click the Change Plan Settings
button for the enabled power plan and select Put the Computer to Sleep under the Plugged
In category to Never
B. Within the Power Options of the Control Panel utility select the option Choose When to
Turn Off the Display and select Turn Off the Display under the Plugged In category to
Never
C. Within the Power Options of the Control Panel utility, select the option Choose What
Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do
Nothing
D. Within the Power Options of the Control Panel utility, click the Change Plan Settings
button for the enabled power plan and select Put the Computer to Sleep under the On
Battery category to Never
Answer: B (LEAVE A REPLY)
NEW QUESTION: 26
An Android user contacts the help desk because a company smartphone failed to
complete a tethered OS update A technician determines there are no error messages on
the device Which of the following should the technician do NEXT?
A. Verify all third-party applications are disabled
B. Confirm a strong internet connection is available using Wi-Fi or cellular data
C. Check if the battery is sufficiently charged
D. Determine if the device has adequate storage available.
Answer: (SHOW ANSWER)
NEW QUESTION: 27
A technician is asked to resize a partition on the internal storage drive of a computer
running macOS. Which of the followings tools should the technician use to accomplish this
task?
A. Consoltf
B. Disk Utility
C. FileVault
D. Time Machine
Answer: (SHOW ANSWER)
NEW QUESTION: 28
A technician is investigating an employee's smartphone that has the following symptoms
* The device is hot even when it is not in use.
* Applications crash, especially when others are launched
* Certain applications, such as GPS, are in portrait mode when they should be in
landscape mode Which of the following can the technician do to MOST likely resolve these
issues with minimal impact? (Select TWO).
A. Close unnecessary applications
B. Reinstall the applications that have crashed.
C. Activate airplane mode.
D. Update the device's operating system
E. Perform a factory reset
F. Turn on autorotation
Answer: D,F (LEAVE A REPLY)
NEW QUESTION: 29
A change advisory board did not approve a requested change due to the lack of alternative
actions if implementation failed. Which of the following should be updated before
requesting approval again?
A. Scope of change
B. Rollback plan
C. End user acceptance
D. Risk level
Answer: (SHOW ANSWER)
NEW QUESTION: 30
A. Use Settings to access General
B. Use Settings to access Screen Timeout settings
C. Use Settings to access Display.
D. Use Settings to access Screensaver settings
Answer: (SHOW ANSWER)
NEW QUESTION: 31
Which of the following is a proprietary Cisco AAA protocol?
A. AES
B. TKIP
C. RADIUS
D. TACACS+
Answer: (SHOW ANSWER)
Valid 220-1102 Dumps shared by TrainingDump for Helping Passing 220-1102 Exam!
TrainingDump now offer the newest 220-1102 exam dumps, the TrainingDump
220-1102 exam questions have been updated and answers have been corrected
get the newest TrainingDump 220-1102 dumps with Test Engine here:
https://www.trainingdump.com/CompTIA/220-1102-practice-exam-dumps.html (160
Q&As Dumps, 35%OFF Special Discount Code: freecram)
NEW QUESTION: 32
Which of the following is the MOST cost-effective version of Windows 10 that allows
remote access through Remote Desktop?
A. Home
B. Pro for Workstations
C. Enterprise
D. Pro
Answer: (SHOW ANSWER)
NEW QUESTION: 33
A user reports a computer is running slow. Which of the following tools will help a
technician identity the issued
A. Resource Monitor
B. Group Policy Editor
C. Disk Cleanup
D. Disk Management
Answer: (SHOW ANSWER)
NEW QUESTION: 34
The network was breached over the weekend System logs indicate that a single user's
account was successfully breached after 500 attempts with a dictionary attack. Which of
the following would BEST mitigate this threat?
A. Antivirus
B. Account lockout
C. Automatic screen lock
D. Encryption at rest
Answer: (SHOW ANSWER)
NEW QUESTION: 35
A technician at a customer site is troubleshooting a laptop A software update needs to be
downloaded but the company's proxy is blocking traffic to the update site. Which of the
following should the technician perform?
A. Change the DNS address to 1.1.1.1
B. Update Group Policy
C. Verity the software license is current.
D. Add the site to the client's exceptions list
Answer: (SHOW ANSWER)
NEW QUESTION: 36
A technician is setting up a SOHO wireless router. The router is about ten years old. The
customer would like the most secure wireless network possible. Which of the following
should the technician configure?
A. WPA3 with AES-128
B. WPA2withAES
C. WPA3withAES-256
D. WPA2 with TKIP
Answer: (SHOW ANSWER)
Valid 220-1102 Dumps shared by TrainingDump for Helping Passing 220-1102 Exam!
TrainingDump now offer the newest 220-1102 exam dumps, the TrainingDump
220-1102 exam questions have been updated and answers have been corrected
get the newest TrainingDump 220-1102 dumps with Test Engine here:
https://www.trainingdump.com/CompTIA/220-1102-practice-exam-dumps.html (160
Q&As Dumps, 35%OFF Special Discount Code: freecram)