CompTIA 220-1102 Exam Practice Questions (P. 4)
- Full Access (701 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?
send
light_mode
delete
Question #32
A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
- AData-in-transit encryption
- BFile encryption
- CUSB drive encryption
- DDisk encryptionMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #33
A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)
- AScan the computer with the company-provided antivirus software.Most Voted
- BInstall a new hard drive and clone the user's drive to it.
- CDeploy an ad-blocking extension to the browser.
- DUninstall the company-provided antivirus software.
- EClick the link in the messages to pay for virus removal.
- FPerform a reset on the user's web browser.Most Voted
Correct Answer:
AF
AF
send
light_mode
delete
Question #34
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?
send
light_mode
delete
Question #35
A technician is investigating an employee's smartphone that has the following symptoms:
✑ The device is hot, even when it is not in use.
✑ Applications crash, especially when others are launched.
✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)
✑ The device is hot, even when it is not in use.
✑ Applications crash, especially when others are launched.
✑ Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Choose two.)
- ATurn on autorotation.Most Voted
- BActivate airplane mode.
- CClose unnecessary applications.Most Voted
- DPerform a factory reset.
- EUpdate the device's operating system.
- FReinstall the applications that have crashed.
Correct Answer:
DE
DE
send
light_mode
delete
Question #36
A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?
- AInstall alternate open-source software in place of the applications with issues.
- BRun both CPU and memory tests to ensure that all hardware functionality is normal.
- CCheck for any installed patches and roll them back one at a time until the issue is resolved.Most Voted
- DReformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
Correct Answer:
C
C
send
light_mode
delete
Question #37
Which of the following could be used to implement secure physical access to a data center?
send
light_mode
delete
Question #38
The Chief Executive Officer at a bank recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bank's risk? (Choose two.)
- AEnable multifactor authentication for each support account.Most Voted
- BLimit remote access to destinations inside the corporate network.
- CBlock all support accounts from logging in from foreign countries.
- DConfigure a replacement remote-access tool for support cases.
- EPurchase a password manager for remote-access tool users.
- FEnforce account lockouts after five bad password attempts.Most Voted
Correct Answer:
AF
AF
send
light_mode
delete
Question #39
A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?
- ADisk Cleanup
- BGroup Policy Editor
- CDisk Management
- DResource MonitorMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #40
Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90c8ee97fa7c211b7673a8
Which of the following BEST describes the purpose of this string?
59d15a16ce90c8ee97fa7c211b7673a8
Which of the following BEST describes the purpose of this string?
- AXSS verification
- BAES-256 verification
- CHash verificationMost Voted
- DDigital signature verification
Correct Answer:
C
C
send
light_mode
delete
All Pages