Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA 220-1102 Practice Exam with Questions & Answers | Set: 10

Questions 136

A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?

Options:
A.

Manually clearing browsing data

B.

Private-browsing mode

C.

Browser data synchronization

D.

Password manager

CompTIA 220-1102 Premium Access
Questions 137

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

Options:
A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Questions 138

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

Options:
A.

End-user license agreement

B.

Non-disclosure agreement

C.

Regulatory compliance

D.

Acceptable use policy

Questions 139

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:
A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Questions 140

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

Options:
A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options

Questions 141

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:
A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Questions 142

A user requires a drive to be mapped through a Windows command line. Which of the following command-line tools can be utilized to map the drive?

Options:
A.

gpupdate

B.

net use

C.

hostname

D.

dir

Questions 143

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

Options:
A.

AUP

B.

EULA

C.

EOL

D.

UAC

Questions 144

A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?

Options:
A.

Biometrics

B.

Soft token

C.

Access control lists

D.

Smart card

Questions 145

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:
A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Questions 146

A company recently outsourced its night-shift cleaning service. A technician is concerned about having unsupervised contractors in the building. Which of the following security measures can be used to prevent the computers from being accessed? (Select two).

Options:
A.

Implementing data-at-rest encryption

B.

Disabling AutoRun

C.

Restricting user permissions

D.

Restricting log-in times

E.

Enabling a screen lock

F.

Disabling local administrator accounts

Questions 147

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:
A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Questions 148

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:
A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Questions 149

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:
A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Questions 150

Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface?

Options:
A.

FreeBSD

B.

Chrome OS

C.

macOS

D.

Windows