Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA 220-1102 Practice Exam with Questions & Answers | Set: 15

Questions 211

Which of the following should be used to control security settings on an Android phone in a domain environment?

Options:
A.

MDM

B.

MFA

C.

ACL

D.

SMS

CompTIA 220-1102 Premium Access
Questions 212

Which of the following should be done NEXT?

Options:
A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Questions 213

Which of the following is used to detect and record access to restricted areas?

Options:
A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Questions 214

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

Options:
A.

Keyboard

B.

Touch pad

C.

Ease of Access Center

D.

Display settings

Questions 215

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

Options:
A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Questions 216

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:
A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Questions 217

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:
A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Questions 218

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:
A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Questions 219

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:
A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Questions 220

Which of the following is MOST likely contained in an EULA?

Options:
A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Questions 221

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:
A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Questions 222

Which of the following is used as a password manager in the macOS?

Options:
A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Questions 223

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:
A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Questions 224

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:
A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Questions 225

Which of the following should be used to secure a device from known exploits?

Options:
A.

Encryption

B.

Remote wipe

C.

Operating system updates

D.

Cross-site scripting