Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA 220-1102 Practice Exam with Questions & Answers | Set: 4

Questions 46

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

Options:
A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

CompTIA 220-1102 Premium Access
Questions 47

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?

Options:
A.

Network & Internet

B.

System

C.

Personalization

D.

Accounts

Questions 48

A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which of the following would most likely be impacted in this situation?

Options:
A.

SAN

B.

LAN

C.

GPU

D.

PAN

Questions 49

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

Options:
A.

Hibernate

B.

Sleep/suspend

C.

Choose what closing the lid does

D.

Turn on fast startup

Questions 50

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

Options:
A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Questions 51

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

Options:
A.

Degaussing

B.

Standard formatting

C.

Low-level wiping

D.

Deleting

Questions 52

Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?

Options:
A.

APFS

B.

FAT32

C.

NTFS

D.

ext4

Questions 53

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

Options:
A.

ifconfig

B.

netstat

C.

ping

Questions 54

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:
A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Questions 55

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

Options:
A.

FAT32

B.

exFAT

C.

NTFS

Questions 56

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:
A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Questions 57

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:
A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Questions 58

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:
A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Questions 59

Which of the following is used to ensure users have the appropriate level of access to perform their job functions?

Options:
A.

Access control list

B.

Multifactor authentication

C.

Least privilege

D.

Mobile device management

Questions 60

Which of the following should be documented to ensure that the change management plan is followed?

Options:
A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis