Test Online Free CompTIA 220-1102 Exam Questions and Answers

The questions for 220-1102 were last updated On Apr.09 2024

Get 220-1102 Full Access
 / 2

Question No : 1
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes.
Which of the following encryption solutions should the technician choose?

Answer:

Question No : 2
A user calls the help desk and reports a workstation is infected with malicious software.
Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Answer:

Question No : 3
A technician needs to exclude an application folder from being cataloged by a Windows 10 search.
Which of the following utilities should be used?

Answer:

Question No : 4
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software.
Which of the following should the technician do to MOST likely resolve the issue?

Answer:
Explanation:
The new laptop was set up with the static IP it needs to connect to the software. The old desktop is still configured with that IP, hence the conflict.

Question No : 5
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing.
Which of the following methods can the administrator use to troubleshoot the server effectively?

Answer:

Question No : 6
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization. The certificate will be used in conjunction with the user's existing username and password
Which of the following BEST describes the security benefits realized after this deployment?

Answer:

Question No : 7
A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected.
Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Answer:

Question No : 8
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network.
Which of the following configurations should the technician employ to achieve this goal?

Answer:

Question No : 9
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server.
Which of the following is MOST likely to be of concern to the IT manager?

Answer:

Question No : 10
The command cac cor.ptia. txt was issued on a Linux terminal.
Which of the following results should be expected?

Answer:

 / 2
  TOP 50 Exam Questions
Exam