Practice Free 220-1102 Exam Online Questions
An organization wants to deploy a customizable operating system.
Which of the following should the organization choose?
- A . Windows 10
- B . macOS
- C . Linux
- D . Chrome OS
- E . iOS
C
Explanation:
Linux is known for its high degree of customizability and flexibility, making it an ideal choice for organizations looking to deploy a customizable operating system. Unlike proprietary operating systems, Linux allows users to modify or replace almost any part of the system, from the kernel to the desktop environment and applications, to suit their specific needs.
Linux: This open-source operating system provides access to the source code, enabling extensive customization. Organizations can tailor Linux distributions to fit specific requirements, making it a popular choice for servers, specialized workstation environments, and embedded systems.
Windows 10 (A) and macOS (B) offer some level of customization but are more restricted due to their proprietary nature. Chrome OS (D) is designed for simplicity and security, focusing on web applications, which limits deep system-level customizations. iOS (E) is designed for Apple’s mobile devices and is not applicable for organizational deployment beyond mobile and tablet devices; it also offers limited customization compared to Linux.
Which of the following data is MOST likely to be regulated?
- A . Name in a Phone book
- B . Name on a medical diagnosis
- C . Name on a job application
- D . Name on a employer’s website
B
Explanation:
A name on a medical diagnosis (B) is most likely to be regulated. This is because it falls under the category of protected health information (PHI), which is subject to regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States. These regulations aim to protect the privacy and security of individuals’ health information.
Which of the following filesystems is most likely to be used for the boot volume on a Linux desktop?
- A . ext4
- B . NTFS
- C . HFS
- D . APFS
A systems administrator is configuring centralized desktop management for computers on a domain.
The management team has decided that all users’ workstations should have the same network drives, printers, and configurations.
Which of the following should the administrator use to accomplish this task?
- A . Network and Sharing Center
- B . net use
- C . User Accounts
- D . regedit
- E . Group Policy
E
Explanation:
Group Policy is a feature of Windows that allows administrators to centrally manage and apply policies and settings to computers and users on a domain3. Group Policy can be used to configure network drives, printers, security settings, desktop preferences, and other configurations for all users’ workstations3. Network and Sharing Center, net use, User Accounts, and regedit are not tools that can accomplish this task.
A technician is installing a new business application on a user’s desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system.
Which of the following files should the technician execute in order to complete the installation?
- A . Installer_x64.exe
- B . Installer_Files.zip
- C . Installer_32.msi
- D . Installer_x86.exe
- E . Installer_Win10Enterprise.dmg
D
Explanation:
The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit installer. The “x86” in the file name refers to the 32-bit architecture.
https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating-systems/
A user is unable to access the internet but can still print to network printers. Other users are not experiencing this issue.
Which of the following steps should the technician take first to diagnose the issue?
- A . Validate physical connectivity.
- B . Reboot the router.
- C . Disable IPv6.
- D . Check the DNS settings.
D
Explanation:
When a user can access the local network (as evidenced by printing to network printers) but not the internet, the issue is often related to Domain Name System (DNS) resolution. DNS is responsible for translating domain names (like google.com) into IP addresses that computers use to communicate. If the DNS settings are incorrect or the DNS server is unreachable, the computer won’t be able to find the IP addresses of websites and other internet resources.
A user notices a small USB drive is attached to the user’s computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt.
Which of the following attacks is MOST likely occurring?
- A . Trojan
- B . Rootkit
- C . Cryptominer
- D . Keylogger
D
Explanation:
A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote attacker1. The attacker can use the captured information to steal passwords, credit card numbers, or other sensitive data. A keylogger can be installed on a computer by attaching a small USB drive that contains a malicious executable file, such as grabber.exe2. The output.txt file may contain the recorded keystrokes. The user should remove the USB drive and scan the computer for malware.
References:
2: What is grabber.exe? (https://www.freefixer.com/library/file/grabber.exe-55857/)
1: What is a keylogger? (https://www.kaspersky.com/resource-center/definitions/keylogger)
A new spam gateway was recently deployed at a small business However; users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems.
Which of the following is the MOST effective method for dealing with this Issue?
- A . Adjusting the spam gateway
- B . Updating firmware for the spam appliance
- C . Adjusting AV settings
- D . Providing user training
D
Explanation:
The most effective method for dealing with spam messages in a small business is to provide user training1. Users should be trained to recognize spam messages and avoid opening them1. They should also be trained to report spam messages to the IT department so that appropriate action can be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from unknown sources1. By providing user training, the management team can reduce the risk of users opening spam messages and potentially infecting the network systems1.
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?
- A . Full
- B . Mirror
- C . Incremental
- D . Differential
C
Explanation:
Incremental backup is a backup method that only backs up the files that have changed since the last backup, whether it was a full or an incremental backup. Incremental backup can save storage space and bandwidth, as it does not copy the same files over and over again. Incremental backup can also retain more versions of backups, as it only stores the changes made to the files. However, incremental backup can have longer restore times, as it requires restoring the last full backup and all the subsequent incremental backups in order to recover the data. The law firm is not concerned about restore times but asks the technician to retain more versions when possible, so incremental backup would be a suitable choice for them.
Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?
- A . APFS
- B . FAT32
- C . NTFS
- D . ext4
C
Explanation:
NTFS stands for New Technology File System and it is the preferred filesystem for Microsoft Windows OS since Windows NT 3.1 in 1993 1. NTFS replaced FAT (File Allocation Table) as the default filesystem for Windows because it offers many advantages over FAT, such as:
Support for larger volumes and files (up to 16 exabytes)2 Support for file compression, encryption, and permissions2
Support for journaling, which records changes to the filesystem and helps recover from errors2 Support for hard links, symbolic links, and mount points2
Support for long filenames and Unicode characters2
FAT32 is an improved version of FAT that supports larger volumes and files (up to 32 GB and 4 GB respectively) and is compatible with older versions of Windows and other operating systems3. However, FAT32 still has many limitations and drawbacks compared to NTFS, such as:
No support for file compression, encryption, and permissions3
No support for journaling, which makes it vulnerable to corruption and data loss3
No support for hard links, symbolic links, and mount points3
No support for long filenames and Unicode characters3
APFS (Apple File System) is the default filesystem for macOS, iOS, iPadOS, watchOS, and tvOS since 20174. APFS replaced HFS+ (Hierarchical File System Plus) as the preferred filesystem for Apple devices because it offers many advantages over HFS+, such as:
Support for larger volumes and files (up to 8 zettabytes)4 Support for file cloning, snapshots, and encryption4
Support for space sharing, which allows multiple volumes to share the same storage pool4 Support for fast directory sizing, which improves performance and efficiency4
ext4 (Fourth Extended Filesystem) is the default filesystem for most Linux distributions since 20085. ext4 replaced ext3 as the preferred filesystem for Linux because it offers many advantages over ext3, such as:
Support for larger volumes and files (up to 1 exabyte and 16 terabytes respectively)5 Support for extents, which reduce fragmentation and improve performance5
Support for journal checksumming, which improves reliability and reduces recovery time5 Support for delayed allocation, which improves efficiency and reduces metadata overhead5
Reference: 1: NTFS – Wikipedia 2: [NTFS vs FAT32 vs exFAT: What’s the Difference?] 3: [FAT32 – Wikipedia] 4:
[Apple File System – Wikipedia] 5: [ext4 – Wikipedia] : NTFS vs FAT32 vs exFAT: What’s the Difference?
: FAT32 – Wikipedia: Apple File System – Wikipedia : ext4 – Wikipedia
