Practice Free 220-1102 Exam Online Questions
After a security event, a technician removes malware from an affected laptop and disconnects the laptop from the network.
Which of the following should the technician do to prevent the operating system from automatically returning to an infected state?
- A . Enable System Restore.
- B . Disable System Restore.
- C . Enable antivirus.
- D . Disable antivirus.
- E . Educate the user.
B
Explanation:
System Restore is a feature that allows the user to revert the system to a previous state. However, this can also restore the malware that was removed by the technician. Disabling System Restore can prevent the operating system from automatically returning to an infected state. Enabling antivirus, educating the user, and enabling System Restore are good preventive measures, but they do not address the question. Disabling antivirus can make the system more vulnerable to malware attacks
A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices.
Which of the following should the company deploy to address these concerns?
- A . UAC
- B . MDM
- C . LDAP
- D . SSO
B
Explanation:
MDM stands for mobile device management, which is a type of software solution that allows remote management and security of mobile devices. MDM can help a company reduce data disclosure caused by malware that may infect these devices by enforcing security policies, such as encryption, password protection, antivirus software, and remote wipe. MDM can also monitor and control the access of personal devices to corporate data and networks. UAC stands for user account control, which is a feature of Windows that prompts users for permission or an administrator password before making changes that affect the system. UAC may not be effective in preventing malware infection or data disclosure on personal devices. LDAP stands for lightweight directory access protocol, which is a protocol for accessing and managing information stored in a directory service, such as user names and passwords. LDAP does not directly address the issue of malware infection or data disclosure on personal devices. SSO stands for single sign-on, which is a feature that allows users to access multiple applications or services with one set of credentials. SSO may not prevent malware infection or data disclosure on personal devices, and may even increase the risk if the credentials are compromised.
https://www.nist.gov/news-events/news/2021/03/mobile-device-security-bring-your-own-device-byod-draft-sp-1800-22
The network was breached over the weekend System logs indicate that a single user’s account was successfully breached after 500 attempts with a dictionary attack.
Which of the following would BEST mitigate this threat?
- A . Encryption at rest
- B . Account lockout
- C . Automatic screen lock
- D . Antivirus
B
Explanation:
Account lockout would best mitigate the threat of a dictionary attack1
An administrator needs to back up the following components of a single workstation:
• The installation of the operating system
• Applications
• User profiles
• System settings
Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?
- A . Differential
- B . Image
- C . Synthetic
- D . Archive
B
Explanation:
An image backup captures a complete snapshot of the entire system at a specific point in time, including the operating system, installed applications, user profiles, and system settings. This method is most suitable for backing up the components listed in the question because it ensures that every aspect of the workstation, from the core OS to individual user settings, is preserved and can be restored in its entirety. This is crucial for quickly recovering a system to a fully operational state after a failure or when migrating to new hardware. Other methods like differential, synthetic, and archive backups do not provide the comprehensive one-step restoration capability that an image backup offers for the complete system recovery.
Which of the following should be enabled on a mobile device to prevent unauthorized access to data in case the device is lost or stolen? (Select two).
- A . Biometric authentication
- B . Remote wipe
- C . Encryption
- D . Device tracking
- E . Antivirus software
- F . VPN access
A,C
Explanation:
To prevent unauthorized access to data if a mobile device is lost or stolen, enabling biometric authentication (such as fingerprint or facial recognition) ensures only authorized users can unlock the device. Encryption protects stored data by making it unreadable without proper credentials, securing the device contents even if physically accessed. Remote wipe and device tracking assist in device recovery or data removal but do not directly prevent unauthorized access. Antivirus software and VPN access protect against malware and network threats but do not guard against physical access. Core 2 Security objectives emphasize biometric authentication and encryption as key security controls for mobile devices.
Would you like me to proceed with the next batch of six questions?
You said:
proceed with the next batch
ChatGPT said:
Certainly! Here are questions 26 to 31 reviewed and detailed per your format:
A technician needs to implement a system to handle both authentication and authorization.
Which of the following meets this requirement?
- A . WPA3
- B . MFA
- C . TACACS+
- D . RADIUS
C
Explanation:
To implement a system that handles both authentication and authorization, TACACS+ (Terminal Access Controller Access-Control System Plus) is the best option. TACACS+ is a security protocol that provides centralized Authentication, Authorization, and Accounting (AAA) services for networked access control, meeting the requirement for both authentication and authorization management.
A user connected a smartphone to a coffee shop’s public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device.
Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).
- A . Disable Wi-Fi auto connect.
- B . Stay offline when in public places.
- C . Uninstall all recently installed applications.
- D . Schedule an antivirus scan.
- E . Reboot the device
- F . Update the OS
CD
Explanation:
The best way to address the security and privacy concerns caused by a malware infection on a smartphone is to uninstall all recently installed applications and schedule an antivirus scan. Uninstalling the applications that may have introduced the malware can help remove the source of infection and prevent further damage. Scheduling an antivirus scan can help detect and remove any remaining traces of malware and restore the device’s functionality.
Reference: CompTIA A+ Core 2 (220-1102) Certification Study Guide, Chapter 5: Mobile Devices,
Section 5.3: Mobile Device Security1
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks.
Which of the following should the technician do next?
- A . Educate the end user on best practices for security.
- B . Quarantine the host in the antivirus system.
- C . Investigate how the system was infected with malware.
- D . Create a system restore point.
A
Explanation:
Educating the end user on best practices for security is the next step that the technician should take after successfully removing malicious software from an infected computer. Educating the end user on best practices for security is an important part of preventing future infections and mitigating risks. The technician should explain to the end user how to avoid common sources of malware, such as phishing emails, malicious websites, or removable media. The technician should also advise the end user to use strong passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently. Educating the end user on best practices for security can help the end user become more aware and responsible for their own security and reduce the likelihood of recurrence of malware infections. Quarantining the host in the antivirus system, investigating how the system was infected with malware, and creating a system restore point are not the next steps that the technician should take after successfully removing malicious software from an infected computer. Quarantining the host in the antivirus system is a step that the technician should take before removing malicious software from an infected computer. Quarantining the host in the antivirus system means isolating the infected computer from the network or other devices to prevent the spread of malware. Investigating how the system was infected with malware is a step that the technician should take during or after removing malicious software from an infected computer. Investigating how the system was infected with malware means identifying the source, type, and impact of malware on the system and documenting the findings and actions taken. Creating a system restore point is a step that the technician should take before removing malicious software from an infected computer. Creating a system restore point means saving a snapshot of the system’s configuration and settings at a certain point in time, which can be used to restore the system in case of failure or corruption.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458
Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company’s resources as if the employees were on premises.
Which of the following remote connection services should the IT team implement?
- A . SSH
- B . VNC
- C . VPN
- D . RDP
C
Explanation:
A VPN (Virtual Private Network) is a service that allows remote employees to access the company’s network resources securely over the internet as if they were on premises. A VPN encrypts the data traffic between the employee’s device and the VPN server, and assigns the employee a virtual IP address that belongs to the company’s network. This way, the employee can access the local servers, files, printers, and other resources without exposing them to the public internet. A VPN also protects the employee’s privacy and identity by masking their real IP address and location.
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer.
Which of the following filesystems will the technician MOST likely use?
- A . FAT32
- B . ext4
- C . NTFS
- D . exFAT
D
Explanation:
