220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 16-Dec-2024

Topic 5: Exam Pool E

A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:
SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture The technician analyses the following Windows firewall information:



Which of the following protocols most likely allowed the data theft to occur?


A. 1


B. 53


C. 110


D. 445





D.
  445

Explanation: The protocol that most likely allowed the data theft to occur is SMB over TCP port 445. SMB is a network file sharing protocol that enables access to files, printers, and other resources on a network. Port 445 is used by SMB to communicate directly over TCP without the need for NetBIOS, which is an older and less secure protocol. The security log shows that the source IP address 192.168.1.1 sent a file named secrets.zip using SMB protocol to the destination IP address 192.168.1.50, which captured the file. The Windows firewall information shows that port 445 is enabled for inbound and outbound traffic, which means that it is not blocked by the firewall. Therefore, port 445 is the most likely port that was exploited by the attacker to steal the data from the corporate laptop.

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?


A. Configure the firewall.


B. Restore the system from backups.


C. Educate the end user


D. Update the antivirus program.





C.
  Educate the end user

Explanation: Malware is software that infects computer systems to damage, disable or exploit the computer or network for various malicious purposes5. Malware is typically distributed via email attachments, fake internet ads, infected applications or websites, and often relies on user interaction to execute6. Therefore, one of the most effective ways to prevent malware infections is to educate the end user about the common signs and sources of malware, and how to avoid them7. Configuring the firewall, restoring the system from backups, and updating the antivirus program are also important security measures, but they do not address the root cause of the user’s repeated infections, which is likely due to a lack of awareness or caution.

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond? Place the customer on hold until the customer calms down.


A. Disconnect the call to avoid a confrontation.


B. Wait until the customer is done speaking and offer assistance.


C. Escalate the issue to a supervisor.





C.
  Escalate the issue to a supervisor.

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?


A. Dedicated GPU


B. DDR5 SODIMM


C. NVMe disk


D. 64-bit CPU





A.
  Dedicated GPU

Which of the following would allow physical access to a restricted area while maintaining a record of events?


A. Hard token


B. Access control vestibule


C. Key fob


D. Door Lock





B.
  Access control vestibule

Explanation: Access control vestibule is the correct answer for this question. An access control vestibule is a physical security device that consists of two doors that form an enclosed space between them. The first door opens only after verifying the identity of the person entering, such as by using a card reader, biometric scanner, or keypad. The second door opens only after the first door closes, creating a buffer zone that prevents unauthorized access or tailgating. An access control vestibule also maintains a record of events, such as who entered or exited, when, and how. Hard token, key fob, and door lock are not sufficient to meet the requirements of this question. A hard token is a device that generates a one-time password or code for authentication purposes. A key fob is a small device that can be attached to a key ring and used to unlock doors or start vehicles remotely. A door lock is a mechanism that secures a door from opening without a key or a code.

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?


A. Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.


B. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.


C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.


D. Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.





C.
  Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

Explanation: Installing new software on an organization’s system or device can have various implications, such as compatibility, security, performance, licensing, and compliance issues. Therefore, it is important to follow the best practices for software installation, such as doing research on the software, checking the system requirements, scanning the installation file for malware, and obtaining the proper license345. The technician should not install the software without formal approval from the management team, as this could violate the organization’s policies or regulations. The technician should also not install the software without investigating the software and its impact on the organization, as this could introduce potential risks or problems to the system or device. The technician should indicate to the developer that formal approval is needed, and then work with the IT team to evaluate the software and its suitability for the organization before installing it

Which of the following is the most likely reason a filtration system is critical for data centers?


A. Plastics degrade over time.


B. High humidity levels can rust metal.


C. Insects can invade the data center.


D. Dust particles can clog the machines.





B.
  High humidity levels can rust metal.

Explanation: A filtration system is critical for data centers because it can control the humidity and temperature levels in the environment. High humidity levels can cause condensation and corrosion on the metal components of the servers and other equipment, leading to malfunction and damage. A filtration system can also prevent dust, dirt, and other contaminants from entering the data center and clogging the machines or causing overheating.

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?


A. Scan for malware and ransomware.


B. Perform a system restore.


C. Check the network utilization.


D. Update the antivirus software.





A.
  Scan for malware and ransomware.

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).


A. Temperature levels


B. Location of the servers


C. Humidity levels


D. Noise levels


E. Lighting levels


F. Cable management





A.
  Temperature levels

C.
  Humidity levels

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?


A. Privacy


B. Advanced


C. Content


D. Connections


E. Security





D.
  Connections

Explanation: The Connections tab in Internet Options allows the technician to configure the proxy server settings for the workstations. The technician can enter the proxy server address and port number, and specify which websites to bypass the proxy server for. The other tabs are not relevant for configuring the proxy server settings. References: CompTIA A+ Certification Exam Core 2 Objectives, page 9, section 1.7; CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 140, section 1.7.


Page 3 out of 74 Pages
Previous