A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?
A. VPN
B. RDP
C. RMM
D. SSH
A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?
A. Phishing
B. Dumpster diving
C. Tailgating
D. Evil twin
A system dives nearly full, and a technician needs to free up some space. Which of the following tools should the technician use?
A. Disk Cleanup
B. Resource Monitor
C. Disk Defragment
D. Disk Management
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?
A. EFS
B. GPT
C. MBR
D. FAT32
During a network outage, a technician discovers a new network switch that was not listed in the support documentation. The switch was installed during a recent change window when a new office was added to the environment. Which of the following would most likely prevent this type of mismatch after next month's change window?
A. Performing annual network topology reviews
B. Requiring all network changes include updating the network diagrams
C. Allowing network changes once per year
D. Routinely backing up switch configuration files
A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?
A. Fingerprint and pattern
B. Facial recognition and PIN code
C. Primary account and password
D. Recovery contact and recovery key
A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?
A. RADIUS
B. AES
C. EAP-EKE
D. MFA
Which of the following operating systems can allow users to have access to the source code, can host various server applications, and can be command line only?
A. Windows
B. macOS
C. Linux
D. Chrome OS
A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?
A. Password-protected Wi-Fi
B. Port forwarding
C. Virtual private network
D. Perimeter network
Which of the following threats will the use of a privacy screen on a computer help prevent?
A. Impersonation
B. Shoulder surfing
C. Whaling
D. Tailgating
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.