A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?
A. Quarantine the computer.
B. Disable System Restore.
C. Update the antivirus software definitions.
D. Boot to safe mode.
A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?
A. AAA
B. SSH
C. RDP
D. VPN
An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?
A. Image deployment
B. Recovery partition Installation
C. Remote network installation
D. Repair installation
A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)
A. Zombies
B. Keylogger
C. Adware
D. Botnet
E. Ransomware
F. Spyware
A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company's requirements?
A. Biometrics
B. Soft token
C. Access control lists
D. Smart card
A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?
A. Escalating the issue to Tier 2
B. Verifying warranty status with the vendor
C. Replacing the motherboard
D. Purchasing another PC
A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users' workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?
A. Network and Sharing Center
B. net use
C. User Accounts
D. regedit
E. Group Policy
A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?
A. Disk Management
B. Device Manager
C. Disk Cleanup
D. Disk Defragmenter
Which of the following best describes when to use the YUM command in Linux?
A. To add functionality
B. To change folder permissions
C. To show documentation
D. To list file contents
Which of the following would MOST likely be used to extend the life of a device?
A. Battery backup
B. Electrostatic discharge mat
C. Proper ventilation
D. Green disposal
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.