A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?
A. Investigate the firewall logs.
B. Isolate the machine from the network.
C. Inspect the Windows Event Viewer.
D. Take a physical inventory of the device.
A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?
A. End user training
B. Progress notes
C. Knowledge base
D. Acceptable use policy document
A Windows computer is experiencing slow performance when the user tries to open programs and files. The user recently installed a new software program from an external website.
Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is consistently at 100%. Which of the following should the technician do first?
A. Uninstall the new program.
B. Check the HOSTS file.
C. Restore from a previous backup.
D. Clear the web browser cache.
Which of the following is also known as something you know, something you have, and something you are?
A. ACL
B. MFA
C. SMS
D. NFC
A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?
A. Delete the browser cookies and history.
B. Reset all browser settings.
C. Change the browser default search engine.
D. Install a trusted browser.
When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?
A. Installing a VPN
B. Implementing location tracking
C. Configuring remote wipe
D. Enabling backups
Which of the following commands can a technician use to get the MAC address of a Linux distribution?
A. net use
B. ifconfig
C. netstat
D. ping
A large organization is researching proprietary software with vendor support for a multiuser environment. Which of the following EULA types should be selected?
A. Corporate
B. Perpetual
C. Open-source
D. Personal
A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?
A. Programs and Features
B. Network and Sharing Center
C. User Accounts
D. Device Manager
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 220-1102 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.