Which of the following should a technician do to allow access?
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?A . Adjust the content filtering. B. Unmap port forwarding. C. Disable unused ports. D. Reduce the encryption strengthView AnswerAnswer: A Explanation: Content filtering is a process that manages...
Which of the following threats was used to carry out the attack?
A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?A . Zero day B. Vishing C. DDoS D. Evil twinView AnswerAnswer: B Explanation: Vishing, also known as voice phishing,...
Which of the following OS utilities is used to change the color of the cursor?
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?A . Keyboard B. Touch pad C. Ease of Access Center D. Display settingsView AnswerAnswer: C Explanation: The OS utility used to change the...
should the technician do FIRST?
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should...
Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?
A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?A . UEFI password B. Secure boot C. Account lockout D. Restricted user permissionsView...
Which of the following protocols will the technician MOST likely utilize?
A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?A . DHCP B. SMTP C. DNS D. RDPView AnswerAnswer: A...
Which of the following should be done NEXT?
Which of the following should be done NEXT?A . Send an email to Telecom to inform them of the issue and prevent reoccurrence. B. Close the ticket out. C. Tell the user to take time to fix it themselves next time. D. Educate the user on the solution that was...
Which of the following should the technician MOST likely have done to prevent damage?
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?A . Removed all jewelry B. Completed an inventory of tools before use C. Practiced electrical fire...
Which of the following Wi-Fi protocols is the MOST secure?
Which of the following Wi-Fi protocols is the MOST secure?A . WPA3 B. WPA-AES C. WEP D. WPA-TKIPView AnswerAnswer: A Explanation: https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)
Which of the following would BEST resolve the issue?
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?A . Application updates B. Anti-malware software C. OS reinstallation D. File restoreView AnswerAnswer: C Explanation: If a rootkit has caused a deep infection, then the only way to...