Free 220-1102 Exam Braindumps (page: 16)

Page 15 of 177

Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

  1. Install and run Linux and the required application in a PaaS cloud environment.
  2. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
  3. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
  4. Set up a dual boot system by selecting the option to install Linux alongside Windows.

Answer(s): B



A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

  1. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never.
  2. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never.
  3. Within the Power Options of the Control Panel utility, select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never.
  4. Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing.

Answer(s): D



A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?

  1. Cryptominer
  2. Phishing
  3. Ransomware
  4. Keylogger

Answer(s): C



A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)

  1. Utilizing an ESD strap
  2. Disconnecting the computer from the power source
  3. Placing the PSU in an antistatic bag
  4. Ensuring proper ventilation
  5. Removing dust from the ventilation fans
  6. Ensuring equipment is grounded

Answer(s): A,B






Post your Comments and Discuss CompTIA 220-1102 exam with other Community members:

220-1102 Discussions & Posts