Free CompTIA 220-1102 Exam Questions (page: 4)

Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?

  1. Use xcopy to clone the hard drives from one to another.
  2. Use robocopy to move the files to each device.
  3. Use a local image deployment tool for each device.
  4. Use a network-based remote installation tool.

Answer(s): D

Explanation:

A network-based remote installation tool (such as Windows Deployment Services, MDT, or a similar solution) scales efficiently across hundreds of devices with varying hardware and user configurations. It allows you to segment deployments by vendor classes and user groups, automate imaging processes, and manage version control centrally - far more effectively than one-to-one cloning or file-copy methods.



Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?

  1. Impersonation
  2. Vishing
  3. Spear phishing
  4. Smishing

Answer(s): D

Explanation:

Smishing is the act of sending fraudulent messages via SMS or other texting platforms to trick users into revealing sensitive information or clicking malicious links. This distinguishes it from phishing over email (spear phishing), voice calls (vishing), or in-person deception (impersonation).



A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?

  1. Reenroll the user's mobile device to be used as an MFA token.
  2. Use a private browsing window to avoid local session conflicts.
  3. Bypass single sign-on by directly authenticating to the application.
  4. Reset the device being used to factory defaults.

Answer(s): B

Explanation:

Single sign-on issues that affect only a specific application often stem from stale or conflicting session data in the user's browser. Launching a private (incognito) window ensures a fresh session without cached cookies or tokens, which can resolve access to the SaaS tool without affecting other configurations.



A technician verifies that a malware incident occurred on some computers in a small office.
Which of the following should the technician do next?

  1. Quarantine the infected systems.
  2. Educate the end users.
  3. Disable System Restore.
  4. Update the anti-malware and scan the computers.

Answer(s): A

Explanation:

Once an incident is confirmed, the immediate priority is containment. Isolating (quarantining) the infected machines prevents the malware from spreading to other systems or exfiltrating data, enabling safe analysis and remediation.



Which of the following is a Linux command that is used for administrative purposes?

  1. runas
  2. cmcl
  3. net user
  4. su

Answer(s): D

Explanation:

The su (substitute user) command is a standard Linux utility that allows an administrator to assume another user's identity - most commonly switching to the root account for elevated privileges. It's an essential tool for administrative tasks on Unix and Linux systems.



Viewing page 4 of 34
Viewing questions 16 - 20 out of 207 questions



Post your Comments and Discuss CompTIA 220-1102 exam prep with other Community members:

220-1102 Exam Discussions & Posts