Complete list of current Q & A>> Download CompTIA Core-II (220-1102) – Quiz 1 / 15 Category: CompTIA Core-II (220-1102) 1. A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email firom the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware· MOST likely infected these computers? A. Ransomware B. Spyware C. Keylogger D. Rootkit 2 / 15 Category: CompTIA Core-II (220-1102) 2. You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive? A. Disk Management B. DxDiag C. Disk Defragmenter 3 / 15 Category: CompTIA Core-II (220-1102) 3. Which of the following data types would be used to store the user’s middle initial? A. Boolean B. String C. Character D. Integers 4 / 15 Category: CompTIA Core-II (220-1102) 4. A penetration tester sends an email out to 100,000 random email addresses. In the email the attacker sent, it claims that “Your Bank of America account is locked out. Please click here to reset your password.” Which of the following attack types is being used? A. Vishing B. Phishing C. Spear phishing D. Whaling 5 / 15 Category: CompTIA Core-II (220-1102) 5. What type of structure is “For Next” in scripting? A. Loop B. Branch C. Constant D. Variable 6 / 15 Category: CompTIA Core-II (220-1102) 6. Which of the following file types are commonly used to create simple scripts in the Windows commandline environment? A. .py B. .sh C. .js D. .bat 7 / 15 Category: CompTIA Core-II (220-1102) 7. You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created? A. Update the firmware B. Enable DHCP C. Configure port forwarding D. Configure your Wi-Fi to use Channel11 8 / 15 Category: CompTIA Core-II (220-1102) 8. Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence? A. Legal hold B. Financial responsibility C. Chain of custody D. Secure copy protocol 9 / 15 Category: CompTIA Core-II (220-1102) 9. Dion Training has recently replaced the batteries in their rack-mounted UPS in their data center. Which of the following should their technicians do to dispose of the depleted batteries? A. Research local regulations for toxic waste disposal in their area B. Review the material safety data sheet for disposal instructions C. Wrap the batteries in plastic and place them in the trash D. Place the batteries in the recycle bin behind their office building 10 / 15 Category: CompTIA Core-II (220-1102) 10. You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions? A. Surge suppressor B. Battery backup C. Grounding the server rack D. Line conditioner 11 / 15 Category: CompTIA Core-II (220-1102) 11. Which of the following BEST describes how a DHCP reservation works? A. By leasing a set of reserved IP addresses according to their category B. By assigning options to the computers on the network by priority C. By matching a MAC address to an IP address within the DHCP scope D. By letting the network switches assign IP addresses from a reserved pool 12 / 15 Category: CompTIA Core-II (220-1102) 12. Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site? A. Tower of Hanoi B. Grandfather-father-son C. FIFO Backup D. 3-2-1 backup 13 / 15 Category: CompTIA Core-II (220-1102) 13. What is the FOURTH step of the seven-step malware removal process? A. Enable System Restore and create a restore point in Windows B. Quarantine the infected system C. Update the applications and the operating system D. Remediate the infected systems 14 / 15 Category: CompTIA Core-II (220-1102) 14. Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user’s password? A. Password complexity B. Password history C. Password expiration D. Password length 15 / 15 Category: CompTIA Core-II (220-1102) 15. Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state? A. Primary B. Swap C. Recovery D. Extended Your score is 0% Restart quiz Send feedback