ExamHelpDesk

Complete list of current Q & A>>

CompTIA Core-II (220-1102) – Quiz

1 / 15

Category: CompTIA Core-II (220-1102)

1. A hospital’s file server has become infected with malware. The files on the server all appear to be encrypted and cannot be opened. The network administrator receives an email firom the attacker asking for 20 bitcoin in exchange for the decryption key. Which type of malware· MOST likely infected these computers?

 

2 / 15

Category: CompTIA Core-II (220-1102)

2. You have been asked to install a new hard drive in a Windows 10 system. You have already installed the hard drive and booted the system up. Which tool should you use to create the new partitions on the hard drive?

3 / 15

Category: CompTIA Core-II (220-1102)

3. Which of the following data types would be used to store the user’s middle initial?

4 / 15

Category: CompTIA Core-II (220-1102)

4. A penetration tester sends an email out to 100,000 random email addresses. In the email the attacker sent, it claims that “Your Bank of America account is locked out. Please click here to reset your password.” Which of the following attack types is being used?

 

5 / 15

Category: CompTIA Core-II (220-1102)

5. What type of structure is “For Next” in scripting?

 

6 / 15

Category: CompTIA Core-II (220-1102)

6. Which of the following file types are commonly used to create simple scripts in the Windows commandline environment?

 

7 / 15

Category: CompTIA Core-II (220-1102)

7. You have just set up a Minecraft server on a spare computer within your network and want your friends to connect to it over the internet. What do you need to configure in your SOHO router to allow your friends to connect to the new Minecraft server you created?

 

8 / 15

Category: CompTIA Core-II (220-1102)

8. Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?

 

9 / 15

Category: CompTIA Core-II (220-1102)

9.  

Dion Training has recently replaced the batteries in their rack-mounted UPS in their data center. Which of the following should their technicians do to dispose of the depleted batteries?

 

10 / 15

Category: CompTIA Core-II (220-1102)

10. You are concerned that your servers could be damaged during a power failure or under-voltage event. Which TWO devices would protect against these conditions?

11 / 15

Category: CompTIA Core-II (220-1102)

11. Which of the following BEST describes how a DHCP reservation works?

12 / 15

Category: CompTIA Core-II (220-1102)

12.  

Which of the following backup rotation schemes requires at least one monthly full backup to be stored safely off-site?

 

13 / 15

Category: CompTIA Core-II (220-1102)

13. What is the FOURTH step of the seven-step malware removal process?

14 / 15

Category: CompTIA Core-II (220-1102)

14. Which of the following password policies defines the number of previous passwords that cannot be reused when resetting a user’s password?

 

15 / 15

Category: CompTIA Core-II (220-1102)

15. Which partition of the hard drive is concealed from the user in the File Explorer within Windows 10 and is only used when imaging the computer back to its factory default state?

 

Your score is

0%

Scroll to Top