00:00

QUESTION 31

A user's iPhone was permanently locked after several tailed login attempts. Which of the following will restore access to the device?

Correct Answer: D
A secondary account and recovery code are used to reset the primary account and password on an iPhone after it has been locked due to failed login attempts. Fingerprint, pattern, facial recognition and PIN code are biometric or numeric methods that can be used to unlock an iPhone, but they are not helpful if the device has been permanently locked. Verified References: https://support.apple.com/en-us/HT204306 https://www.comptia.org/certifications/a

QUESTION 32

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

Correct Answer: B
Verifying warranty status with the vendor is the most logical next step in the remediation process after determining that a motherboard has failed. A warranty is a guarantee from the vendor that covers the repair or replacement of defective or faulty products within a specified period of time. Verifying warranty status with the vendor can help the technician determine if the motherboard is eligible for warranty service and what steps to take to obtain it. Escalating the issue to Tier 2, replacing the motherboard, and purchasing another PC are not the most logical next steps in the remediation process.

QUESTION 33

A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method

Correct Answer: C
Using disk-wiping software is the most secure method for removing information from past users’ hard drives in order to reuse the hard drives. Disk-wiping220-1102 dumps exhibitsoftware can help to ensure that all data on the hard drive is completely erased and cannot be recovered.

QUESTION 34

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Correct Answer: C
Mobile device multifactor authentication (MFA) is a method of verifying a user’s identity by requiring two or more factors, such as something the user knows (e.g., password, PIN, security question), something the user has (e.g., smartphone, OTP app, security key), or something the user is (e.g., fingerprint, face, iris)12. The combination of fingerprint and password meets the requirements for mobile device MFA because it uses two different factors: something the user is (fingerprint) and something the user knows (password). The other combinations do not meet the requirements because they use only one factor: something the user knows (password or PIN) or something the user does (swipe). References1: Set up the Microsoft Authenticator app as your verification method2: What is Multi-Factor Authentication (MFA)? | OneLogin

QUESTION 35

Which of the following is MOST likely used to run .vbs files on Windows devices?

Correct Answer: C
A .vbs file is a Virtual Basic script written in the VBScript scripting language. It contains code that can be executed within Windows via the Windows-based script host (Wscript.exe), to perform certain admin and processing functions1. Cscript.exe is a command-line version of the Windows Script Host that provides command-line options for setting script properties. Therefore, cscript.exe is most likely used to run .vbs files on Windows devices. References: 1: https://fileinfo.com/extension/vbs : https://docs.microsoft.com/en-us/windows-server/administration/windows- commands/cscript
220-1102 dumps exhibit