exam questions

Exam 220-1102 All Questions

View all questions & answers for the 220-1102 exam

Exam 220-1102 topic 1 question 213 discussion

Actual exam question from CompTIA's 220-1102
Question #: 213
Topic #: 1
[All 220-1102 Questions]

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

  • A. Restore the device to factory settings.
  • B. Uninstall the unapproved application.
  • C. Disable the ability to install applications from unknown sources.
  • D. Ensure the device is connected to the corporate WiFi network.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 1 month ago
Selected Answer: B
From removing it you'll know what caused it or not
upvoted 7 times
...
Rixon
Most Recent 10 months, 2 weeks ago
both and A. and B. seem correct to me. CompTIA questions are so bad that Im thinking this is my last CompTIA cert.
upvoted 1 times
...
Jay23AmMonsIV
1 year ago
Selected Answer: A
Restoring the device to factory settings is crucial to eliminate any potential malicious configurations or unauthorized access that may have contributed to the leaked data. It effectively removes all data and applications, resetting the device to its original state. This step helps in identifying if the leak was due to a compromise in the device itself or through the installed applications.
upvoted 1 times
...
Raffaelloo
1 year, 6 months ago
Selected Answer: B
B is correct Unauthorized software increases the risk of outsiders gaining access to sensitive data. Any software that is not authorized is likely managed without proper patching, updates, configurations, and security protocols
upvoted 1 times
...
shkhsprre
1 year, 8 months ago
According to chatgpt: The next step the technician should take to find the cause of the leaked data and address the security issue is: A. Restore the device to factory settings. Restoring the device to factory settings (also known as a factory reset) will remove all installed applications, data, and configurations, effectively wiping the device clean. This is a crucial step because it will remove any potential malware or unauthorized applications that might be causing the data leakage and remove any suspicious configurations. It's a comprehensive measure to ensure the device is in a clean and secure state.
upvoted 2 times
...
rknard22
1 year, 9 months ago
Selected Answer: C
C. Disable the ability to install applications from unknown sources. Disabling the ability to install applications from unknown sources is a crucial step because it prevents the installation of potentially malicious apps that may have contributed to the data leak. By doing this, you can enhance the security of the device and reduce the risk of further data breaches.
upvoted 1 times
mehmibhavna
1 year, 3 months ago
This is not a corporate device then how can you restrict download,
upvoted 1 times
...
...
EngAbood
1 year, 10 months ago
b , c are correct for me , sooooooooo ??
upvoted 1 times
...
Mehsotopes
1 year, 11 months ago
Selected Answer: B
The application coming from an unknown location should have never existed in the first place and phone has likely been rooted and jailbroken.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...