Practice Free 220-1101 Exam Online Questions
A company has implemented a policy that allows employees to use personal devices to perform work duties.
Which of the following policies should the technician activate to protect company information?
- A . MFD
- B . MAM
- C . MFA
- D . MDM
D
Explanation:
MDM (Mobile Device Management) is a policy that allows the technician to remotely manage, secure, and monitor the personal devices that employees use for work purposes. MDM can enforce security settings, such as passwords, encryption, and antivirus software, on the personal devices. MDM can also remotely wipe or lock the devices in case of loss, theft, or termination of employment. MDM can protect company information by preventing unauthorized access, data leakage, or malware infection on the personal devices.
Reference
What is Mobile Device Management (MDM)?
Chapter 2: Networking
A systems administrator is working to ensure access to corporate laptops is limited to authorized users. The administrator has already implemented a password policy.
Which of the following would be the best option to help the administrator secure the corporate resources?
- A . Trusted Platform Module
- B . Biometric scanner
- C . Laptop lock
- D . Encryption
B
Explanation:
The best option to help the administrator secure the corporate resources is B. Biometric scanner.
A biometric scanner is a device that can authenticate a user’s identity based on their physical or behavioral characteristics, such as fingerprint, iris, face, voice, or signature. A biometric scanner can provide a high level of security and convenience for accessing corporate laptops, as it can prevent unauthorized users from accessing the devices and eliminate the need to remember passwords. The other options are not the best options for this scenario. A Trusted Platform Module (TPM) is a chip that can store encryption keys and other sensitive data on a laptop. A TPM can enhance the security of data and devices, but it does not limit access to authorized users by itself. A TPM can work with a password or a biometric scanner to provide multifactor authentication. A laptop lock is a device that can physically secure a laptop to a desk or other object using a cable and a lock. A laptop lock can deter theft or tampering, but it does not prevent unauthorized users from accessing the laptop if they have the password or the key. Encryption is a process that can protect data on a laptop by transforming it into an unreadable format using a key. Encryption can prevent unauthorized users from accessing or modifying the data, but it does not prevent them from accessing the laptop itself.
A user’s laptop keyboard is not working properly. A technician notices that when the keys for special characters are pressed, other characters appear instead.
Which of the following should the technician do first to diagnose the issue?
- A . Check the keyboard layout.
- B . Replace the keyboard.
- C . Update the keyboard drivers.
- D . Change the keyboard language.
A
Explanation:
The first thing that the technician should do to diagnose the issue is A) Check the keyboard layout.
The keyboard layout is the arrangement of the keys and symbols on the keyboard, which can vary depending on the language, region, or standard. If the keyboard layout is not set correctly, it can cause the keys to produce different characters than expected. For example, if the keyboard layout is set to French, pressing the key for @ will produce à instead.
To check and change the keyboard layout, the technician can follow these steps:
• On Windows 10, click on the Start menu and select Settings.
• Click on Time & Language and then on Language.
• Under Preferred languages, click on the current language and then on Options.
• Under Keyboards, check if the keyboard layout matches the physical keyboard. If not, click on Add a keyboard and select the correct layout. Alternatively, click on Remove to delete any unwanted layouts.
• To switch between keyboard layouts, use the shortcut Windows key + Space bar.
Checking the keyboard layout can help identify and fix the issue quickly and easily, without requiring any hardware or software changes. Therefore, it is the best first step to diagnose the issue.
Reference: How to change your keyboard layout on Windows 10 PC | Windows Central
: How to type French accents on a PC – FrenchCrazy
A user needs to upgrade a PC in order to run the latest 3-D design software.
Which of the following components should the user upgrade to best meet this requirement?
- A . Motherboard
- B . CPU
- C . Power supply
- D . Graphics card
- E . Memory
D
Explanation:
The correct answer is D. Graphics card.
A graphics card is a component that handles the processing and rendering of 3D graphics on a PC. A graphics card can significantly improve the performance and quality of 3D design software, as it can handle complex calculations and display high-resolution images faster than the CPU. A graphics card can also support features such as ray tracing, anti-aliasing, and texture mapping, which can enhance the realism and detail of 3D models.
A) Motherboard. This is not a correct answer. A motherboard is a component that connects and communicates with all the other components in a PC. A motherboard does not directly affect the performance or quality of 3D design software, unless it is incompatible or outdated with the other components.
B) CPU. This is not a correct answer. A CPU is a component that executes instructions and calculations for various programs on a PC. A CPU can affect the performance and quality of 3D design software, but not as much as a graphics card. A CPU is more important for tasks such as compiling, encoding, or multitasking, which are not specific to 3D design.
C) Power supply. This is not a correct answer. A power supply is a component that converts AC power from the wall outlet to DC power for the PC components. A power supply does not directly affect the performance or quality of 3D design software, unless it is insufficient or faulty to provide enough power for the other components.
E) Memory. This is not a correct answer. Memory is a component that stores data temporarily for fast access by the CPU and other components. Memory can affect the performance and quality of 3D design software, but not as much as a graphics card. Memory is more important for tasks such as loading, saving, or switching between programs, which are not specific to 3D design.
Reference: System requirements | Substance 3D Designer1, 12 Best Free 3D Modeling Software (For Beginners) 20232, System requirements for Autodesk 3ds Max 20213.
A technician is using a PAN to connect a group of users on a field project.
Which of the following services should the technician activate on the mobile device to share the internet data connection?
- A . Tethering
- B . Pairing
- C . Bluetooth
- D . Hotspot
A
Explanation:
The correct answer is A) Tethering.
Tethering is the process of sharing a mobile device’s internet data connection with other devices, such as laptops, tablets, or other phones. Tethering can be done by using a Wi-Fi hotspot, a Bluetooth connection, or a USB cable. A Wi-Fi hotspot creates a wireless network that other devices can join, a Bluetooth connection pairs the devices and allows data transfer, and a USB cable connects the devices physically and enables data sharing.
A PAN, or personal area network, is a type of network that connects devices within a short range, usually up to 10 meters. A PAN can be used for various purposes, such as transferring files, printing documents, or accessing the internet. A PAN can be created by using Bluetooth, Wi-Fi, or infrared technologies.
A technician can use a PAN to connect a group of users on a field project by using tethering on a mobile device. The technician can activate the tethering service on the mobile device and choose the preferred method of sharing the internet data connection. The other devices can then connect to the mobile device and access the internet through it.
The other options are incorrect because they are not services that can share the internet data connection on a mobile device. Pairing is the process of establishing a connection between two Bluetooth devices, but it does not necessarily share the internet data connection. Bluetooth is a technology that can create a PAN and enable tethering, but it is not a service that can be activated on a mobile device. Hotspot is a term that can refer to a Wi-Fi hotspot created by tethering on a mobile device, but it is not a service that can be activated on its own.
Reference: Share a mobile connection by hotspot or tethering on Android
How to share a mobile connection by tethering or hotspot on Android How to Share Mobile Internet to PC or Other devices
Which of the following video cables can carry an audio signal?
- A . HDMI
- B . S-Video
- C . VGA
- D . DVI
A
Explanation:
This is because HDMI (High-Definition Multimedia Interface) is a digital video cable that can also carry audio signals1. HDMI cables are commonly used to connect devices like Blu-ray players, game consoles, and streaming boxes to HDTVs and monitors. The other options are not capable of carrying audio signals. VGA (Video Graphics Array) is an analog video cable that only carries RGBHV signals12. S-Video (Super Video) is another analog video cable that carries separate luminance and chrominance signals1
. DVI (Digital Visual Interface) is a digital video cable that can carry either analog or digital signals, but not audio1.
Which of the following protocols can be used to securely access a remote network to troubleshoot various devices?
- A . FTP
- B . RDP
- C . SSH
- D . TFTP
C
Explanation:
Secure Shell (SSH) is a protocol used to securely access and manage devices over a network. It provides a secure channel over an unsecured network in a client-server architecture, enabling technicians to perform troubleshooting and management tasks remotely with encryption to ensure the security of the data transmitted. FTP and TFTP are used for file transfers and do not inherently provide the same level of security or direct device management capabilities. RDP is used for remote desktop connections but is not as universally applicable for various devices as SSH.
Reference: CompTIA A+ Core 1 Exam Objectives Section 2.1: Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes.
A salesperson is unable to use a personal device to access emails and calendar features at a client site but was able to use the device while at the office.
Which of the following policies has been enforced on the salesperson’s mobile device?
- A . MOW
- B . MAN
- C . MFA
- D . MAM
D
Explanation:
Mobile Application Management (MAM) enforces policies restricting access to apps and services based on location, ensuring security at external sites.
Why Not A (MOW): "Mobile Only Workplace" (MOW) is not a recognized term in this context.
Why Not B (MAN): Metropolitan Area Network (MAN) is unrelated to mobile device policies.
Why Not C (MFA): Multi-Factor Authentication secures user accounts but does not enforce app restrictions.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.7, mobile device security policies.
After a technician updated the wireless APs to 5GHz, users report they have degraded Wi-Fi performance. The technician tests for interference but finds none.
Which of the following should the technician do next?
- A . Select a different channel.
- B . Switch the Wi-Fi back to the 2.4GHz frequency.
- C . Upgrade the wireless drivers on the users’ devices.
- D . Add more access points for better coverage.
D
Explanation:
Step by Step Detailed Comprehensive Explanation with All CompTIA
Reference: Analysis of the Problem:
Switching to the 5GHz frequency improves speed but decreases range and penetration through walls compared to 2.4GHz.
Users experience degraded performance likely due to poor coverage at the 5GHz range.
Option Evaluation:
A technician is upgrading a desktop’s storage with the fastest option available. The desktop’s
motherboard is equipped with SATA Ill, NVMe, and IDE.
Which of the following should the technician choose for the best performance?
- A . PCIe SSD connected via NVMe interface
- B . 3.5in (8.9cm) 10,000rpm HDD connected via IDE interface
- C . M.2 SSD connected via SATA interface
- D . 2.5in (6.35cm) SSD connected via SATA interface
A
Explanation:
The best option that the technician should choose for the best performance is
A) PCIe SSD connected via NVMe interface. This option means that the technician should install a solid state drive (SSD) that uses the PCIe (Peripheral Component Interconnect Express) bus and the NVMe (Non-Volatile Memory Express) protocol to communicate with the motherboard. This option can offer the following advantages:
Faster speed: PCIe SSDs can transfer data faster than SATA or IDE SSDs, as they use more lanes and have higher bandwidth. PCIe SSDs can reach speeds of up to 7,000 MB/s, while SATA SSDs are limited to 600 MB/s and IDE SSDs are even slower12. NVMe is a protocol that is designed specifically for SSDs and can optimize their performance by reducing latency and increasing parallelism3.
Smaller size: PCIe SSDs can be smaller than SATA or IDE SSDs, as they do not require additional cables or connectors. PCIe SSDs can come in different form factors, such as M.2 or U.2, which can fit in different slots on the motherboard12.
Higher reliability: PCIe SSDs can be more reliable than SATA or IDE SSDs, as they have less moving parts and are less prone to mechanical failures or data corruption. PCIe SSDs can also support features such as error correction and wear leveling, which can enhance their durability and lifespan12.