Practice Free 220-1101 Exam Online Questions
A home user has purchased a subscription for a service that blocks malicious sites by preventing them from resolving correctly.
Which of the following settings MOST likely needs to be changed on the user’s router to enable this functionally?
- A . DNS server
- B . Port forwarding
- C . Perimeter network
- D . Universal PnP
- E . DHCP server
A
Explanation:
The Domain Name System (DNS) is responsible for translating domain names into IP addresses. By blocking malicious sites from resolving correctly, the DNS server is able to prevent the user from accessing those sites. Therefore, the DNS server setting on the user’s router needs to be changed to enable this functionality123.
Which of the following is a legacy, 15-pin cable type?
- A . DisplayPort
- B . DVI
- C . VGA
- D . HDMI
C
Explanation:
VGA (Video Graphics Array) is a legacy 15-pin connector used for transmitting analog video signals. VGA was commonly used to connect monitors to computers, but it has been largely replaced by more modern digital interfaces like DVI and HDMI.
C. VGA: A legacy 15-pin connector used for analog video signals.
Why the other options are incorrect:
While on a VoIP call, one user is unable to understand the other because the audio is breaking up.
Which of the following BEST describes what is occurring on the call?
- A . High latency
- B . External interference
- C . No connectivity
- D . Port flapping
A
Explanation:
High latency is what best describes what is occurring on a VoIP call when one user is unable to understand the other because the audio is breaking up. Latency is the delay between sending and receiving data over a network, and high latency can cause poor quality or interruptions in VoIP calls. External interference, no connectivity, or port flapping are not likely to cause audio breaking up, but rather complete loss of signal or connection.
Which of the following scenarios best illustrate a need for VDI? (Select two).
- A . An IT engineer who is designing and showcasing organization user experiences for multiple clients
- B . A company that needs to store IOPB worth of data
- C . A manufacturing plant that has high turnover
- D . A bank that has security concerns regarding employee activity
- E . A payment processor that is planning on implementing virtual currency
- F . An application developer who needs to configure network settings for an application
AD
Explanation:
The scenarios that best illustrate a need for VDI are A and D.
VDI can provide several benefits for different use cases, such as:
Enhancing security and compliance by centralizing and encrypting data and applications on the server, rather than on the endpoint devices. This can prevent data loss, theft, or leakage, as well as reduce the risk of malware or unauthorized access. This is especially important for organizations that deal with sensitive or regulated information, such as banks, healthcare providers, or government agencies123.
Improving flexibility and mobility by allowing users to access their desktops and applications from any device, location, or network. This can enable remote work, bring your own device (BYOD) policies, or disaster recovery scenarios. This is especially useful for organizations that have distributed or mobile workforce, such as IT engineers, consultants, or sales representatives123. Reducing costs and complexity by simplifying the management and maintenance of desktops and applications. This can lower the hardware, software, and energy expenses, as well as the IT staff workload. This is especially beneficial for organizations that have large or diverse desktop environments, such as schools, call centers, or manufacturing plants123. Based on these benefits, the scenarios that best illustrate a need for VDI are:
A) An IT engineer who is designing and showcasing organization user experiences for multiple clients. This scenario requires flexibility and mobility, as the IT engineer needs to access different desktop environments and applications from various devices and locations. VDI can enable the IT engineer to create and switch between multiple virtual desktops on the same server, and to access them from any client device with an internet connection1.
D) A bank that has security concerns regarding employee activity. This scenario requires security and compliance, as the bank needs to protect its data and applications from internal and external threats. VDI can enhance the security of the bank’s desktop environment by storing and encrypting all data and applications on the server, rather than on the endpoint devices. VDI can also provide granular control and monitoring of user access and activity2.
The scenarios that do not illustrate a need for VDI are:
B) A company that needs to store IOPB worth of data. This scenario does not require VDI, as VDI is not a storage solution but a desktop virtualization solution. VDI can help reduce the storage requirements of endpoint devices by storing data on the server, but it does not provide storage capacity or performance for large-scale data processing or analysis. The company may need a different type of cloud service, such as storage as a service (SaaS) or big data as a service (BDaaS), to store and manage its massive amount of data4.
C) A manufacturing plant that has high turnover. This scenario does not require VDI, as VDI is not a human resource solution but a desktop virtualization solution. VDI can help reduce the costs and complexity of managing desktops and applications for a large number of users, but it does not address the root causes of high turnover, such as low wages, poor working conditions, or lack of training. The manufacturing plant may need to improve its human resource policies and practices to retain its employees.
E) A payment processor that is planning on implementing virtual currency. This scenario does not require VDI, as VDI is not a payment solution but a desktop virtualization solution. VDI can help improve the security and flexibility of accessing desktops and applications over the internet, but it does not provide the functionality or compatibility for processing virtual currency transactions. The payment processor may need a different type of cloud service, such as blockchain as a service (BaaS) or cryptocurrency as a service (CaaS), to implement and manage its virtual currency platform.
F) An application developer who needs to configure network settings for an application. This scenario does not require VDI, as VDI is not a development solution but a desktop virtualization solution. VDI can help provide different desktop environments and applications for testing purposes, but it does not provide the tools or resources for developing or configuring applications. The application developer may need a different type of cloud service, such as platform as a service (PaaS) or software development as a service (SDaaS), to create and deploy applications.
After replacing a hot-swappable hard drive in a RAID 5 array, a technician notices decreased disk performance for approximately 12 hours.
Which of the following is the most likely cause of the performance issue?
- A . Losing a drive caused data loss.
- B . Data is being written to the new drive.
- C . The array is repairing corrupt data sectors.
- D . Another drive has gone offline.
B
Explanation:
In RAID 5 arrays, when a drive is replaced, the array must rebuild the data that was on the failed drive using parity information. This rebuild process involves reading from the existing drives and writing to the new drive, which can significantly impact performance until the rebuild is complete. This process typically takes several hours depending on the size and usage of the array, which explains the decreased performance observed.
Which of the following 802.11 standards supports both 5GHz and 2.4GHz channel frequencies?
- A . 802.11a
- B . 802.11ac
- C . 802.11b
- D . 802.11g
B
Explanation:
A user takes a tablet to a technician because the cursor on it keeps drifting. The technician notices the screen does not appear to be damaged.
Which of the following is the most likely cause of the cursor issue?
- A . The screen is physically damaged.
- B . The screen rotation is incorrect.
- C . The touch-pen battery is depleted.
- D . The screen needs to be recalibrated.
D
Explanation:
The screen needs to be recalibrated. The cursor drift is a common symptom of a misaligned touch screen, which can be caused by physical shocks, temperature changes, or software updates. The screen can be recalibrated using the tablet’s settings or a utility program. The screen is not physically damaged, as there is no visible crack or break. The screen rotation is not related to the cursor drift, as it only affects the orientation of the display. The touch-pen battery is not relevant, as the cursor drift occurs even without using the pen.
Reference: [CompTIA A+ Core 1 (220-1101) Certification Study Guide], page 15.
A technician is preparing to set up a gaming computer with the following components:
• Discrete, high-end graphics card
• Video capture card
• High-end processor
• Multiple hard drives
• USB 3.0 hub
• Sound card
Which of the following options is the most important for the technician to consider before building the gaming computer?
- A . Redundant power supply
- B . Modular power supply
- C . 20-pin vs. 24-pin power adapter
- D . Power supply wattage rating
D
Explanation:
The correct answer is
D. Power supply wattage rating.
The power supply wattage rating is the most important factor to consider before building a gaming computer, as it determines how much power the system can draw from the wall and how much power the components can consume. A power supply with a low wattage rating may not be able to support the high-end graphics card, processor, and other devices, resulting in poor performance, instability, or damage12.
To find the optimal power supply wattage rating for a gaming computer, the technician should calculate the total power consumption of all the components and add some headroom for future upgrades or overclocking. The technician can use online calculators such as Cooler Master Power Calculator or Seasonic Wattage Calculator to estimate the power requirements of the system3.
Which of the following server roles does RADIUS perform?
- A . DNS
- B . AAA
- C . Mail server
- D . Syslog
B
Explanation:
AAA stands for Authentication, Authorization, and Accounting, and it is a framework that provides security services for network access control. Authentication verifies the identity of a user or device that requests access to a network resource. Authorization determines what level of access or privileges are granted to a user or device based on their identity or role. Accounting tracks and records the usage of network resources by users or devices for billing or auditing purposes. RADIUS (Remote Authentication Dial-In User Service) is a protocol that implements AAA functions by communicating with a central server that stores user credentials and policies.
A company wants to save printing costs by restricting network printer use. The company implements a solution that requires employees to authenticate to the printer to release print jobs.
Which of the following has the company implemented?
- A . Access control list
- B . Audit logging
- C . Badging
- D . Print server
C
Explanation:
Badging is a form of authentication that requires employees to use a badge or ID card to release print jobs. This solution reduces unnecessary printing by ensuring only authorized users print.
Why Not A (Access control list): While ACLs manage permissions, they are not used for physical authentication at printers.
Why Not B (Audit logging): Audit logs track actions but do not restrict printer access.
Why Not D (Print server): A print server manages print jobs but doesn’t enforce authentication.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.5, authentication mechanisms.