Practice Free 220-1101 Exam Online Questions
A user is experiencing an issue when trying to use a wireless headset with a mobile phone. The device was previously paired with the phone but is unable to connect when switched on.
Which of the following should the user enable on the phone to remediate the issue?
- A . Bluetooth
- B . Near-field communication
- C . Tether
- D . Wi-Fi
A
Explanation:
The correct answer is A. Bluetooth.
Bluetooth is a wireless technology that allows devices to communicate with each other over short distances. It is commonly used for connecting wireless headsets, speakers, keyboards, mice, and other peripherals to mobile phones, laptops, and other devices.
To use a Bluetooth device with a mobile phone, the user needs to enable Bluetooth on both devices and pair them together. Pairing is a process of exchanging security codes and creating a trusted connection between the devices. Once paired, the devices can automatically connect when they are in range and turned on.
If the user is experiencing an issue when trying to use a wireless headset with a mobile phone, the first thing to check is whether Bluetooth is enabled on both devices. If Bluetooth is turned off, the devices will not be able to connect or communicate with each other.
To enable Bluetooth on a mobile phone, the user can follow these steps:
• Check in quick settings: Select the Network, Sound, or Battery icons ( ) on the right side of the taskbar, look for the Bluetooth quick setting, then select Bluetooth to turn it on. You’ll see “Not connected” if your Windows 11 device isn’t connected to any Bluetooth accessories.
• Check in Settings: Select Start > Settings > Bluetooth & devices. Make sure Bluetooth is turned on.
These steps are based on Windows 11 operating system1. The exact steps may vary depending on the type and model of the mobile phone and its operating system.
If Bluetooth is enabled on both devices but they still cannot connect, the user can try some other troubleshooting steps, such as:
• Turn off your Bluetooth device, wait a few seconds, then turn it back on.
• Make sure your Bluetooth device is in range of your mobile phone.
• Remove the Bluetooth device from your mobile phone’s list of paired devices, then add it
again.
• Update the Bluetooth driver on your mobile phone or the firmware on your Bluetooth
device.
• Restart your mobile phone or reset your Bluetooth device.
For more details and tips on how to fix Bluetooth problems in Windows 112 or other operating systems1, you can visit the links provided.
A technician needs to adjust the VLAN to allow users in the sales department to access the marketing department’s network resources.
Which of the following should the technician configure?
- A . Network card
- B . Patch panel
- C . Switch
- D . Server
- E . Hub
C
Explanation:
To adjust the VLAN configuration, the technician needs to configure the switch. VLANs are configured on switches to segment network traffic logically, even if the devices are connected to the same physical network. By adjusting the VLAN settings on the switch, the technician can ensure that the sales department has access to the marketing department’s network resources.
C. Switch: VLANs are configured on switches to logically separate or combine network segments.
Why the other options are incorrect:
Which of the following options provides correct information about 2.4GHz and 5GHz wireless frequencies? (Select TWO)
- A . 2.4GHz has less interference. 5GHz transmits inlower speed.
- B . 2.4GHz penetrates solid objects more effectively. 5GHz provides faster data connections.
- C . 2.4GHz has a higher data rate. 5GHz has 23 channels.
- D . 2.4GHz has Il channels. 5GHz has no data interference.
- E . 2.4GHz has a higher coverage area. 5GHz has higher bandwidth.
- F . 2.4GHz has a higher bandwidth. 5GHz has lower transmit power.
B,E
Explanation:
The correct answers are B. 2.4GHz penetrates solid objects more effectively. 5GHz provides faster data connections and E. 2.4GHz has a higher coverage area. 5GHz has higher bandwidth. The 2.4GHz frequency has a lower data rate compared to 5GHz, but it can penetrate solid objects more effectively and has a higher coverage area. The 5GHz frequency, on the other hand, provides faster data connections and has higher bandwidth, but it has fewer channels and lower transmit power.
A customer purchased an active touch pen for a tablet PC. After the customer used the pen for a few days, it stopped working.
Which of the following is most likely causing the issue?
- A . The tablet screen is scratched.
- B . The pen software is out of date.
- C . The pen batteries need recharging.
- D . Software updates disabled the pen.
C
Explanation:
The most likely answer is C. The pen batteries need recharging.
An active touch pen is a stylus that uses a battery to power features such as pressure sensitivity, buttons, or Bluetooth connectivity. If the pen batteries are low or depleted, the pen may stop working or become inaccurate1. To fix this issue, you should recharge the pen batteries using the provided charger or cable, or replace them with new ones if they are not rechargeable1.
The other options are less likely to cause the issue. A scratched tablet screen may affect the touch sensitivity, but it should not affect the pen functionality. The pen software may need updating to improve performance or compatibility, but it should not stop the pen from working altogether.
Software updates may disable the pen if they change the settings or drivers, but this can be fixed by
re-enabling the pen or reinstalling the drivers2.
Reference: 1: Troubleshoot your Surface Pen – Microsoft Support
2: Windows 10 touch screen: active pen works, finger does not – Super User
A user entered a help desk ticket stating the latest calendar updates have not appeared on the user’s corporate mobile device for several days, even though updates do appear on the user’s laptop.
Which of the following actions will MOST likely enable calendar alerts?
- A . Checking that the ringer volume on the device is high enough to be audible
- B . Ensuring the corporate password is saved correctly in the calendar application
- C . Installing a third-party calendar application and synchronizing it with the corporate calendar
- D . Remotely wiping the mobile device and reinstalling all applications
A company is testing the latest model of a laptop. After turning on the laptop, there is a noticeable burning smell.
Which of the following steps should a technician take to troubleshoot the laptop issue? (Select two).
- A . Turn it off and disconnect all power sources.
- B . Submit an emergency request to the local facilities manager.
- C . Check for foreign objects, liquid spills, and internal damage.
- D . Contact the vendor and submit a return request.
- E . Remove the device from the MDM.
- F . Try an alternate AC adapter.
A, C
Explanation:
Turning off the laptop and disconnecting power immediately prevents further damage and potential safety hazards. Checking for foreign objects or damage is essential for identifying the root cause. Other options, such as contacting the vendor or using a different adapter, are not immediate troubleshooting steps for an active burning smell. CompTIA A+ Core 1 objectives emphasize safety and hardware troubleshooting.
A technician is mitigating threats to web clusters.
Which of the following tools is the most appropriate for a technician to use to mitigate unwanted traffic against the web clusters’ public-facing interface?
- A . Device encryption
- B . Intrusion detection system
- C . Antivirus/anti-malware
- D . Physical firewall
D
Explanation:
A physical firewall is a hardware device that filters and blocks unwanted or malicious traffic from entering or leaving a network. A physical firewall can be configured with rules and policies to allow or deny traffic based on various criteria, such as source and destination IP addresses, ports, protocols, applications, etc. A physical firewall can also provide logging and monitoring capabilities to detect and prevent network attacks12.
A physical firewall is the most appropriate tool for a technician to use to mitigate threats to web clusters, which are groups of web servers that work together to provide high availability and scalability for web applications. Web clusters are often exposed to the internet and face various types of threats, such as denial-of-service (DoS) attacks, brute force attacks, SQL injection attacks, cross-site scripting (XSS) attacks, etc. A physical firewall can protect the web clusters’ public-facing interface by filtering and blocking the unwanted or malicious traffic before it reaches the web servers, thus reducing the risk of compromise or downtime34.
The other options are not as effective or relevant as a physical firewall for mitigating threats to web clusters. Device encryption is a process of transforming data into an unreadable form using a secret key, which can prevent unauthorized access to the data if the device is lost or stolen. However, device encryption does not prevent network attacks or filter traffic, and it may not apply to web clusters that use shared storage or cloud services. Intrusion detection system (IDS) is a software or hardware tool that monitors network traffic and alerts the administrator of any suspicious or malicious activity. However, IDS does not block or filter traffic, and it may not be able to prevent or stop an attack in progress. IDS is often used in conjunction with a firewall, not as a replacement. Antivirus/anti-malware is a software tool that scans and removes viruses, worms, trojans, spyware, ransomware, and other malicious software from a device. However, antivirus/anti-malware does not filter or block network traffic, and it may not be able to detect or prevent some web-based attacks,
such as XSS or SQL injection. Antivirus/anti-malware is also often used in conjunction with a firewall,
not as a replacement.
Reference: CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 5: Networking, Section 5.4: Network Devices, Page 233
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, Chapter 5: Networking, Section 5.4: Network Devices, Page 197
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Pearson uCertify Course and Labs and Textbook Bundle, Chapter 5: Networking, Section 5.4: Network Devices, Page 234
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, Chapter 5: Networking, Section 5.4: Network Devices, Page 205
CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.3: Device Security, Page 419
CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.4: Network Security, Page 431
CompTIA A+ Core 1 (220-1101) Certification Study Guide, Chapter 9: Security, Section 9.5: Malware and Threats, Page 443
Which of the following translates a hostname to IP addresses?
- A . AAA
- B . DHCP
- C . DNS
- D . UTM
C
Explanation:
DNS stands for Domain Name System, which is a network service that translates hostnames to IP addresses. Hostnames are human-readable names that identify devices or services on the Internet, such as www.google.com or mail.yahoo.com. IP addresses are numerical identifiers that specify the location of devices or services on the Internet, such as 172.217.14.206 or 98.137.11.163. DNS allows users to access websites or services by using hostnames instead of IP addresses, which are easier to remember and type. DNS also allows hostnames to change their IP addresses without affecting the users, which can improve performance and security.
Reference: The following web search results provide more information about DNS and how it translates hostnames to IP addresses:
What is DNS? | How DNS Works | Cloudflare: This article explains the concept of DNS, its components, its functions, and its benefits.
Hostname vs. IP – address – Stack Overflow: This answer compares the differences between hostnames and IP addresses, and how DNS resolves them.
How DNS Works: Domain Name System (DNS): This article illustrates how DNS works with diagrams and examples.
A technician has just installed a new SSD into a computer, but the drive is not appearing.
Which of the following is most likely the reason’s?
- A . The SSD is faulty and should be replaced by the manufacturer
- B . The SSD has not been properly formatted and is not readable
- C . The SSD is incompatible with the motherboard
- D . The SSD has not boon installed properly and should be reseated
D
Explanation:
Improper seating is the most common reason an SSD isn’t recognized. Ensuring it is correctly connected resolves the issue.
Why Not A (Faulty SSD): A faulty SSD is possible but less likely than an installation issue.
Why Not B (Not formatted): Formatting affects data usability, not drive detection.
Why Not C (Incompatibility): SSD compatibility issues are rare with modern hardware.
CompTIA A+ Exam
Reference: Core 1 (220-1101), Section 3.3, storage troubleshooting.
Which of the following cloud-computing concepts describes an application that is hosted on the internet but can be used and configured as needed internally per organization?
- A . Hybrid cloud
- B . Public cloud
- C . laaS
- D . SaaS
- E . PaaS