Practice Free 220-1101 Exam Online Questions
A technician identified an issue on a workstation, obtained details from the user, and made a backup of the system.
Which of the following should the technician do NEXT?
- A . Determine the next steps to resolve the issue and document it.
- B . Design a plan of action to resolve the issue and implement the solution.
- C . Document the findings, actions, and outcomes.
- D . Establish a theory of probable cause, researching internally or externally as needed.
D
Explanation:
After the issue has been identified and the backup of the system has been made, the next step is to establish a theory of probable cause. This involves researching the issue to determine the root cause of the problem. This can involve researching internally (e.g. referring to the system logs) or externally (e.g. searching online). Once the probable cause has been identified, the technician can then move on to the next step of designing a plan of action to resolve the issue and implementing the solution.
Which of the following standards supports MIMO technology?
- A . 802.11a
- B . 802.11b
- C . 802.11g
- D . 802.11n
D
Explanation:
The 802.11n wireless networking standard supports Multiple Input Multiple Output (MIMO) technology. MIMO technology uses multiple antennas on both the transmitting and receiving devices to improve wireless performance by increasing the amount of data that can be transmitted simultaneously. 802.11a, 802.11b, and 802.11g do not support MIMO technology. References: CompTIA A+ Certification Exam: Core 1 – Objective 3.3
A user is requesting a headset that can be physically connected to a laptop for online conference calls.
Which of the following connections should the headset use?
- A . Bluetooth
- B . DVI
- C . Thunderbolt
- D . USB
D
Explanation:
A USB (universal serial bus) connection is the most suitable option for a headset that can be physically connected to a laptop for online conference calls. A USB connection is a digital interface that can transfer both power and data between devices using a standard cable. A USB headset can plug into any available USB port on the laptop and communicate with the audio and microphone drivers without requiring additional software or hardware. A USB headset can also offer enhanced features, such as inline controls, noise cancellation, surround sound, or LED lighting, depending on the model and manufacturer.
Other connections, such as Bluetooth, DVI, or Thunderbolt, are not appropriate for a headset that can be physically connected to a laptop. Bluetooth is a wireless technology that uses radio waves to pair devices over a short distance, and it requires a battery or a charger for the headset. DVI (digital visual interface) is a video interface that can transmit digital or analog signals between a display device and a video source, and it is not compatible with audio or microphone devices. Thunderbolt is a high-speed interface that can support multiple protocols, such as DisplayPort, USB, or PCI Express, and it requires a special cable and port that may not be available on all laptops.
Reference: How to set up and use a headset on Windows 10 | Windows Central1 How to Connect a Headset to a Computer2
USB – Wikipedia
The motherboard on a user’s company laptop was recently replaced Now the user is unable to log in using the fingerprint reader. The fingerprint reader is working but it does not recognize the user’s fingerprint.
Which of the following should a technician perform FIRST to fix the issue?
- A . Restore the system to a previous recovery point
- B . Reinstall the fingerprint software
- C . Access the BIOS and clear the TPM
- D . Update the drivers and the fingerprint software
- E . Flash the newest BIOS firmware that is available
B
Explanation:
If a user is unable to log in using the fingerprint reader on a company laptop after the motherboard was replaced, it could be due to an issue with the fingerprint software. The first step to fix the issue would be for the technician to reinstall the fingerprint software.
A user connects a smartphone to a laptop.
Which of the following types of networks has the user created?
- A . PAN
- B . MAN
- C . WLAN
- D . LAN
A
Explanation:
When a user connects a smartphone to a laptop, they create a Personal Area Network (PAN). A PAN is a type of network used for communication between devices in close proximity to each other, typically within a range of a few meters or less. This type of network is commonly used for wireless communication between personal devices, such as connecting a smartphone to a laptop for file sharing or internet access.
References: CompTIA A+ Certification Exam Objectives – 220-1001: 1.1 Explain common connectors and their uses.
CORRECT TEXT
Which of the following is the PRIMARY security concern with virtual machine escape?
- A . Cross-site scripting
- B . Compromising the hypervisor
- C . Overutilization of resources
- D . Rogue virtual machines installed on the hypervisor
B
Explanation:
The primary security concern with virtual machine escape is compromising the hypervisor, which can allow attackers to gain access to other virtual machines or the host system. Virtual machine escape refers to an attack that allows a guest virtual machine to break out of its isolated environment and access other parts of the system.
A customer brings a phone top a repair shop because it is experiencing extreme slowness and applications are crashing. A technician attempts to install a diagnostic application. but the installation fails .
Which of the following should the technician do FIRST to troubleshoot the issue?
- A . Check the storage space.
- B . Inspect the screen for damage.
- C . Install the latest updates.
- D . Recalibrate the digitizer.
A
Explanation:
One of the possible causes of extreme slowness and application crashes on a phone is low or insufficient storage space. This can affect the performance and functionality of the phone, as well as prevent new applications from being installed or updated. The technician should check the storage space on the phone and see if there is enough free space available for the diagnostic application and other operations. The technician should also advise the customer to delete or move any unnecessary or unused files, apps, or data from the phone to free up some space .
Reference: https://partners.comptia.org/docs/default-source/resources/a-core-1-content-guide (page 10)
A company wants to use client-side visualization for application testing.
Which of the following configurations would BEST support this goal?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
A technician receives several error alerts on a server after an unexpected reboot. A message states that one or more disks are in a degraded state. When the technician advances to the next error message, it indicates the OS is missing.
Which of the following are the MOST likely causes of these errors? (Choose two.)
- A . Missing drives in the OS
- B . RAID failure
- C . Bootable device not found
- D . Data loss
- E . Controller failure
- F . CMOS corruption
- G . TPM malfunction
B,C
Explanation:
The message stating that one or more disks are in a degraded state is a clear indication of a RAID failure. RAID stands for Redundant Array of Independent Disks, and it is a technology used to provide fault tolerance and improve performance by combining multiple hard drives into a single logical unit.
The message indicating that the OS is missing is most likely caused by a bootable device not found. This means that the server is unable to boot from the designated boot device, which could be the hard drive, a CD/DVD drive, or a USB flash drive. This could be caused by a faulty boot device, a loose cable, or a misconfiguration in the BIOS or UEFI settings.
A user’s computer frequently freezes and requires multiple hard restarts to recover functionality. A technician confirms the hardware components have not been recently upgraded or replaced.
Which of the following should the technician do first to troubleshoot the issue?
- A . Check the temperature of the CPU.
- B . Update the device driver.
- C . Read the event logs.
- D . Replace the power supply.
C
Explanation:
When a computer frequently freezes and requires hard restarts, the first step a technician should take, especially when hardware components have not been recently changed, is to read the event logs. Event logs can provide critical insights into what is causing the system to freeze, including errors and warnings that precede the freeze. This information is essential for diagnosing software or operating system issues that might be causing instability. Checking the temperature or updating drivers might be subsequent steps based on findings from the event logs.
Reference: CompTIA A+ Core 1 (220-1101) troubleshooting section, which emphasizes the importance of using system logs to diagnose issues.