Practice Free 220-1102 Exam Online Questions
A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change.
Which of the following should be done NEXT?
- A . Document the date and time of change.
- B . Document the purpose of the change.
- C . Document the risk level.
- D . Document findings of the sandbox test.
A
Explanation:
After implementing a change authorized by the change advisory board (CAB), the technician should document the date and time of change as part of the post-implementation review. This helps to track the change history, verify the success of the change, and identify any issues or incidents caused by the change1. Documenting the purpose of the change, the risk level, and the findings of the sandbox test are all part of the pre-implementation activities that should be done before submitting the change request to the CAB2.
References:
2: https://www.manageengine.com/products/service-desk/itil-change-management/cab-change-advisory-board.html
1: https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/success/quick-answer/change-advisory-board-setup.pdf
Which of the following should be used to secure a device from known exploits?
- A . Encryption
- B . Remote wipe
- C . Operating system updates
- D . Cross-site scripting
C
Explanation:
Operating system updates are used to secure a device from known exploits. Operating system updates are patches or fixes that are released by the vendor to address security vulnerabilities, bugs, or performance issues. Operating system updates can also provide new features or enhancements to the device. It is important to keep the operating system updated to prevent attackers from exploiting known flaws or weaknesses.
A technician is modifying the default home page of all the workstations in a company.
Which of the following will help to implement this change?
- A . Group Policy
- B . Browser extension
- C . System Configuration
- D . Task Scheduler
A
Explanation:
Group Policy is a feature of Windows that allows administrators to centrally manage and configure the settings of computers and users in a domain network. Group Policy can be used to modify the default home page of all the workstations in a company by creating and applying a policy that specifies the desired URL for the home page. This way, the change will be automatically applied to all the workstations that are joined to the domain and receive the policy.
Which of the following operating systems was the app file type designed to run under as an application file bundle?
- A . macOS
- B . Chrome
- C . Windows
- D . Linux
A
Explanation:
The app file type is designed to run under macOS as an application file bundle. macOS uses application bundles to store executable files and related resources, such as libraries, image files, and localized content, in a single directory hierarchy. This approach simplifies application management and execution within the macOS environment.
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems.
Which of the following would BEST limit the bark’s risk? (Select TWO)
- A . Enable multifactor authentication for each support account
- B . Limit remote access to destinations inside the corporate network
- C . Block all support accounts from logging in from foreign countries
- D . Configure a replacement remote-access tool for support cases.
- E . Purchase a password manager for remote-access tool users
- F . Enforce account lockouts after five bad password attempts
A,F
Explanation:
The best ways to limit the bank’s risk are to enable multifactor authentication for each support account and enforce account lockouts after five bad password attempts. Multifactor authentication adds an extra layer of security to the login process, making it more difficult for attackers to gain access to systems. Account lockouts after five bad password attempts can help to prevent brute force attacks by locking out accounts after a certain number of failed login attempts.
A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times.
Which of the following should the technician use?
- A . DHCP reservation
- B . Port forwarding
- C . DNS A record
- D . NAT
A
Explanation:
The technician should use DHCP reservation to maintain the same IP address for the server at all times. DHCP reservation allows the server to obtain an IP address dynamically from the DHCP server, while ensuring that the same IP address is assigned to the server each time it requests an IP address.
Users report that they can log in to the web application during business hours, but none of the application’s functions are working properly. Company policy does not allow for the server to be rebooted during business hours.
Which of the following should a technician do to fix the web application and follow company policy?
- A . Restart services.
- B . Roll back Windows updates.
- C . Perform a Windows repair.
- D . Add RAM to the server.
A
Explanation:
Restarting services can resolve issues with web applications without requiring a full server reboot, which aligns with the company policy.
Restart services: Likely to resolve issues with the web application by refreshing the necessary services.
Roll back Windows updates: Unnecessary if the issue is with the application services.
Perform a Windows repair: More disruptive and not typically needed for application service issues. Add RAM to the server: Would require a reboot and is not immediately necessary for troubleshooting application issues.
Reference: CompTIA A+ Exam Objectives [220-1102] – 3.1: Given a scenario, troubleshoot common Windows OS problems.
A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add the majority of the workstations, but failed on a couple.
Which of the following menus should the technician check in order to complete the task manually?
- A . User Accounts
- B . System Properties
- C . Windows Firewall
- D . Network and Sharing
B
Explanation:
To manually add a workstation to a domain, the technician needs to access the System Properties menu where domain settings are configured.
User Accounts: Manages user accounts but does not handle domain membership.
System Properties: The correct place to add or change domain membership settings.
Windows Firewall: Manages firewall settings but not domain membership.
Network and Sharing: Manages network connections and sharing but not domain settings.
Reference: CompTIA A+ Exam Objectives [220-1102] – 1.6: Given a scenario, configure Microsoft Windows networking features on a client/desktop.
A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.
Which of the following security measures should the user take to ensure security and privacy?
- A . Only accept calls from known people.
- B . Disregard any suspicious emails.
- C . Update the antivirus software.
- D . Enable two-factor authentication.
- E . Install a malware scanner.
A
Explanation:
This is a scenario of a potential tech support scam, where a fraudster pretends to be a technical support agent and tries to trick the user into giving them access to the computer, personal information, or money. The user should not trust any unsolicited calls from unknown people claiming to be from tech support, as they might be trying to install malware, steal data, or charge for fake services. The user should only accept calls from known people, such as their IT department, their service provider, or their software vendor, and verify their identity before logging in to the computer. The user should also report any suspicious calls to the appropriate authorities or organizations.
Reference: How to protect against tech support scams1
Avoid and report Microsoft technical support scams2
How to Protect Against Technical Support Scams3
How To Recognize and Avoid Tech Support Scams4
A computer on a corporate network has a malware infection.
Which of the following would be the BEST method for returning the computer to service?
- A . Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service
- B . Flashing the BIOS, reformatting the drive, and then reinstalling the OS
- C . Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
- D . Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus
B
Explanation:
Flashing the BIOS, reformatting the drive, and then reinstalling the OS is the best method for returning a computer with a malware infection to service. Flashing the BIOS updates the firmware of the motherboard and can remove any malware that may have infected it. Reformatting the drive erases all data on it and can remove any malware that may have infected it. Reinstalling the OS restores the system files and settings to their original state and can remove any malware that may have modified them. Scanning the system with a Linux live disc may not detect or remove all malware infections. Degaussing the hard drive is an extreme method of destroying data that may damage the drive beyond repair. Reinstalling the OS before flashing the BIOS or scanning with antivirus may not remove malware infections that persist in the BIOS or other files.