Practice Free 220-1102 Exam Online Questions
After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired.
Which of the following Windows 10 utilities should a technician use to address this concern?
- A . Device Manager
- B . Administrator Tools
- C . Programs and Features
- D . Recovery
D
Explanation:
Recovery is a Windows 10 utility that can be used to address the concern of a failed update that prevents an application from launching. Recovery allows the user to reset the PC, go back to a previous version of Windows, or use advanced startup options to troubleshoot and repair the system2. Device Manager, Administrator Tools, and Programs and Features are not Windows 10 utilities that can fix a failed update.
Which of the following would most likely be used in a small office environment?
- A . Print server
- B . Virtualization
- C . Domain access
- D . Workgroup
D
Explanation:
A workgroup is a network configuration that allows computers to communicate and share resources with each other without requiring a centralized server or domain controller. A workgroup is suitable for small office environments where there are only a few computers and users who need simple file and printer sharing. A workgroup does not have centralized management or security policies, which may be desirable for larger or more complex networks. Print server, virtualization, and domain access are not network configurations that are most likely used in a small office environment.
Someone who is fraudulently claiming to be from a reputable bank calls a company employee.
Which of the following describes this incident?
- A . Pretexting
- B . Spoofing
- C . Vishing
- D . Scareware
C
Explanation:
Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data.
A systems administrator is configuring centralized desktop management for computers on a domain.
The management team has decided that all users’ workstations should have the same network drives, printers, and configurations.
Which of the following should the administrator use to accomplish this task?
- A . Network and Sharing Center
- B . net use
- C . User Accounts
- D . regedit
- E . Group Policy
E
Explanation:
Group Policy is a feature of Windows that allows administrators to centrally manage and apply policies and settings to computers and users on a domain3. Group Policy can be used to configure network drives, printers, security settings, desktop preferences, and other configurations for all users’ workstations3. Network and Sharing Center, net use, User Accounts, and regedit are not tools that can accomplish this task.
A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks.
Which of the following features should the technician implement to mitigate such attacks?
- A . System screen lock
- B . Failed log-in lockout
- C . Restricted user permissions
- D . Data-at-rest encryption
B
Explanation:
To mitigate brute-force attacks, implementing a failed log-in lockout feature is effective. This security measure temporarily disables user accounts after a specified number of unsuccessful login attempts, preventing attackers from continuously trying different password combinations to gain unauthorized access.
A technician is investigating options to secure a small office’s wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords.
Which of the following should the wireless solution have in order to support this feature?
- A . RADIUS
- B . AES
- C . EAP-EKE
- D . MFA
A
Explanation:
RADIUS is the correct answer for this question. RADIUS stands for Remote Authentication Dial-In User Service, and it is a protocol that provides centralized authentication, authorization, and accounting for wireless networks. RADIUS can support certificate-based authentication, which allows users to log in to the network automatically without entering passwords. RADIUS also provides other benefits, such as enforcing security policies, logging user activities, and managing network access. AES, EAP-EKE, and MFA are not wireless solutions, but rather encryption algorithms, authentication methods, and security factors, respectively.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 23 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459
A company needs to securely dispose of data stored on optical discs.
Which of the following is the MOST effective method to accomplish this task?
- A . Degaussing
- B . Low-level formatting
- C . Recycling
- D . Shredding
D
Explanation:
Shredding is the most effective method to securely dispose of data stored on optical discs12
References: 4.
How Can I Safely Destroy Sensitive Data CDs/DVDs? – How-To Geek. Retrieved from https://www.howtogeek.com/174307/how-can-i-safely-destroy-sensitive-data-cdsdvds/ 5. Disposal ― UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-management/store-your-data/disposal/
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop.
Which of the following should the technician MOST likely have done to prevent damage?
- A . Removed all jewelry
- B . Completed an inventory of tools before use
- C . Practiced electrical fire safety
- D . Connected a proper ESD strap
D
Explanation:
The technician should have connected a proper ESD strap to prevent damage to the motherboard. ESD (electrostatic discharge) can cause damage to electronic components, and an ESD strap helps to prevent this by grounding the technician and preventing the buildup of static electricity. Removing all jewelry is also a good practice, but it is not the most likely solution to this problem.
A system drive is nearly full, and a technician needs lo tree up some space.
Which of the following tools should the technician use?
- A . Disk Cleanup
- B . Resource Monitor
- C . Disk Defragment
- D . Disk Management
A
Explanation:
Disk Cleanup is a tool that can free up some space on a system drive that is nearly full. It can delete temporary files, cached files, recycle bin files, old system files and other unnecessary data. Resource Monitor is a tool that shows the network activity of each process on a Windows machine. Disk Defragment is a tool that optimizes the performance of a hard drive by rearranging the data into contiguous blocks. Disk Management is a tool that allows creating, formatting, resizing and deleting partitions on a hard drive.
Verified References: https://www.comptia.org/blog/how-to-use-disk-cleanup https://www.comptia.org/certifications/a
An office is experiencing constant connection attempts to the corporate Wi-Fi.
Which of the following should be disabled to mitigate connection attempts?
- A . SSID
- B . DHCP
- C . Firewall
- D . SSD
A
Explanation:
The SSID (Service Set Identifier) is the name of a wireless network that is broadcasted by the router or the Wi-Fi base station. The SSID helps nearby devices to identify and connect to the available networks. However, broadcasting the SSID also exposes the network to potential connection attempts from unauthorized or malicious users. Therefore, disabling the SSID can mitigate connection attempts by making the network invisible or hidden to the devices that are not already connected to it. To connect to a hidden network, the user would need to know the exact SSID and enter it manually.
The other options are not related to mitigating connection attempts to the corporate Wi-Fi. DHCP (Dynamic Host Configuration Protocol) is a protocol that assigns IP addresses to the devices on a network. Firewall is a software or hardware device that filters the incoming and outgoing network traffic based on predefined rules. SSD (Solid State Drive) is a type of storage device that uses flash memory to store data. Disabling any of these options would not prevent connection attempts to the Wi-Fi network, and may cause other problems or issues for the network functionality and performance.
Reference: What is SSID + how to find (and change) it1
Choosing an SSID2
SSID Meaning: Finding Your Network’s Name3