Practice Free 220-1102 Exam Online Questions
A malicious user was able to export an entire website’s user database by entering specific commands into a field on the company’s website.
Which of the following did the malicious user most likely exploit to extract the data?
- A . Cross-site scripting
- B . SQL injection
- C . Brute-force attack
- D . DDoS attack
B
Explanation:
SQL injection is a type of attack that takes advantage of vulnerabilities in a web application’s database query software, allowing an attacker to send malicious SQL commands through the application to the database. These commands can manipulate the database and can lead to unauthorized data access or manipulation.
SQL injection: In the scenario described, the malicious user was able to export an entire website’s user database by entering specific commands into a field on the company’s website, which is a classic example of an SQL injection attack. This type of attack exploits vulnerabilities in the database layer of an application to execute unauthorized SQL commands.
Cross-site scripting (A) involves injecting malicious scripts into content from otherwise trusted websites. A brute-force attack (C) is an attempt to gain access to a system by systematically checking all possible keys or passwords until the correct one is found. A DDoS attack (D) is an attempt to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
A user wants to back up a Windows 10 device.
Which of the following should the user select?
- A . Devices and Printers
- B . Email and Accounts
- C . Update and Security
- D . Apps and Features
C
Explanation:
Update and Security is the section in Windows 10 Settings that allows the user to back up their device. Backing up a device means creating a copy of the data and settings on the device and storing it in another location, such as an external drive or a cloud service. Backing up a device can help the user restore their data and settings in case of data loss, corruption, or theft. Devices and Printers, Email and Accounts, and Apps and Features are not sections in Windows 10 Settings that allow the user to back up their device.
Which of the following filesystems supports journaling?
- A . NTFS
- B . exFAT
- C . HFS
- D . ext2
A
Explanation:
Journaling is a feature that helps maintain the integrity of the filesystem by keeping a record of changes not yet committed to the main file system. This feature is supported by various filesystems, but not all.
Option A: NTFS
NTFS (New Technology File System) is a filesystem used by Windows that supports journaling. This makes it resilient to corruption from unexpected shutdowns or crashes by keeping a log of file changes.
Option B: exFAT
exFAT (Extended File Allocation Table) does not support journaling. It is optimized for flash drives and large files but lacks advanced features like journaling.
Option C: HFS
HFS (Hierarchical File System) is an older filesystem used by Apple. HFS+ (also known as Mac OS Extended) supports journaling, but HFS itself does not.
Option D: ext2
ext2 (Second Extended File System) is a filesystem for Linux that does not support journaling. Its successor, ext3, introduced journaling.
Reference: CompTIA A+ 220-1102 Objective 1.8 (Explain common OS types and their purposes), particularly filesystems and their features.
A user is being directed by the help desk to look up a Windows PC’s network name so the help desk can use a remote administration tool to assist the user.
Which of the following commands would allow the user to give the technician the correct information? (Select TWO).
- A . ipconfig /all
- B . hostname
- C . netstat /?
- D . nslookup localhost
- E . arp ―a
- F . ping :: 1
A,B
Explanation:
The user can use the following commands to give the technician the correct information: ipconfig /all and hostname 1. The ipconfig /all command displays the IP address, subnet mask, and default gateway for all adapters on the computer 1. The hostname command displays the name of the computer 1.
A technician is troubleshooting a customer’s PC and receives a phone call. The technician does not take the call and sets the phone to silent.
Which of the following BEST describes the technician’s actions?
- A . Avoid distractions
- B . Deal appropriately with customer’s confidential material.
- C . Adhere to user privacy policy
- D . Set and meet timelines
A
Explanation:
The technician’s action of setting the phone to silent while troubleshooting the customer’s PC is an example of avoiding distractions. By setting the phone to silent, the technician is ensuring that they are able to focus on the task at hand without any distractions that could potentially disrupt their workflow. This is an important practice when handling customer’s confidential material, as it ensures that the technician is able to focus on the task and not be distracted by any external sources. Furthermore, it also adheres to user privacy policies, as the technician is not exposing any confidential information to any external sources.
Which of the following is used to detect and record access to restricted areas?
- A . Bollards
- B . Video surveillance
- C . Badge readers
- D . Fence
C
Explanation:
Badge readers are devices that scan employee or visitor credentials, logging entries and exits from restricted areas. Video surveillance (B) provides a visual record but does not directly control access. Bollards (A) and fences (D) provide physical security but cannot detect or record access events.
Reference: Core 2, Domain 2.1 – Physical security measures.
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue.
Which of the following tools should the technician use to make adjustments?
- A . eventvwr.msc
- B . perfmon.msc
- C . gpedic.msc
- D . devmgmt.msc
D
Explanation:
The technician should use devmgmt.msc tool to make adjustments for the touchpad issue after Windows installed updates on a laptop. Devmgmt.msc is a command that opens the Device Manager, which is a utility that allows users to view and manage the hardware devices and drivers installed on a computer. The technician can use the Device Manager to check the status, properties and compatibility of the touchpad device and its driver, and perform actions such as updating, uninstalling or reinstalling the driver, enabling or disabling the device, or scanning for hardware changes. Eventvwr.msc is a command that opens the Event Viewer, which is a utility that allows users to view and monitor the system logs and events. The Event Viewer may provide some information or clues about the touchpad issue, but it does not allow users to manage or troubleshoot the device or its driver directly. Perfmon.msc is a command that opens the Performance Monitor, which is a utility that allows users to measure and analyze the performance of the system
A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run.
Which of the following should the technician do to most likely resolve the issue?
- A . Install the software in safe mode.
- B . Attach the external hardware token.
- C . Install OS updates.
- D . Restart the workstation after installation.
B
Explanation:
A hardware token is a physical device that provides an additional layer of security for software authorization. Some specialized software may require a hardware token to be attached to the workstation in order to run. A hardware token may contain a cryptographic key, a password, or a one-time code that verifies the user’s identity or permission. Installing the software in safe mode, installing OS updates, and restarting the workstation after installation are not likely to resolve the issue of software authorization.
Users access files in the department share. When a user creates a new subfolder, only that user can access the folder and Its files.
Which of the following will MOST likely allow all users to access the new folders?
- A . Assigning share permissions
- B . Enabling inheritance
- C . Requiring multifactor authentication
- D . Removing archive attribute
B
Explanation:
Enabling inheritance is a method that allows new subfolders to inherit the permissions and settings from their parent folder. If users can access files in the department share, but not in the new subfolders created by other users, it may indicate that inheritance is disabled and that each new subfolder has its own permissions and settings that restrict access to only the creator. Enabling inheritance can help resolve this issue by allowing all users to access the new subfolders with the same permissions and settings as the department share. Assigning share permissions, requiring multifactor authentication, and removing archive attribute are not methods that can most likely allow all users to access the new folders.
A technician is setting up a new PC in a SOHO.
Which of the following should the technician most likely configure on the PC?
- A . VDI
- B . Mapped drives
- C . Wireless WAN
- D . Domain
B
Explanation:
In a Small Office/Home Office (SOHO) setup, the technician is most likely to configure mapped drives on a new PC. Mapped drives allow for easy access to shared resources such as files and printers on the network. This setup facilitates file sharing and collaboration within a small network, making it an essential configuration for SOHO environments.