Practice Free 220-1102 Exam Online Questions
A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file.
Which of the following
should the technician do next to attempt to access the OS file?
- A . Request physical media
- B . Mount the ISO file.
- C . Install a third-party software.
- D . Download an appropriate 32-bit/64-bit OS file.
B
Explanation:
If a technician is unable to run an OS installation file and receives a message indicating no software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.
A technician is setting up a newly built computer .
Which of the following is the fastest way for the technician to install Windows 10?
- A . Factory reset
- B . System Restore
- C . In-place upgrade
- D . Unattended installation
D
Explanation:
The correct answer is D) Unattended installation. An unattended installation is a way of installing Windows 10 without requiring any user input or interaction. It uses a configuration file called answer file that contains the settings and preferences for the installation, such as the product key, language, partition, and network settings. An unattended installation can be performed by using a bootable USB flash drive or DVD that contains the Windows 10 installation files and the answer file1. This is the fastest way for the technician to install Windows 10 on a newly built computer, as it automates the whole process and saves time.
A factory reset is a way of restoring a computer to its original state by deleting all the data and applications and reinstalling the operating system. A factory reset can be performed by using the recovery partition or media that came with the computer, or by using the Reset this PC option in Windows 10 settings2. A factory reset is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system to be present.
A system restore is a way of undoing changes to a computer’s system files and settings by using a restore point that was created earlier. A system restore can be performed by using the System Restore option in Windows 10 settings or by using the Advanced Startup Options menu3. A system restore is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system and restore points to be present.
An in-place upgrade is a way of upgrading an existing operating system to a newer version without losing any data or applications. An in-place upgrade can be performed by using the Windows 10 Media Creation Tool or by running the Setup.exe file from the Windows 10 installation media. An in-place upgrade is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system to be present.
A technician suspects the boot disk of a user’s computer contains bad sectors.
Which of the following should the technician verify in the command prompt to address the issue without making any changes?
- A . Run sfc / scannow on the drive as the administrator.
- B . Run clearnmgr on the drive as the administrator
- C . Run chkdsk on the drive as the administrator.
- D . Run dfrgui on the drive as the administrator.
C
Explanation:
The technician should verify bad sectors on the user’s computer by running chkdsk on the drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and repairs disk errors, including bad sectors. It runs a scan of the disk and displays any errors that are found
An employee has been using the same password for multiple applications and websites for the past several years.
Which of the following would be best to prevent security issues?
- A . Configuring firewall settings
- B . Implementing expiration policies
- C . Defining complexity requirements
- D . Updating antivirus definitions
B
Explanation:
To prevent security issues related to an employee using the same password for multiple applications and websites, implementing expiration policies (B) is best. Password expiration policies require users to change their passwords at regular intervals, which helps to mitigate the risks associated with password reuse. Regularly changing passwords reduces the chances of unauthorized access from compromised credentials.
The network was breached over the weekend System logs indicate that a single user’s account was successfully breached after 500 attempts with a dictionary attack.
Which of the following would BEST mitigate this threat?
- A . Encryption at rest
- B . Account lockout
- C . Automatic screen lock
- D . Antivirus
B
Explanation:
Account lockout would best mitigate the threat of a dictionary attack1
Which of the following provides disk encryption on computers running a Windows OS?
- A . FileVault
- B . BitLocker
- C . Private Key
- D . PowerShell
B
Explanation:
BitLocker is a full-disk encryption feature included with certain editions of Windows, designed to protect data by providing encryption for entire volumes.
Option A: FileVault
FileVault is a disk encryption program in macOS, not Windows.
Option B: BitLocker
BitLocker is the correct tool for disk encryption on Windows operating systems, providing full disk encryption.
Option C: Private Key
A private key is part of public key infrastructure (PKI) used in encryption, but it is not a tool for disk encryption by itself.
Option D: PowerShell
PowerShell is a task automation and configuration management framework from Microsoft, not a tool for disk encryption.
Reference: CompTIA A+ 220-1102 Objective 2.5 (Manage and configure basic security settings in the Windows OS), particularly BitLocker for disk encryption.
Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?
- A . Data integrity form
- B . Valid operating system license
- C . Documentation of an incident
- D . Chain of custody
D
Explanation:
Chain of custody is a process that helps ensure that a piece of evidence extracted from a PC is admissible in a court of law. Chain of custody refers to the documentation and tracking of who handled, accessed, modified, or transferred the evidence, when, where, why, and how. Chain of custody can help establish the authenticity, integrity, and reliability of the evidence, as well as prevent tampering, alteration, or loss of the evidence. Data integrity form, valid operating system license, and documentation of an incident are not processes that can ensure that a piece of evidence extracted from a PC is admissible in a court of law.
A user’s Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace.
Which of the following is most likely the cause of the issue?
- A . The OS update failed.
- B . The user downloaded malware.
- C . The device is In developer mode.
- D . The over-the-air carrier update failed.
B
Explanation:
Random restarting of an Android phone and the presence of applications not from the standard marketplace strongly suggest the possibility of malware.
Option A: The OS update failed
While an OS update failure can cause issues, it is less likely to result in random restarts compared to malware.
Option B: The user downloaded malware
Malware is a common cause of erratic behavior, including random restarts, especially when applications are installed from unofficial sources.
Option C: The device is in developer mode
Developer mode alone does not typically cause random restarts. It may make the device more susceptible to issues if improper apps are installed.
Option D: The over-the-air carrier update failed
Similar to the OS update, this would more likely cause consistent issues rather than random restarts.
Reference: CompTIA A+ 220-1102 Objective 2.3 (Detect, remove, and prevent malware) and Objective 3.5 (Mobile OS and application security issues).
A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled and no other antivirus is installed on the PC.
Which of the following would have caused this issue?
- A . Ransomware
- B . Rootkit
- C . Spyware
- D . Keylogger
B
Explanation:
Detailed Explanation with Core 2
Reference: Rootkits can disable antivirus programs, including Windows Defender, as they operate at a low level within the OS to avoid detection. This issue falls under malware types and removal strategies in Core 2 (Core 2 Objective 2.3).
A technician is troubleshooting application crashes on a Windows workstation.
Each time the workstation user tries to open a website in a browser, the following message is displayed:
crypt32.d11 is missing not found
Which of the following should the technician attempt FIRST?
- A . Rebuild Windows profiles.
- B . Reimage the workstation
- C . Roll back updates
- D . Perform a system file check
D
Explanation:
If this file is missing or corrupted, it can cause application crashes or errors when trying to open websites in a browser. To fix this, the technician can perform a system file check, which is a utility that scans and repairs corrupted or missing system files1.
To perform a system file check, the technician can follow these steps:
✑ Open the Command Prompt as an administrator. To do this, type cmd in the search box on the taskbar, right-click on Command Prompt, and select Run as administrator.
✑ In the Command Prompt window, type sfc /scannow and hit Enter. This will start the scanning and repairing process, which may take some time.
✑ Wait for the process to complete. If any problems are found and fixed, you will see a message saying Windows Resource Protection found corrupt files and successfully repaired them. If no problems are found, you will see a message saying Windows Resource Protection did not find any integrity violations.
✑ Restart your computer and check if the issue is resolved.