Practice Free 220-1102 Exam Online Questions
A technician received a call stating that all files in a user’s documents folder appear to be Changed, and each of the files now has a look file extension
Which pf the following actions is the FIRST step the technician should take?
- A . Runa live disk clone.
- B . Run a full antivirus scan.
- C . Use a batch file to rename the files-
- D . Disconnect the machine from the network
D
Explanation:
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness.
A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?
- A . WPA3
- B . MFA
- C . TACACS+
- D . RADIUS
C
Explanation:
To implement a system that handles both authentication and authorization, TACACS+ (Terminal Access Controller Access-Control System Plus) is the best option. TACACS+ is a security protocol that provides centralized Authentication, Authorization, and Accounting (AAA) services for networked access control, meeting the requirement for both authentication and authorization management.
A user received an alert from a Windows computer indicating low storage space.
Which of the following will best resolve this issue?
- A . Reviewing System Information
- B . Running Disk Cleanup
- C . Editing the Registry
- D . Checking the Performance Monitor
- E . Increasing the memory
B
Explanation:
To resolve an issue of low storage space on a Windows computer, the best approach is to Run Disk Cleanup (B). Disk Cleanup is a built-in utility that helps users free up space on their hard drives by deleting temporary files, system files, and other unnecessary files that are no longer needed, thereby resolving low storage space issues
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the wired network. The user has been on an extended leave and has not logged in to the computer in several months.
Which of the following is causing the login issue?
- A . Expired certificate
- B . OS update failure
- C . Service not started
- D . Application crash
- E . Profile rebuild needed
A
Explanation:
EAP-TLS is a method of authentication that uses certificates to establish a secure tunnel between the client and the server3. The certificates have a validity period and must be renewed before they expire1. If the user has been on an extended leave and has not logged in to the computer in several months, it is possible that the certificate on the client or the server has expired and needs to be renewed2. The other options are not directly related to EAP-TLS authentication or 802.1X network access.
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license.
Which of the following license types should the technician recommend?
- A . Corporate
- B . Open-source
- C . Personal
- D . Enterprise
B
Explanation:
Open-source software is software that has its source code available for anyone to inspect, modify,
and distribute. Open-source software is usually free of charge and does not require a license to
use. Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The
other license types are either not free or not suitable for a SOHO PC. Corporate and enterprise
licenses are designed for large-scale organizations and networks, and they usually require a
subscription fee. Personal licenses are for individual users and may have limited features or support.
Reference:
1 What is Open Source Software? – Definition from Techopedia(https://www.tomsguide.com/us/best-antivirus,review-2588.html). 2 7 Best Lifetime License Antivirus Tools [2023 Guide] – Windows Report ( https://windowsreport.com/antivirus-with-unlimited-validity/).
A user’s antivirus software reports an infection that it is unable to remove.
Which of the following is the most appropriate way to remediate the issue?
- A . Disable System Restore.
- B . Utilize a Linux live disc.
- C . Quarantine the infected system.
- D . Update the anti-malware.
C
Explanation:
Quarantining the infected system is the most appropriate way to remediate the issue of an infection that the antivirus software cannot remove. Quarantining means isolating the system from the network and other devices to prevent the infection from spreading or causing further damage. Quarantining also allows the technician to perform further analysis and removal of the infection without risking the security of other systems or data.
Some of the steps involved in quarantining an infected system are:
Disconnect the system from the internet and any local network connections, such as Wi-Fi, Ethernet, Bluetooth, or USB.
Disable any file-sharing or remote access services on the system, such as Windows File Sharing,
Remote Desktop, or TeamViewer.
Use a separate device to download and update the antivirus software and any other tools that may be needed to remove the infection, such as malware scanners, rootkit removers, or bootable rescue disks.
Transfer the updated antivirus software and tools to the infected system using a removable media, such as a CD, DVD, or USB flash drive. Scan the removable media for any infections before and after using it on the infected system.
Run the antivirus software and tools on the infected system and follow the instructions to delete or quarantine the infection. If the infection is persistent or complex, it may require booting the system from a rescue disk or using a Linux live disc to access and clean the system files.
After the infection is removed, restore the system to a previous clean state using System Restore, backup, or recovery partition. Scan the system again to ensure that it is clean and secure. Reconnect the system to the network and update the system and the antivirus software.
Reference: How to Identify and Repair Malware or Virus Infected Computers, section 31
Uninstalling Antivirus Software, the Clean Way: 40 Removal Tools & Instructions, section 22
How to manually remove an infected file from a Windows computer3
The Official CompTIA A+ Core 2 Study Guide (220-1102), page 2194
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others.
Which of the following applications should the technician use to assist the user with hiding the file?
- A . Device Manager
- B . Indexing Options
- C . File Explorer
- D . Administrative Tools
C
Explanation:
The technician should use the File Explorer application to assist the user with hiding the file 1. The user can right-click the file and select Properties. In the Properties dialog box, select the Hidden check box, and then click OK 1.
A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue.
Which of the following is most likely causing the issue?
- A . Date and time
- B . User access control
- C . UEFI boot mode
- D . Log-on times
A
Explanation:
Date and time is the most likely cause of the issue. The date and time settings on a workstation affect the validity of the certificates used by websites to establish secure connections. If the date and time are incorrect, the workstation may not recognize the certificate as valid and display an invalid certificate error. Other workstations on the same local network may not have this issue if their date and time are correct. User access control, UEFI boot mode, and log-on times are not likely causes of the issue. User access control is a feature that prevents unauthorized changes to the system by prompting for confirmation or credentials. UEFI boot mode is a firmware interface that controls the boot process of the workstation. Log-on times are settings that restrict when a user can log in to the workstation. None of these factors affect the validity of the certificates used by websites.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 14 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456
Which of the following statements describes the purpose of scripting languages?
- A . To access the hardware of the computer it is running on
- B . To automate tasks and reduce the amount of manual labor
- C . To abstract the complexity of the computer system
- D . To compile the program into an executable file
B
Explanation:
Scripting languages are used to write small to medium-sized programs that perform specific tasks. Some common uses of scripting languages are: automating repetitive processes, web development, system administration, data processing, multimedia and games, report generation, document and text processing, writing plugins and extensions for existing programs and applications 1.
Reference: 1 What is Scripting Language?: Introduction, Types, Uses & Career …(https://leverageedu.com/blog/scripting-language/)
A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue.
Which of the following should the technician do before modifying the registry keys?
- A . Update the anti-malware software.
- B . Create a restore point.
- C . Run the PC in sate mode.
- D . Roll back the system updates.
B
Explanation:
A restore point is a snapshot of the system settings and configuration at a specific point in time2. Creating a restore point before modifying the registry keys allows the technician to revert the system back to a previous state if something goes wrong or causes instability2. Updating the anti-malware software, running the PC in safe mode, and rolling back the system updates are not necessary steps before modifying the registry keys.