Practice Free 220-1102 Exam Online Questions
Which of the following filesystem types does macOS use?
- A . ext4
- B . exFAT
- C . NTFS
- D . APFS
D
Explanation:
APFS stands for Apple File System and it is the default filesystem type for macOS since High Sierra (10.13) version 1. APFS is optimized for flash storage and supports features such as encryption, snapshots, cloning, and space sharing 1.
A macOS user needs to create another virtual desktop space.
Which of the following applications will allow the user to accomplish this task?
- A . Dock
- B . Spotlight
- C . Mission Control
- D . Launchpad
C
Explanation:
application that will allow a macOS user to create another virtual desktop space is Mission Control Mission Control lets you create additional desktops, called spaces, to organize the windows of your apps. You can create a space by entering Mission Control and clicking the Add button in the Spaces bar1. You can also assign apps to specific spaces and move between them easily1.
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards.
Which of the following encryption technologies should be used to secure the workstation in case of theft?
- A . Data-in-transit encryption
- B . File encryption
- C . USB drive encryption
- D . Disk encryption
D
Explanation:
Disk encryption should be used to secure the workstation in case of theft. Disk encryption can help to protect data on the hard drive by encrypting it so that it cannot be accessed without the correct encryption key.
A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed.
Which of the following backup methods should be used to provide fast data recovery in this situation?
- A . Full
- B . Differential
- C . Synthetic
- D . Incremental
A
Explanation:
A full backup does not depend on any previous backups, unlike differential or incremental backups,
which only save the changes made since the last backup. A synthetic backup is a type of full backup that combines an existing full backup with incremental backups to create a new full backup, but it still requires multiple backup sets to recover data. Therefore, a full backup is the most suitable for the payroll workstation that needs to have its data readily available and recoverable. You can learn more about the differences between full, differential, incremental, and synthetic backups from this article.
Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?
- A . SQL
- B . HTML
- C . PowerShell
- D . C#
C
Explanation:
Detailed Explanation with Core 2
Reference: PowerShell is a powerful scripting language used in Windows environments to automate administrative tasks and configure services across multiple systems. According to Core 2, understanding scripting languages like PowerShell is essential for automating administrative functions (Core 2 Objective 4.8).
Which of the following best describes when to use the YUM command in Linux?
- A . To add functionality
- B . To change folder permissions
- C . To show documentation
- D . To list file contents
A
Explanation:
YUM stands for Yellowdog Updater Modified and it is a command-line tool that allows users to install, update, remove, and manage software packages in Linux. YUM can be used to add functionality to a Linux system by installing new software packages or updating existing ones. To change folder permissions, show documentation, or list file contents, other commands such as chmod, man, or ls can be used in Linux.
A user’s permissions are limited to read on a shared network folder using NTFS security settings.
Which of the following describes this type of security control?
- A . SMS
- B . MFA
- C . ACL
- D . MDM
C
Explanation:
ACL (access control list) is a security control that describes what permissions a user or group has on a shared network folder using NTFS (New Technology File System) security settings. It can be used to grant or deny read, write, modify, delete or execute access to files and folders. SMS (short message service), MFA (multifactor authentication), MDM (mobile device management) are not security controls that apply to shared network folders.
Verified References: https://www.comptia.org/blog/what-is-an-acl https://www.comptia.org/certifications/a
Sensitive data was leaked from a user’s smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device’s command shell.
Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
- A . Restore the device to factory settings.
- B . Uninstall the unapproved application.
- C . Disable the ability to install applications from unknown sources.
- D . Ensure the device is connected to the corporate WiFi network.
B
Explanation:
The technician should disable the user’s access to the device’s command shell. This will prevent the user from accessing sensitive data and will help to prevent further data leaks. The technician should then investigate the unapproved application to determine if it is the cause of the data leak. If the application is found to be the cause of the leak, the technician should uninstall the application and restore the device to factory settings. If the application is not the cause of the leak, the technician should investigate further to determine the cause of the leak. Disabling the ability to install applications from unknown sources can help to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to this scenario1
Which of the following will automatically map network drives based on Group Policy configuration?
- A . Log-in scripts
- B . Access control lists
- C . Organizational units
- D . Folder redirection
A
Explanation:
Network drives can be automatically mapped for users based on Group Policy configuration using log-in scripts.
Here’s how it works:
Log-in scripts: These are scripts executed when a user logs in to a domain. They can be configured through Group Policy in Active Directory to map network drives automatically. The scripts can use commands like net use to map drives.
Access control lists (ACLs): While ACLs control permissions for files and folders, they do not automatically map network drives.
Organizational units (OUs): OUs are used to organize users and computers in a directory structure but do not map drives.
Folder redirection: This redirects the path of a folder to a new location, typically on a network share,
but it does not automatically map drives.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 1.6: Given a scenario configure Microsoft Windows networking features on a client/desktop.
Group Policy and login script documentation from Microsoft.
Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?
- A . APFS
- B . FAT32
- C . NTFS
- D . ext4
C
Explanation:
NTFS stands for New Technology File System and it is the preferred filesystem for Microsoft Windows OS since Windows NT 3.1 in 1993 1. NTFS replaced FAT (File Allocation Table) as the default filesystem for Windows because it offers many advantages over FAT, such as:
Support for larger volumes and files (up to 16 exabytes)2 Support for file compression, encryption, and permissions2
Support for journaling, which records changes to the filesystem and helps recover from errors2 Support for hard links, symbolic links, and mount points2
Support for long filenames and Unicode characters2
FAT32 is an improved version of FAT that supports larger volumes and files (up to 32 GB and 4 GB respectively) and is compatible with older versions of Windows and other operating systems3. However, FAT32 still has many limitations and drawbacks compared to NTFS, such as:
No support for file compression, encryption, and permissions3
No support for journaling, which makes it vulnerable to corruption and data loss3
No support for hard links, symbolic links, and mount points3
No support for long filenames and Unicode characters3
APFS (Apple File System) is the default filesystem for macOS, iOS, iPadOS, watchOS, and tvOS since 20174. APFS replaced HFS+ (Hierarchical File System Plus) as the preferred filesystem for Apple devices because it offers many advantages over HFS+, such as:
Support for larger volumes and files (up to 8 zettabytes)4 Support for file cloning, snapshots, and encryption4
Support for space sharing, which allows multiple volumes to share the same storage pool4 Support for fast directory sizing, which improves performance and efficiency4
ext4 (Fourth Extended Filesystem) is the default filesystem for most Linux distributions since 20085. ext4 replaced ext3 as the preferred filesystem for Linux because it offers many advantages over ext3, such as:
Support for larger volumes and files (up to 1 exabyte and 16 terabytes respectively)5 Support for extents, which reduce fragmentation and improve performance5
Support for journal checksumming, which improves reliability and reduces recovery time5 Support for delayed allocation, which improves efficiency and reduces metadata overhead5
Reference: 1: NTFS – Wikipedia 2: [NTFS vs FAT32 vs exFAT: What’s the Difference?] 3: [FAT32 – Wikipedia] 4:
[Apple File System – Wikipedia] 5: [ext4 – Wikipedia] : NTFS vs FAT32 vs exFAT: What’s the Difference?
: FAT32 – Wikipedia: Apple File System – Wikipedia : ext4 – Wikipedia