Practice Free 220-1102 Exam Online Questions
A user reported that a laptop’s screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally.
Which of the following Windows settings should be configured?
- A . Power Plans
- B . Hibernate
- C . Sleep/Suspend
- D . Screensaver
A
Explanation:
Power Plans are Windows settings that allow a user to configure how a laptop’s screen behaves when plugged in or running on battery power. They can adjust the screen brightness and the time before the screen turns off due to inactivity. Hibernate, Sleep/Suspend and Screensaver are other Windows settings that affect how a laptop’s screen behaves, but they do not allow changing the screen brightness or turning off time.
Verified References: https://www.comptia.org/blog/windows-power-plans https://www.comptia.org/certifications/a
A technician is installing a new business application on a user’s desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system.
Which of the following files should the technician execute in order to complete the installation?
- A . Installer_x64.exe
- B . Installer_Files.zip
- C . Installer_32.msi
- D . Installer_x86.exe
- E . Installer_Win10Enterprise.dmg
D
Explanation:
The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit installer. The “x86” in the file name refers to the 32-bit architecture.
https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating-systems/
A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks.
Which of the following should the technician do next?
- A . Educate the end user on best practices for security.
- B . Quarantine the host in the antivirus system.
- C . Investigate how the system was infected with malware.
- D . Create a system restore point.
A
Explanation:
Educating the end user on best practices for security is the next step that the technician should take after successfully removing malicious software from an infected computer. Educating the end user on best practices for security is an important part of preventing future infections and mitigating risks. The technician should explain to the end user how to avoid common sources of malware, such as phishing emails, malicious websites, or removable media. The technician should also advise the end user to use strong passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently. Educating the end user on best practices for security can help the end user become more aware and responsible for their own security and reduce the likelihood of recurrence of malware infections. Quarantining the host in the antivirus system, investigating how the system was infected with malware, and creating a system restore point are not the next steps that the technician should take after successfully removing malicious software from an infected computer. Quarantining the host in the antivirus system is a step that the technician should take before removing malicious software from an infected computer. Quarantining the host in the antivirus system means isolating the infected computer from the network or other devices to prevent the spread of malware. Investigating how the system was infected with malware is a step that the technician should take during or after removing malicious software from an infected computer. Investigating how the system was infected with malware means identifying the source, type, and impact of malware on the system and documenting the findings and actions taken. Creating a system restore point is a step that the technician should take before removing malicious software from an infected computer. Creating a system restore point means saving a snapshot of the system’s configuration and settings at a certain point in time, which can be used to restore the system in case of failure or corruption.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458
Which of the following ensures data is unrecoverable on a lost or stolen mobile device?
- A . Device encryption
- B . Remote wipe
- C . Data backup
- D . Fingerprint reader
B
Explanation:
To ensure data is unrecoverable on a lost or stolen mobile device, the best solution is:
Remote wipe: This feature allows the device owner or IT administrator to remotely erase all data on the device, ensuring that it cannot be recovered by unauthorized users.
Device encryption: While important for protecting data, encryption alone does not remove data from the device.
Data backup: Ensures data is saved elsewhere but does not make it unrecoverable on the lost or stolen device.
Fingerprint reader: Provides security for accessing the device but does not affect data recovery if the
device is compromised.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and embedded devices.
Mobile device security practices documentation.
A team of support agents will be using their workstations to store credit card data.
Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).
- A . Encryption
- B . Antivirus
- C . AutoRun
- D . Guest accounts
- E . Default passwords
- F . Backups
A,F
Explanation:
Encryption is a way of protecting cardholder data by transforming it into an unreadable format that can only be decrypted with a secret key1. Backups are a way of ensuring that cardholder data is not lost or corrupted in case of a disaster or system failure2. Both encryption and backups are part of the PCI DSS requirements that apply to any entity that stores, processes, or transmits cardholder data1. The other options are not directly related to credit card data security or compliance.
Which of the following Linux commands would help to identify which directory the user is currently operating in?
- A . pwd
- B . dig
- C . find
- D . cat
A
Explanation:
The pwd command, which stands for "print working directory," is used in Linux and Unix-like operating systems to display the current directory in which the user is operating. This command outputs the full pathname of the current working directory, helping users to understand their current location in the filesystem hierarchy.
pwd: When executed, it provides the absolute path of the directory you’re currently in, which is
useful for navigation and scripting purposes.
Other options listed:
dig: This command is used for querying DNS name servers for information about host addresses, mail exchanges, name servers, and related information.
find: This command is used to search for files in a directory hierarchy based on specified criteria (such as name, modification date, size, etc.).
cat: Short for "concatenate," this command is used to read the contents of files and output them to the terminal.
Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company’s resources as if the employees were on premises.
Which of the following remote connection services should the IT team implement?
- A . SSH
- B . VNC
- C . VPN
- D . RDP
C
Explanation:
A VPN (Virtual Private Network) is a service that allows remote employees to access the company’s network resources securely over the internet as if they were on premises. A VPN encrypts the data traffic between the employee’s device and the VPN server, and assigns the employee a virtual IP address that belongs to the company’s network. This way, the employee can access the local servers, files, printers, and other resources without exposing them to the public internet. A VPN also protects the employee’s privacy and identity by masking their real IP address and location.
A technician has been tasked with using the fastest and most secure method of logging in to laptops.
Which of the following log-in options meets these requirements?
- A . PIN
- B . Username and password
- C . SSO
- D . Fingerprint
D
Explanation:
Fingerprint login utilizes biometric authentication, which is typically faster and more secure than traditional methods such as PIN, username/password, or Single Sign-On (SSO).
A fingerprint is unique to each individual, making it a very secure method of authentication. It’s also quick, as it simply involves placing a finger on a scanner rather than typing in information.
It’s important to note that while biometrics like fingerprint scanning are generally secure, they are not infallible and should ideally be used as part of a multi-factor authentication strategy to ensure the highest level of security.
A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive.
Which of the following file types did the technician download?
- A . .msi
- B . .iso
- C . .zip
- D . .exe
B
Explanation:
An .iso file is a disk image file that needs to be mounted or burned to a physical or virtual drive. When the technician is prompted to mount the drive, it indicates that the file is an ISO, and they must mount it to proceed with the installation.
Reference: CompTIA A+ 220-1102 Exam Objectives, Domain 1.7 Operating Systems – Application Installation
A technician has been unable to remediate a persistent malware infection on a user’s workstation. After the technician reinstalled the OS. the malware infection returned later that day.
Which of the following is the most likely source?
- A . Trojan
- B . Boot sector virus
- C . Spyware
- D . Rootkit
B
Explanation:
A boot sector virus infects the master boot record (MBR) of a hard drive, the sector that contains information required to start the operating system after the computer is turned on. This type of virus is particularly insidious because it loads into memory immediately upon booting and before most antivirus programs start. This makes it possible for the virus to evade detection and removal, and can easily reinfect a system even after the operating system is reinstalled if the boot sector is not cleaned.
Boot sector virus: Given that the malware infection returned after the OS reinstallation, it’s likely that
the virus was not removed from the boot sector during the reinstallation process. Reinstalling the OS
without cleaning the boot sector won’t remove the infection, allowing the virus to continue to affect
the system.
Other options:
Trojan: A Trojan is a type of malware that disguises itself as legitimate software. While Trojans can be persistent, the reinstallation of the OS should remove any Trojans unless they are reintroduced after installation.
Spyware: Spyware is designed to gather information about a person or organization without their knowledge. Like Trojans, spyware should be removed with an OS reinstallation unless it is reintroduced in some way.
Rootkit: Rootkits are designed to enable continued privileged access to a computer while actively hiding their presence. While a rootkit could potentially survive an OS reinstall if it infects the firmware or certain areas outside the OS, the scenario described points more specifically to a boot sector virus, especially considering the immediate return of the infection after OS reinstallation.