Practice Free 220-1102 Exam Online Questions
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on.
Which of the following will MOST likely resolve the issue?
- A . Recalibrating the magnetometer
- B . Recalibrating the compass
- C . Recalibrating the digitizer
- D . Recalibrating the accelerometer
D
Explanation:
When a user rotates a cell phone horizontally to read emails and the display remains vertical, even though the settings indicate autorotate is on, this is typically due to a problem with the phone’s accelerometer. The accelerometer is the sensor that detects changes in the phone’s orientation and adjusts the display accordingly. If the accelerometer is not calibrated correctly, the display may not rotate as expected.
Recalibrating the accelerometer is the most likely solution to this issue. The process for recalibrating the accelerometer can vary depending on the specific device and operating system, but it typically involves going to the device’s settings and finding the option to calibrate or reset the sensor. Users may need to search their device’s documentation or online resources to find specific instructions for their device.
A user reports that a device with a statically defined IP is unable to connect to the internet.
The technician runs the ipconfig /all command and sees the following output:
IPv4 Address………… 192.168.0.74
Subnet Mask…………. 255.255.255.255
Default Gateway……… 192.168.0.1
Which of the following is most likely the reason for the issue?
- A . The default gateway is up.
- B . The user has an APIPA IP address.
- C . The IP address is on the wrong subnet
- D . The subnet mask is incorrect.
D
Explanation:
The ipconfig /all output shows the following:
IPv4 Address………… 192.168.0.74
Subnet Mask…………. 255.255.255.255
Default Gateway……… 192.168.0.1
The issue with the subnet mask being set to 255.255.255.255 is that it specifies a single host subnet, meaning the device cannot communicate with other devices on the network or access the internet.
The correct subnet mask for a typical home network should be:
Subnet mask of 255.255.255.0: This allows for communication within the same local network (192.168.0.0/24).
Default gateway 192.168.0.1: Correct, this is the typical address for the router. IPv4 Address 192.168.0.74: Correct, within the correct subnet range. Changing the subnet mask to 255.255.255.0 will resolve the connectivity issue.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks. IP addressing and subnetting documentation.
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization. The certificate will be used in conjunction with the user’s existing username and password.
Which of the following BEST describes the security benefits realized after this deployment?
- A . Multifactor authentication will be forced for Wi-Fi
- B . All Wi-Fi traffic will be encrypted in transit
- C . Eavesdropping attempts will be prevented
- D . Rogue access points will not connect
A
Explanation:
Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be used for Wi-Fi access for all devices in an organization3 References:
✑ CompTIA Security+ (Plus) Practice Test Questions | CompTIA. Retrieved from https://www.comptia.org/training/resources/comptia-security-practice-tests
A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs.
Which of the following should the technician do to proceed with the upgrade? (Select two).
- A . Unplug the extra hardware.
- B . Delete unnecessary files.
- C . Update the driver software.
- D . Restore the system files.
- E . Uninstall unused desktop applications.
- F . Add additional memory.
B, E
Explanation:
To free up space for the upgrade, the technician should delete unnecessary files and uninstall unused desktop applications. These actions will clear storage, making room for the update. Additional memory would not solve a storage issue, and driver updates are not relevant to the storage space problem.
Reference: CompTIA A+ 220-1102 Exam Objectives, Domain 1.9 Operating Systems – Installation
A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email.
Which of the following tools would best accomplish this task*?
- A . MSRA
- B . FTP
- C . RMM
- D . VPN
D
Explanation:
A Virtual Private Network (VPN) creates a secure connection over the internet to a network, allowing a user to access shared files and corporate email as if they were directly connected to the network. This makes VPN the best tool for secure remote work access, compared to the other options which do not offer the same level of secure, remote network access.
Users report having difficulty using the Windows Hello facial recognition feature.
Which of the following is a secondary feature of Windows Hello that can be used to log in?
- A . Personal identification number
- B . Username/password
- C . One-time-use token
- D . Cryptographic device
A
Explanation:
Windows Hello is a biometric-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services, and networks with just a look or a touch. If users have difficulty using the facial recognition feature, Windows Hello also supports a Personal Identification Number (PIN) as a secondary feature for logging in. The PIN is tied to the specific device on which it is set up, adding a layer of security even if the PIN is obtained by someone else. Personal identification number: The PIN serves as an alternative to the facial recognition feature, allowing users to quickly and securely access their devices without relying solely on biometric authentication.
Username/password (B) is the traditional method of authentication but is not specifically a secondary feature of Windows Hello. One-time-use token (C) and cryptographic device (D) could be part of an MFA setup but are not directly related to Windows Hello’s alternate authentication options.
A network administrator wants to enforce a company’s security policy that prohibits USB drives on user workstations.
Which of the following commands should the administrator run on the users’ workstations?
- A . diskpart
- B . chown
- C . gpupdate
- D . netstat
C
Explanation:
To enforce a security policy that prohibits USB drives on user workstations, the network administrator should run the gpupdate (C) command. This command forces a Group Policy update, which can include policies to disable USB drives. Group Policy is a feature in Microsoft Windows that allows for centralized management and configuration of operating systems, applications, and users’ settings in an Active Directory environment.
A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is unable to locate the source of an infection.
Which of the following should the technician check NEXT?
- A . Windows updates
- B . DNS settings
- C . Certificate store
- D . Browser plug-ins
D
Explanation:
Browser plug-ins are software components that add functionality to a web browser, such as playing videos, displaying animations, etc. However, some browser plug-ins can also be malicious or compromised and cause unwanted pop-up advertising messages while browsing the internet. A malware scan may not be able to locate the source of the infection if it is hidden in a browser plug-in. Windows updates, DNS settings and certificate store are not likely sources of pop-up advertising messages.
Verified References: https://www.comptia.org/blog/browser-security https://www.comptia.org/certifications/a
A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation.
Which of the following should be the technician’s next step to resolve this issue?
- A . Install antispyware
- B . Reimage the system
- C . Disable the pop-up blocker
- D . Upgrade the browser
- E . Install antivirus software
A
Explanation:
The presence of pop-up windows advertising free software and the error message about memory are indicative of spyware infection. Installing and running antispyware software is a practical first step to remove the unwanted software and resolve the issue without resorting to more drastic measures like re-imaging the system.
A technician is asked to resize a partition on the internal storage drive of a computer running macOS.
Which of the followings tools should the technician use to accomplish this task?
- A . Consoltf
- B . Disk Utility
- C . Time Machine
- D . FileVault
B
Explanation:
The technician should use Disk Utility to resize a partition on the internal storage drive of a computer running macOS. Disk Utility is a built-in utility that allows users to manage disks, partitions, and volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to format disks and volumes.