Practice Free 220-1102 Exam Online Questions
An organization wants to deploy a customizable operating system.
Which of the following should the organization choose?
- A . Windows 10
- B . macOS
- C . Linux
- D . Chrome OS
- E . iOS
C
Explanation:
Linux is known for its high degree of customizability and flexibility, making it an ideal choice for organizations looking to deploy a customizable operating system. Unlike proprietary operating systems, Linux allows users to modify or replace almost any part of the system, from the kernel to the desktop environment and applications, to suit their specific needs.
Linux: This open-source operating system provides access to the source code, enabling extensive customization. Organizations can tailor Linux distributions to fit specific requirements, making it a popular choice for servers, specialized workstation environments, and embedded systems.
Windows 10 (A) and macOS (B) offer some level of customization but are more restricted due to their proprietary nature. Chrome OS (D) is designed for simplicity and security, focusing on web applications, which limits deep system-level customizations. iOS (E) is designed for Apple’s mobile devices and is not applicable for organizational deployment beyond mobile and tablet devices; it also offers limited customization compared to Linux.
Malware is installed on a device after a user clicks on a link in a suspicious email.
Which of the following is the best way to remove the malware?
- A . Run System Restore.
- B . Place in recovery mode.
- C . Schedule a scan.
- D . Restart the PC.
B
Explanation:
Recovery mode is a special boot option that allows the user to access advanced tools and features to troubleshoot and remove malware from the device. Recovery mode can also restore the system to a previous state or reset the device to factory settings. Running System Restore, scheduling a scan, or restarting the PC may not be effective in removing the malware, as it may still be active or hidden in the system files.
A company would like to implement multifactor authentication for all employees at a minimal cost.
Which of the following best meets the company’s requirements?
- A . Biometrics
- B . Soft token
- C . Access control lists
- D . Smart card
B
Explanation:
A soft token, also known as a software token or an OTP (one-time password) app, is a type of multifactor authentication that generates a temporary code or password on a user’s device, such as a smartphone or a tablet. The user must enter this code or password along with their username and password to access their account or service. A soft token can help improve security by adding an extra layer of verification and preventing unauthorized access even if the user’s credentials are compromised. A soft token can also be implemented at a minimal cost, as it does not require any additional hardware or infrastructure. Biometrics, access control lists, and smart card are not types of multifactor authentication that can be implemented at a minimal cost.
A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name.
Which of the following tools should the technician use? (Select two).
- A . cat
- B . df
- C . grep
- D . ps
- E . dig
- F . find
- G . top
CF
Explanation:
To locate a missing file with only a partial name known, the best tools to use in a Linux environment would be grep and find.
grep: This command is used to search the contents of files for a specific pattern. While grep itself might not be the first choice for finding file names, it can be combined with other commands (like ls or find) to search within file lists or contents.
find: This command is used to search for files in a directory hierarchy based on various criteria like name, size, modification date, etc. find can be used to search for files by partial name by using wildcards in the search pattern.
cat (A) is used to concatenate and display the content of files. df (B) displays the amount of disk space used and available on filesystems. ps (D) shows information about active processes. dig (E) is used for querying DNS name servers. top (G) displays Linux tasks and system performance information. None of these tools are directly suited for finding files by partial names.
A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone.
Which of the following could the user do to most likely resolve the issue?
- A . Enable cellular data.
- B . Increase data limits.
- C . Disconnect the VPN.
- D . Reinstall the SIM card.
A
Explanation:
The most likely solution to this issue is to enable cellular data. After a business trip, the user may have disabled cellular data to avoid roaming charges, or the phone may have been set to Wi-Fi only for internet access. Enabling cellular data would restore internet access outside of Wi-Fi networks.
Reference: CompTIA A+ 220-1101 Exam Objectives, Domain 1.4 Mobile Devices – Wireless/Cellular Network
Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?
- A . WPA3
- B . MAC filleting
- C . RADIUS
- D . TACACS+
A
Explanation:
WPA3 (Wi-Fi Protected Access 3) is a wireless security method that supports the majority of current Wi-Fi-capable devices without sacrificing security. It is backward compatible with WPA2 devices and offers enhanced encryption and authentication features. MAC filtering is another wireless security method, but it can be easily bypassed by spoofing MAC addresses. RADIUS (Remote Authentication Dial-In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) are network authentication protocols, but they are not wireless security methods by themselves.
Verified References: https://www.comptia.org/blog/wireless-security-standards https://www.comptia.org/certifications/a
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
- A . Remote Assistance
- B . Remote Desktop Protocol
- C . Screen Sharing
- D . Virtual Network Computing
C
Explanation:
Screen Sharing is the default system tool that can be used in macOS to allow the technician to view the screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their Mac screen with another Mac on the network. The user can enable screen sharing in the System Preferences > Sharing pane, and then allow other users to request or enter a password to access their screen1. The technician can launch the Screen Sharing app from the Spotlight search or the Finder sidebar, and then enter the user’s name, address, or Apple ID to connect to their screen2. Remote Assistance is a Windows feature that allows users to invite someone to help them with a problem on their PC3. Remote Desktop Protocol (RDP) is a protocol that allows users to connect to a remote computer over a network4. Virtual Network Computing (VNC) is a technology that allows users to share their screen with other devices using a VNC viewer app1. These are not default system tools in macOS, although they can be used with third-party software or settings.
References:
1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-mac-mh14066/mac
2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-with-another-mac/
3: https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remote-connection-b077e31a-16f4-2529-1a47-21f6a9040bf3
4: https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-protocol
Which of the following should be documented to ensure that the change management plan is followed?
- A . Scope of the change
- B . Purpose of the change
- C . Change rollback plan
- D . Change risk analysis
A
Explanation:
The scope of the change is one of the elements that should be documented to ensure that the change management plan is followed. The scope of the change defines the boundaries and limitations of the change, such as what is included and excluded, what are the deliverables and outcomes, what are the assumptions and constraints, and what are the dependencies and risks. The scope of the change helps to clarify the expectations and objectives of the change, as well as to prevent scope creep or deviation from the original plan. The scope of the change also helps to measure the progress and success of the change, as well as to communicate the change to the stakeholders and the team
A police officer often leaves a workstation for several minutes at a time.
Which of the following is the BEST way the officer can secure the workstation quickly when walking away?
- A . Use a key combination to lock the computer when leaving.
- B . Ensure no unauthorized personnel are in the area.
- C . Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
- D . Turn off the monitor to prevent unauthorized visibility of information.
A
Explanation:
The BEST way to secure the workstation quickly when walking away is to use a key combination to lock the computer when leaving1
An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data.
Which of the following is the best way for a technician to protect the data on the phone?
- A . Remote lock
- B . Remote wipe
- C . Remote access
- D . Remote encrypt
B
Explanation:
When a smartphone is lost, especially one that might contain sensitive or private data, the primary concern is to ensure that any data on the device cannot be accessed by unauthorized persons.
Among the options provided:
Remote lock: This option will lock the device remotely, preventing access. However, it does not remove the data and might not be effective if the device is powered off or reset.
Remote wipe: This is the best option as it allows the technician to erase all data from the device remotely, ensuring that sensitive information is not accessible to anyone who finds or steals the device.
Remote access: This option would allow a technician to access the device remotely, but it would not directly prevent unauthorized access or data breaches.
Remote encrypt: Encrypting the device remotely might not be possible if the device is not accessible or turned on, and it does not remove existing data which could be at risk.
Reference: CompTIA A+ Exam Objectives [220-1102] – 3.4: Given a scenario, use best practices to secure a mobile device.