Practice Free 220-1102 Exam Online Questions
Which of the following device types would a technician consider a security concern?
- A . NIC
- B . IoT
- C . PoE
- D . LC
B
Explanation:
IoT (Internet of Things) devices are often considered a security concern due to their typically weak security protocols and the fact that many IoT manufacturers do not prioritize security when designing
these devices. These devices often lack the capability to be regularly patched or updated, which leaves them vulnerable to exploitation by attackers. The multitude of IoT devices, such as smart thermostats, cameras, and even light bulbs, when connected to a network, can serve as entry points for cyberattacks if not secured properly. In contrast, NICs (Network Interface Cards), PoE (Power over Ethernet), and LC (a type of fiber optic connector) do not inherently pose the same level of security risk as IoT devices because they are more established technologies and typically have better security practices in place.
Reference: CompTIA A+ Exam Objectives – 220-1102, Domain 2.7: Security (CompTIA) (ProfMesser)
A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician.
Which of the following should the technician use to assist the user?
- A . AAA
- B . SSH
- C . RDP
- D . VPN
C
Explanation:
RDP stands for Remote Desktop Protocol and it is a protocol that allows a user to remotely access and control another computer over a network. A technician can use RDP to assist a user who is in a different building but on the same network by connecting to the user’s computer and viewing their screen, keyboard, and mouse. AAA, SSH, and VPN are not protocols that can be used to assist a user with a program feature.
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering .
Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?
- A . Security and Maintenance
- B . Network and Sharing Center
- C . Windows Defender Firewall
- D . Internet Options
D
Explanation:
Explore
The correct answer is D) Internet Options. The Internet Options utility in Windows allows you to configure various settings related to your internet connection, including the proxy server settings. To access the Internet Options utility, you can either open the Control Panel and click on Internet Options, or open any web browser and click on the Tools menu and then on Internet Options. In the Internet Options window, go to the Connections tab and click on the LAN settings button. Here, you can enable or disable the use of a proxy server, as well as enter the address and port number of the proxy server you want to use12.
Security and Maintenance is a utility in Windows that allows you to view and manage the security and maintenance status of your computer, such as firewall, antivirus, backup, troubleshooting, and recovery settings. It does not have any option to configure proxy server settings.
Network and Sharing Center is a utility in Windows that allows you to view and manage your network connections, such as Wi-Fi, Ethernet, VPN, or dial-up. It also allows you to change network settings, such as network discovery, file and printer sharing, homegroup, and adapter settings. It does not have any option to configure proxy server settings.
Windows Defender Firewall is a utility in Windows that allows you to enable or disable the firewall protection for your computer, as well as configure firewall rules for inbound and outbound traffic. It does not have any option to configure proxy server settings.
A user is unable to access a remote server from a corporate desktop computer using the appropriate
terminal emulation program. The user contacts the help desk to report the issue.
Which of the following clarifying questions would be most effective for the help desk technician to ask the user in
- A . order to understand the issue?
- B . What is the error message?
- C . Does the program work on another computer?
- D . Did the program ever work?
- E . Is anyone else having this issue?
A
Explanation:
The most effective clarifying question for the help desk technician to ask the user in order to understand the issue is A) What is the error message? This question will help the technician to identify the possible cause and solution of the problem, as the error message will provide specific information about the nature and location of the error, such as the server name, the port number, the protocol, the authentication method, or the network status. The error message will also help the technician to troubleshoot the issue by following the suggested steps or searching for the error code online .
This question is more effective than the other choices because:
B) Does the program work on another computer? is not a very helpful question, as it will not reveal the source of the error or how to fix it. The program may work on another computer for various reasons, such as different network settings, firewall rules, permissions, or software versions. However, this question will not tell the technician what is wrong with the user’s computer or the remote server, or what needs to be changed or updated to make the program work.
C) Did the program ever work? is not a very relevant question, as it will not address the current issue or how to resolve it. The program may have worked in the past, but it may have stopped working due to changes in the network configuration, the server status, the software updates, or the user credentials. However, this question will not tell the technician what has changed or how to restore the program functionality.
D) Is anyone else having this issue? is not a very useful question, as it will not explain the reason or the solution for the error. The issue may affect only the user, or multiple users, depending on the scope and the impact of the error. However, this question will not tell the technician what is causing the error or how to fix it for the user or the others.
Reference: : How to Troubleshoot Terminal Emulation Problems – Techwalla : How to Read and Understand Windows Error Messages – Lifewire : How to Troubleshoot Network Connectivity Problems – How-To Geek : How to Troubleshoot Software Problems – dummies : How to Troubleshoot Common PC Issues For Users – MakeUseOf
A user’s PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources.
Which of the following should the technician do first?
- A . Disconnect the computer from the network
- B . Run an antivirus scan
- C . Reboot the computer
- D . Educate the user about cybersecurity best practices
A
Explanation:
Detailed
The technician should disconnect the computer from the network (Option A) first to prevent any further spread of the infection or data loss. Once the machine is isolated from the network, the technician can safely investigate the malware without risking infection to other systems. Running an antivirus scan (Option B) comes after isolating the system.
Rebooting the computer (Option C) could lead to the loss of critical information or make it harder to diagnose the issue.
Educating the user (Option D) is important but should happen after resolving the immediate issue.
CompTIA A+ Core 2
Reference: 3.3 – Best practices for malware removal, including isolating the system first.
A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network.
Which of the following steps should the technician take next?
- A . Schedule and perform an antivirus scan and system update
- B . Educate the end user on internet usage
- C . Perform a system scan to remove the malware
- D . Create a system restore point
C
Explanation:
Detailed
The next step after isolating the system is to perform a system scan to remove the malware (Option C). Since ransomware is suspected, running a comprehensive malware scan can help identify and remove the malicious software. It is crucial to deal with the active threat before taking further actions.
Scheduling an antivirus scan and system update (Option A) may help, but the immediate concern is identifying and removing the ransomware.
Educating the end user (Option B) is important but should happen after the immediate threat is resolved.
Creating a system restore point (Option D) would not be useful at this point since the system is infected.
CompTIA A+ Core 2
Reference: 2.3 – Detect, remove, and prevent malware, including handling ransomware.
Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?
- A . Authenticator application
- B . Access control lists
- C . Biometrics
- D . Smart card readers
A
Explanation:
Authenticator applications are designed to enhance security by generating temporary, time-sensitive passcodes used in two-factor authentication (2FA) processes. These passcodes are used in conjunction with traditional credentials (like usernames and passwords) to grant access to systems or applications. This extra layer of security ensures that even if primary login credentials are compromised, unauthorized access is still prevented without the dynamically generated code from the authenticator app.
A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock.
Which of the following options in the Windows settings should the technician use?
- A . Ease of Access
- B . Privacy
- C . Personalization
- D . Update and Security
C
Explanation:
The technician should use the Personalization option in the Windows settings to enable a Screensaver lock. The Personalization option allows users to customize the appearance and behavior of their desktop, such as themes, colors, backgrounds, lock screen and screensaver. The technician can enable a Screensaver lock by choosing a screensaver from the drop-down menu, setting a wait time in minutes and checking the box that says “On resume, display logon screen”. This will lock the computer and require a password or PIN to log back in after the screensaver is activated. Ease of Access is an option in the Windows settings that allows users to adjust accessibility features and settings, such as narrator, magnifier, high contrast and keyboard shortcuts. Ease of Access is not related to enabling a Screensaver lock. Privacy is an option in the Windows settings that allows users to manage privacy and security settings, such as location, camera, microphone and app permissions. Privacy is not related to enabling a Screensaver lock. Update and Security is an option in the Windows settings that allows users to check and install updates, troubleshoot problems, backup files and restore system. Update and Security is not related to enabling a Screensaver lock. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.7
Before leaving work, a user wants to see the traffic conditions for the commute home.
Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.?
- A . taskschd.msc
- B . perfmon.msc
- C . lusrmgr.msc
- D . Eventvwr.msc
A
Explanation:
The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically launch a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule tasks to run automatically at specified times or in response to certain events.
A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions.
Which of the following would best accomplish this task?
- A . Group Policy Editor
- B . Local Users and Groups
- C . Device Manager
- D . System Configuration
B
Explanation:
Local Users and Groups is the best option to accomplish this task. Local Users and Groups is a tool that allows managing the local user accounts and groups on a Windows workstation. The technician can use this tool to create a new user account with administrator privileges or add an existing user account to the Administrators group. This way, the technician can log in with the administrator account and make system changes without elevating permissions. Group Policy Editor, Device Manager, and System Configuration are not correct answers for this question. Group Policy Editor is a tool that allows configuring policies and settings for users and computers in a domain environment. Device Manager is a tool that allows managing the hardware devices and drivers on a Windows workstation. System Configuration is a tool that allows modifying the startup options and services on a Windows workstation. None of these tools can directly grant administrator access to a user account.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 13
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103