Practice Free 220-1102 Exam Online Questions
A technician is creating a location on a Windows workstation for a customer to store meeting minutes.
Which of the following commands should the technician use?
- A . c: minutes
- B . dir
- C . rmdir
- D . md
D
Explanation:
The command md stands for make directory and is used to create a new directory or folder in the current location. In this case, the technician can use md minutes to create a folder named minutes in the C: drive. The other commands are not relevant for this task. c: minutes is not a command but a path to a folder. dir is used to display a list of files and folders in the current directory. rmdir is used to remove or delete an existing directory or folder.
A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following
Which of the following ports should be opened to allow for DNS recursion?
- A . 1
- B . 53
- C . 80
- D . 123
- E . 445
B
Explanation:
DNS (Domain Name System) lookups are essential for translating human-friendly domain names into IP addresses that computers use to communicate. DNS typically uses port 53 for its communication. In the provided firewall output, various ports are either allowed or blocked for outgoing traffic. For DNS recursion, which is the process of resolving domain names to IP addresses, port 53 must be open.
Port 53: This is the standard port used by DNS for queries and responses. The fact that it is currently blocked (as per the firewall output) is the reason why DNS lookups are failing. Opening port 53 will allow the DNS requests to pass through the firewall, enabling the resolution of domain names to IP addresses.
Other ports mentioned in the output are used for different services and protocols:
Port 1 is generally not used for standard services.
Port 445 is associated with SMB (Server Message Block) for file sharing in Windows environments.
Port 123 is used by NTP (Network Time Protocol) for time synchronization.
Port 80 is used for HTTP traffic, which is web traffic but not related to DNS lookups.
A technician discovers a user’s PC has a "No OS found" error message.
Which of the following steps should the technician take next?
- A . Remove external storage and reboot the PC.
- B . Replace the SSD and run disk defragmenter.
- C . Start up in safe mode and roll back the latest security updates.
- D . Back up personal data and rebuild the user profile.
A
Explanation:
Detailed Explanation with Core 2
Reference: A "No OS found" message often occurs if the PC is trying to boot from an external storage device that does not contain an OS. Removing any external devices and rebooting can resolve this issue. This approach is part of troubleshooting boot-related problems, as emphasized in Core 2 (Core 2 Objective 3.1).
After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional.
Which of the following actions should the user take to troubleshoot the issue?
- A . Run the application as Administrator.
- B . Raise the User Account Control level.
- C . Turn off Windows Defender Firewall.
- D . Disable compatibility mode for the application.
A
Explanation:
When a legacy application is not fully functional after upgrading the Windows operating system, the first step to troubleshoot the issue is to:
Run the application as Administrator: Legacy applications often require administrative privileges to run correctly. Running the application with these privileges can resolve issues related to permissions and access to certain system resources.
Raise the User Account Control level: This increases security prompts but does not resolve compatibility issues.
Turn off Windows Defender Firewall: This can expose the system to security risks and is unlikely to resolve application functionality issues.
Disable compatibility mode for the application: Compatibility mode should generally be enabled for legacy applications to ensure they run properly on newer OS versions.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 1.3: Given a scenario use features and tools of the Microsoft Windows 10 operating system (OS).
Windows application compatibility troubleshooting documentation.
Which of the following is the weakest wireless security protocol?
- A . WEP
- B . WPA2
- C . TKIP
- D . AES
A
Explanation:
WEP (Wired Equivalent Privacy) is known to be the weakest wireless security protocol due to its vulnerabilities and ease of being compromised.
WEP: The oldest and weakest protocol, susceptible to various attacks and easily cracked.
WPA2: Much stronger security with AES encryption, currently one of the most secure standards.
TKIP: Used with WPA, stronger than WEP but weaker than WPA2 with AES.
AES: Advanced Encryption Standard, used in WPA2 and known for strong security.
Reference: CompTIA A+ Exam Objectives [220-1102] – 2.2: Compare and contrast wireless security protocols and authentication methods.
After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists.
Which of the following actions should the user take next?
- A . Shut down and cold start the smartphone
- B . Delete the email containing the attachment
- C . Wipe the device and reset it to factory defaults
- D . Uninstall and reinstall the mobile browser
C
Explanation:
In this case, abnormal behavior after opening a suspicious email suggests malware might have infected the device. A full factory reset is recommended to remove any persistent malware, especially when a restart does not resolve the issue. Deleting the email or reinstalling the browser will not remove the malware already on the device.
Reference: Core 2, Domain 2.3 – Malware detection and removal.
A technician is upgrading the Microsoft Windows 10 OS.
Which of the following are required for the technician to safely upgrade the OS? (Select two).
- A . Release notes
- B . Antivirus software
- C . Backup of critical data
- D . Device drivers
- E . Word processing software
- F . Safe boot mode
C, D
Explanation:
To safely upgrade the Microsoft Windows 10 OS, it is essential to backup critical data (C) and ensure that you have the necessary device drivers (D). Backing up critical data protects against potential data loss during the upgrade process. Having the correct device drivers ensures that the hardware components function properly with the new OS version, preventing issues like loss of functionality or compatibility problems.
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented.
Which of the following is the NEXT step the technician should take?
- A . Shut down the infected computer and swap it with another computer
- B . Investigate what the interface is and what triggered it to pop up
- C . Proceed with initiating a full scan and removal of the viruses using the presented interface
- D . Call the phone number displayed in the interface of the antivirus removal tool
B
Explanation:
The technician should not proceed with initiating a full scan and removal of the viruses using the presented interface or call the phone number displayed in the interface of the antivirus removal tool12
Shutting down the infected computer and swapping it with another computer is not necessary at this point12
The technician should not immediately assume that the message is legitimate or perform any actions without knowing what the interface is and what triggered it to pop up. It is important to investigate the issue further, including checking the legitimacy of the antivirus program and the message it is displaying.
A technician is installing software on a user’s workstation. The installation fails due to incompliance with the HCL.
Which of the following components is most likely causing the installation to fail? (Select two).
- A . NIC
- B . CPU
- C . PSU
- D . KVM
- E . RAM
- F . DVI
BE
Explanation:
The Hardware Compatibility List (HCL) is a list that indicates hardware components that are compatible with a specific software or operating system. If software installation fails due to incompliance with the HCL, it’s most likely due to core hardware components like the Network Interface Card (NIC) or the Central Processing Unit (CPU) not being supported or not meeting the software’s minimum hardware requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as defined by the HCL.
A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company’s application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?
- A . Reenroll the user’s mobile device to be used as an MFA token.
- B . Use a private browsing window to avoid local session conflicts.
- C . Bypass single sign-on by directly authenticating to the application.
- D . Reset the device being used to factory defaults.
B
Explanation:
Detailed Explanation with Core 2
Reference: Using a private browsing window can help resolve session conflicts by not relying on cached credentials, which might interfere with single sign-on processes. Core 2 objectives include troubleshooting authentication issues and resolving potential conflicts with single sign-on systems (Core 2 Objective 4.7).