Practice Free 220-1102 Exam Online Questions
The audio on a user’s mobile device is inconsistent when the user uses wireless headphones and moves around.
Which of the following should a technician perform to troubleshoot the issue?
- A . Verify the Wi-Fi connection status.
- B . Enable the NFC setting on the device.
- C . Bring the device within Bluetooth range.
- D . Turn on device tethering.
C
Explanation:
Bringing the device within Bluetooth range is the best way to troubleshoot the issue of inconsistent audio when using wireless headphones and moving around. Bluetooth is a wireless technology that allows devices to communicate over short distances, typically up to 10 meters or 33 feet. If the device is too far from the headphones, the Bluetooth signal may be weak or interrupted, resulting in poor audio quality or loss of connection.
Which of the following is an example of MFA?
- A . Fingerprint scan and retina scan
- B . Password and PIN
- C . Username and password
- D . Smart card and password
D
Explanation:
Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or more authentication factors. Smart card and password is an example of two-factor authentication (2FA)2
Which of the following operating systems would most likely be used to run the inventory management system at a factory?
- A . Windows
- B . Chrome OS
- C . Android
- D . iOS
A
Explanation:
Windows is widely used in industrial and business environments due to its major market presence, extensive support from the industry, and a broad selection of operating system options. It supports a wide variety of software, making it suitable for running complex systems like an inventory management system in a factory. Other options such as Chrome OS, Android, and iOS are either more consumer-oriented or designed for specific types of devices, making them less likely choices for an industrial application like inventory management.
Reference: Professor Messer’s CompTIA 220-1102 A+ Course Notes.
A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor.
Which of the following procedures should the technician perform?
- A . Boot into safe mode.
- B . Perform a malware scan.
- C . Restart the machine.
- D . Reinstall the browser
B
Explanation:
The situation described seems to be a result of malware or adware that’s displaying pop-ups. The most appropriate action would be to perform a malware scan to identify and remove the offending software.
A company is retiring old workstations and needs a certificate of destruction for all hard drives.
Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).
- A . Standard formatting
- B . Drilling
- C . Erasing
- D . Recycling
- E . Incinerating
- F . Low-level formatting
B,E
Explanation:
Drilling and incinerating are physical destruction methods that make the data on hard drives unrecoverable. Standard formatting, erasing and low-level formatting are logical methods that can be reversed with data recovery tools. Recycling is not a destruction method at all.
Verified References: https://www.comptia.org/blog/what-is-a-certificate-of-destruction https://www.comptia.org/certifications/a
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering.
Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?
- A . Security and Maintenance
- B . Network and Sharing Center
- C . Windows Defender Firewall
- D . Internet Options
D
Explanation:
The best choice for accessing the necessary configuration to configure the desktop systems to use a new proxy server is the Internet Options utility. This utility can be found in the Control Panel and allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+ Core 2 exam objectives, technicians should be familiar with the Internet Options utility and how to configure proxy settings.
A PC is taking a long time to boot.
Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).
- A . Installing additional RAM
- B . Removing the applications from startup
- C . Installing a faster SSD
- D . Running the Disk Cleanup utility
- E . Defragmenting the hard drive
- F . Ending the processes in the Task Manager
B, D
Explanation:
Removing the applications from startup can improve the boot time of a PC by reducing the number of programs that load automatically when the PC starts. Some applications may add themselves to the startup list without the user’s knowledge or consent, which can slow down the PC’s performance. Running the Disk Cleanup utility can also improve the boot time of a PC by deleting unnecessary or temporary files that take up disk space and affect the PC’s speed. Disk Cleanup can also remove old system files that may cause conflicts or errors during booting. Installing additional RAM, installing a faster SSD, defragmenting the hard drive, and ending the processes in the Task Manager are not operations that would be best to do to resolve the issue of slow boot time at a minimal expense, as they may require purchasing new hardware or software, or may have negative impacts on other aspects of the PC’s performance.
A PC is taking a long time to boot.
Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).
- A . Installing additional RAM
- B . Removing the applications from startup
- C . Installing a faster SSD
- D . Running the Disk Cleanup utility
- E . Defragmenting the hard drive
- F . Ending the processes in the Task Manager
B, D
Explanation:
Removing the applications from startup can improve the boot time of a PC by reducing the number of programs that load automatically when the PC starts. Some applications may add themselves to the startup list without the user’s knowledge or consent, which can slow down the PC’s performance. Running the Disk Cleanup utility can also improve the boot time of a PC by deleting unnecessary or temporary files that take up disk space and affect the PC’s speed. Disk Cleanup can also remove old system files that may cause conflicts or errors during booting. Installing additional RAM, installing a faster SSD, defragmenting the hard drive, and ending the processes in the Task Manager are not operations that would be best to do to resolve the issue of slow boot time at a minimal expense, as they may require purchasing new hardware or software, or may have negative impacts on other aspects of the PC’s performance.
Which of the following involves sending arbitrary characters in a web page request?
- A . SMS
- B . SSL
- C . XSS
- D . VPN
C
Explanation:
XSS stands for cross-site scripting, which is a web security vulnerability that allows an attacker to inject malicious code into a web page that is viewed by other users 1. XSS involves sending arbitrary characters in a web page request, such as a query string, a form field, a cookie, or a header, that contain a malicious script. The web server does not validate or encode the input, and returns it as part of the web page response. The browser then executes the script, which can perform various actions on behalf of the attacker, such as stealing cookies, session tokens, or other sensitive information, redirecting the user to a malicious site, or displaying fake content
An organization implemented a method of wireless security that requires both a user and the user’s computer to be in specific managed groups on the server in order to connect to Wi-Fi.
Which of the following wireless security methods BEST describes what this organization implemented?
- A . TKIP
- B . RADIUS
- C . WPA2
- D . AES
B
Explanation:
RADIUS stands for Remote Authentication Dial-In User Service and it is a protocol that provides centralized authentication, authorization, and accounting for network access. RADIUS can be used to implement a method of wireless security that requires both a user and the user’s computer to be in specific managed groups on the server in order to connect to Wi-Fi. This is also known as 802.1X authentication or EAP-TLS authentication