Practice Free 220-1102 Exam Online Questions
A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console.
Which of the following is the NEXT step the technician should take to resolve the issue?
- A . Run the antivirus scan.
- B . Add the required snap-in.
- C . Restore the system backup
- D . use the administrator console.
B
Explanation:
Local Users and Groups is a Microsoft Management Console (MMC) snap-in that allows you to manage user accounts or groups on your computer1.
If you cannot find it in the MMC console, you can add it manually by following these steps2:
✑ Press Windows key + R to open the Run dialog box, or open the Command Prompt.
✑ Type mmc and hit Enter. This will open a blank MMC console.
✑ Click File and then Add/Remove Snap-in.
✑ In the Add or Remove Snap-ins window, select Local Users and Groups from the Available snap-ins list, and click Add.
✑ In the Select Computer window, choose Local computer or Another computer, depending on which computer you want to manage, and click Finish.
✑ Click OK to close the Add or Remove Snap-ins window. You should now see Local Users and Groups in the MMC console.
A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change.
Which of the following should be done NEXT?
- A . Document the date and time of change.
- B . Document the purpose of the change.
- C . Document the risk level.
- D . Document findings of the sandbox test.
A
Explanation:
After implementing a change authorized by the change advisory board (CAB), the technician should document the date and time of change as part of the post-implementation review. This helps to track the change history, verify the success of the change, and identify any issues or incidents caused by the change1. Documenting the purpose of the change, the risk level, and the findings of the sandbox test are all part of the pre-implementation activities that should be done before submitting the change request to the CAB2.
References:
2: https://www.manageengine.com/products/service-desk/itil-change-management/cab-change-advisory-board.html
1: https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/success/quick-answer/change-advisory-board-setup.pdf
A macOS user is installing a new application.
Which of the following system directories is the software MOST likely to install by default?
- A . /etc/services
- B . /Applications
- C . /usr/bin
- D . C:Program Files
B
Explanation:
The software is most likely to install by default in the /Applications directory, which is the standard location for macOS applications. This directory can be accessed from the Finder sidebar or by choosing Go > Applications from the menu bar. The /Applications directory contains all the applications that are available to all users on the system1. Some applications might also offer the option to install in the ~/Applications directory, which is a personal applications folder for a single user2. The /etc/services directory is a system configuration file that maps service names to port numbers and protocols3. The /usr/bin directory is a system directory that contains executable binaries for various commands and utilities4. The C:Program Files directory is a Windows directory that does not exist on macOS.
A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected.
Which of the following is the most likely issue?
- A . Time drift
- B . NTP failure
- C . Windows Update
- D . CMOS battery
A
Explanation:
Time drift occurs when the internal clock of a computer is not properly synchronized, often leading to discrepancies like being an hour behind. In this case, the workstation is the only device affected, indicating that it’s likely a local issue. Time drift can happen if the system clock isn’t syncing properly with an NTP (Network Time Protocol) server or if automatic daylight savings adjustments aren’t enabled. It’s less likely to be a CMOS battery issue since the technician has already verified the correct date and the system clock isn’t completely reset (which is what happens when the CMOS battery fails).
Reference: Troubleshooting Time Synchronization Issues in Windows (Help Desk Geek) (Zendesk)
Which of the following operating systems was the app file type designed to run under as an application file bundle?
- A . macOS
- B . Chrome
- C . Windows
- D . Linux
A
Explanation:
The app file type is designed to run under macOS as an application file bundle. macOS uses application bundles to store executable files and related resources, such as libraries, image files, and localized content, in a single directory hierarchy. This approach simplifies application management and execution within the macOS environment.
A technician received a call stating that all files in a user’s documents folder appear to be Changed, and each of the files now has a look file extension
Which pf the following actions is the FIRST step the technician should take?
- A . Runa live disk clone.
- B . Run a full antivirus scan.
- C . Use a batch file to rename the files-
- D . Disconnect the machine from the network
D
Explanation:
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness.
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken.
Which of the following should the technician do next?
- A . Run an antivirus and enable encryption.
- B . Restore the defaults and reimage the corporate OS.
- C . Back up the files and do a system restore.
- D . Undo the jailbreak and enable an antivirus.
B
Explanation:
Jailbreaking a device exposes it to various security risks, such as malware, data theft, network attacks, and service disruption1234. Running an antivirus and enabling encryption may not be enough to remove the threats and restore the device’s functionality. Undoing the jailbreak may not be possible or effective, depending on the method used. Backing up the files and doing a system restore may preserve the jailbreak and the associated problems. The best option is to erase the device and reinstall the original operating system that is compatible with the corporate policies and standards. This will ensure that the device is clean, secure, and compliant25.
Reference: 1 What is Jailbreaking & Is it safe? – Kaspersky(https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking).
2 Jailbreak Detection: Why is jailbreaking a potential security risk? – Cybersecurity ASEE (https://cybersecurity.asee.co/blog/what-is-jailbreaking/).
3 Jailbreaking Information for iOS Devices | University IT ( https://uit.stanford.edu/service/mydevices/jailbreak)
4 What does it mean to jailbreak your phone―and is it legal? – Microsoft(https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/what-is-jailbreaking-a-phone).
5 Resetting a corporate laptop back to a personal laptop… Enterprise vs Pro C Windows 10(https://community.spiceworks.com/topic/2196812-resetting-a-corporate-laptop-back-to-a-personal-laptop-enterprise-vs-pro).
A customer needs to purchase a desktop capable of rendering video.
Which of the following should the customer prioritize?
- A . NIC
- B . USB
- C . GPU
- D . HDMI
C
Explanation:
For rendering video, the most critical component a customer should prioritize in a desktop is:
GPU (Graphics Processing Unit): The GPU is specifically designed to handle complex graphics and video rendering tasks. A powerful GPU will significantly improve performance in video rendering applications.
NIC (Network Interface Card): Important for network connectivity but irrelevant for video rendering.
USB: Useful for peripherals but does not impact video rendering capabilities.
HDMI: An important output interface for connecting monitors but not crucial for the rendering process itself.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes, including hardware components for specific tasks.
GPU importance in video rendering documentation.
Which of the following Linux commands would help to identify which directory the user is currently operating in?
- A . pwd
- B . dig
- C . find
- D . cat
A
Explanation:
The pwd command, which stands for "print working directory," is used in Linux and Unix-like operating systems to display the current directory in which the user is operating. This command outputs the full pathname of the current working directory, helping users to understand their current location in the filesystem hierarchy.
pwd: When executed, it provides the absolute path of the directory you’re currently in, which is useful for navigation and scripting purposes.
Other options listed:
dig: This command is used for querying DNS name servers for information about host addresses, mail exchanges, name servers, and related information.
find: This command is used to search for files in a directory hierarchy based on specified criteria (such as name, modification date, size, etc.).
cat: Short for "concatenate," this command is used to read the contents of files and output them to the terminal.
An organization’s Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years.
Which of the following backup methods would BEST meet the requirements?
- A . A daily, incremental backup that is saved to the corporate file server
- B . An additional, secondary hard drive in a mirrored RAID configuration
- C . A full backup of the data that is stored of site in cold storage
- D . Weekly, differential backups that are stored in a cloud-hosting provider
C
Explanation:
According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a separate physical location, it is less likely to be affected by the same event that could cause data loss on the original system. Cold storage is a term used for data archiving, which typically refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for regulatory or compliance reasons.
