Practice Free 220-1102 Exam Online Questions
A technician is assisting a customer who is having difficulty accessing the company’s website.
Which of the following should the technician do first?
- A . Ask the customer for their log-in credentials.
- B . Check the company’s internal knowledge base for solutions.
- C . Refer the customer to a more experienced technician.
- D . Record the details of the issue in the company’s ticketing system.
D
Explanation:
When a customer is having difficulty accessing the company’s website, the technician should first document the issue in the company’s ticketing system. This step ensures that the problem is officially logged, which allows for proper tracking, prioritization, and assignment to the appropriate personnel if needed. Recording the details helps in maintaining a record of the issue and the troubleshooting steps taken, which is useful for future reference and analysis.
A user’s home system has been infected with malware. A technician has isolated the system from the network and disabled System Restore.
Which of the following should the technician do next?
- A . Perform an antivirus scan.
- B . Run Windows updates.
- C . Reimage the system.
- D . Enable System Restore.
A
Explanation:
When dealing with a malware-infected system, isolating the system from the network and disabling System Restore are critical initial steps. The next step in the malware removal process should be: Perform an antivirus scan: This helps to identify and remove the malware from the system. Running a thorough scan using updated antivirus software is essential to detect and clean any malicious files. Run Windows updates: This is important for system security but should be done after the malware is removed to avoid further issues.
Reimage the system: This is a more drastic measure and should be considered if the antivirus scan cannot fully clean the system.
Enable System Restore: This should only be done after the system is confirmed to be clean.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 3.3: Given a scenario use best practice procedures for malware removal.
Malware removal best practices documentation.
Internet speeds on a user’s Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings.
Which of the following should the technician check to verify the proxy configuration?
- A . Network and Sharing Center
- B . Internet Options
- C . Firewall settings
- D . System settings
B
Explanation:
Detailed
The correct place to check proxy settings in Windows 10 is under Internet Options (Option B), specifically in the "Connections" tab. Proxy configurations can affect internet speeds if misconfigured or if a proxy is being used unnecessarily.
Network and Sharing Center (Option A) provides information on network connections but doesn’t handle proxy settings.
Firewall settings (Option C) manage network traffic rules but don’t directly affect proxy settings. System settings (Option D) contain general system configurations, not specific to proxy settings. CompTIA A+ Core 2
Reference: 1.6 – Configure networking features in Windows, including proxy settings
A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key.
Which of the following is the best way for a technician to return the device to service safely?
- A . Run an AV scan.
- B . Reinstall the operating system
- C . Install a software firewall.
- D . Perform a system restore.
- E . Comply with the on-screen instructions.
B
Explanation:
The best way for a technician to return the device to service safely is to reinstall the operating system. This is because the device is infected by ransomware, which is a form of malware that encrypts files and demands payment for decryption. Reinstalling the operating system will erase the ransomware and restore the device to its original state. However, this will also delete any data that was not backed up before the infection. Therefore, it is important to have regular backups of critical data and protect them from ransomware attacks 1.
The other options are not effective or safe for ransomware recovery. Running an AV scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Installing a software firewall may prevent future attacks, but it will not help with the current infection. Performing a system restore may not work if the ransomware has corrupted or deleted the restore points. Complying with the on-screen instructions is not advisable, as it will encourage the attackers and there is no guarantee that they will provide the decryption key after receiving the payment.
To prevent and recover from ransomware attacks, it is recommended to follow some best practices, such as234:
Use strong passwords and multifactor authentication for all accounts and devices.
Keep all software and firmware updated with the latest security patches.
Avoid opening suspicious or unsolicited emails and attachments.
Educate users and staff on how to recognize and report phishing and social engineering attempts.
Use antivirus software and enable real-time protection.
Enable network segmentation and firewall rules to limit the spread of ransomware.
Implement a Zero Trust security model to verify all requests and devices before granting access.
Create and test backups of critical data and store them offline or in a separate network.
Recover safely by isolating the infected devices, identifying the ransomware variant, and restoring data from backups.
Report any ransomware incidents to law enforcement agencies and seek help from experts.
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer.
Which of the following filesystems will the technician MOST likely use?
- A . FAT32
- B . ext4
- C . NTFS
- D . exFAT
D
Explanation:
exFAT is a file system that is supported by both Linux and Windows and can handle large files1.
Which of the following is an example of MFA?
- A . Fingerprint scan and retina scan
- B . Password and PIN
- C . Username and password
- D . Smart card and password
D
Explanation:
Smart card and password is an example of two-factor authentication (2FA), not multi-factor authentication (MFA). MFA requires two or more authentication factors. Smart card and password is an example of two-factor authentication (2FA)2
All the desktop icons on a user’s newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed.
Which of the following would BEST resolve the issue?
- A . Rolling back video card drivers
- B . Restoring the PC to factory settings
- C . Repairing the Windows profile
- D . Reinstalling the Windows OS
A
Explanation:
Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a user’s newly issued PC. This means restoring the previous version of the drivers that were working fine before the software patch was deployed. The software patch may have caused compatibility issues or corrupted the drivers, resulting in display problems
A systems administrator received a request to limit the amount of cellular data a user’s Windows 10 tablet can utilize when traveling.
Which of the following can the administrator do to best solve the user’s issue?
- A . Turn on airplane mode.
- B . Set the connection to be metered.
- C . Configure the device to use a static IP address.
- D . Enable the Windows Defender Firewall.
B
Explanation:
Setting the connection to be metered is the best solution for limiting the amount of cellular data a user’s Windows 10 tablet can utilize when traveling. A metered connection is a network connection that has a data limit or charges fees based on the amount of data used. Windows 10 allows users to set any network connection as metered, which reduces the amount of data that Windows and some apps use in the background. For example, setting a connection as metered will prevent Windows from downloading updates automatically, stop some apps from syncing data online, and disable some live tiles on the Start menu. Setting a connection as metered can help users save cellular data and avoid extra charges when traveling. Turning on airplane mode, configuring the device to use a static IP address, and enabling the Windows Defender Firewall are not effective solutions for limiting the amount of cellular data a user’s Windows 10 tablet can utilize when traveling. Turning on airplane mode will disable all wireless connections on the device, including Wi-Fi, Bluetooth, and cellular data. This will prevent the user from accessing any online services or applications on the tablet. Configuring the device to use a static IP address will assign a fixed IP address to the device instead of obtaining one dynamically from a DHCP server. This will not affect the amount of cellular data the device uses, and it may cause IP conflicts or connectivity issues on some networks. Enabling the Windows Defender Firewall will block or allow incoming and outgoing network traffic based on predefined or custom rules. This will not reduce the amount of cellular data the device uses, and it may interfere with some apps or services that require network access.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 19
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 108
A systems administrator receives notification about unauthorized access to company resources outside normal business hours.
Which of the following security measures should the systems administrator implement to prevent further unauthorized use?
- A . Perimeter firewalls
- B . SSL-enabled DNS
- C . Anonymizing VPNs
- D . Multifactor authentication
A user’s new laptop, which was advertised as gaming-ready, is performing slowly when the user is playing a modern game. However, when the user is playing a less resource-demanding game, the user does not see any lag.
Which of the following should a technician do to resolve the issue?
- A . Overclock the RAM
- B . Enable NIC teaming
- C . Select dedicated graphics
- D . Activate CPU hyperthreading
C
Explanation:
Comprehensive and Detailed In-Depth
Many modern laptops have both an integrated GPU (built into the CPU) and a dedicated GPU (such as NVIDIA or AMD). The system may default to the integrated GPU to save power, which results in poor gaming performance. The technician should manually set the game to use the dedicated graphics card to resolve the issue.
