Practice Free 220-1102 Exam Online Questions
Which of the following system preference items allows a user to enable third-party application installations on macOS 11?
- A . Keychain
- B . Privacy
- C . Accessibility
- D . Spotlight
B
Explanation:
In macOS, the "Privacy" settings under "Security & Privacy" are where users can control which applications are allowed to run, including third-party apps. By default, macOS may restrict apps that are not downloaded from the App Store, but in the Privacy settings, users can enable installations from identified developers or even from any source. The other options like "Keychain" manage passwords and certificates, "Accessibility" deals with assistive technologies, and "Spotlight" is the search feature.
Reference: Apple Support: Safely open apps on your Mac
CompTIA A+ 220-1102 Study Guide (Whizlabs)
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs.
Which of the following can BEST resolve the interference?
- A . Changing channels
- B . Modifying the wireless security
- C . Disabling the SSIO broadcast
- D . Changing the access point name
A
Explanation:
Changing channels can best resolve interference from other nearby SSIDs. Wireless networks operate on different channels, and changing the channel can help to avoid interference from other nearby networks.
A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites.
Which of the following Windows settings should the user utilize to create the secondary login?
- A . Privacy
- B . Accounts
- C . Personalization
- D . Shared resources
B
Explanation:
To create a secondary login with different permissions in Windows 10, the user should utilize the Accounts setting.
Here are the steps to create a new user account with different permissions:
✑ Right-click the Windows Start menu button.
✑ Select Control Panel.
✑ Select User Accounts.
✑ Select Manage another account.
✑ Select Add a new user in PC settings.
✑ Use the Accounts dialog box to configure a new account.1
A user reports being unable to access a sports team’s website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines.
Which of the following is the administrator referring to?
- A . NDA
- B . AUP
- C . VPN
- D . SOP
B
Explanation:
An AUP, or Acceptable Use Policy, is a set of rules applied by the owner, creator, or administrator of a
network, website, or service that restricts the ways in which the network, website, or system may be used. In this scenario, the administrator is likely referring to the company’s AUP, which outlines what employees can and cannot do on the company’s network, including restrictions on accessing certain types of websites, such as sports teams’ sites, for non-work-related purposes.
AUP (Acceptable Use Policy): This policy typically includes rules designed to maintain the security of the network, ensure the productivity of employees, and comply with legal regulations. Blocking access to specific websites is a common practice enforced through an AUP to align with these goals. An NDA (Non-Disclosure Agreement) (A) is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes but wish to restrict access to or by third parties. A VPN (Virtual Private Network) (C) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. SOP (Standard Operating Procedures) (D) are a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations, which wouldn’t typically include website access guidelines.
A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users.
Which of the following commands should be used to complete the user’s request?
- A . cat
- B . chmod
- C . pwd
- D . cacls
B
Explanation:
The chmod command is used to change the permissions of files and directories in Linux. It can grant
or revoke read, write, and execute permissions for the owner, the group, and others. To change the
file permissions to only allow access to a certain group of users, the chmod command can use either
the symbolic or the numeric mode.
For example, to give read and write permissions to the group and no permissions to others, the command can be:
chmod g+rw,o-rwx filename
or
chmod 660 filename
Reference: 1 Chmod Command in Linux (File Permissions) | Linuxize(https://linuxize.com/post/chmod-command-in-linux/)2 How To Change File or Directory Permissions in Linux | Tom’s Hardware(https://www.tomshardware.com/how-to/change-file-directory-permissions-linux).
A technician needs to manually set an IP address on a computer that is running macOS.
Which of the following commands should the technician use?
- A . ipconfig
- B . ifconfig
- C . arpa
- D . ping
B
Explanation:
ifconfig is a command-line utility that allows you to configure network interfaces on macOS and other Unix-like systems1. To set an IP address using ifconfig, you need to know the name of the network interface you want to configure (such as en0 or en1), and the IP address you want to assign (such as 192.168.0.150). You also need to use sudo to run the command with administrative privileges2. The syntax of the command is: sudo ifconfig interface address
For example, to set the IP address of en1 to 192.168.0.150, you would type:
sudo ifconfig en1 192.168.0.150
You may also need to specify other parameters such as subnet mask, gateway, or DNS servers, depending on your network configuration3. The other commands are not directly related to setting an IP address on macOS. ipconfig is a similar command for Windows systems4, arpa is a domain name used for reverse DNS lookup, and ping is a command for testing network connectivity.
An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue.
Which of the following should the technician perform to fix the issue?
- A . Disable the Windows Update service.
- B . Check for updates.
- C . Restore hidden updates.
- D . Rollback updates.
D
Explanation:
The technician should perform a rollback of the Windows update that caused the issue with the locally attached devices. A rollback is a process of uninstalling an update and restoring the previous version of the system. This can help to fix any compatibility or performance issues caused by the update1. To rollback an update, the technician can use the Settings app, the Control Panel, or the System Restore feature. The technician should also check for any device driver updates that might be needed after rolling back the update. Disabling the Windows Update service is not a good practice, as it can prevent the system from receiving important security and feature updates. Checking for updates might not fix the issue, as the update that caused the issue might still be installed. Restoring hidden updates is not relevant, as it only applies to updates that have been hidden by the user to prevent them from being installed2.
References:
1: https://www.windowscentral.com/how-uninstall-and-reinstall-updates-windows-10
2: https://support.microsoft.com/en-us/windows/show-or-hide-updates-in-windows-10-9c9f0a4f-9a6e-4c8e-8b44-afbc6b33f3cf
A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing.
Which of the following remote access technologies should the administrator use?
- A . RDP
- B . MSRA
- C . SSH
- D . VNC
C
Explanation:
Detailed Explanation with Core 2
Reference: SSH allows for remote access to systems securely and discretely, suitable for verifying patch levels
and other administrative tasks. This meets Core 2 objectives on using secure remote access tools (Core 2 Objective 4.9).
A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software.
Which of the following should the technician do next?
- A . Run one scan and schedule future scans.
- B . Back up the uninfected files and reimage the computer.
- C . Restore the clean backup copies of the infected files.
- D . Run repeated remediation scans until the malware is removed.
D
Explanation:
Malware is malicious software that can cause damage or harm to a computer system or network4. A technician has verified a computer is infected with malware by observing unusual behavior, such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the anti-malware software to prevent further infection or spread of the malware. The next step is to run repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and removes malware from the system. Running one scan may not be enough to remove all traces of malware, as some malware may hide or regenerate itself.
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?
- A . Full
- B . Mirror
- C . Incremental
- D . Differential
C
Explanation:
The law firm wants to retain more versions of the backups when possible, so the best backup method for the technician to implement in this scenario would be Incremental backup. Incremental backups only save the changes made since the last backup, which allows for more frequent backups and minimizes the amount of storage required. This would allow the law firm to retain more than three versions of backups without risking backup failure.
To retain more versions of backups, the technician should implement an Incremental backup method12
An incremental backup method only backs up the data that has changed since the last
backup, so it requires less storage space than a full backup12