Practice Free 220-1102 Exam Online Questions
Which of the following file types allows a user to easily uninstall software from macOS by simply
placing it in the trash bin?
- A . .exe
- B . .dmg
- C . .app
- D . .rpm
- E . .pkg
C
Explanation:
.app files are application bundles that contain all the necessary files and resources for a Mac app. They can be easily deleted by dragging them to the Trash or using Launchpad12. Other file types, such as .exe, .dmg, .rpm, and .pkg, are either not compatible with macOS or require additional steps to uninstall34.
Reference: 1 Uninstall apps on your Mac – Apple Support(https://support.apple.com/en-us/102610)2 How to Uninstall Apps on a Mac (and Make Sure Leftover Files Are …(https://www.pcmag.com/how-to/uninstall-delete-apps-from-mac)3 How to install and uninstall software on a Mac – Laptop Mag(https://www.laptopmag.com/articles/install-unininstall-mac-software)4 How to completely uninstall an app on a Mac and delete all junk files(https://www.xda-developers.com/how-to-uninstall-app-mac/).
A remote user’s smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company’s corporate guest network. A technician sees that the phone has a large number of applications installed on it.
Which of the following is the most likely cause of the issue?
- A . The user is in a poor signal area.
- B . The user has too many processes running.
- C . The smartphone has malware on it.
- D . The smartphone has been jailbroken.
B
Explanation:
One of the common reasons for a slow smartphone performance is having too many apps installed and running in the background. These apps consume the device’s memory (RAM) and CPU resources, which can affect the speed and responsiveness of the phone. Rebooting the phone can temporarily clear the RAM and stop some background processes, but they may resume after a while. Connecting to a different network does not affect the performance of the phone, unless the network is congested or has a poor signal. The user can improve the phone’s performance by uninstalling unused apps, clearing app caches, and restricting background activities12. Malware can also slow down a phone, but it is not the most likely cause in this scenario, as the user does not report any other symptoms of infection, such as pop-ups, battery drain, or data usage spikes3. Jailbreaking a phone can also affect its performance, but it is not a cause, rather a consequence, of the user’s actions. Jailbreaking is the process of removing the manufacturer’s restrictions on a phone, which allows the user to install unauthorized apps, customize the system, and access root privileges4. However, jailbreaking also exposes the phone to security risks, voids the warranty, and may cause instability or compatibility issues5.
Reference
1: Speed up a slow Android device – Android Help – Google Help
2: Why your phone slows down over time and what you can do to stop it | TechRadar
3: How to tell if your phone has a virus | Norton
4: What is Jailbreaking? – Definition from Techopedia
5: What is Jailbreaking an iPhone? – Lifewire
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use.
Which of the following explains why the OS can only access 46B of RAM?
- A . The UEFI settings need to be changed.
- B . The RAM has compatibility issues with Windows 10.
- C . Some of the RAM is defective.
- D . The newly installed OS is x86.
D
Explanation:
The newly installed OS is x86. The x86 version of Windows 10 can only use up to 4GB of RAM. The x64 version of Windows 10 can use up to 2TB of RAM1.
Which of the following are mobile operating systems used on smartphones? (Select two).
- A . macOS
- B . Windows
- C . Chrome OS
- D . Linux
- E . iOS
- F . Android
E, F
Explanation:
iOS and Android are the two most popular and widely used mobile operating systems for smartphones. They are both based on Unix-like kernels and provide a variety of features and applications for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as iPhones and iPads. Android is developed by Google and runs on a range of devices from different manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.
A Windows administrator is creating user profiles that will include home directories and network printers for several new users.
Which of the following is the most efficient way for the technician to complete this task?
- A . Access control
- B . Authentication application
- C . Group Policy
- D . Folder redirection
C
Explanation:
Group Policy is a feature of Windows that allows administrators to centrally manage and apply policies and settings to computers and users on a domain. Group Policy can be used to create user profiles that include home directories and network printers for several new users, as well as other configurations such as security settings, desktop preferences, and software installation. Group Policy can save time and effort for the administrator by applying the same settings to multiple users at once. Access control, authentication application, and folder redirection are not the most efficient ways to create user profiles that include home directories and network printers for several new users.
Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?
- A . apt-get
- B . CIFS
- C . Samba
- D . greP
C
Explanation:
Samba is a software suite that allows Linux servers and desktops to integrate with Windows Active Directory environments. Samba can act as a domain controller, a file server, a print server, or a client for Windows networks. Samba can also provide authentication and authorization services for Linux users and devices using Active Directory.
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company.
Which of the following has infected the computer?
- A . Cryptominer
- B . Phishing
- C . Ransomware
- D . Keylogger
C
Explanation:
Ransomware is malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid. In this case, the user was able to access the files before without issue, and no changes have been made within the company, so it is likely that the computer was infected with ransomware.
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device.
Which of the following should the technician do NEXT?
- A . Verify all third-party applications are disabled
- B . Determine if the device has adequate storage available.
- C . Check if the battery is sufficiently charged
- D . Confirm a strong internet connection is available using Wi-Fi or cellular data
B
Explanation:
An operating system update usually requires a significant amount of storage space. If the device doesn’t have enough free storage, the update cannot be completed. This is one of the most common reasons for a failed OS update. After verifying storage availability, the technician should consider the other options if the issue persists. These include checking the battery status (an update process can drain battery quickly, and some devices won’t start an update if the battery level is too low), ensuring a stable internet connection, and checking for potential software conflicts with third-party applications.
A technician is working on a way to register all employee badges and associated computer IDs.
Which of the following options should the technician use in order to achieve this objective?
- A . Database system
- B . Software management
- C . Active Directory description
- D . Infrastructure as a Service
A
Explanation:
A database system is a software application that allows storing, organizing, and managing data in a structured way. A database system can be used to register all employee badges and associated computer IDs by creating a table or a record for each employee that contains their badge number, computer ID, name, and other relevant information. A database system can also facilitate searching, updating, and deleting data as needed.
Software management is a general term that refers to the process of planning, developing, testing, deploying, and maintaining software applications. It does not directly address the issue of registering employee badges and computer IDs. Active Directory description is a field in Active Directory that can be used to store additional information about an object, such as a user or a computer. It is not a software application that can be used to register employee badges and computer IDs by itself. Infrastructure as a Service (IaaS) is a cloud computing model that provides servers, storage, networking, and software over the internet. It does not directly address the issue of registering employee badges and computer IDs either.
https://www.idcreator.com/
https://www.alphacard.com/photo-id-systems/card-type/employee-badges
A user requires local administrative access to a workstation.
Which of the following Control Panel utilities allows the technician to grant access to the user?
- A . System
- B . Network and Sharing Center
- C . User Accounts
- D . Security and Maintenance
C
Explanation:
User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on a workstation1. The technician can use User Accounts to grant local administrative access to a user by adding the user to the Administrators group1. The Administrators group has full control over the workstation and can perform tasks such as installing software, changing system settings, and accessing all files.
References:
1: User Accounts (Control Panel) (https://docs.microsoft.com/en-us/windows/win32/shell/user-accounts): Local Users and Groups (https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/local-users-and-groups)