Practice Free 220-1102 Exam Online Questions
A user reports a computer is running slow.
Which of the following tools will help a technician identity the issued
- A . Disk Cleanup
- B . Group Policy Editor
- C . Disk Management
- D . Resource Monitor
D
Explanation:
Resource Monitor will help a technician identify the issue when a user reports a computer is running slow1
A technician is setting up a new laptop for an employee who travels,.
Which of the following is the BEST security practice for this scenario?
- A . PIN-based login
- B . Quarterly password changes
- C . Hard drive encryption
- D . A physical laptop lock
C
Explanation:
Encrypting the laptop’s hard drive will ensure that any sensitive data stored on the laptop is secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone without the correct encryption key. This is an important security measure for any laptop used by an employee who travels, as it helps to protect the data stored on the laptop from unauthorized access.
A new service desk is having a difficult time managing the volume of requests.
Which of the following is the BEST solution for the department?
- A . Implementing a support portal
- B . Creating a ticketing system
- C . Commissioning an automated callback system
- D . Submitting tickets through email
B
Explanation:
A ticketing system is one of the most effective ways to manage a high volume of requests. It allows for better tracking, prioritization, and resolution of issues. The ticketing system can categorize issues based on their urgency, assign them to the appropriate personnel, and track the status and progress of each ticket until resolution. This greatly improves the efficiency of the service desk and ensures that no request is overlooked. It also provides a systematic way to handle and document issues, which is crucial for future reference and for identifying recurring problems.
A user’s smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet.
Which of the following BEST addresses the user’s concern?
- A . Operating system updates
- B . Remote wipe
- C . Antivirus
- D . Firewall
D
Explanation:
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. In this scenario, the user is concerned about an installed application transmitting data in the background, so a firewall would be the best solution to address their concern. By installing and configuring a firewall, the user can block unauthorized connections to and from the device, and receive alerts whenever an application tries to access the internet.
A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation.
Which of the following actions should be taken to prevent this incident from happening again? (Select two).
- A . Install a host-based IDS.
- B . Restrict log-in times.
- C . Enable a BIOS password.
- D . Update the password complexity.
- E . Disable AutoRun.
- F . Update the antivirus definitions.
- G . Restrict user permissions.
E, G
Explanation:
AutoRun is a feature of Windows that automatically executes a program or file when a removable media such as a USB drive is inserted into the computer. Disabling AutoRun can prevent a USB drive containing malicious software from covertly installing malware on a workstation, as it would require the user to manually open the drive and run the file. Restricting user permissions can also prevent a USB drive containing malicious software from covertly installing malware on a workstation, as it would limit the user’s ability to execute or install unauthorized programs or files. Installing a host-based IDS, restricting log-in times, enabling a BIOS password, updating the password complexity, and updating the antivirus definitions are not actions that can directly prevent this incident from happening again.
A company needs to securely and remotely access network devices.
Which of the following will allow the company to access these devices?
- A . Telnet
- B . TKIP
- C . RDP
- D . SSH
D
Explanation:
SSH (Secure Shell) is the secure protocol used for remotely accessing and managing network devices. It encrypts communication, ensuring confidentiality and integrity. Telnet provides remote access but is not secure because it transmits data, including passwords, in plaintext. TKIP is an encryption protocol for Wi-Fi security, not a remote access method. RDP (Remote Desktop Protocol) provides graphical remote desktop access mainly for Windows systems, not typically used for network device management. CompTIA A+ Core 2 clearly indicates SSH as the secure remote access protocol for network device administration.
Users report having difficulty using the Windows Hello facial recognition feature.
Which of the following is a secondary feature of Windows Hello that can be used to log in?
- A . Personal identification number
- B . Username/password
- C . One-time-use token
- D . Cryptographic device
A
Explanation:
Windows Hello is a biometric-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services, and networks with just a look or a touch. If users have difficulty using the facial recognition feature, Windows Hello also supports a Personal Identification Number (PIN) as a secondary feature for logging in. The PIN is tied to the specific device on which it is set up, adding a layer of security even if the PIN is obtained by someone else. Personal identification number: The PIN serves as an alternative to the facial recognition feature, allowing users to quickly and securely access their devices without relying solely on biometric authentication.
Username/password (B) is the traditional method of authentication but is not specifically a secondary feature of Windows Hello. One-time-use token (C) and cryptographic device (D) could be part of an MFA setup but are not directly related to Windows Hello’s alternate authentication options.
After a user recently installs a new scanner and the associated software on a computer, they notice the computer is now starting up very slowly.
Which of the following is the best tool to troubleshoot this issue?
- A . Resource Monitor
- B . Task Manager
- C . Device Manager
- D . Windows Update
- E . Event Viewer
B
Explanation:
Reference: CompTIA A+ Certification Core 2 220-1102, Objective 3.1 (Windows Performance Troubleshooting).
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined.
Which of the following should be performed FIRST to prevent further damage to the host and other systems?
- A . Power off the machine.
- B . Run a full antivirus scan.
- C . Remove the LAN card.
- D . Install a different endpoint solution.
A
Explanation:
Ransomware is a type of malware that encrypts the files on a system and demands a ransom for their decryption1. Ransomware can also spread to other systems on the network or exfiltrate sensitive data to the attackers2. Therefore, it is important to isolate the infected machine as soon as possible to contain the infection and prevent further damage3. Powering off the machine is a quick and effective way of disconnecting it from the network and stopping any malicious processes running on it12. The other options are not directly related to preventing ransomware damage or may not be effective. Running a full antivirus scan may not be able to detect or remove the ransomware, especially if it is a new or unknown variant1. Removing the LAN card may disconnect the machine from the network, but it may not stop any malicious processes running on it or any data encryption or exfiltration that has already occurred2. Installing a different endpoint solution may not be possible or helpful if the system is already infected and locked by ransomware1.
A technician suspects the boot disk of a user’s computer contains bad sectors.
Which of the following should the technician verify in the command prompt to address the issue without making any changes?
- A . Run sfc / scannow on the drive as the administrator.
- B . Run clearnmgr on the drive as the administrator
- C . Run chkdsk on the drive as the administrator.
- D . Run dfrgui on the drive as the administrator.
C
Explanation:
The technician should verify bad sectors on the user’s computer by running chkdsk on the drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and repairs disk errors, including bad sectors. It runs a scan of the disk and displays any errors that are found
