Practice Free 220-1102 Exam Online Questions
A technician receives a migration audit stating that a desktop needs to be removed from the network and reimaged with a current OS.
Which of the following is the most likely reason for the notification?
- A . MTBF exceeded
- B . Incompatible drivers
- C . End-of-life
- D . NTFS corruption
As part of a CYOD policy a systems administrator needs to configure each user’s Windows device to require a password when resuming from a period of sleep or inactivity.
Which of the following paths will lead the administrator to the correct settings?
- A . Use Settings to access Screensaver settings
- B . Use Settings to access Screen Timeout settings
- C . Use Settings to access General
- D . Use Settings to access Display.
B
Explanation:
On a Windows device, the option to require a password when resuming from a period of sleep or inactivity is typically found within the Screen Timeout settings. The exact navigation path can vary slightly depending on the version of Windows, but it usually involves going into the system settings, finding the power and sleep settings, then adjusting the Screen Timeout settings to require a password on wake-up. This provides an additional layer of security, ensuring that the device is protected even if the user steps away for a period of time.
A desktop engineer is deploying a master image.
Which of the following should the desktop engineer consider when building the master image? (Select TWO).
- A . Device drivers
- B . Keyboard backlight settings
- C . Installed application license keys
- D . Display orientation
- E . Target device power supply
- F . Disabling express charging
A,C
Explanation:
✑ A. Device drivers23: Device drivers are software components that enable the operating system to communicate with hardware devices. Different devices may require different drivers, so the desktop engineer should include the appropriate drivers in the master image or configure the deployment process to install them automatically.
✑ C. Installed application license keys2: Installed application license keys are codes that activate or authenticate software applications. Some applications may require license keys to be entered during installation or after deployment. The desktop engineer should include the license keys in the master image or configure the deployment process to apply them automatically.
A user calls the help desk and reports a workstation is infected with malicious software.
Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).
- A . File Explorer
- B . User Account Control
- C . Windows Backup and Restore
- D . Windows Firewall
- E . Windows Defender
- F . Network Packet Analyzer
A,E
Explanation:
The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in antivirus program that can detect and remove malicious software from a workstation. File Explorer can be used to locate and delete files associated with the malicious software1
A user connected an external hard drive but is unable to see it as a destination to save files.
Which of the following tools will allow the drive to be formatted?
- A . Disk Management
- B . Device Manager
- C . Disk Cleanup
- D . Disk Defragmenter
A
Explanation:
Disk Management is a tool that allows users to create, format, delete, shrink, extend, and manage partitions on hard drives. If the external hard drive is not formatted or has an incompatible filesystem type, Disk Management can be used to format it with a supported filesystem type such as NTFS, FAT32, or exFAT. Device Manager, Disk Cleanup, and Disk Defragmenter are not tools that can format a hard drive.
A user’s personal computer was infected with malware that had a known remediation.
Which of the following should the user have done to prevent this issue?
- A . Kept endpoint protection software updated
- B . Created a restore point
- C . Maintained a preinstallation environment
- D . Disabled System Restore
A
Explanation:
Malware infections are commonly prevented by having updated endpoint protection software (antivirus/antimalware). Keeping this software updated ensures it can detect and remove the latest threats effectively before they cause damage. Restore points and preinstallation environments are recovery methods but do not prevent malware infections. Disabling System Restore removes the ability to roll back system changes, which is counterproductive. Endpoint protection software is a fundamental security control in Core 2 security domains and is critical in maintaining system integrity and preventing infections. Regular updates to antivirus definitions and endpoint software are a proactive defense aligned with security best practices covered in the official CompTIA materials.
An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data.
Which of the following is the best way for a technician to protect the data on the phone?
- A . Remote lock
- B . Remote wipe
- C . Remote access
- D . Remote encrypt
B
Explanation:
When a smartphone is lost, especially one that might contain sensitive or private data, the primary concern is to ensure that any data on the device cannot be accessed by unauthorized persons.
Among the options provided:
Remote lock: This option will lock the device remotely, preventing access. However, it does not remove the data and might not be effective if the device is powered off or reset.
Remote wipe: This is the best option as it allows the technician to erase all data from the device remotely, ensuring that sensitive information is not accessible to anyone who finds or steals the device.
Remote access: This option would allow a technician to access the device remotely, but it would not directly prevent unauthorized access or data breaches.
Remote encrypt: Encrypting the device remotely might not be possible if the device is not accessible or turned on, and it does not remove existing data which could be at risk.
Reference: CompTIA A+ Exam Objectives [220-1102] – 3.4: Given a scenario, use best practices to secure a mobile device.
A user is configuring a new SOHO Wi-Fi router for the first time.
Which of the following settings should the user change FIRST?
- A . Encryption
- B . Wi-Fi channel
- C . Default passwords
- D . Service set identifier
C
Explanation:
the user should change the default passwords first when configuring a new SOHO Wi-Fi router1
Which of the following would most likely be used to extend the life of a device?
- A . Battery backup
- B . Electrostatic discharge mat
- C . Proper ventilation
- D . Green disposal
C
Explanation:
Proper ventilation is a factor that can extend the life of a device by preventing overheating and thermal damage to the device’s components. Proper ventilation means ensuring that there is enough airflow around and inside the device to dissipate heat and maintain a suitable temperature for optimal performance. Proper ventilation can be achieved by using fans, heat sinks, vents, or liquid cooling systems, as well as avoiding placing the device near heat sources or in enclosed spaces. Battery backup, electrostatic discharge mat, and green disposal are not factors that can extend the life of a device.
The audio on a user’s mobile device is inconsistent when the user uses wireless headphones and moves around.
Which of the following should a technician perform to troubleshoot the issue?
- A . Verify the Wi-Fi connection status.
- B . Enable the NFC setting on the device.
- C . Bring the device within Bluetooth range.
- D . Turn on device tethering.
C
Explanation:
Bringing the device within Bluetooth range is the best way to troubleshoot the issue of inconsistent audio when using wireless headphones and moving around. Bluetooth is a wireless technology that allows devices to communicate over short distances, typically up to 10 meters or 33 feet. If the device is too far from the headphones, the Bluetooth signal may be weak or interrupted, resulting in poor audio quality or loss of connection.
