Practice Free 220-1102 Exam Online Questions
A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting.
Which of the following should the technician use to assist the user?
- A . VNC
- B . SSH
- C . VPN
- D . RMM
D
Explanation:
The best tool to use to assist the user with viewing the email is RMM, which stands for remote monitoring and management. This is a software that allows the technician to remotely access, monitor, and manage the user’s computer and applications. The technician can use RMM to view the user’s screen, control the mouse and keyboard, and troubleshoot the email issue. The other tools are not suitable for this task. VNC is a software that allows remote desktop sharing, but it requires the user to install and configure it on their computer, which may not be feasible or convenient. SSH is a protocol that allows secure remote access to a command-line interface, but it is not useful for viewing graphical applications such as email. VPN is a technology that creates a secure and encrypted connection over a public network, but it does not provide remote access or control of the user’s computer.
Which of the following system preference items allows a user to enable third-party application installations on macOS 11?
- A . Keychain
- B . Privacy
- C . Accessibility
- D . Spotlight
B
Explanation:
In macOS, the "Privacy" settings under "Security & Privacy" are where users can control which applications are allowed to run, including third-party apps. By default, macOS may restrict apps that are not downloaded from the App Store, but in the Privacy settings, users can enable installations from identified developers or even from any source. The other options like "Keychain" manage passwords and certificates, "Accessibility" deals with assistive technologies, and "Spotlight" is the search feature.
Reference: Apple Support: Safely open apps on your Mac
CompTIA A+ 220-1102 Study Guide (Whizlabs)
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser.
Which of the following is the best solution for a technician to implement?
- A . Disable the browser from sending notifications to the Action Center.
- B . Run a full antivirus scan on the computer.
- C . Disable all Action Center notifications.
- D . Move specific site notifications from Allowed to Block.
A
Explanation:
The best solution for a technician to implement is to disable the browser from sending notifications to the Action Center. This will prevent the random advertisement notifications from appearing in the Windows 10 Action Center, which can be annoying and distracting for the user. The technician can follow these steps to disable the browser notifications1:
Open the browser that is sending the notifications, such as Microsoft Edge, Google Chrome, or Mozilla Firefox.
Go to the browser settings or options menu, and look for the privacy and security section.
Find the option to manage site permissions or notifications, and click on it.
You will see a list of sites that are allowed or blocked from sending notifications to the browser and the Action Center. You can either block all sites from sending notifications, or select specific sites that you want to block or allow.
Save the changes and close the browser settings.
This solution is better than the other options because:
Running a full antivirus scan on the computer (B) is not necessary, as the advertisement notifications are not malicious or harmful, and they are not caused by a virus or malware infection. Running a scan will not stop the notifications from appearing, and it will consume system resources and time.
Disabling all Action Center notifications © is not advisable, as the Action Center is a useful feature that shows notifications and alerts from various apps and system events, such as email, calendar, security, updates, etc. Disabling all notifications will make the user miss important information and reminders, and reduce the functionality of the Action Center.
Moving specific site notifications from Allowed to Block (D) is not the best solution, as it will only stop the notifications from some sites, but not from others. The user may still receive advertisement notifications from other sites that are not blocked, or from new sites that are added to the Allowed list. This solution will also require the user to manually manage the list of sites, which can be tedious and time-consuming.
Reference: 1: How to Disable Annoying Browser Notifications – PCMag
Which of the following scripting languages is the most commonly used for system administration on Windows operating systems?
- A . PowerShell
- B . Python
- C . Bash
- D . JavaScript
Multiple users routinely record log-in information in readily accessible areas.
Which of the following is the best way to mitigate this issue?
- A . Trusted sources
- B . Valid certificates
- C . User training
- D . Password manager
C
Explanation:
Using a password manager is the best way to mitigate the issue of users recording their login information in accessible areas. Password managers securely store and encrypt passwords and login details, reducing the need for users to write down or remember multiple complex passwords. This approach enhances security by encouraging the use of strong, unique passwords for different accounts without the risk of forgetting them or the unsafe practice of writing them down. Trusted sources, valid certificates, and user training are important security measures but do not directly address the problem of managing multiple secure passwords as effectively as a password manager does.
A technician has identified malicious traffic originating from a user’s computer.
Which of the following is the best way to identify the source of the attack?
- A . Investigate the firewall logs.
- B . Isolate the machine from the network.
- C . Inspect the Windows Event Viewer.
- D . Take a physical inventory of the device.
B
Explanation:
Isolating the machine from the network is the best way to identify the source of the attack, because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating the machine can also help preserve the evidence of the attack, such as the malware files, the network connections, the registry entries, or the system logs. By isolating the machine, a technician can safely analyze the machine and determine the source of the attack, such as a phishing email, a compromised website, a removable media, or a network vulnerability.
A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email.
Which of the following is the most effective way to prevent this issue from reoccurring?
- A . Spam filtering
- B . Malware prevention software
- C . End user education
- D . Stateful firewall inspection
C
Explanation:
To prevent ransomware attacks via email, the most effective way is End user education (C). Educating users about the dangers of phishing emails, how to recognize suspicious emails, and the importance of not clicking on unknown links or attachments can significantly reduce the risk of ransomware infections. Awareness and training can empower users to act as the first line of defense against such cyber threats
A call center technician receives a call from a user asking how to update Windows.
Which of the following describes what the technician should do?
- A . Have the user consider using an iPad if the user is unable to complete updates
- B . Have the user text the user’s password to the technician.
- C . Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
- D . Advise the user to wait for an upcoming, automatic patch
C
Explanation:
The technician should guide the user to update Windows through the built-in "Check for Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install them.
Which of the following is the most likely to use NTFS as the native filesystem?
- A . macOS
- B . Linux
- C . Windows
- D . Android
C
Explanation:
NTFS stands for New Technology File System, which is a proprietary file system developed by Microsoft4. NTFS is the default file system for the Windows NT family of operating systems, which includes Windows 10, Windows Server 2019, and other versions5. NTFS provides features such as security, encryption, compression, journaling, and large volume support45. NTFS is not the native file system for other operating systems, such as macOS, Linux, or Android, although some of them can read or write to NTFS volumes with third-party drivers or tools
Which of the following features can a technician use to ensure users are following password length requirements?
- A . Group Policy
- B . Log-on script
- C . Access control list
- D . Security groups
A
Explanation:
Group Policy is a feature in Windows that allows network administrators to manage and configure operating system, application settings, and user settings in an Active Directory environment. It can enforce password policies across the network, including password length requirements, making it the best tool for ensuring compliance with security policies.
