Practice Free 220-1102 Exam Online Questions
While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning.
Which of the following steps should a technician take next? (Select two).
- A . Isolate the computer from the network
- B . Enable the firewall service.
- C . Update the endpoint protection software
- D . Use System Restore to undo changes.
- E . Delete the browser cookies
- F . Run sfc /scannow.
A
Explanation:
When encountering a warning about antivirus protection malfunctioning, the first step should be to isolate the computer from the network to prevent potential spread of malware. Updating the endpoint protection software is also crucial to ensure the latest virus definitions and security features are in place to effectively identify and remove the threat.
Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred.
Which of the following steps should the technician try FIRST to correct the issue?
- A . Rebuild the Windows profiles.
- B . Restore the computers from backup.
- C . Reimage the computers.
- D . Run the System File Checker.
D
Explanation:
The technician should run the System File Checker (SFC) first to correct file corruption errors on computers after a power outage. SFC is a command-line utility that scans for and repairs corrupted system files. It can be run from the command prompt or from the Windows Recovery Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging the computers are more drastic measures that should be taken only if SFC fails to correct the issue1
A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC.
Which of the following is the most appropriate command to use to fix the issue?
- A . msconfig
- B . chkdsk
- C . sfc
- D . diskpart
- E . mstsc
C
Explanation:
The sfc command is a tool for scanning and repairing system files that are corrupted or missing on Windows operating systems12. System files are essential files that are required for the proper functioning of the operating system, such as the GUI, drivers, services, and applications. If system files are damaged or deleted, the operating system may fail to start or run properly, causing errors, crashes, or blue screens.
The sfc command can be used to fix the issue of the PC that is unable to start the GUI, assuming that the problem is caused by corrupted or missing system files. The sfc command can be run from the command prompt, which can be accessed by booting the PC from the installation media, choosing the repair option, and selecting the command prompt option3. The sfc command can be used with different switches, such as /scannow, /verifyonly, /scanfile, or /offbootdir, depending on the situation and the desired action4. The most common switch is /scannow, which scans all the system files and repairs any problems that are found5. The syntax of the sfc command with the /scannow switch is: sfc /scannow
The sfc command will then scan and repair the system files, and display the results on the screen. If the sfc command is able to fix the system files, the PC should be able to start the GUI normally after rebooting. If the sfc command is unable to fix the system files, the PC may need further troubleshooting or a clean installation of Windows.
Reference: 1: CompTIA A+ Certification Exam Core 2 Objectives, page 10 2: CompTIA A+ Core 2 (220-1102) Complete Video Course, Lesson 26 Documentation 3: How to use SFC Scannow to repair Windows system files 4: SFC Command (System File Checker) 5: How to Repair Windows 10 using Command Prompt
A technician is troubleshooting a customer’s PC and receives a phone call. The technician does not take the call and sets the phone to silent.
Which of the following BEST describes the technician’s actions?
- A . Avoid distractions
- B . Deal appropriately with customer’s confidential material
- C . Adhere to user privacy policy
- D . Set and meet timelines
A
Explanation:
The technician has taken the appropriate action by not taking the call and setting the phone to silent in order to avoid any distractions and remain focused on the task at hand. This is a good example of how to maintain focus and productivity when working on a customer’s PC, and will help to ensure that the job is completed in a timely and efficient manner.
A technician is installing new software on a macOS computer.
Which of the following file types will the technician MOST likely use?
- A . .deb
- B . .vbs
- C . .exe
- D . .app
D
Explanation:
The file type that the technician will MOST likely use when installing new software on a macOS computer is .app. This is because .app is the file extension for applications on macOS1.
A technician is asked to resize a partition on the internal storage drive of a computer running macOS.
Which of the followings tools should the technician use to accomplish this task?
- A . Consoltf
- B . Disk Utility
- C . Time Machine
- D . FileVault
B
Explanation:
The technician should use Disk Utility to resize a partition on the internal storage drive of a computer running macOS. Disk Utility is a built-in utility that allows users to manage disks, partitions, and volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to format disks and volumes.
Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).
- A . Licensing agreements
- B . Chain of custody
- C . Incident management documentation
- D . Data integrity
- E . Material safety data sheet
- F . Retention requirements
B,D
Explanation:
Which of the following protects a mobile device against unwanted access when it is left unattended?
- A . PIN code
- B . OS updates
- C . Antivirus software
- D . BYOD policy
A
Explanation:
A PIN code is a numeric password that protects a mobile device against unwanted access when it is left unattended. It requires the user to enter the correct code before unlocking the device. OS updates, antivirus software and BYOD policy are other security measures for mobile devices, but they do not prevent unauthorized access when the device is left unattended.
Verified References: https://www.comptia.org/blog/mobile-device-security https://www.comptia.org/certifications/a
After a recent mobile OS upgrade to a smartphone, a user attempts to access their corporate email, but the application does not open. A technician restarts the smartphone, but the issue persists.
Which of the following is the most likely way to resolve the issue?
- A . Updating the failed software
- B . Registering the smartphone with an MDM solution
- C . Installing a third-party client
- D . Clearing the cache partition
A
Explanation:
Comprehensive and Detailed In-Depth
When a mobile OS is updated, some applications may become incompatible or corrupted due to changes in system files. The best solution is to update the failed software, as the app developer may have released a patch to resolve compatibility issues.
B. Registering the smartphone with an MDM solution C Incorrect. MDM (Mobile Device Management) helps with security policies but does not fix application compatibility issues.
C. Installing a third-party client C Incorrect. Using a different app may work but does not resolve the root cause of the issue.
D. Clearing the cache partition C While clearing the cache can help with performance, it is unlikely to resolve an application not opening due to an OS update.
Reference: CompTIA A+ 220-1102, Objective 1.5 C Common Mobile Device Issues and Troubleshooting
A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive.
Which of the following Control Panel utilities should the user select to enable connectivity to the device?
- A . Devices and Printers
- B . Administrative Tools
- C . Network and Sharing Center
- D . Programs and Features
C
Explanation:
The Network and Sharing Center in the Control Panel is the central place to manage network connections and settings in Windows. When facing issues with accessing a mapped drive, this utility allows users to review and adjust network settings, making it possible to resolve connectivity problems. It provides options to view network status, set up new connections, change adapter settings, and troubleshoot network problems, which can help in enabling connectivity to the mapped drive on the Windows XP machine.
