Practice Free 220-1102 Exam Online Questions
A user’s corporate phone was stolen, and the device contains company trade secrets.
Which of the following technologies should be implemented to mitigate this risk? (Select TWO).
- A . Remote wipe
- B . Firewall
- C . Device encryption
- D . Remote backup
- E . Antivirus
- F . Global Positioning System
A,C
Explanation:
Remote wipe is a feature that allows data to be deleted from a device or system remotely by an administrator or owner1. It is used to protect data from being compromised if the device is lost, stolen, or changed hands1. Device encryption is a feature that helps protect the data on a device by making it unreadable to unauthorized users2. It requires a key or a password to access the data2. Both features can help mitigate the risk of losing company trade secrets if a corporate phone is stolen.
References:
1: How to remote wipe Windows laptop (https://www.thewindowsclub.com/remote-wipe-windows-10)
2: Device encryption in Windows (https://support.microsoft.com/en-us/windows/device-encryption-in-windows-ad5dcf4b-dbe0-2331-228f-7925c2a3012d)
An analyst needs GUI access to server software running on a macOS server.
Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
- A . RDP through RD Gateway
- B . Apple Remote Desktop
- C . SSH access with SSH keys
- D . VNC with username and password
D
Explanation:
VNC (Virtual Network Computing) is a platform-independent protocol that enables remote control of another computer’s desktop. It uses the Remote Frame Buffer (RFB) protocol to provide access to the graphical user interface of one computer on another machine. Since it’s platform-independent, it would allow a Windows machine to interact with the macOS server’s GUI. The VNC connection can be secured using a username and password.
Apple Remote Desktop (B) is a proprietary system developed by Apple for remotely managing macOS systems, but it’s not directly compatible with Windows systems.
RDP through RD Gateway (A) and SSH access with SSH keys (C) are more suitable for Windows-to-Windows and Linux-to-Linux connections, respectively, and do not provide GUI access by default.
A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially.
Which of the following considerations was overlooked?
- A . OS compatibility
- B . Quality of service
- C . 32- vs. 64-bit architecture
- D . Storage requirements
B
Explanation:
The performance degradation following the launch of a new external web server suggests that Quality of Service (QoS) considerations were overlooked. QoS settings help prioritize traffic to ensure that critical services like web servers receive the bandwidth they need without negatively impacting the overall network performance. Without proper QoS configuration, the new server’s traffic could overwhelm the firewall, leading to widespread performance issues.
A technician is working at a client office site and the technician’s family member repeatedly calls and texts about a non-emergency situation.
Which of the following should the technician do?
- A . Step aside and answer.
- B . Put the phone on silent.
- C . Text a reply.
- D . Ignore the phone and continue working.
B
Explanation:
In a professional work environment, distractions should be minimized, especially when working onsite for a client. The best approach is to put the phone on silent (Option B) to avoid interruptions while remaining professional.
Step aside and answer (Option A): Not recommended as it disrupts work and appears unprofessional.
Text a reply (Option C): While this may seem reasonable, it still causes a distraction.
Ignore the phone and continue working (Option D): While focusing on work is important, completely ignoring calls may not be the best approach. Silent mode ensures work continuity while allowing the technician to check messages later.
Reference: CompTIA A+ Core 2 (220-1102) Exam Objectives – 4.6: Given a scenario, apply best practices associated with documentation and professionalism.
A company would like to implement multifactor authentication for all employees at a minimal cost.
Which of the following best meets the company’s requirements?
- A . Biometrics
- B . Soft token
- C . Access control lists
- D . Smart card
B
Explanation:
A soft token, also known as a software token or an OTP (one-time password) app, is a type of multifactor authentication that generates a temporary code or password on a user’s device, such as a smartphone or a tablet. The user must enter this code or password along with their username and password to access their account or service. A soft token can help improve security by adding an extra layer of verification and preventing unauthorized access even if the user’s credentials are compromised. A soft token can also be implemented at a minimal cost, as it does not require any additional hardware or infrastructure. Biometrics, access control lists, and smart card are not types of multifactor authentication that can be implemented at a minimal cost.
A technician has been tasked with using the fastest and most secure method of logging in to laptops.
Which of the following log-in options meets these requirements?
- A . PIN
- B . Username and password
- C . SSO
- D . Fingerprint
D
Explanation:
Fingerprint login utilizes biometric authentication, which is typically faster and more secure than traditional methods such as PIN, username/password, or Single Sign-On (SSO).
A fingerprint is unique to each individual, making it a very secure method of authentication. It’s also quick, as it simply involves placing a finger on a scanner rather than typing in information.
It’s important to note that while biometrics like fingerprint scanning are generally secure, they are not infallible and should ideally be used as part of a multi-factor authentication strategy to ensure the highest level of security.
A technician thinks a customer’s computer may have a malware infection and wants to determine whether the computer is in communication with any other machines.
Which of the following commands should the technician use?
- A . netstat
- B . tracert
- C . net use
- D . net user
- E . nslookup
A
Explanation:
The netstat command displays active TCP/IP network connections on a computer. It shows current connections between the infected machine and any external IP addresses, which can help the technician detect communication with suspicious or malicious hosts. This is crucial in malware investigations to identify if the system is contacting command and control servers. tracert traces the path to a network host but doesn’t show active connections. net use manages shared resources, net user manages user accounts, and nslookup resolves DNS names but doesn’t show communication. Core 2 tools for network troubleshooting list netstat as vital for identifying network activity related to malware infections.
A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies.
Which of the following is the most important component?
- A . Dedicated GPU
- B . DDR5 SODIMM
- C . NVMe disk
- D . 64-bit CPU
A
Explanation:
A dedicated GPU (graphics processing unit) is the most important component for rendering 3-D promotional movies, as it can handle the complex calculations and graphics operations required for creating realistic and high-quality images. A dedicated GPU has its own memory and processor, which are optimized for graphics tasks. A dedicated GPU can also support multiple monitors, high resolutions, and advanced features such as ray tracing12.
Reference: 1 What Kind of Computer Do You Need for 3D Rendering in 2021?(https://kitbash3d.com/a/blog/best-computer-for-3d-rendering-2021)2 How to Choose the Best Hardware for a 3D Artist – GarageFarm(https://garagefarm.net/blog/how-to-choose-the-best-hardware-for-a-3d-artist).
A change advisory board just approved a change request.
Which of the following is the MOST likely next step in the change process?
- A . End user acceptance
- B . Perform risk analysis
- C . Communicate to stakeholders
- D . Sandbox testing
C
Explanation:
Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).
- A . Temperature levels
- B . Location of the servers
- C . Humidity levels
- D . Noise levels
- E . Lighting levels
- F . Cable management
AC
Explanation:
Temperature and humidity levels are the most important environmental factors to consider when planning the configuration of a data center, as they directly affect the performance, reliability, and energy efficiency of the IT equipment. Excessive heat or moisture can cause overheating, corrosion, condensation, or static electricity, which can damage the hardware and lead to data loss or service disruption. Therefore, data centers need to monitor and control the temperature and humidity levels within the recommended ranges by using various cooling systems, airflow management, and sensors12.
Reference: 1 5 Factors to Consider for Data Center Environmental Monitoring ( https://community.fs.com/blog/5-factors-to-consider-for-data-center-environmental-monitoring.html)2 Data Center Environmental standards and Controls – DataSpan(https://dataspan.com/blog/data-center-environmental-standards/).
