Practice Free 220-1102 Exam Online Questions
A technician needs to update the software on several hundred Mac laptops.
Which of the following is the best method to complete the task?
- A . SSH
- B . MDM
- C . RDP
- D . SFTP
B
Explanation:
For updating software on several hundred Mac laptops, the best method is Mobile Device
Management (MDM). MDM solutions allow administrators to remotely manage and update software across multiple devices efficiently, making it an ideal choice for handling software updates on a large scale.
A suite of security applications was installed a few days ago on a user’s home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid.
Which of the following should be checked FIRST?
- A . Services in Control Panel to check for overutilization
- B . Performance Monitor to check for resource utilization
- C . System File Checker to check for modified Windows files
- D . Event Viewer to identify errors
B
Explanation:
The Performance Monitor tool in Windows provides real-time information about hardware resources (such as CPU, disk, network, memory) and software resources (such as files and running applications) that you can use to identify system performance issues.
Given that the computer has been running slowly since the security suite was installed and the hard drive activity light is constantly solid, it’s possible that the security software is using a significant amount of system resources. By using the Performance Monitor, you can identify if the software is causing high disk usage, high CPU usage, or other resource utilization issues.
The other options, while potentially helpful in troubleshooting other issues, are less likely to be the first step in this case:
After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists.
Which of the following actions should the user take next?
- A . Shut down and cold start the smartphone
- B . Delete the email containing the attachment
- C . Wipe the device and reset it to factory defaults
- D . Uninstall and reinstall the mobile browser
C
Explanation:
In this case, abnormal behavior after opening a suspicious email suggests malware might have infected the device. A full factory reset is recommended to remove any persistent malware, especially when a restart does not resolve the issue. Deleting the email or reinstalling the browser will not remove the malware already on the device.
Reference: Core 2, Domain 2.3 – Malware detection and removal.
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?
- A . Full
- B . Mirror
- C . Incremental
- D . Differential
C
Explanation:
The law firm wants to retain more versions of the backups when possible, so the best backup method for the technician to implement in this scenario would be Incremental backup. Incremental backups only save the changes made since the last backup, which allows for more frequent backups and minimizes the amount of storage required. This would allow the law firm to retain more than three versions of backups without risking backup failure.
To retain more versions of backups, the technician should implement an Incremental backup method12
An incremental backup method only backs up the data that has changed since the last backup, so it requires less storage space than a full backup12
A proxy server is required for internet access from a corporate network.
Which of the following should a technician perform to manually configure a Windows 10 device for internet access?
- A . Add the proxy server’s URL and IP address to the computer’s hosts file under C:windowsSystem32driversetc.
- B . Enable the use of a proxy server and enter an address for it under Control Panel > Internet Options > Connections > LAN settings.
- C . Open a command prompt and run ipconfig /release, followed by ipconfig /renew.
- D . Set the proxy server as the default gateway under the computer’s network connection IP settings by selecting Manual, then entering the proxy server’s IP address under Gateway.
B
Explanation:
Detailed Explanation with Core 2
Reference: Configuring a proxy server in Windows 10 can be done through the Internet Options under LAN settings, where the user can enable and enter a proxy server’s address. This aligns with Core 2’s objectives of configuring network settings in a Windows environment (Core 2 Objective 1.4).
A user accidentally deleted an important presentation from the desktop of a workstation. The presentation was created after the most recent daily corporate backup. As a result, the technician is unable to restore the presentation.
Which of the following should the technician enable to prevent this issue from occurring in the future?
- A . Incremental backup
- B . File History
- C . System Restore
- D . BitLocker
A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic.
Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?
- A . Resource Monitor
- B . Performance Monitor
- C . Command Prompt
- D . System Information
A
Explanation:
Resource Monitor is a tool that shows the network activity of each process on a Windows machine, including the TCP connections and the sent and received bytes. Performance Monitor is a tool that shows the performance metrics of the system, such as CPU, memory, disk and network usage. Command Prompt is a tool that allows running commands and scripts on a Windows machine. System Information is a tool that shows the hardware and software configuration of a Windows machine.
Verified References: https://www.comptia.org/blog/how-to-use-resource-monitor https://www.comptia.org/certifications/a
A technician is investigating options to secure a small office’s wireless network. One requirement is to allow automatic log-ins to the network using certificates instead of passwords.
Which of the following should the wireless solution have in order to support this feature?
- A . RADIUS
- B . AES
- C . EAP-EKE
- D . MFA
A
Explanation:
RADIUS is the correct answer for this question. RADIUS stands for Remote Authentication Dial-In User Service, and it is a protocol that provides centralized authentication, authorization, and accounting for wireless networks. RADIUS can support certificate-based authentication, which allows users to log in to the network automatically without entering passwords. RADIUS also provides other benefits, such as enforcing security policies, logging user activities, and managing network access. AES, EAP-EKE, and MFA are not wireless solutions, but rather encryption algorithms, authentication methods, and security factors, respectively.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 23 CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459
Which of the following only has a web browser interface?
- A . Linux
- B . Microsoft Windows
- C . iOS
- D . Chromium
D
Explanation:
Chromium is an operating system that only has a web browser interface. Chromium is an open-source project that provides the source code and framework for Chrome OS, which is a Linux-based operating system developed by Google. Chromium and Chrome OS are designed to run web applications and cloud services through the Chrome web browser, which is the only user interface available on the system. Chromium and Chrome OS are mainly used on devices such as Chromebooks, Chromeboxes and Chromebits. Linux is an operating system that does not only have a web browser interface but also a graphical user interface and a command-line interface. Linux is an open-source and customizable operating system that can run various applications and services on different devices and platforms. Linux can also support different web browsers, such as Firefox, Opera and Chromium. Microsoft Windows is an operating system that does not only have a web browser interface but also a graphical user interface and a command-line interface. Microsoft Windows is a proprietary and popular operating system that can run various applications and services on different devices and platforms. Microsoft Windows can also support different web browsers, such as Edge, Internet Explorer and Chrome. iOS is an operating system that does not only have a web browser interface but also a graphical user interface and a voice-based interface. iOS is a proprietary and mobile operating system developed by Apple that can run various applications and services on devices such as iPhone, iPad and iPod Touch. iOS can also support different web browsers, such as Safari, Firefox and Chrome. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.1
A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms.
Which of the following was MOST likely used to compromise the server?
- A . Keylogger
- B . Ransomware
- C . Boot sector virus
- D . Cryptomining malware
D
Explanation:
Cryptomining malware is a type of malicious program that uses the CPU resources of a compromised server to generate cryptocurrency, such as Bitcoin or Ethereum. It can cause extremely high CPU utilization and network traffic to the IP address of the cryptocurrency service. Keylogger, ransomware and boot sector virus are other types of malware, but they do not cause the same symptoms as cryptomining malware.
Verified References: https://www.comptia.org/blog/what-is-cryptomining https://www.comptia.org/certifications/a
