Practice Free 220-1102 Exam Online Questions
A technician is troubleshooting a Windows system that is having issues with the OS loading at startup.
Which of the following should the technician do to diagnose the issue?
- A . Enable boot logging on the system.
- B . Launch the last known-good configuration.
- C . Check the system resource usage in Task Manager.
- D . Run the sfc /scannow command.
- E . Use the Event Viewer to open the application log
A
Explanation:
When troubleshooting a Windows system that is experiencing issues during the OS loading phase at startup, enabling boot logging is a practical step. Boot logging creates a record of all drivers and services that are loaded (or attempted to be loaded) during the startup process. This record, typically named ntbtlog.txt, can be reviewed to identify any drivers or services that failed to load, which could be contributing to the startup issues. This diagnostic step helps pinpoint the problematic component(s) and facilitates targeted troubleshooting to resolve the OS loading issues.
Which of the following script types is used with the Python language by default?
- A . .ps1
- B . .vbs
- C . .bat
- D . .py
D
Explanation:
The script type that is used with the Python language by default is .py. .py is a file extension that indicates a Python script file that contains Python code that can be executed by a Python interpreter or compiler. Python is a high-level, general-purpose and interpreted programming language that can be used for various applications, such as web development, data analysis, machine learning and automation. .ps1 is a file extension that indicates a PowerShell script file that contains PowerShell code that can be executed by a PowerShell interpreter or compiler. PowerShell is a task-based, command-line and scripting language that can be used for system administration and automation on Windows systems. .vbs is a file extension that indicates a VBScript file that contains VBScript code that can be executed by a VBScript interpreter or compiler. VBScript is an Active Scripting language that can be used for web development and automation on Windows systems. .bat is a file extension that indicates a batch file that contains a series of commands that can be executed by a command-line interpreter or shell on Windows systems. Batch files can be used for system administration and automation on Windows systems. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 4.3
A user submits a request to have a graphics application installed on a desktop. When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS’ is displayed.
Which of the following is the most likely reason for this error message?
- A . The graphics card driver needs to be updated
- B . The application installer is 64-bit.
- C . The installation requires administrative rights.
- D . The disk space is inadequate.
C
Explanation:
The most likely reason for an error message stating "Not compatible with OS" during a software installation is that the installation requires administrative rights. Many software installations, especially those that affect system files or install drivers, require administrative privileges to execute correctly. Without these rights, the installer cannot make the necessary changes to the system, leading to such error messages.
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue.
Which of the following should the technician confirm NEXT as part of the troubleshooting process?
- A . If airplane mode is enabled
- B . If Bluetooth is disabled
- C . If NFC is enabled
- D . If WiFi is enabled
- E . If location services are disabled
C
Explanation:
NFC stands for Near Field Communication, and it is a wireless technology that allows your phone to act as a contactless payment device, among other things2. Payment applications that allow payments to be made with a mobile device usually rely on NFC to communicate with the payment terminal1. Therefore, if NFC is disabled on the phone, the payment will not work.
To enable NFC on an Android phone, you need to follow these steps3:
✑ On your Android device, open the Settings app.
✑ Select Connected devices.
✑ Tap on Connection preferences.
✑ You should see the NFC option. Toggle it on.
The other options are not directly related to using a payment application with a mobile device. Airplane mode is a setting that disables all wireless communication on the phone, including NFC4, but it also affects calls, texts, and internet access. Bluetooth is a wireless technology that allows you to connect your phone with other devices such as headphones or speakers, but it is not used for contactless payments. Wi-Fi is a wireless technology that allows you to access the internet or a local network, but it is also not used for contactless payments. Location services are a feature that allows your phone to determine your geographic location using GPS or other methods, but they are not required for contactless payments.
Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?
- A . Remote Assistance
- B . Remote Desktop Protocol
- C . Screen Sharing
- D . Virtual Network Computing
C
Explanation:
Screen Sharing is the default system tool that can be used in macOS to allow the technician to view the screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their Mac screen with another Mac on the network. The user can enable screen sharing in the System Preferences > Sharing pane, and then allow other users to request or enter a password to access their screen1. The technician can launch the Screen Sharing app from the Spotlight search or the Finder sidebar, and then enter the user’s name, address, or Apple ID to connect to their screen2. Remote Assistance is a Windows feature that allows users to invite someone to help them with a problem on their PC3. Remote Desktop Protocol (RDP) is a protocol that allows users to connect to a remote computer over a network4. Virtual Network Computing (VNC) is a technology that allows users to share their screen with other devices using a VNC viewer app1. These are not default system tools in macOS, although they can be used with third-party software or settings.
References:
1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-mac-mh14066/mac
2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-with-another-mac/
3: https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remote-connection-b077e31a-16f4-2529-1a47-21f6a9040bf3
4: https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-protocol
A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday.
Which of the following types of attacks does this describe?
- A . Phishing
- B . Dumpster diving
- C . Tailgating
- D . Evil twin
A
Explanation:
Phishing is the correct answer for this question. Phishing is a type of attack that uses fraudulent emails or other messages to trick users into revealing sensitive information or installing malicious software. Phishing emails often impersonate legitimate entities or individuals and offer incentives or threats to lure users into clicking on malicious links or attachments. In this scenario, the user received a removable USB device in the mail as a prize, which could be a phishing attempt to infect the user’s computer with malware or gain access to the user’s data. Dumpster diving, tailgating, and evil twin are not correct answers for this question. Dumpster diving is a type of attack that involves searching through trash bins or recycling containers to find discarded documents or devices that contain valuable information. Tailgating is a type of attack that involves following an authorized person into a restricted area without proper identification or authorization. Evil twin is a type of attack that involves setting up a rogue wireless access point that mimics a legitimate one to intercept or manipulate network traffic.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25 [CompTIA Security+ SY0-601 Certification Study Guide], page 1004
Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).
- A . Biometric lock
- B . Badge reader
- C . USB token
- D . Video surveillance
- E . Locking rack
- F . Access control vestibule
A,D
Explanation:
Biometric locks provide a high level of security because they require unique physical characteristics such as fingerprints or retinal scans to grant access. This makes them difficult to bypass because these characteristics are unique to each individual.
Video surveillance is another important layer of physical security that can deter unauthorized access and provide a record of who enters and exits the server room. This can be useful for investigative purposes if any problems occur.
Although badge readers (B), USB tokens (C), and access control vestibules (F) can be used as part of a comprehensive security strategy, they can potentially be bypassed or stolen, making them less secure than biometric locks. Locking racks (E) protect the hardware within the data center but do not limit access to the room itself.
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times.
Which of the following should the technician do to selectively prevent programs from loading?
- A . Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin
- B . Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
- C . Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup
- D . Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.
D
Explanation:
This is the most effective way to selectively prevent programs from loading on a Windows 10 machine. The Startup tab can be accessed by opening Task Manager and then selecting the Startup tab. From there, the technician can methodically disable items that are currently listed as enabled, reboot the machine, and check for issue resolution at each startup. If the issue persists, the technician can then move on to disabling the next item on the list.
Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?
- A . Data integrity form
- B . Valid operating system license
- C . Documentation of an incident
- D . Chain of custody
D
Explanation:
Chain of custody is a process that helps ensure that a piece of evidence extracted from a PC is admissible in a court of law. Chain of custody refers to the documentation and tracking of who handled, accessed, modified, or transferred the evidence, when, where, why, and how. Chain of custody can help establish the authenticity, integrity, and reliability of the evidence, as well as prevent tampering, alteration, or loss of the evidence. Data integrity form, valid operating system license, and documentation of an incident are not processes that can ensure that a piece of evidence extracted from a PC is admissible in a court of law.
A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week.
Which of the following tools should a technician use to remediate the issue?
- A . Disk Defragment
- B . Registry Editor
- C . System Information
- D . Disk Cleanup
A
Explanation:
Over time, especially with frequent opening, modification, and saving of large files, a hard disk drive (HDD) can become fragmented. Fragmentation occurs when pieces of individual files are scattered across the disk, leading to longer read and write times, which can significantly slow down the computer. Disk defragmentation reorganizes these fragmented files, placing the pieces closer together on the drive, which improves access time and overall system performance.
Disk Defragment: Using the Disk Defragment tool on a Windows 10 system with an HDD will help in reorganizing the data more efficiently, thus potentially remedying the slow performance issue.
The Registry Editor (B) is a tool that allows for the viewing and editing of the Windows registry and is generally not used for performance improvement but rather for system settings and configuration adjustments. System Information (C) provides a detailed look at the computer’s hardware and system details but does not offer tools for performance improvement. Disk Cleanup (D) can help free up space on the hard drive by removing temporary files and system files that are no longer needed, which can indirectly improve performance but is not the primary tool for addressing fragmentation.
