Practice Free 220-1102 Exam Online Questions
An administrator has submitted a change request for an upcoming server deployment.
Which of the following must be completed before the change can be approved?
- A . Risk analysis
- B . Sandbox testing
- C . End user acceptance
- D . Lessons learned
A
Explanation:
Risk analysis is the process of identifying and evaluating the potential threats and impacts of a change on the system, network, or service. It is an essential step before approving a change request, as it helps to determine the level of risk, the mitigation strategies, and the contingency plans. Risk analysis also helps to prioritize the change requests based on their urgency and importance12.
Reference: 1 The Change Request Process and Best Practices ( https://www.processmaker.com/blog/it-change-request-process-best-practices/)
2 Risk Assessment and Analysis Methods: Qualitative and Quantitative(https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/risk-assessment-and-analysis-methods).
Which of the following should be done NEXT?
- A . Send an email to Telecom to inform them of the issue and prevent reoccurrence.
- B . Close the ticket out.
- C . Tell the user to take time to fix it themselves next time.
- D . Educate the user on the solution that was performed.
D
Explanation:
educating the user on the solution that was performed is a good next step after resolving an issue. This can help prevent similar issues from happening again and empower users to solve problems on their own.
A remote user is having issues accessing an online share.
Which of the following tools would MOST likely be used to troubleshoot the Issue?
- A . Screen-sharing software
- B . Secure shell
- C . Virtual private network
- D . File transfer software
A
Explanation:
Screen-sharing software is a tool that allows a technician to remotely view and control a user’s screen over the internet. It can be used to troubleshoot issues with accessing an online share, as well as other problems that require visual inspection or guidance. Secure shell (SSH) is a protocol that allows remote access and command execution on another device, but it does not allow screen-sharing. Virtual private network (VPN) is a protocol that creates a secure tunnel between two devices over the internet, but it does not allow remote troubleshooting. File transfer software is a tool that allows transferring files between two devices over the internet, but it does not allow screen-sharing.
Verified References: https://www.comptia.org/blog/what-is-screen-sharing-software https://www.comptia.org/certifications/a
A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment.
Which of the following should the e-waste company provide the business7
- A . Non-disclosure agreement
- B . Certification of destruction
- C . Low-level formatting
- D . Shredding/drilling
B
Explanation:
When disposing of e-waste, it is important to ensure that the data on the equipment is securely destroyed and that the disposal process complies with environmental regulations.
Non-disclosure agreement: Relates to confidentiality, not disposal.
Certification of destruction: The correct document verifying that the equipment has been disposed of in accordance with regulations and standards, ensuring data is irretrievably destroyed.
Low-level formatting: A method to wipe data but does not guarantee compliance with e-waste disposal regulations.
Shredding/drilling: Physical destruction methods that might be used, but certification of destruction is the documentation needed.
Reference: CompTIA A+ Exam Objectives [220-1102] – 3.7: Explain the importance of physical security measures.
A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted.
Which of the following tools can be used?
- A . afc
- B . ehkdsk
- C . git clone
- D . zobocopy
D
Explanation:
A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection.
Which of the following Windows versions will MOST likely be selected?
- A . Home
- B . Pro
- C . Pro for Workstations
- D . Enterprise
D
Explanation:
When selecting a new Windows operating system for a large company that needs built-in encryption and endpoint protection, the Enterprise edition is the most likely choice. This edition provides advanced security features such as Windows Defender Advanced Threat Protection (ATP), AppLocker, and BitLocker Drive Encryption. These features can help to protect the company’s data and endpoints against malware attacks, unauthorized access, and data theft.
The Home and Pro editions of Windows do not include some of the advanced security features provided by the Enterprise edition, such as Windows Defender ATP and AppLocker. The Pro for Workstations edition is designed for high-performance and high-end hardware configurations, but it does not provide additional security features beyond those provided by the Pro edition.
A technician is tasked with configuring a computer for a visually impaired user.
Which of the following utilities should the technician use?
- A . Device Manager
- B . System
- C . Ease of Access Center
- D . Programs and Features
C
Explanation:
The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of Access Center, the technician can turn on options like high contrast display, screen magnification, and screen reader software to help the user better interact with the computer.
A technician installs a Bluetooth headset for a user. During testing, the sound is still coming from the speaker on the computer. The technician verifies the headset shows up in Device Manager.
Which of the following would the technician most likely do to fix this issue?
- A . Update the drivers for the wireless headset.
- B . Replace the battery on the headset, and try again later.
- C . Verify that the sound is not muted in the control panel.
- D . Change the headset as the default device in sound settings.
D
Explanation:
Reference: CompTIA A+ Certification Core 2 220-1102, Objective 1.7 (Bluetooth and Audio Device Configuration).
