Practice Free 220-1102 Exam Online Questions
A technician needs to perform maintenance on a switch.
Which of the following is the best method for this task?
- A . Videoconferencing software
- B . Phone call
- C . Secure Shell
- D . Virtual private network
C
Explanation:
The best method to perform maintenance on a network switch is using Secure Shell (SSH). SSH provides secure, encrypted command-line access to network devices remotely, enabling configuration changes and diagnostics without exposing credentials or data to interception. Videoconferencing and phone calls are communication tools, not management methods. A VPN creates a secure tunnel but does not directly manage devices. Core 2 networking and security domains highlight SSH as the preferred secure protocol for remote switch administration, supporting operational security best practices.
A user calls a technician and asks for help with setting up a connection to a printer application. The technician has never dealt with secure print but has directions that will help guide the user.
Which of the following techniques should the technician use?
- A . Express to the user that this is the technician’s first experience with the application.
- B . Maintain a positive attitude and project confidence.
- C . Use technical jargon so the user is confident in the technician’s skills.
- D . Send the user the directions to connect.
B
Explanation:
Maintaining a positive attitude and projecting confidence is essential in customer support, especially when the technician is unfamiliar with the specific application. This approach reassures the user and fosters trust. Expressing inexperience (A) may reduce user confidence. Using excessive technical jargon (C) can confuse the user. Simply sending directions (D) might not be sufficient for the user to set up correctly. The Core 2 operational procedures emphasize professionalism, effective communication, and customer service skills as vital components of successful technical support interactions.
Users report that a network printer intermittently goes offline during the day.
Which of the following commands should the technician use to confirm whether the printer has connectivity issues?
- A . ping
- B . netstat
- C . net
- D . nslookup
A
Explanation:
To confirm whether a network printer has connectivity issues, the technician should use:
ping: This command checks the connectivity to the printer by sending packets and measuring the response time. It helps determine if the printer is reachable on the network.
netstat: Provides statistics and current network connections but does not directly confirm connectivity to a specific device.
net: Used for network resources management but not specifically for checking connectivity.
nslookup: Used for querying DNS to obtain domain name or IP address mapping, not for checking
connectivity.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario, use networking tools.
Network troubleshooting commands documentation.
A user’s laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows.
Which of the following is the first step a technician should take to resolve the issue?
- A . Scan for malware and ransomware.
- B . Perform a system restore.
- C . Check the network utilization.
- D . Update the antivirus software.
A
Explanation:
The most likely cause of the user’s laptop issues is that it has been infected by some type of malware or ransomware. Malware and ransomware are malicious software that can harm, exploit, or disrupt devices or networks12. They can cause symptoms such as slow performance, browser redirects, pop-up windows, data encryption, or ransom demands12. Therefore, the first step a technician should take to resolve the issue is to scan the laptop for malware and ransomware using a reliable and updated anti-malware tool34. This can help identify and remove any malicious software that may be present on the laptop.
Scanning for malware and ransomware is more effective and urgent than the other options because:
Performing a system restore may not remove the malware or ransomware, as some of them can persist or hide in the system files or backup copies34. Moreover, a system restore may result in data loss or corruption, as it restores the system to a previous state and deletes any changes made after that point5.
Checking the network utilization may not help diagnose or fix the problem, as the malware or ransomware may not be using the network at all, or may be using it in a stealthy or encrypted manner34. Furthermore, checking the network utilization does not address the root cause of the issue, which is the presence of malicious software on the laptop.
Updating the antivirus software may not be sufficient to detect or remove the malware or ransomware, as some of them may evade or disable the antivirus software, or may be too new or unknown for the antivirus software to recognize34. Additionally, updating the antivirus software does not guarantee that the laptop will be scanned for malware or ransomware, as the user may need to initiate or schedule the scan manually.
Which of the following is used to generate passcodes necessary to access applications or systems that require an extra layer of security?
- A . Authenticator application
- B . Access control lists
- C . Biometrics
- D . Smart card readers
A
Explanation:
Authenticator applications are designed to enhance security by generating temporary, time-sensitive passcodes used in two-factor authentication (2FA) processes. These passcodes are used in conjunction with traditional credentials (like usernames and passwords) to grant access to systems or applications. This extra layer of security ensures that even if primary login credentials are compromised, unauthorized access is still prevented without the dynamically generated code from the authenticator app.
Which of the following command-line tools will delete a directory?
- A . md
- B . del
- C . dir
- D . rd
- E . cd
D
Explanation:
To delete an empty directory, enter rd Directory or rmdir Directory. If the directory is not empty, you can remove files and subdirectories from it using the /s switch. You can also use the /q switch to suppress confirmation messages (quiet mode).
A company using Active Directory wants to change the location of all users’ "Documents" to a file server on the network.
Which of the following should the company set up to accomplish this task?
- A . Security groups
- B . Folder redirection
- C . Organizational unit structure
- D . Access control list
B
Explanation:
Folder redirection is a feature in Windows that allows administrators to change the default location of certain special folders within the user profile, such as the "Documents" folder, to a different location, typically on a network server. This is commonly used in organizational environments to centralize file storage, simplify backups, and ensure data is stored on network drives with potentially more robust security measures and redundancy.
Folder redirection: By implementing folder redirection through Group Policy in Active Directory, a company can ensure that all users’ "Documents" folders are stored on a specified file server on the network, allowing for centralized management and backup of important user files.
Security groups (A) are used to manage user and computer access to shared resources, but they don’t directly enable the relocation of user folders. Organizational unit structure (C) helps in managing and applying policies within Active Directory but is not directly related to the physical location of files. Access control lists (D) are used to define permissions for files and directories, but they do not govern where those files and directories should be located.
A user is unable to access several documents saved on a work PC. A technician discovers the files were corrupted and must change several system settings within Registry Editor to correct the issue.
Which of the following should the technician do before modifying the registry keys?
- A . Update the anti-malware software.
- B . Create a restore point.
- C . Run the PC in sate mode.
- D . Roll back the system updates.
B
Explanation:
A restore point is a snapshot of the system settings and configuration at a specific point in time2. Creating a restore point before modifying the registry keys allows the technician to revert the system back to a previous state if something goes wrong or causes instability2. Updating the anti-malware software, running the PC in safe mode, and rolling back the system updates are not necessary steps before modifying the registry keys.
A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment.
Which of the following would be the BEST method to protect against unauthorized use?
- A . Implementing password expiration
- B . Restricting user permissions
- C . Using screen locks
- D . Disabling unnecessary services
B
Explanation:
Restricting user permissions is a method of creating a more secure environment for the finance department in a non-domain environment. This means that users will only have access to the files and resources that they need to perform their tasks and will not be able to modify or delete other files or settings that could compromise security or functionality.
A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS.
Which of the following should the technician do to apply this license?
- A . Copy the c:Wlndowswlndows.lie file over to the machine and restart.
- B . Redeem the included activation key card for a product key.
- C . Insert a Windows USB hardware dongle and initiate activation.
- D . Activate with the digital license included with the device hardware.
B
Explanation:
Redeeming the included activation key card for a product key is the correct way to apply a Windows 10 Pro license to a computer that has Windows 10 Home installed. The activation key card is a physical or digital card that contains a 25-digit code that can be used to activate Windows 10 Pro online or by phone. Copying the windows.lie file, inserting a Windows USB hardware dongle and activating with the digital license are not valid methods of applying a Windows 10 Pro license.
Verified References: https://www.comptia.org/blog/how-to-upgrade-windows-10-home-to-pro https://www.comptia.org/certifications/a
