Practice Free 220-1102 Exam Online Questions
A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper.
Which of the following should the student use to change the wallpaper?
- A . Apps and Features
- B . Personalization
- C . File Explorer
- D . Task Manager
B
Explanation:
To change the wallpaper on a Windows 10 laptop, the "Personalization" settings should be used. These settings allow users to customize themes, which include various aspects of the desktop environment such as the desktop wallpaper, screen saver, color scheme, and more. This makes "Personalization" the correct option for customizing the wallpaper.
Reference: Official CompTIA A+ Core 1 and Core 2 Student Guide.
A technician is assisting a customer who is having difficulty accessing the company’s website.
Which of the following should the technician do first?
- A . Ask the customer for their log-in credentials.
- B . Check the company’s internal knowledge base for solutions.
- C . Refer the customer to a more experienced technician.
- D . Record the details of the issue in the company’s ticketing system.
D
Explanation:
When a customer is having difficulty accessing the company’s website, the technician should first document the issue in the company’s ticketing system. This step ensures that the problem is officially logged, which allows for proper tracking, prioritization, and assignment to the appropriate personnel if needed. Recording the details helps in maintaining a record of the issue and the troubleshooting steps taken, which is useful for future reference and analysis.
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes.
Which of the following should the support representative do NEXT?
- A . Send a quick message regarding the delay to the next customer.
- B . Cut the current customer’s lime short and rush to the next customer.
- C . Apologize to the next customer when arriving late.
- D . Arrive late to the next meeting without acknowledging the lime.
A
Explanation:
The support representative should send a quick message regarding the delay to the next customer. This will help the next customer understand the situation and adjust their schedule accordingly.
A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow.
Which of the following steps should the technician take to resolve the issue?
- A . Uninstall one antivirus software program and install a different one.
- B . Launch Windows Update, and then download and install OS updates
- C . Activate real-time protection on both antivirus software programs
- D . Enable the quarantine feature on both antivirus software programs.
- E . Remove the user-installed antivirus software program.
E
Explanation:
Removing the user-installed antivirus software program is the best way to resolve the issue of extremely slow performance caused by installing additional real-time protection antivirus software on a PC. Having more than one antivirus software program running at the same time can cause conflicts, resource consumption and performance degradation. Uninstalling one antivirus software program and installing a different one, activating real-time protection on both antivirus software programs, enabling the quarantine feature on both antivirus software programs and launching Windows Update are not effective ways to resolve the issue.
Verified References: https://www.comptia.org/blog/why-you-shouldnt-run-multiple-antivirus-programs-at-the-same-time https://www.comptia.org/certifications/a
Which of the following often uses an SMS or third-party application as a secondary method to access a system?
- A . MFA
- B . WPA2
- C . AES
- D . RADIUS
A
Explanation:
MFA (Multi-Factor Authentication) is a security measure that often uses an SMS or third-party application as a secondary method to access a system. MFA requires the user to provide two or more pieces of evidence to prove their identity, such as something they know (e.g., password), something they have (e.g., phone), or something they are (e.g., fingerprint)2. WPA2 (Wi-Fi Protected Access 2) is a security protocol for wireless networks that does not use SMS or third-party applications. AES (Advanced Encryption Standard) is a symmetric encryption algorithm that does not use SMS or third-party applications. RADIUS (Remote Authentication Dial-In User Service) is a network protocol that provides centralized authentication and authorization for remote access clients, but does not use SMS or third-party applications.
Which of the following languages is used for scripting the creation of Active Directory accounts?
- A . Bash
- B . SQL
- C . PHP
- D . PowerShell
D
Explanation:
PowerShell is a scripting language that can interact with Active Directory and other Windows components. It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell can also use the Active Directory module to access other AD-related functions and attributes. Other languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and would require additional tools or libraries to do so.
Which of the following features can be used to ensure a user can access multiple versions of files?
- A . Multiple desktops
- B . Remote Disc
- C . Time Machine
- D . FileVault
C
Explanation:
Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The
other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.
All the desktop icons on a user’s newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed.
Which of the following would BEST resolve the issue?
- A . Rolling back video card drivers
- B . Restoring the PC to factory settings
- C . Repairing the Windows profile
- D . Reinstalling the Windows OS
A
Explanation:
Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a user’s newly issued PC. This means restoring the previous version of the drivers that were working fine before the software patch was deployed. The software patch may have caused compatibility issues or corrupted the drivers, resulting in display problems
Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader.
Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?
- A . Network and Sharing Center
- B . Programs and Features
- C . Default Apps
- D . Add or Remove Programs
C
Explanation:
Default Apps should be used to ensure all PDF files open in Adobe Reader1
A user reports the following issues:
• Their computer is constantly running slowly.
• The default home page of the web browser has changed to a suspicious search engine.
• They have been receiving pop-up ads on the screen.
Which of the following should a technician do first to address these issues?
- A . Update the antivirus program and run a full system scan.
- B . Uninstall the suspicious search engine and reset the home page.
- C . Install the latest updates for the operating system.
- D . Block the pop-up ads using the web browser settings.
A
Explanation:
When a user reports slow performance, a changed home page, and pop-up ads, these are classic signs of malware infection.
The first step should be:
Update the antivirus program and run a full system scan: This helps identify and remove any malware present on the system, addressing the root cause of the issues.
Uninstall the suspicious search engine and reset the home page: This addresses the symptom but not the underlying cause, which is likely malware.
Install the latest updates for the operating system: Important for security but secondary to removing malware.
Block the pop-up ads using the web browser settings: Again, addresses the symptom but not the root
cause.
Reference: CompTIA A+ 220-1102 Exam Objectives, Section 3.3: Given a scenario use best practice procedures for malware removal.
Malware identification and removal documentation.