Practice Free 220-1102 Exam Online Questions
A user’s mobile phone battery does not last long and navigation is very slow.
Which of the following should the technician do first to resolve the issue?
- A . Uninstall unused programs
- B . Check running applications
- C . Update the mobile OS
- D . Disable network services
B
Explanation:
Detailed
The first step is to check running applications (Option B). Applications running in the background could consume a lot of battery and processing power, causing slow performance and battery drain. By identifying and closing or uninstalling these apps, the technician can resolve the issue more effectively.
Uninstalling unused programs (Option A) might help, but checking active applications is more immediate.
Updating the mobile OS (Option C) can improve performance but is not the first step in this scenario. Disabling network services (Option D) might help reduce battery drain but does not address potential app-related issues.
CompTIA A+ Core 2
Reference: 3.4 – Troubleshoot common mobile OS and application issues, including battery and performance concerns.
A technician sees a file that is requesting payment to a cryptocurrency address.
Which of the following should the technician do first?
- A . Quarantine the computer.
- B . Disable System Restore.
- C . Update the antivirus software definitions.
- D . Boot to safe mode.
A
Explanation:
Quarantining the computer means isolating it from the network and other devices to prevent the spread of malware or ransomware. Ransomware is a type of malware that encrypts the files on a computer and demands payment (usually in cryptocurrency) to restore them. If a technician sees a file that is requesting payment to a cryptocurrency address, it is likely that the computer has been infected by ransomware. Quarantining the computer should be the first step to contain the infection and prevent further damage. Disabling System Restore, updating the antivirus software definitions, and booting to safe mode are not steps that should be done before quarantining the computer.
Which of the following threats will the use of a privacy screen on a computer help prevent?
- A . Impersonation
- B . Shoulder surfing
- C . Whaling
- D . Tailgating
B
Explanation:
Shoulder surfing is a threat that involves someone looking over another person’s shoulder to observe their screen, keyboard, or other sensitive information. Shoulder surfing can be used to steal passwords, personal identification numbers (PINs), credit card numbers, or other confidential data. The use of a privacy screen on a computer can help prevent shoulder surfing by limiting the viewing angle of the screen and making it harder for someone to see the screen from the side or behind. Impersonation, whaling, and tailgating are not threats that can be prevented by using a privacy screen on a computer.
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network.
Which of the following BEST describes what the systems administrator should tell the user?
- A . Use the application only on the home laptop because it contains the initial license.
- B . Use the application at home and contact the vendor regarding a corporate license.
- C . Use the application on any computer since the user has a license.
- D . Use the application only on corporate computers.
B
Explanation:
Use the application at home and contact the vendor regarding a corporate license. The user should use the application only on the home laptop because it contains the initial license. The user should contact the vendor regarding a corporate license if they want to use the application on multiple computers on the corporate network1
A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user’s machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives.
Which of the following command-line tools should the technician use?
- A . net use
- B . set
- C . mkdir
- D . rename
A
Explanation:
The technician should use net use command-line tool to remove and reconnect mapped drives. Net use is a command that allows users to manage network connections and resources, such as shared folders or printers. Net use can be used to map or unmap network drives by specifying their drive letters and network paths. For example, net use Z: servershare maps drive Z: to servershare folder, and net use Z: /delete unmaps drive Z:. Set is a command that displays or modifies environment variables for the current user or process. Set is not related to managing mapped drives. Mkdir is a command that creates a new directory or folder in the current or specified location. Mkdir is not related to managing mapped drives. Rename is a command that renames a file or folder in the current or specified location. Rename is not related to managing mapped drives. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6
An organization is creating guidelines for the incorporation of generative Al solutions.
In which of the following would these guidelines be published?
- A . Standard operating procedure
- B . Acceptable use policy
- C . Security protocols
- D . Data flow diagram
B
Explanation:
An acceptable use policy (AUP) is a document that defines the rules and expectations for the users of a system, network, or service. It typically covers topics such as the purpose, scope, responsibilities, and restrictions of using the system, network, or service 1. An AUP is a suitable place to publish the guidelines for the incorporation of generative AI solutions, as it can inform the users of the benefits, risks, and ethical implications of using such tools. It can also specify the conditions and limitations for using generative AI solutions, such as the types of data, and applications that are allowed or prohibited, the security and privacy requirements, the legal and regulatory compliance, and the accountability and reporting mechanisms23.
Reference: 1 What is an Acceptable Use Policy (AUP)? – Definition from Techopedia(https://security.stackexchange.com/questions/84168/the-difference-of-security-policy-and-acceptable-use-policy). 2 Guide on the use of Generative AI – Canada.ca ( https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/responsible-use-ai/guide-use-generative-ai.html)3 Key Considerations for Developing Organizational Generative AI Policies – ISACA ( https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2023/volume-44/key-considerations-for-developing-organizational-generative-ai-policies).
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined.
Which of the following should be performed first to prevent further damage to the host and other systems?
- A . Turn off the machine.
- B . Run a full antivirus scan.
- C . Remove the LAN card.
- D . Install a different endpoint solution.
A
Explanation:
Turning off the machine is the first and most urgent step to prevent further damage to the host and other systems. Ransomware can encrypt files, steal data, and spread to other devices on the network if the infected machine remains online. Turning off the machine will stop the ransomware process and isolate the machine from the network12. The other options are either ineffective or risky. Running a full antivirus scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Removing the LAN card may disconnect the machine from the network, but it will not stop the ransomware from encrypting or deleting files on the local drive. Installing a different endpoint solution may not be possible or helpful if the ransomware has already compromised the system or blocked the installation.
Reference: 1 3 steps to prevent and recover from ransomware (https://www.microsoft.com/en-us/security/blog/2021/09/07/3-steps-to-prevent-and-recover-from-ransomware/)2 #StopRansomware Guide | CISA (https://www.cisa.gov/stopransomware/ransomware-guide).
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel.
Which of the following explains why the technician unable to find this menu item?
- A . The hardware does not meet BitLocker’s minimum system requirements.
- B . BitLocker was renamed for Windows 10.
- C . BitLocker is not included on Windows 10 Home.
- D . BitLocker was disabled in the registry of the laptop
C
Explanation:
BitLocker is only available on Windows 10 Pro, Enterprise, and Education editions1. Therefore, the technician is unable to find the BitLocker Drive Encryption menu item in Control Panel because it is not included in the Windows 10 Home edition1.
A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues.
Which of the following actions should the technician take next?
- A . Isolate the machine from the network.
- B . Scan the system for hidden files.
- C . Disable unused ports.
- D . Install antivirus software.
- E . Reconfigure the firewall.
A
Explanation:
Isolating the machine from the network is a good practice when troubleshooting a PC that is suspected of being infected with malware. This can prevent the malware from spreading to other devices on the network or communicating with external servers that may control or exploit the malware. Isolating the machine can be done by disconnecting the network cable, disabling the wireless adapter, or blocking the network traffic with a firewall.
A malicious file was executed automatically when a flash drive was plugged in.
Which of the following features would prevent this type of incident?
- A . Disabling UAC
- B . Restricting local administrators
- C . Enabling UPnP
- D . Turning off AutoPlay
D
Explanation:
AutoPlay is a feature that automatically runs programs or files when a removable media device, such as a flash drive, is plugged in. This can be exploited by malware authors who place malicious files on flash drives that execute automatically when inserted into a computer. Turning off AutoPlay can prevent this type of incident by requiring the user to manually open or run files from removable media devices. Disabling UAC (user account control), restricting local administrators and enabling UPnP (universal plug and play) are not effective ways to prevent this type of incident.
Verified References: https://www.comptia.org/blog/autoplay-security-risk https://www.comptia.org/certifications/a
