Practice Free 220-1102 Exam Online Questions
A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances.
Which of the following impacts is the IT manager most concerned with?
- A . Device
- B . Business
- C . Network
- D . Operation
B
Explanation:
The IT manager’s caution regarding the new applications not having a detrimental effect on company finances points directly to concerns about the business impact. This encompasses potential costs associated with upgrading legacy systems, compatibility issues that might arise from running new applications on old infrastructure, and the risks of system downtime or reduced performance affecting business operations. The focus here is on ensuring that the integration of new applications into the legacy system does not incur unexpected expenses or disrupt critical business processes.
A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user’s productivity and may have caused the user’s files to be altered.
Which of the following should a technician do to address these issues with minimal impact to the user?
- A . Use System Restore to recover the OS files.
- B . Wipe the computer and install a new copy of the OS.
- C . Identify whether the disk partition table has been reduced in size.
- D . Perform a full-system, antivirus scan and check browser notifications.
D
Explanation:
For issues related to constant, unwanted pop-ups and browser window problems, a careful approach that minimizes impact to the user’s data and productivity is advisable:
Perform a full-system, antivirus scan: This step involves using antivirus software to scan the entire system for malware or adware that might be causing the pop-ups and browser issues.
Check browser notifications: Some unwanted pop-ups may result from browser notification permissions inadvertently granted to malicious or spammy websites. Reviewing and adjusting these settings can help stop the pop-ups.
A user’s workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS.
Which of the following actions should the user take to remove the virus?
- A . Enable the system firewall.
- B . Use bootable antivirus media to scan the system.
- C . Download software designed to specifically target the virus.
- D . Run the operating system update process.
B
Explanation:
Using bootable antivirus media to scan the system is an effective method for removing a persistent virus. Booting from external antivirus media allows the system to scan for and remove malware without the infected operating system running, which can prevent the virus from hiding or resisting removal efforts that might occur within the active OS environment.
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the
users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
- A . acceptable use policy.
- B . regulatory compliance requirements.
- C . non-disclosure agreement
- D . incident response procedures
A
Explanation:
Logging into a user’s account without their explicit permission is a violation of the acceptable use policy, which outlines the rules and regulations by which a user must abide while using a computer system. By logging into the user’s account without their permission, the technician would be violating this policy. Additionally, this action could be seen as a breach of confidentiality, as the technician would have access to information that should remain confidential.
CORRECT TEXT
A user reports that after a recent software deployment to upgrade applications, the user can no longer use the Testing program.
However, other employees can successfully use the Testing program.
INSTRUCTIONS
Review the information in each tab to verify the results of the deployment and resolve any issues discovered by selecting the:
✑ Index number of the Event Viewer issue
✑ First command to resolve the issue
✑ Second command to resolve the issue
BSOD
Commands:
Event Viewer:
System Error:
A technician is setting up a newly built computer.
Which of the following is the fastest way for the technician to install Windows 10?
- A . Factory reset
- B . System Restore
- C . In-place upgrade
- D . Unattended installation
D
Explanation:
An unattended installation is a method of installing Windows 10 that does not require any user input or interaction during the installation process. An unattended installation can be performed by using an answer file, which is a file that contains all the configuration settings and preferences for the installation, such as the product key, the language, the partition size, and the user accounts. An unattended installation can be the fastest way to install Windows 10, as it automates and streamlines the installation process. Factory reset, System Restore, and in-place upgrade are not methods of installing Windows 10.
Which of the following is a preventive physical security control?
- A . Video surveillance system
- B . Bollards
- C . Alarm system
- D . Motion sensors
B
Explanation:
Detailed Explanation with Core 2
Reference: Bollards are physical barriers that prevent unauthorized vehicle access to certain areas, providing a preventive measure against unauthorized entry and potential threats. Bollards are classified as a preventive control because they act to deter or block physical access to secured locations, as opposed to video surveillance or alarm systems, which are typically used for detection and monitoring. Core 2 highlights the importance of implementing various physical security controls to protect assets and infrastructure (Core 2 Objective 2.1).
Which of the following would allow physical access to a restricted area while maintaining a record of events?
- A . Hard token
- B . Access control vestibule
- C . Key fob
- D . Door Lock
B
Explanation:
Access control vestibule is the correct answer for this question. An access control vestibule is a physical security device that consists of two doors that form an enclosed space between them. The first door opens only after verifying the identity of the person entering, such as by using a card reader, biometric scanner, or keypad. The second door opens only after the first door closes, creating a buffer zone that prevents unauthorized access or tailgating. An access control vestibule also maintains a record of events, such as who entered or exited, when, and how. Hard token, key fob, and door lock are not sufficient to meet the requirements of this question. A hard token is a device that generates a one-time password or code for authentication purposes. A key fob is a small device that can be attached to a key ring and used to unlock doors or start vehicles remotely. A door lock is a mechanism that secures a door from opening without a key or a code.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder.
Which of the following should the technician do to solve the issue?
- A . Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
- B . Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
- C . Delete the microphone from Device Manager and scan for new hardware,
- D . Replace the USB microphone with one that uses a traditional 3.5mm plug.
B
Explanation:
In Windows 10, there are privacy settings that control access to certain devices, such as microphones, cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP application to allow it to access the microphone.
Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5mm plug is not recommended, as it would require purchasing a new microphone and may not solve the issue.
A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language.
Which of the following BEST describes the risks in running this script?
- A . The instructions from the software company are not being followed.
- B . Security controls will treat automated deployments as malware.
- C . The deployment script is performing unknown actions.
- D . Copying scripts off the internet is considered plagiarism.
C
Explanation:
The risks in running this script are that the deployment script is performing unknown actions. Running the script blindly could cause unintended actions, such as deploying malware or deleting important files, which could negatively impact the organization’s network and data1.