Practice Free 220-1102 Exam Online Questions
Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?
- A . gpedit
- B . gpmc
- C . gpresult
- D . gpupdate
A
Explanation:
The feature that allows a technician to configure policies in a Windows 10 Professional desktop is gpedit. Gpedit is a command that opens the Local Group Policy Editor, which is a utility that allows users to view and modify local group policies on their Windows PC. Local group policies are a set of rules and settings that control the behavior and configuration of the system and its users. Local group policies can be used to configure policies such as security, network, software installation and user rights. Gpmc is a command that opens the Group Policy Management Console, which is a utility that allows users to view and modify domain-based group policies on a Windows Server. Domain-based group policies are a set of rules and settings that control the behavior and configuration of the computers and users in a domain. Domain-based group policies are not available on a Windows 10 Professional desktop. Gpresult is a command that displays the result of applying group policies on a Windows PC. Gpresult can be used to troubleshoot or verify group policy settings but not to configure them. Gpupdate is a command that updates or refreshes the group policy settings on a Windows PC. Gpupdate can be used to apply new or changed group policy settings but not to configure them. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6
A technician needs to implement password requirements that apply to all domain-joined computers.
Which of the following commands should the technician most likely run?
- A . gpugdate
- B . devmgmt
- C . regedit
- D . resmon
A
Explanation:
Detailed
The correct command is gpupdate (Option A), which refreshes Group Policy settings. To implement password requirements across domain-joined computers, the policy would be set via Group Policy, and then running the gpupdate command ensures that the new settings are applied to all systems. devmgmt (Option B) opens Device Manager, which is unrelated to Group Policy.
regedit (Option C) opens the Windows Registry Editor, which is not used for group-wide password policy settings.
resmon (Option D) opens Resource Monitor, which helps monitor system resources, not Group Policy.
CompTIA A+ Core 2
Reference: 1.5 – Using appropriate Windows settings, including password policies via Group Policy.
An engineer is configuring a new server that requires a bare-metal installation.
Which of the following installation methods should the engineer use if installation media is not available on site?
- A . Image deployment
- B . Recovery partition installation
- C . Remote network installation
- D . Repair installation
C
Explanation:
Remote network installation is the best option for configuring a new server that requires a bare-metal installation without installation media on site. A remote network installation is a method of installing an operating system or an application over a network connection, such as LAN, WAN, or Internet. A remote network installation can use various protocols, such as PXE, HTTP, FTP, or SMB, to access the installation files from a server or a cloud service. A remote network installation can also use various tools, such as Windows Deployment Services, Microsoft Deployment Toolkit, or Red Hat Kickstart, to automate and customize the installation process. A remote network installation can save time and resources by eliminating the need for physical media and allowing centralized management of multiple installations. Image deployment, recovery partition installation, and repair installation are not correct answers for this question. Image deployment is a method of installing an operating system or an application by copying a preconfigured image file to a target device. Image deployment requires an existing image file and a compatible device. Recovery partition installation is a method of restoring an operating system or an application from a hidden partition on the hard disk that contains the original factory settings. Recovery partition installation requires an existing recovery partition and a functional hard disk. Repair installation is a method of fixing an operating system or an application that is corrupted or damaged by replacing or repairing the system files without affecting the user data or settings. Repair installation requires an existing operating system or application and a working device.
Reference: Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 16
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 106
A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked.
. The possibility of file corruption is reduced.
・ Data recovery is easy.
Which of the following filesystem types best meets these requirements?
- A . ext3
- B . FAT32
- C . exFAT
- D . NTFS
A
Explanation:
The ext3 file system is a Linux native file system that meets the requirements of the question. It has the following features:
All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to the file system metadata in a special log called the journal before applying them to the actual file system. This ensures that the file system can be restored to a consistent state in case of a power failure or system crash12.
The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility of file corruption, as it avoids the need for a full file system check after an unclean shutdown. The file system can be quickly replayed from the journal and any inconsistencies can be fixed12.
Data recovery is easy. The ext3 file system supports undeletion of files using tools such as ext3grep or extundelete, which can scan the file system for deleted inodes and attempt to recover the data blocks associated with them34.
Reference: 1: Introduction to Linux File System [Structure and Types] – MiniTool1 2: 7 Ways to Determine the File System Type in Linux (Ext2, Ext3 or Ext4) – Tecmint3 3: How to Recover Deleted Files in Linux with ext3grep 4: How to Recover Deleted Files from ext3 Partitions
A user updates a mobile device’s OS. A frequently used application becomes consistently unresponsive immediately after the device is launched.
Which of the following troubleshooting steps should the user perform FIRST?
- A . Delete the application’s cache.
- B . Check for application updates.
- C . Roll back the OS update.
- D . Uninstall and reinstall the application.
B
Explanation:
Checking for application updates is the first troubleshooting step that the user should perform, because the application may not be compatible with the new OS version and may need an update to fix the issue. Deleting the application’s cache, rolling back the OS update, or uninstalling and reinstalling the application are possible solutions, but they are more time-consuming and disruptive than checking for updates.
References:
https://www.comptia.org/training/resources/exam-objectives/comptia-a-core-2-exam-objectives: https://www.lifewire.com/how-to-update-apps-on-android-4173855
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering.
Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?
- A . Security and Maintenance
- B . Network and Sharing Center
- C . Windows Defender Firewall
- D . Internet Options
D
Explanation:
The best choice for accessing the necessary configuration to configure the desktop systems to use a new proxy server is the Internet Options utility. This utility can be found in the Control Panel and allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+ Core 2 exam objectives, technicians should be familiar with the Internet Options utility and how to configure proxy settings.
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue.
Which of the following tools should the technician use to make adjustments?
- A . eventvwr.msc
- B . perfmon.msc
- C . gpedic.msc
- D . devmgmt.msc
D
Explanation:
The technician should use devmgmt.msc tool to make adjustments for the touchpad issue after Windows installed updates on a laptop. Devmgmt.msc is a command that opens the Device Manager, which is a utility that allows users to view and manage the hardware devices and drivers installed on a computer. The technician can use the Device Manager to check the status, properties and compatibility of the touchpad device and its driver, and perform actions such as updating, uninstalling or reinstalling the driver, enabling or disabling the device, or scanning for hardware changes. Eventvwr.msc is a command that opens the Event Viewer, which is a utility that allows users to view and monitor the system logs and events. The Event Viewer may provide some information or clues about the touchpad issue, but it does not allow users to manage or troubleshoot the device or its driver directly. Perfmon.msc is a command that opens the Performance Monitor, which is a utility that allows users to measure and analyze the performance of the system
A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service.
Which of the following needs to be completed before this event is considered closed?
- A . Acceptable use policy
- B . Incident report
- C . End user license agreement
- D . Standard operating procedures
B
Explanation:
After successfully mitigating a malicious event caused by an infected email, the final step before considering the event closed is to complete an incident report. This document should detail the nature of the incident, the steps taken to resolve it, and any lessons learned to improve future responses to similar threats.
Which of the following macOS utilities uses AES-128 to encrypt the startup disk?
- A . fdisk
- B . Diskpart
- C . Disk Utility
- D . FileVault
D
Explanation:
FileVault is a macOS utility that uses AES-128 (Advanced Encryption Standard) to encrypt the startup disk of a Mac computer. It protects the data from unauthorized access if the computer is lost or stolen. fdisk and Diskpart are disk partitioning utilities for Linux and Windows, respectively. Disk Utility is another macOS utility that can perform disk management tasks, such as formatting, resizing, repairing, etc.
Verified References: https://www.comptia.org/blog/what-is-filevault https://www.comptia.org/certifications/a
Which of the following is the most secure method of preventing someone from accessing a cell phone?
- A . PIN
- B . Swipe
- C . Passphrase
- D . Pattern
C
Explanation:
A passphrase is the most secure method among the options listed for preventing unauthorized access to a cell phone. Unlike a simple PIN or pattern, a passphrase is typically longer and can include a combination of letters, numbers, and special characters, making it harder to guess or brute force. Swipe and pattern locks are generally easier to bypass or observe due to smudge traces or pattern predictability. CompTIA A+ Core 2 security domain stresses using strong authentication methods to protect mobile devices, and passphrases are recommended for their complexity and strength. This aligns with mobile device security best practices covered in the official study guide, emphasizing strong, complex authentication mechanisms to secure sensitive data on mobile devices.
