Practice Free 220-1102 Exam Online Questions
Users report that they can log in to the web application during business hours, but none of the application’s functions are working properly. Company policy does not allow for the server to be rebooted during business hours.
Which of the following should a technician do to fix the web application and follow company policy?
- A . Restart services.
- B . Roll back Windows updates.
- C . Perform a Windows repair.
- D . Add RAM to the server.
A
Explanation:
Restarting services can resolve issues with web applications without requiring a full server reboot, which aligns with the company policy.
Restart services: Likely to resolve issues with the web application by refreshing the necessary services.
Roll back Windows updates: Unnecessary if the issue is with the application services.
Perform a Windows repair: More disruptive and not typically needed for application service issues. Add RAM to the server: Would require a reboot and is not immediately necessary for troubleshooting application issues.
Reference: CompTIA A+ Exam Objectives [220-1102] – 3.1: Given a scenario, troubleshoot common Windows OS problems.
An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either.
Which of the following indicates a vendor no longer supports a product?
- A . AUP
- B . EULA
- C . EOL
- D . UAC
C
Explanation:
EOL (end-of-life) is a term that indicates a vendor no longer supports a product. It means that the product will no longer be sold, updated or patched by the vendor, and that the users should migrate to a newer version or alternative product. AUP (acceptable use policy), EULA (end-user license agreement) and UAC (user account control) are not terms that indicate a vendor no longer supports a product.
Verified References: https://www.comptia.org/blog/what-is-end-of-life https://www.comptia.org/certifications/a
The battery life on an employee’s new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down.
Which of the following should the technician check first to troubleshoot this issue? (Select two).
- A . Screen resolution
- B . Screen zoom
- C . Screen timeout
- D . Screen brightness
- E . Screen damage
- F . Screen motion smoothness
C, D
Explanation:
Screen timeout is the setting that determines how long the screen stays on after the user stops interacting with the phone. Screen brightness is the setting that determines how much light the screen emits. Both of these settings affect the battery life of the phone, as keeping the screen on longer and brighter consumes more power than turning it off sooner and dimmer. A technician should check these settings first to troubleshoot the issue of low battery life and adjust them accordingly. Screen resolution, screen zoom, screen damage, and screen motion smoothness are not settings that directly affect the battery life or the screen staying on for a long time.
A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window.
Which of the following is the most likely cause of these issues’?
- A . Expired certificate
- B . False alert
- C . Missing system files
- D . OS update failure
B
Explanation:
The scenario described is characteristic of a malware tactic known as scareware, where users are tricked into installing malware through false alerts claiming that their system is infected. The anti-malware software installed in response to a pop-up is likely malicious, causing the system to run slowly and display frequent pop-ups.
A user’s corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place.
Which of the following would MOST likely prevent the stored data from being recovered?
- A . Biometrics
- B . Full disk encryption
- C . Enforced strong system password
- D . Two-factor authentication
B
Explanation:
Full disk encryption is a security mechanism that encrypts the entire data on a hard drive, making it unreadable without the correct decryption key or password. It can prevent the stored data from being recovered by unauthorized persons who steal or access the laptop. Biometrics, enforced strong system password and two-factor authentication are other security mechanisms, but they only protect the login access to the laptop, not the data on the hard drive.
Verified References: https://www.comptia.org/blog/what-is-full-disk-encryption https://www.comptia.org/certifications/a
A user is unable to access a website, which is widely used across the organization, and receives the following error message:
The security certificate presented by this website has expired or is not yet valid.
The technician confirms the website works when accessing it from another computer but not from the user’s computer.
Which of the following should the technician perform NEXT to troubleshoot the issue?
- A . Reboot the computer.
- B . Reinstall the OS.
- C . Configure a static 12
- D . Check the computer’s date and time.
D
Explanation:
The error message indicates that the security certificate presented by the website has either expired or is not yet valid. This can happen if the computer’s clock has the wrong date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too much, it may cause the certificate to fail to validate. Therefore, the technician should check the computer’s date and time and ensure that they are correct.
A user requires local administrative access to a workstation.
Which of the following Control Panel utilities allows the technician to grant access to the user?
- A . System
- B . Network and Sharing Center
- C . User Accounts
- D . Security and Maintenance
C
Explanation:
User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on a workstation1. The technician can use User Accounts to grant local administrative access to a user by adding the user to the Administrators group1. The Administrators group has full control over the workstation and can perform tasks such as installing software, changing system settings, and accessing all files.
References:
1: User Accounts (Control Panel) (https://docs.microsoft.com/en-us/windows/win32/shell/user-accounts): Local Users and Groups (https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/local-users-and-groups)
A company needs employees who work remotely to have secure access to the corporate intranet.
Which of the following should the company implement?
- A . Password-protected Wi-Fi
- B . Port forwarding
- C . Virtual private network
- D . Perimeter network
C
Explanation:
A virtual private network (VPN) is a technology that creates a secure and encrypted connection over a public network, such as the internet. A VPN allows remote employees to access the corporate intranet as if they were physically connected to the local network3. Password-protected Wi-Fi is a security measure for wireless networks that does not provide access to the corporate intranet. Port forwarding is a technique that allows external devices to access services on a private network through a router, but does not provide access to the corporate intranet. A perimeter network is a network segment that lies between an internal network and an external network, such as the internet, and provides an additional layer of security, but does not provide access to the corporate intranet.
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines.
Which of the following should be updated to reflect this new requirement?
- A . MDM
- B . EULA
- C . IRP
- D . AUP
D
Explanation:
AUP (Acceptable Use Policy) should be updated to reflect this new requirement. The AUP is a document that outlines the acceptable use of technology within an organization. It is a set of rules that employees must follow when using company resources. The AUP should be updated to include a policy on cryptocurrency mining on work desktops
An administrator is designing and implementing a server backup system that minimizes the capacity of storage used.
Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?
- A . Differential
- B . Open file
- C . Archive
- D . Incremental
D
Explanation:
Incremental backups are backups that only include the changes made since the last backup, whether it was a full or an incremental backup. Incremental backups minimize the capacity of storage used and are often used in conjunction with synthetic full backups, which are backups that combine a full backup and subsequent incremental backups into a single backup set.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 3.3
