Practice Free 220-1202 Exam Online Questions
A technician is deploying mobile devices and needs to prevent access to sensitive data if the devices are lost.
Which of the following is the best way to prevent unauthorized access if the user is unaware that the phone is lost?
- A . Encryption
- B . Remote wipe
- C . Geofencing
- D . Facial recognition
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Remote wipe is the best option to prevent unauthorized access to data when a mobile device is lost or stolen―especially if the user is unaware of the loss. It allows administrators or mobile device management (MDM) systems to remotely erase all data on the device, rendering it unusable for unauthorized users.
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding.
Which of the following would a technician most likely inspect?
- A . Anti-malware logs
- B . Workstation repair options
- C . Bandwidth status as reported in the Task Manager
- D . File size and related memory utilization
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
If a system becomes unresponsive while opening a specific spreadsheet, the issue is likely tied to the file’s size or the complexity of its content (e.g., embedded formulas, macros, or graphics). High memory utilization caused by the file can lead to temporary freezing or application "Not Responding" messages. Checking the spreadsheet’s file size and monitoring system memory in Task Manager will help isolate performance bottlenecks.
A company wants to use a single operating system for its workstations and servers and avoid licensing fees.
Which of the following operating systems would the company most likely select?
- A . Linux
- B . Windows
- C . macOS
- D . Chrome OS
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Linux is an open-source operating system that is freely available and does not require traditional
licensing fees. It is highly versatile and scalable, making it suitable for both workstations and servers. Many enterprise environments use Linux to reduce software costs and benefit from robust server features.
B. Windows requires per-device or per-user licensing for both workstation and server editions.
C. macOS is proprietary and limited to Apple hardware with licensing restrictions.
D. Chrome OS is designed for lightweight devices and lacks server functionality.
Reference: CompTIA A+ 220-1102 Objective 1.8 & 1.9: Identify common features and tools of the Linux client/desktop OS.
Study Guide Section: Open-source operating systems and licensing considerations
Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?
- A . Access control list
- B . Single sign-on
- C . Multifactor authentication
- D . One-time password
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Single sign-on (SSO)allows users to authenticate once and gain access to multiple systems without re-entering credentials, which significantly enhances user convenience while maintaining security. From Quentin Docter C CompTIA A+ Complete Study Guide:
“Single sign-on streamlines authentication by allowing users to log in once and access all authorized resources, reducing credential fatigue and improving security.”
A security administrator teaches all of an organization’s staff members to use BitLocker To Go.
Which of the following best describes the reason for this training?
- A . To ensure that all removable media is password protected in case of loss or theft
- B . To enable Secure Boot and a BIOS-level password to prevent configuration changes
- C . To enforce VPN connectivity to be encrypted by hardware modules
- D . To configure all laptops to use the TPM as an encryption factor for hard drives
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
BitLocker To Go is a Microsoft encryption feature specifically designed for removable drives such as USB flash drives and external hard drives. It allows users to protect the data on these devices by requiring a password to decrypt the contents, thereby preventing unauthorized access in the event the device is lost or stolen.
A is correct because BitLocker To Go is directly tied to password-protecting removable media. B and C are unrelated to BitLocker To Go; Secure Boot and VPN encryption are entirely different security layers.
D applies to BitLocker (not BitLocker To Go) and full disk encryption on internal drives using TPM.
Reference: CompTIA A+ 220-1102 Objective 2.2: Compare and contrast common security measures and tools. Study Guide Section: Encryption technologies (BitLocker, BitLocker To Go)
A security administrator teaches all of an organization’s staff members to use BitLocker To Go.
Which of the following best describes the reason for this training?
- A . To ensure that all removable media is password protected in case of loss or theft
- B . To enable Secure Boot and a BIOS-level password to prevent configuration changes
- C . To enforce VPN connectivity to be encrypted by hardware modules
- D . To configure all laptops to use the TPM as an encryption factor for hard drives
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
BitLocker To Go is a Microsoft encryption feature specifically designed for removable drives such as USB flash drives and external hard drives. It allows users to protect the data on these devices by requiring a password to decrypt the contents, thereby preventing unauthorized access in the event the device is lost or stolen.
A is correct because BitLocker To Go is directly tied to password-protecting removable media. B and C are unrelated to BitLocker To Go; Secure Boot and VPN encryption are entirely different security layers.
D applies to BitLocker (not BitLocker To Go) and full disk encryption on internal drives using TPM.
Reference: CompTIA A+ 220-1102 Objective 2.2: Compare and contrast common security measures and tools. Study Guide Section: Encryption technologies (BitLocker, BitLocker To Go)
A technician is securing a newly deployed workstation. Only authorized users should access it.
Which actions should the technician take? (Select two)
- A . Defragment the hard drive
- B . Enable SSH
- C . Enable screensaver locks
- D . Disable iCloud integration
- E . Enable the firewall
- F . Apply the BIOS password
C,F
Explanation:
Screensaver locks help protect unattended workstations.
BIOS passwords prevent unauthorized changes at startup or during boot.
From QUENTIN DOCTER – COMPTIA A+ COMPLETE study GUIDE:
“Applying a BIOS password adds a pre-boot security layer. Screensaver locks help protect logged-in sessions during idle times.”
A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable.
Which is the best method?
- A . Use Power Options in Control Panel
- B . Update the computer’s firmware
- C . Run gpupdate from command prompt
- D . Use the powercfg command in PowerShell
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The powercfg command is a built-in utility for controlling power settings including hibernation. It can be used in scripts and does not require domain access. From QUENTIN DOCTER – COMPTIA A+ COMPLETE study GUIDE:
“The powercfg command provides granular control of power settings, useful for scripting and configuring systems without Group Policy access.”
Which of the following prevents forced entry into a building?
- A . PIV card
- B . Motion-activated lighting
- C . Video surveillance
- D . Bollard
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
A bollard is a sturdy physical barrier―often a steel or concrete post―designed to prevent vehicles or unauthorized individuals from ramming into or entering secure areas of a building. It provides physical security and is commonly used outside entrances to prevent forced entry.
The battery on a user’s smartphone discharges quickly when the user travels. The smartphone was replaced two weeks ago.
Which of the following should a technician do first?
- A . Replace the battery with a higher capacity option
- B . Provide an external battery to extend the usage time
- C . Ensure that the charging port is working as expected
- D . Look for applications that are reporting the highest utilization
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
High battery drain is often due to apps running in the background or using GPS during travel. The first step should always be to check battery usage statistics to see if an application is misbehaving.
From All-in-One Exam Guide:
“Travel conditions can increase app activity, especially navigation or social media. Check app battery usage before assuming hardware faults.”