Practice Free 220-1202 Exam Online Questions
SIMULATION
Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.
INSTRUCTIONS
Quarantine and configure the appropriate device(s) so that the users’ audio issues are resolved using best practice procedures.
Multiple devices may be selected for quarantine.
Click on a host or server to configure services.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
generated content may be incorrect.
content may be incorrect.
An organization sees unauthorized apps installed and licensing prompts.
What should the security team do?
- A . Deploy an internal PKI to filter encrypted web traffic.
- B . Remove users from the local admin group.
- C . Implement stronger controls to block suspicious websites.
- D . Enable stricter UAC settings on Windows.
B
Explanation:
Removing users from the local admin group prevents them from installing unauthorized software.
From Quentin Docter C Complete Study Guide:
“Local admin privileges allow users to install unauthorized apps. Removing them from this group restricts installations and helps prevent malware.” .
A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental.
Which of the following would most likely resolve the issue?
- A . Changing the backup window
- B . Performing incremental weekly backups
- C . Increasing the backup storage
- D . Running synthetic full weekly backups
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
A synthetic full backup combines the last full backup with subsequent incremental backups to create a new full backup without re-reading data from the source system. This method significantly reduces the backup window and network impact. It is especially useful when traditional full backups are too time-consuming.
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue.
Which of the following should the technician do?
- A . Escalate the issue to a senior team member and provide next steps to the customer.
- B . Dismiss the customer and reschedule another troubleshooting session at a later date.
- C . Interrupt the customer and express that troubleshooting support tickets can take time.
- D . Maintain a positive attitude and continue to ask questions regarding the scope of the issue.
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
When a technician exhausts all troubleshooting steps within their knowledge and the issue remains unresolved, the best practice is to escalate the issue to a higher-level technician or team. Additionally, the technician should clearly communicate the next steps to the customer to maintain transparency and reduce frustration. This ensures continuity of support and upholds customer satisfaction.
B. Dismissing the customer is unprofessional and violates proper customer service protocols.
C. Interrupting the customer and providing excuses escalates the tension and is inappropriate.
D. Continuing to ask questions without new troubleshooting steps wastes time and increases
frustration.
Reference: CompTIA A+ 220-1102 Objective 4.1: Given a scenario, implement best practices associated with documentation and support systems information.
Study Guide Section: Customer service best practices ― escalation and communication
A customer’s computer does not have an active connection to the network. A technician goes through a few troubleshooting steps but is unable to resolve the issue. The technician has exhausted their knowledge. The customer expresses frustration at the time taken to resolve this issue.
Which of the following should the technician do?
- A . Escalate the issue to a senior team member and provide next steps to the customer.
- B . Dismiss the customer and reschedule another troubleshooting session at a later date.
- C . Interrupt the customer and express that troubleshooting support tickets can take time.
- D . Maintain a positive attitude and continue to ask questions regarding the scope of the issue.
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
When a technician exhausts all troubleshooting steps within their knowledge and the issue remains unresolved, the best practice is to escalate the issue to a higher-level technician or team. Additionally, the technician should clearly communicate the next steps to the customer to maintain transparency and reduce frustration. This ensures continuity of support and upholds customer satisfaction.
B. Dismissing the customer is unprofessional and violates proper customer service protocols.
C. Interrupting the customer and providing excuses escalates the tension and is inappropriate.
D. Continuing to ask questions without new troubleshooting steps wastes time and increases
frustration.
Reference: CompTIA A+ 220-1102 Objective 4.1: Given a scenario, implement best practices associated with documentation and support systems information.
Study Guide Section: Customer service best practices ― escalation and communication
Which of the following is used to apply corporate restrictions on an Apple device?
- A . App Store
- B . VPN configuration
- C . Apple ID
- D . Management profile
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
A management profile is used to enforce corporate policies on Apple devices. These profiles are installed via an MDM (Mobile Device Management) solution and control access, restrictions, Wi-Fi settings, app installations, and more. They’re critical for managing devices in a business environment.
Which of the following types of social engineering attacks sends an unsolicited text message to a user’s mobile device?
- A . Impersonation
- B . Vishing
- C . Spear phishing
- D . Smishing
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Smishing (SMS phishing) is a type of social engineering attack where attackers send fraudulent text messages to trick users into revealing sensitive information or downloading malware. These messages often impersonate banks, delivery services, or official institutions to lure the victim into clicking malicious links.
A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G.
Which of the following is the most likely cause of the issue?
- A . The user does not have Wi-Fi enabled.
- B . The website’s subscription has run out.
- C . The bandwidth is not fast enough.
- D . The mobile device storage is full.
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
3G networks generally do not provide the bandwidth required for seamless HD video streaming. With only two signal bars and a 3G connection, the mobile device likely cannot maintain the necessary data throughput, resulting in timeouts or buffering failures. This is a classic symptom of insufficient network speed or signal strength.
A technician needs to install an operating system on a large number of workstations.
Which of the following is the fastest method?
- A . Physical media
- B . Mountable ISO
- C . Manual installation
- D . Image deployment
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Image deployment is the fastest and most efficient method for installing operating systems on multiple machines. It involves creating a pre-configured image of an OS and deploying it across systems using tools like Windows Deployment Services (WDS) or third-party imaging solutions. This method saves time and ensures consistency across all devices. A. Physical media is slow and not scalable.
B. Mountable ISOs are useful but still require manual installation.
C. Manual installation is time-consuming and not suitable for large-scale deployment.
Reference: CompTIA A+ 220-1102 Objective 1.4: Given a scenario, use appropriate Microsoft operating system installation methods.
Study Guide Section: Deployment methods ― image deployment, automation
Which of the following are system folders on macOS? (Select two)
- A . Applications
- B . Spotlight
- C . Time Machine
- D . Library
- E . FileVault
- F . iCloud
A,D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Applications and Library are core system directories in macOS. The Applications folder contains installed applications. The Library folder contains support files, preferences, and other system-related files. From the Quentin Docter C CompTIA A+ Complete Study Guide:
“macOS organizes system and user files into several key folders. Among them, Applications and Library are standard system folders where apps and related files are stored.”