Practice Free 220-1202 Exam Online Questions
What is the next step a technician should take after completing malware cleanup?
- A . Perform a secondary antivirus scan
- B . Educate the end user
- C . Reimage the computer
- D . Review system logs
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Once the system is cleaned, the next priority is to educate the user on safe practices to prevent recurrence.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Post-malware remediation should include user education to prevent reinfection and identify how the malware was introduced.”
What is the next step a technician should take after completing malware cleanup?
- A . Perform a secondary antivirus scan
- B . Educate the end user
- C . Reimage the computer
- D . Review system logs
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Once the system is cleaned, the next priority is to educate the user on safe practices to prevent recurrence.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Post-malware remediation should include user education to prevent reinfection and identify how the malware was introduced.”
A technician is assigned to offboard a user.
Which of the following are common tasks on an offboarding checklist? (Choose two.)
- A . Quarantine the hard drive in the user’s laptop.
- B . Deactivate the user’s key fobs for door access.
- C . Purge all PII associated with the user.
- D . Suspend the user’s email account.
- E . Turn off the network ports underneath the user’s desk.
- F . Add the MAC address of the user’s computer to a blocklist.
B,D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
User offboarding involves disabling the departing user’s access to company systems and facilities.
Two key tasks typically include:
Deactivating physical access credentials (e.g., key fobs or badges) to prevent unauthorized entry (B).
Suspending or disabling the user’s email account to prevent future use and to retain business communications (D).
Which of the following authentication methods is the best way to prevent users from frequently entering their credentials?
- A . Access control list
- B . Single sign-on
- C . Multifactor authentication
- D . One-time password
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Single sign-on (SSO)allows users to authenticate once and gain access to multiple systems without re-entering credentials, which significantly enhances user convenience while maintaining security.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Single sign-on streamlines authentication by allowing users to log in once and access all authorized resources, reducing credential fatigue and improving security.”
A security administrator teaches all of an organization’s staff members to use BitLocker To Go.
Which of the following best describes the reason for this training?
- A . To ensure that all removable media is password protected in case of loss or theft
- B . To enable Secure Boot and a BIOS-level password to prevent configuration changes
- C . To enforce VPN connectivity to be encrypted by hardware modules
- D . To configure all laptops to use the TPM as an encryption factor for hard drives
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
BitLocker To Go is a Microsoft encryption feature specifically designed for removable drives such as USB flash drives and external hard drives. It allows users to protect the data on these devices by requiring a password to decrypt the contents, thereby preventing unauthorized access in the event the device is lost or stolen.
A is correct because BitLocker To Go is directly tied to password-protecting removable media.
B and C are unrelated to BitLocker To Go; Secure Boot and VPN encryption are entirely different security layers.
D applies to BitLocker (not BitLocker To Go) and full disk encryption on internal drives using TPM.
Reference: CompTIA A+ 220-1102 Objective 2.2: Compare and contrast common security measures and tools. Study Guide Section: Encryption technologies (BitLocker, BitLocker To Go)
Technicians are failing to document user contact information, device asset tags, and a clear description of each issue in the ticketing system.
Which of the following should a help desk management team implement for technicians to use on every call?
- A . Service-level agreements
- B . Call categories
- C . Standard operating procedures
- D . Knowledge base articles
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Standard Operating Procedures (SOPs) define the mandatory steps and expectations technicians must follow during support calls. This includes documentation standards such as logging user info, asset details, and issue descriptions in the ticketing system. Implementing SOPs ensures consistency and accountability.
Which of the following is a Linux command that is used for administrative purposes?
- A . runas
- B . cmcl
- C . net user
- D . su
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The su (substitute user) command is used in Linux to switch to another user account, most commonly to escalate privileges by switching to the root (administrator) account. It allows administrative tasks to be performed in a terminal session.
Which of the following malware types typically has very high computing resource usage?
- A . Rootkit
- B . Cryptominer
- C . Boot sector virus
- D . Trojan
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Crypto miners exploit system resources to mine cryptocurrency, often without user consent, leading to high CPU and GPU usage.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Crypto mining malware can cause significant performance degradation by monopolizing system resources like CPU and GPU to mine digital currency.”
A user wants to use a USB to move a 4.57GB .pst file from one Windows computer to another.
Which of the following filesystems should the USB be formatted with?
- A . ext4
- B . NTFS
- C . FAT32
- D . APFS
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
FAT32cannot support files larger than 4GB.NTFSsupports large file sizes and is compatible across Windows systems, making it the correct choice for transferring a 4.57GB file.
From All-in-One Exam Guide:
“NTFS is the preferred file system for large file transfers within Windows. FAT32 has a 4GB file size limit, which makes it unsuitable for modern use cases involving large files.”
Which of the following types of social engineering attacks sends an unsolicited text message to a user’s mobile device?
- A . Impersonation
- B . Vishing
- C . Spear phishing
- D . Smishing
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Smishing (SMS phishing) is a type of social engineering attack where attackers send fraudulent text messages to trick users into revealing sensitive information or downloading malware. These messages often impersonate banks, delivery services, or official institutions to lure the victim into clicking malicious links.
