Practice Free 220-1202 Exam Online Questions
A technician needs to change hibernation settings on a Windows computer via a batch file. Domain policies are unavailable.
Which is the best method?
- A . Use Power Options in Control Panel
- B . Update the computer’s firmware
- C . Run gpupdate from command prompt
- D . Use the powercfg command in PowerShell
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The powercfg command is a built-in utility for controlling power settings including hibernation. It can be used in scripts and does not require domain access. From QUENTIN DOCTER – COMPTIA A+ COMPLETE study GUIDE:
“The powercfg command provides granular control of power settings, useful for scripting and configuring systems without Group Policy access.”
A technician is setting up a computer for a new user. A requirement is that the user’s documents are
stored on a network location and not locally on the computer.
Which of the following should the technician configure?
- A . File attributes
- B . User Account Control
- C . Security groups
- D . Folder redirection
D
Explanation:
The correct answer is D. Folder redirection, because folder redirection allows specific user folders― such as Documents, Desktop, and Downloads―to be stored on a network share rather than the local computer. This ensures centralized storage, easier backups, and improved data security.
According to the Quentin Docter C CompTIA A+ Complete Study Guide, folder redirection is commonly used in domain environments to store user data on file servers. This prevents data loss if a workstation fails and allows users to access their files from multiple systems.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide explains that folder redirection works seamlessly with roaming profiles and Group Policy, ensuring that users do not need to manually save files to network drives.
The Mike Meyers / Mark Soper Lab Manual clarifies that file attributes only affect file behavior, UAC controls privilege elevation, and security groups control access permissions―but none of these determine where user folders are stored.
Because the requirement is to store documents on a network location instead of locally, configuring folder redirection is the correct and intended solution, making D the correct answer.
An employee is trying to connect their company laptop to an airport’s Wi-Fi during a business trip. Once the network is connected, a pop-up window appears with the airport logo, which the employee quickly closes. The internet connection is not working properly.
Which of the following should a help desk technician suggest?
- A . Look for a wall socket with RJ45 and try to connect the laptop to it
- B . Contact the airport IT department
- C . Tell the employee that company policy prohibits connection to public Wi-Fi
- D . Reconnect to the network and read the pop-up carefully
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Most public Wi-Fi networks require interaction with a captive portal (e.g., terms of use or login). Dismissing it prevents the user from gaining internet access. Reconnecting and completing the portal page is essential.
From All-in-One Exam Guide:
“Many public hotspots require user acknowledgment or login via a captive portal. Skipping this step results in no internet access.”
Which of the following provides information to employees, such as permitted activities when using the organization’s resources?
- A . AUP
- B . MNDA
- C . DRM
- D . EULA
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
An Acceptable Use Policy (AUP) outlines the rules and guidelines for employees or users regarding the appropriate use of company systems, resources, and internet access. It defines permitted and prohibited activities, helping to mitigate security risks and establish clear behavioral expectations.
B. MNDA (Mutual Non-Disclosure Agreement) deals with confidentiality, not usage guidelines.
C. DRM (Digital Rights Management) controls access to copyrighted content.
D. EULA (End User License Agreement) pertains to software licensing, not internal policies.
Reference: CompTIA A+ 220-1102 Objective 4.3: Explain common safety and environmental impacts and procedures.
Study Guide Section: Organizational policies ― AUP, security best practices
Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the application is not responding.
Which of the following would a technician most likely inspect?
- A . Anti-malware logs
- B . Workstation repair options
- C . Bandwidth status as reported in the Task Manager
- D . File size and related memory utilization
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
If a system becomes unresponsive while opening a specific spreadsheet, the issue is likely tied to the file’s size or the complexity of its content (e.g., embedded formulas, macros, or graphics). High
memory utilization caused by the file can lead to temporary freezing or application "Not Responding" messages. Checking the spreadsheet’s file size and monitoring system memory in Task Manager will help isolate performance bottlenecks.
A user switches from Linux to Windows and tries to migrate data using an external USB drive. Windows prompts that the device must be formatted. It works fine on Linux.
What should the user do?
- A . Configure Windows firewall to allow data from Linux systems
- B . Replace the cable with Windows-supported hardware
- C . Apply a firmware update from the PC manufacturer
- D . Update the file allocation system to exFAT
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Windows doesn’t natively support many Linux file systems (like ext4). Reformatting to exFAT makes the drive readable/writable on both Linux and Windows.
From All-in-One Exam Guide:
“For cross-platform compatibility, exFAT is recommended as it supports large files and is recognized by Windows, macOS, and Linux (with exFAT drivers).”
A user notices that their smartphone’s data usage has increased significantly even when the device is not in use. The phone feels warm, and its battery drains quickly.
Which of the following should the user do to address this issue?
- A . Check for malicious applications
- B . Disable the Wi-Fi and mobile networks
- C . Reset the device to its factory defaults
- D . Enable airplane mode temporarily
A
Explanation:
The correct answer is A. Check for malicious applications, because excessive data usage, device overheating, and rapid battery drain are classic indicators of mobile malware or spyware running in the background.
According to the Quentin Docter C CompTIA A+ Complete Study Guide, malicious applications can continuously transmit data, mine cryptocurrency, or monitor user activity, all of which cause increased network usage and battery consumption―even when the device appears idle.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide emphasizes that the first step in mobile troubleshooting is identifying whether unauthorized or malicious apps are present. Reviewing installed applications and running a mobile security scan can quickly confirm the root cause.
The Mike Meyers / Mark Soper Lab Manual explains that disabling networks or enabling airplane mode only masks symptoms temporarily and does not remove malware. Factory resets are effective but should be used after confirming malware or if other remediation steps fail.
Because the symptoms strongly suggest malicious background activity, the most appropriate first action is to check for malicious applications, making A the correct answer.
A technician is working on multiple remote machines using a command line.
Which of the following commands should the technician use to verify which SMB shares are currently mapped?
- A . system info
- B . hostname
- C . net use
- D . nslookup
C
Explanation:
The correct answer is C. net use, which is the Windows command-line utility used to display, create, and remove mapped network drives and SMB (Server Message Block) connections. When working remotely through command-line interfaces, technicians often rely on net use to quickly verify which network shares are currently connected.
The Quentin Docter C CompTIA A+ Complete Study Guide explains that SMB is the protocol Windows uses for file and printer sharing, and mapped drives are maintained through SMB sessions. The net use command lists all active connections, including the drive letter, remote UNC path, and connection status.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide highlights that net use is especially valuable for remote troubleshooting because it does not require a graphical interface. This makes it ideal when administering multiple systems via command prompt or remote shell.
The Mike Meyers / Mark Soper Lab Manual clarifies that system info displays OS and hardware details, hostname only shows the system name, and nslookup is used for DNS queries. None of those commands provide information about mapped SMB shares.
Since the task is to verify existing SMB mappings, net use is the only command that directly fulfills this requirement, making C the correct answer.
A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons.
Which of the following is the best way to upgrade while keeping security settings in place?
- A . Using an external hard drive to upgrade the OS
- B . Copying the ISO file to each workstation and executing
- C . Setting up image deployment for PXE
- D . Using a hardware token to access upgrade files
C
Explanation:
The correct answer is C. Setting up image deployment for PXE, because PXE (Preboot Execution Environment) allows operating system installations and upgrades to be performed over the network without using removable storage. Since all removable media is disabled for security reasons, PXE-based deployment preserves existing security controls while enabling centralized OS upgrades.
According to the Quentin Docter C CompTIA A+ Complete Study Guide, PXE is commonly used in enterprise environments to deploy or upgrade operating systems at scale. PXE works by booting client machines from a network interface and pulling installation images from a secured deployment server.
The Travis Everett & Andrew Hutz C CompTIA A+ All-in-One Exam Guide explains that PXE is especially valuable when USB drives and external media are restricted. It ensures consistency, reduces human error, and maintains compliance with organizational security policies.
The Mike Meyers / Mark Soper Lab Manual reinforces that copying ISO files locally still requires write access and may violate security baselines. External drives are explicitly prohibited, and hardware tokens are authentication tools―not deployment mechanisms.
Because PXE enables secure, centralized, removable-media-free OS upgrades, it is the most appropriate solution, making C the correct answer.
A network technician notices that most of the company’s network switches are now end-of-life and need to be upgraded.
What should the technician do first?
- A . Implement the change
- B . Approve the change
- C . Document the change
- D . Schedule the change
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Before any change is implemented, it must bedocumentedas part of change management procedures. This ensures transparency, review, and tracking.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Documenting a change is the first step in change management. This includes defining the scope, purpose, impact, and implementation plan before approval or scheduling.”
