Practice Free 220-1202 Exam Online Questions
A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day.
Which of the following should the technician use to determine the cause?
- A . Event Viewer
- B . Performance Monitor
- C . System Information
- D . Device Manager
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Event Viewer is the primary tool used to investigate system-level errors and logs, including BSODs. When a BSOD occurs, Windows logs the error codes and associated system behavior under “System” logs in Event Viewer. This allows the technician to review crash events, identify error codes (e.g., STOP codes), and pinpoint hardware or driver issues.
B. Performance Monitor is used for real-time performance tracking and trend analysis, not crash logs.
C. System Information displays system specs but not crash logs or events.
D. Device Manager shows device status and driver issues but doesn’t retain error logs related to BSODs.
Reference: CompTIA A+ 220-1102 Objective 3.1: Given a scenario, troubleshoot common Windows OS problems.
Study Guide Section: Troubleshooting BSODs using Event Viewer and system logs
A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a day.
Which of the following should the technician use to determine the cause?
- A . Event Viewer
- B . Performance Monitor
- C . System Information
- D . Device Manager
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Event Viewer is the primary tool used to investigate system-level errors and logs, including BSODs. When a BSOD occurs, Windows logs the error codes and associated system behavior under “System” logs in Event Viewer. This allows the technician to review crash events, identify error codes (e.g., STOP codes), and pinpoint hardware or driver issues.
B. Performance Monitor is used for real-time performance tracking and trend analysis, not crash logs.
C. System Information displays system specs but not crash logs or events.
D. Device Manager shows device status and driver issues but doesn’t retain error logs related to BSODs.
Reference: CompTIA A+ 220-1102 Objective 3.1: Given a scenario, troubleshoot common Windows OS problems.
Study Guide Section: Troubleshooting BSODs using Event Viewer and system logs
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers.
Which of the following best describes this issue?
- A . Unreachable DNS server
- B . Virtual local area network misconfiguration
- C . Incorrect IP address
- D . Rogue wireless access point
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
This scenario describes a rogue access point ― a malicious or unauthorized wireless access point that uses the same SSID as the legitimate network. Users may connect to it unknowingly, which can result in limited network access, data interception, or redirection of traffic. The inability to reach internal file servers supports this being an unauthorized AP with no connection to internal resources.
A technician needs to map a shared drive from a command-line interface.
Which of the following commands should the technician use?
- A . pathping
- B . nslookup
- C . net use
- D . tracert
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The net use command in Windows is used to map (assign) a shared drive from the command line. The syntax typically looks like: net use X: servershare where X is the drive letter and servershare is the network path.
A user reports that their corporate mobile phone is lost.
Which of the following protects the data locally on the phone from unauthorized access?
- A . Password manager
- B . Degaussing
- C . Remote wipe
- D . Antivirus
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Remote wipe is a mobile device management (MDM) feature that allows administrators to erase data remotely if a device is lost or stolen, preventing unauthorized access to corporate or personal information.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“Remote wipe features enable a device to be cleared of all sensitive data if it is lost or stolen. This is one of the most effective ways to prevent unauthorized access to corporate resources.”
A technician is troubleshooting a print spooler that fails to start on a Windows 11 desktop computer. The technician determines the root cause is that required dependencies are failing to run.
Which of the following tools is the technician using?
- A . Process
- B . Services
- C . Startup
- D . Performance
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The Service stool in Windows allows a technician to view service dependencies and status. If the print spooler can’t start due to a dependency, Services is the correct tool to inspect and manage them. From All-in-One Exam Guide:
“The Services console allows technicians to view, start, and configure system services, including setting recovery actions and viewing dependencies.”
A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company’s application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?
- A . Reenroll the user’s mobile device to be used as an MFA token
- B . Use a private browsing window to avoid local session conflicts
- C . Bypass single sign-on by directly authenticating to the application
- D . Reset the device being used to factory defaults
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
SSO issues are often related to cached session data, cookies, or browser artifacts. The fact that the user can access the company portal but not one specific SaaS tool suggests a session or token problem. Using a private/incognito browsing window allows a clean session to be initiated, which often resolves SSO conflicts.
A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company’s application portal but cannot access a specific SaaS-based tool.
Which of the following would the technician most likely suggest as a next step?
- A . Reenroll the user’s mobile device to be used as an MFA token
- B . Use a private browsing window to avoid local session conflicts
- C . Bypass single sign-on by directly authenticating to the application
- D . Reset the device being used to factory defaults
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
SSO issues are often related to cached session data, cookies, or browser artifacts. The fact that the user can access the company portal but not one specific SaaS tool suggests a session or token problem. Using a private/incognito browsing window allows a clean session to be initiated, which often resolves SSO conflicts.
Why would a network engineering team provide a help desk technician with IP addresses for a wired network segment?
- A . Only specific DNS servers are allowed outbound.
- B . The network allow list is set to a specific address.
- C . DHCP is not enabled for this subnet.
- D . NAC servers only allow security updates to be installed.
C
Explanation:
When DHCP isn’t enabled, static IPs must be assigned manually, so the engineering team provides the IP details.
From Travis Everett C All-in-One Exam Guide:
“If DHCP is unavailable, technicians need the static IP configuration to connect devices to the network.”
Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?
- A . exFAT
- B . ReFS
- C . NTFS
- D . APFS
- E . ext4
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
exFAT is the only listed file system that supports both read and write access across Windows, macOS, and Linux (with appropriate drivers). It’s optimized for flash storage and external drives. From All-in-One Exam Guide:
“exFAT is a lightweight file system with cross-platform read/write support, ideal for use on removable drives when compatibility is essential.”