Practice Free 220-1202 Exam Online Questions
An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics.
Which of the following additional security measures further reduces the risk of unauthorized data access?
- A . Remote backups
- B . Location tracking
- C . PIN code screen lock
- D . Device encryption
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Device encryption ensures that even if someone bypasses biometrics or has physical access to the phone, they cannot read the stored data without the encryption key. From Quentin Docter C CompTIA A+ Complete Study Guide:
“Encryption is the most effective way to protect data at rest. Even if the device is lost or stolen, encryption ensures the data remains inaccessible without the correct key or passcode.”
A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user’s session.
Which of the following remote access technologies would support the use case?
- A . VPN
- B . VNC
- C . SSH
- D . RDP
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The correct answer is VNC (Virtual Network Computing). VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It is platform-independent and widely supported on Linux, which makes it ideal for providing interactive remote support for a Linux-based operating system. It allows the technician not only to view the remote desktop session but also to control it, fulfilling the need to see and interact with the user’s session.
Which of the following is the best way to distribute custom images to 800 devices that include four device vendor classes with two types of user groups?
- A . Use xcopy to clone the hard drives from one to another
- B . Use robocopy to move the files to each device
- C . Use a local image deployment tool for each device
- D . Use a network-based remote installation tool
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
In enterprise environments, network-based deployment solutions (such as Windows Deployment Services or SCCM) allow administrators to push images across the network to hundreds of devices efficiently. These tools support hardware-specific drivers (for different vendor classes) and can accommodate user-group configurations using task sequences or answer files.
A and B (xcopy and robocopy) are file-level tools and not designed for full OS image deployment.
C. Using local tools per device is inefficient for large-scale rollouts (800 devices).
D. Network-based deployment is the industry standard for this scale.
Reference: CompTIA A+ 220-1102 Objective 1.4: Given a scenario, use appropriate Microsoft operating system installation methods.
Study Guide Section: Deployment methods (including PXE boot, image deployment)
A user decides to switch to Windows from Linux and is trying to migrate data using an external USB hard disk. However, when the user connects the cable to the Windows machine, an error message appears stating the device must be formatted before it can be used. The hard disk works as expected when connected to the Linux machine.
Which of the following should the user do to resolve this issue?
- A . Configure Windows firewall to allow data from Linux systems
- B . Replace the cable with Windows-supported hardware
- C . Apply a firmware update from the PC manufacturer
- D . Update the file allocation system to exFAT
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
The Linux machine likely formatted the drive in a file system like ext4, which Windows cannot natively read. Reformatting the drive toexFATallows cross-platform compatibility. From All-in-One Exam Guide:
“When migrating data between OSes, using a file system like ex FAT ensures compatibility. Windows cannot read Linux-native file systems such as ext4 without third-party tools.”
An administrator is investigating a technical outage. The management team wants information that includes the summary of the outage and actions taken.
Which of the following documentation should the administrator provide?
- A . Knowledge base article
- B . Non-disclosure agreement
- C . Incident report
- D . Standard operating procedure
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
An incident report summarizes what happened during an outage, the timeline, the actions taken, and the resolution, which is exactly what management typically requests post-incident. From Quentin Docter C CompTIA A+ Complete Study Guide:
“Incident reports document the events of an IT issue or outage, including detection, response, and resolution. They are crucial for post-incident review and management accountability.”
A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times.
Which of the following should a technician enable to satisfy this request?
- A . Single sign-on
- B . Windows Hello
- C . BitLocker
- D . User Account Control
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Windows Hello provides alternative sign-in options including facial recognition, fingerprint scans, and PINs, reducing dependence on passwords.
From All-in-One Exam Guide:
“Windows Hello offers a range of biometric and PIN-based login methods designed to simplify access while enhancing security.”
“It can be used in place of a password, ideal for users who frequently forget credentials.”
Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
- A . Deleting the partitions
- B . Implementing EFS
- C . Performing a low-level format
- D . Degaussing the device
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
A low-level format (also referred to as a zero-fill or full format) writes over every sector on a storage device, effectively destroying the existing data and making recovery nearly impossible. Unlike degaussing, which renders the drive unusable, a low-level format maintains the integrity of the device, allowing it to be repurposed or reused.
A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order.
Which of the following is the most important for the technician to use?
- A . Steel-toed boots
- B . Air filter mask
- C . ESD mat
- D . Antistatic bags
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Carbon fiber filament can produce fine particles or fumes during printing, which may be harmful when inhaled. Wearing an air filter mask is essential to protect the respiratory system. From Quentin Docter C CompTIA A+ Complete Study Guide:
“When working with advanced materials like carbon fiber, always use appropriate personal protective equipment such as air filter masks to prevent inhalation of dangerous particles.”
Which of the following is used to detect and record access to restricted areas?
- A . Bollards
- B . Video surveillance
- C . Badge readers
- D . Fence
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Badge readers are electronic access control systems that require authorized users to scan a badge (e.g., RFID or magnetic strip cards) to gain access to restricted physical locations. These systems typically log all access attempts―successful or denied―providing both detection and recording of access events.
An administrator received an email stating that the OS they are currently supporting will no longer receive security updates and patches.
Which of the following is the most likely reason?
- A . Support from the computer’s manufacturer is expiring
- B . The OS will be considered end of life
- C . The built-in security software is being removed from the next OS version
- D . A new version of the OS will be released soon
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
When an OS is no longer receiving updates, it is generally because it has reached end of life (EOL), meaning the vendor has ceased support.
From Quentin Docter C CompTIA A+ Complete Study Guide:
“End-of-life refers to the point when an OS vendor no longer issues updates or support. Systems at EOL pose security risks and must be upgraded or isolated.”