Practice Free 220-1202 Exam Online Questions
A user reports that double-clicking an application’s shortcut fails to launch the program. A technician believes the application process is running in the background in an unresponsive state.
Which of the following tools should the technician use to resolve the issue?
- A . Resource Monitor
- B . Task Manager
- C . Event Viewer
- D . Registry Editor
B
Explanation:
The correct answer is B. Task Manager, because Task Manager allows technicians to view, manage, and terminate running processes, including those that are frozen or unresponsive. If an application process is already running but not responding, launching it again will fail until the existing process is stopped.
According to the Quentin Docter C CompTIA A+ Complete Study Guide, Task Manager is the primary Windows tool for troubleshooting application hangs, excessive resource usage, and nonresponsive programs. Technicians can end the task and relaunch the application cleanly.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide explains that Resource Monitor provides detailed performance metrics but is not optimized for quickly terminating frozen applications. Event Viewer logs errors but does not resolve active process issues.
The Mike Meyers / Mark Soper Lab Manual reinforces that Registry Editor should never be used for live application troubleshooting due to the risk of system instability.
Because the issue involves an unresponsive background process, Task Manager is the fastest and safest tool to resolve the problem, making B the correct answer.
Which of the following describes a vulnerability that has been exploited before a patch or remediation is available?
- A . Spoofing
- B . Brute-force
- C . DoS
- D . Zero-day
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
A Zero-day vulnerability refers to a security flaw in software or hardware that is unknown to the vendor or has not yet been patched. If this vulnerability is exploited before the vendor has issued a fix or patch, it becomes a Zero-day exploit. These attacks are highly dangerous because they take advantage of the absence of defenses due to the lack of awareness or mitigation options.
MFA for a custom web application on a user’s smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country.
Which of the following should the technician do first?
- A . Verify the date and time settings
- B . Apply mobile OS patches
- C . Uninstall and reinstall the application
- D . Escalate to the website developer
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Multi-Factor Authentication (MFA) apps, especially time-based one-time password (TOTP) apps (e.g., Google Authenticator, Authy), rely on accurate time synchronization between the device and the authentication server. If the user recently traveled internationally, the device may have incorrect date/time settings due to time zone changes or failed synchronization, leading to MFA failure.
The most logical and non-intrusive first step is to verify and correct the date and time settings. This aligns with basic troubleshooting principles―start with the simplest and most likely cause before taking more drastic action.
Reference: CompTIA A+ 220-1102 Objective 2.6: Given a scenario, apply cybersecurity best practices to secure a workstation.
Study Guide Section: Authentication technologies and MFA troubleshooting
A user’s computer is running slowly. Web pages take several seconds to open, and applications are slow to respond.
A technician opens the Windows Task Manager and sees the following:
Disk: 2%
Network: 12%
GPU: 15%
CPU: 70%
Memory: 97%
Which of the following would a technician most likely do to resolve the issue?
- A . Clear browser cached data
- B . Upgrade the network connection
- C . Close unnecessary programs
- D . Delete temporary files
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
High memory usage (97%) suggests the system is overloaded with active processes. The technician should close unneeded applications to free up RAM and improve performance.
From Mike Meyers’ Lab Manual:
“When memory usage is near capacity, close all non-essential programs. This can dramatically improve response time without needing hardware upgrades.”
Which of the following Linux commands is used to read another command’s documentation?
- A . chmod
- B . cat
- C . man
- D . sudo
C
Explanation:
The correct answer is C. man, which stands for manual. The man command is used in Linux and UNIX-based operating systems to display the official documentation for commands, configuration files, and system calls. This documentation includes descriptions, syntax, available options, and usage examples.
The Quentin Docter C CompTIA A+ Complete Study Guide explains that Linux relies heavily on built-in documentation accessible from the command line. The man pages are considered the authoritative reference for how a command works and what options it supports.
For example, running man cp displays documentation for the file copy command.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide emphasizes that learning to use man is essential for Linux administration and troubleshooting. Unlike graphical help systems, man pages are always available locally and do not require internet access.
The Mike Meyers / Mark Soper Lab Manual clarifies that chmod changes file permissions, cat displays file contents, and sudo allows commands to be run with elevated privileges. None of these commands provide documentation about other commands.
Because the question specifically asks about reading another command’s documentation, the Linux command designed for that exact purpose is man, making C the correct answer.
A user takes an iOS-based smartphone to a repair shop due to performance issues.
The technician observes:
Battery charge: 25%
Battery health: 90%
Hotspot: On
Used space: 63.76GB / 64GB
Which of the following is the most likely cause of the performance issue?
- A . The device is running out of free space
- B . The battery health is low
- C . The phone is not sufficiently charged
- D . The hotspot is degrading the performance
- E . Too many applications are open
A
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Running at near full storage capacity significantly slows down smartphones. iOS in particular requires space for caching and temporary files. Performance improves when storage is cleared. From Mike Meyers’ Lab Manual:
“Lack of free space causes mobile operating systems to struggle with temp files and updates. Performance improves significantly with adequate storage.”
An end user’s laptop is having network drive connectivity issues in the office. The end user submits a
help desk ticket, and a support technician is able to establish a remote connection and fix the issue. The following day, however, the network drive is disconnected again.
Which of the following should the technician do next?
- A . Connect remotely to the user’s computer to see whether the network drive is still connected.
- B . Send documentation about how to fix the issue in case it reoccurs.
- C . Escalate the ticket to the next level.
- D . Keep the ticket open until next day, then close the ticket.
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Since the issue has recurred after a temporary fix, it is likely a deeper or persistent configuration or server issue. Escalating the ticket to the next tier of support (e.g., network or system administrator) ensures further investigation and permanent resolution. Escalation is part of the standard support protocol when issues reoccur despite initial troubleshooting.
A user installed a free application from an unofficial application store. Now, their smartphone displays random pop-ups and shows increased data usage. Additionally, the user cannot perform certain actions such as opening banking applications or updating their OS.
Which of the following should the user do first to address the security issues on their smartphone?
- A . Perform a factory reset
- B . Clear the device cache
- C . Contact the manufacturer’s support line
- D . Change all passwords on the device
A
Explanation:
The correct answer is A. Perform a factory reset, because the symptoms strongly indicate a serious mobile malware infection, potentially including spyware or a trojan installed from an unofficial app store. Random pop-ups, excessive data usage, blocked access to banking apps, and inability to update the OS are classic indicators that malicious software has gained deep system-level access.
According to the Quentin Docter C CompTIA A+ Complete Study Guide, mobile malware installed from unofficial sources can embed itself deeply into the operating system, sometimes gaining device administrator privileges. In such cases, standard remediation steps such as clearing cache or uninstalling apps may be ineffective.
The Travis Everett & Andrew Hutz C All-in-One Exam Guide explains that when a mobile device shows signs of persistent compromise―especially when core OS functions and security-sensitive applications are affected―the recommended first step is to perform a factory reset. This completely wipes user-installed applications and restores the device to a known-good state.
The Mike Meyers / Mark Soper Lab Manual reinforces that changing passwords is important after the device is secured, not before. Contacting support or clearing cache does not remove deeply embedded malware.
Therefore, to immediately address the security threat and regain control of the device, a factory reset is the most appropriate first action, making A the correct answer.
