ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 49

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is also known as something you know, something you have, and something you are?

A.
ACL
A.
ACL
Answers
B.
MFA
B.
MFA
Answers
C.
SMS
C.
SMS
Answers
D.
NFC
D.
NFC
Answers
Suggested answer: B

Explanation:

MFA stands for Multi-Factor Authentication, which is a method of verifying a user's identity using two or more different factors of authentication. The three factors of authentication are something you know, something you have, and something you are. These factors correspond to different types of information or evidence that only the legitimate user should possess or provide. For example:

Something you know: a password, a PIN, a security question, etc.

Something you have: a smart card, a token, a mobile device, etc.

Something you are: a fingerprint, a face, an iris, etc.

MFA provides a higher level of security than single-factor authentication, which only uses one factor, such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an attacker would need to compromise more than one factor to impersonate a user.MFA is commonly used for online banking, email accounts, cloud services, and other sensitive applications

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

A.
Do not notify the customer if arriving before the customer.
A.
Do not notify the customer if arriving before the customer.
Answers
B.
Dismiss the customer and proceed with the after-hours work.
B.
Dismiss the customer and proceed with the after-hours work.
Answers
C.
Contact the customer if the technician is arriving late.
C.
Contact the customer if the technician is arriving late.
Answers
D.
Disclose the experience via social media.
D.
Disclose the experience via social media.
Answers
Suggested answer: C

Explanation:

The best option for the technician to demonstrate proper communication techniques and professionalism is to contact the customer if the technician is arriving late. This shows respect for the customer's time and expectations, and allows the customer to adjust their schedule accordingly. It also helps to maintain a positive relationship and trust between the technician and the customer. The technician should apologize for the delay and provide a realistic estimate of their arrival time. The technician should also thank the customer for their patience and understanding.

The other options are not appropriate or professional. Do not notify the customer if arriving before the customer is not a good practice, as it may cause confusion or frustration for the customer. The customer may have made other plans or arrangements based on the technician's original schedule, and may not be available or prepared for the service. Dismiss the customer and proceed with the after-hours work is rude and disrespectful, as it ignores the customer's needs and preferences. The customer may have questions or concerns about the service, or may want to supervise or verify the work. The technician should always communicate with the customer before, during, and after the service. Disclose the experience via social media is unethical and unprofessional, as it may violate the customer's privacy and the company's policies. The technician should not share any confidential or sensitive information about the customer or the service on social media, or make any negative or inappropriate comments about the customer or the situation.

CompTIA A+ Certification Exam Core 2 Objectives1

CompTIA A+ Core 2 (220-1102) Certification Study Guide2

8 Ways You Can Improve Your Communication Skills3

Professionalism in Communication | How To Do It And How It Pays4

Which of the following would typically require the most computing resources from the host computer?

A.
Chrome OS
A.
Chrome OS
Answers
B.
Windows
B.
Windows
Answers
C.
Android
C.
Android
Answers
D.
macOS
D.
macOS
Answers
E.
Linux
E.
Linux
Answers
Suggested answer: B

Explanation:

Windows is the operating system that typically requires the most computing resources from the host computer, compared to the other options. Computing resources include hardware components such as CPU, RAM, disk space, graphics card, and network adapter. The minimum system requirements for an operating system indicate the minimum amount of computing resources needed to install and run the operating system on a computer. The higher the minimum system requirements, the more computing resources the operating system consumes.

According to the web search results, the minimum system requirements for Windows 10 and Windows 11 are as follows12:

CPU: 1 GHz or faster with two or more cores (Windows 10); 1 GHz or faster with two or more cores on a compatible 64-bit processor (Windows 11)

RAM: 1 GB for 32-bit or 2 GB for 64-bit (Windows 10); 4 GB (Windows 11)

Disk space: 16 GB for 32-bit or 32 GB for 64-bit (Windows 10); 64 GB (Windows 11)

Graphics card: DirectX 9 or later with WDDM 1.0 driver (Windows 10); DirectX 12 compatible with WDDM 2.0 driver (Windows 11)

Network adapter: Ethernet or Wi-Fi (Windows 10); Ethernet or Wi-Fi that supports 5 GHz (Windows 11)

The minimum system requirements for macOS Ventura are as follows:

CPU: Intel Core i3 or higher, or Apple M1 chip

RAM: 4 GB

Disk space: 35.5 GB

Graphics card: Metal-capable

Network adapter: Ethernet or Wi-Fi

The minimum system requirements for Chrome OS are as follows:

CPU: Intel Celeron or higher

RAM: 2 GB

Disk space: 16 GB

Graphics card: Integrated

Network adapter: Ethernet or Wi-Fi

The minimum system requirements for Android are as follows:

CPU: 1 GHz or higher

RAM: 512 MB

Disk space: 8 GB

Graphics card: OpenGL ES 2.0

Network adapter: Ethernet or Wi-Fi

The minimum system requirements for Linux vary depending on the distribution, but a common example is Ubuntu, which has the following minimum system requirements:

CPU: 2 GHz dual core processor or better

RAM: 4 GB

Disk space: 25 GB

Graphics card: 1024 x 768 screen resolution

Network adapter: Ethernet or Wi-Fi

Based on the comparison of the minimum system requirements, Windows has the highest requirements for CPU, RAM, disk space, and graphics card, while Chrome OS and Android have the lowest requirements. macOS and Linux have moderate requirements, depending on the hardware and software configuration. Therefore, Windows is the operating system that typically requires the most computing resources from the host computer.

Windows, macOS, Chrome OS, or Linux: Which Operating System Is Right for You?1

Comparison of operating systems3

Windows 10 vs 11 Minimum System Requirements: Why Need a New One?2

macOS Monterey - Technical Specifications

Chrome OS - Wikipedia

Android - Wikipedia

Installation/SystemRequirements - Community Help Wiki

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

A.
SSID
A.
SSID
Answers
B.
DHCP
B.
DHCP
Answers
C.
Firewall
C.
Firewall
Answers
D.
SSD
D.
SSD
Answers
Suggested answer: A

Explanation:

The SSID (Service Set Identifier) is the name of a wireless network that is broadcasted by the router or the Wi-Fi base station. The SSID helps nearby devices to identify and connect to the available networks. However, broadcasting the SSID also exposes the network to potential connection attempts from unauthorized or malicious users. Therefore, disabling the SSID can mitigate connection attempts by making the network invisible or hidden to the devices that are not already connected to it. To connect to a hidden network, the user would need to know the exact SSID and enter it manually.

The other options are not related to mitigating connection attempts to the corporate Wi-Fi. DHCP (Dynamic Host Configuration Protocol) is a protocol that assigns IP addresses to the devices on a network. Firewall is a software or hardware device that filters the incoming and outgoing network traffic based on predefined rules. SSD (Solid State Drive) is a type of storage device that uses flash memory to store data. Disabling any of these options would not prevent connection attempts to the Wi-Fi network, and may cause other problems or issues for the network functionality and performance.

What is SSID + how to find (and change) it1

Choosing an SSID2

SSID Meaning: Finding Your Network's Name3

A network technician is deploying a new machine in a small branch office that does not have a DHCP server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to communicate with the rest of the network. Which of the following would restore communication?

A.
Static entry
A.
Static entry
Answers
B.
ARP table
B.
ARP table
Answers
C.
APIPA address
C.
APIPA address
Answers
D.
NTP specification
D.
NTP specification
Answers
Suggested answer: A

Explanation:

A static entry is the best option to restore communication for the new machine in a small branch office that does not have a DHCP server. A static entry means manually configuring the IP address, subnet mask, default gateway, and DNS server for the network adapter of the machine. A static entry ensures that the machine has a valid and unique IP address that matches the network configuration and can communicate with the rest of the network.

The new machine automatically receives the IP address of 169.254.0.2 because it uses APIPA (Automatic Private IP Addressing), which is a feature that enables computers to self-assign an IP address when a DHCP server is not available. However, APIPA only works for local communication within the same subnet, and does not provide a default gateway or a DNS server. Therefore, the new machine is unable to communicate with the rest of the network, which may be on a different subnet or require a gateway or a DNS server to access.

The other options are not related to restoring communication for the new machine. ARP table is a cache that stores the mapping between IP addresses and MAC addresses for the devices on the network. NTP specification is a protocol that synchronizes the clocks of the devices on the network.

CompTIA A+ Certification Exam Core 2 Objectives1

CompTIA A+ Core 2 (220-1102) Certification Study Guide2

What is APIPA (Automatic Private IP Addressing)?- Study-CCNA3

How to Configure a Static IP Address in Windows and OS X4

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

A.
Restart the phone.
A.
Restart the phone.
Answers
B.
Reimage the OS.
B.
Reimage the OS.
Answers
C.
Reinstall the application.
C.
Reinstall the application.
Answers
D.
Clear the cache.
D.
Clear the cache.
Answers
Suggested answer: C

Explanation:

Reinstalling the application is the best option to fix the intermittent crashing of the application on the corporate smartphone. Reinstalling the application will ensure that the latest version of the app is installed, which may have bug fixes and compatibility updates that can resolve the crashing issue. Reinstalling the app will also clear any corrupted or outdated data or cache that may cause the app to malfunction.

The other options are not as effective or appropriate as reinstalling the app. Restarting the phone may temporarily fix the issue, but it will not address the root cause of the app crashing, which may be related to the app itself or its data. Reimaging the OS is a drastic and unnecessary measure that will erase all the data and settings on the phone and restore it to its factory state. This will also remove all the other apps and files that may be important for the corporate use of the phone. Clearing the cache may help to free up some space and improve the performance of the app, but it will not update the app or fix any bugs that may cause the app to crash.

Top 5 Reasons Behind Your App Crash and Solutions To Fix Them1

How to Stop Apps From Crashing on Android2

Why are my Android phone apps crashing or closing & how to fix the issue3

A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues?

A.
End user training
A.
End user training
Answers
B.
Progress notes
B.
Progress notes
Answers
C.
Knowledge base
C.
Knowledge base
Answers
D.
Acceptable use policy document
D.
Acceptable use policy document
Answers
Suggested answer: C

Explanation:

A knowledge base is a centralized repository of information that can be used by technicians to find solutions to common problems, best practices, troubleshooting guides, and other useful resources12. Updating the knowledge base with the details of the issue and the resolution can help other technicians who encounter similar issues in the future.It can also reduce the number of tickets and improve customer satisfaction3.

Reference 1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-112: CompTIA A+ Certification Exam Core 2 Objectives, page 133: CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 10-12

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

A.
Group Policy
A.
Group Policy
Answers
B.
User accounts
B.
User accounts
Answers
C.
Access control lists
C.
Access control lists
Answers
D.
Authenticator applications
D.
Authenticator applications
Answers
Suggested answer: A

Explanation:

Group Policy is a feature of Windows that allows administrators to manage and configure settings for computers and users on a network12.One of the settings that can be controlled by Group Policy is the password policy, which defines the rules for creating and changing passwords, such as minimum length, complexity, expiration, and history34. By using Group Policy, the Chief Information Officer can enforce the new password length requirement for all users and computers in the company's domain, without having to manually adjust each user account or device.

Reference: 1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-112: CompTIA A+ Certification Exam Core 2 Objectives, page 133: The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10-124: CompTIA A+ Certification Exam: Core 2 (220-1102) Exam Objectives

A developer reports that a workstation's database file extensions have been changed from .db to .enc. The developer is also unable to open the database files manually. Which of the following is the best option for recovering the data?

A.
Accessing a restore point
A.
Accessing a restore point
Answers
B.
Rebooting into safe mode
B.
Rebooting into safe mode
Answers
C.
Utilizing the backups
C.
Utilizing the backups
Answers
D.
Using an AV to scan the affected files
D.
Using an AV to scan the affected files
Answers
Suggested answer: C

Explanation:

The scenario described in the question suggests that the workstation has been infected by a ransomware, which is a type of malware that encrypts the files on the target system and demands a ransom for the decryption key12.The file extension .enc is commonly used by some ransomware variants to mark the encrypted files34. The developer is unable to open the database files manually because they are encrypted and require the decryption key, which is usually held by the attacker.

The best option for recovering the data is to utilize the backups, assuming that the backups are recent, valid, and not affected by the ransomware. Backups are copies of the data that are stored in a separate location or device, and can be used to restore the data in case of a disaster, such as a ransomware attack . By restoring the data from the backups, the developer can avoid paying the ransom and losing the data permanently.

Accessing a restore point is not a good option, because restore points are snapshots of the system settings and configuration, not the data files. Restore points can help to undo some system changes, such as installing a faulty driver or software, but they cannot recover the encrypted data files .

Rebooting into safe mode is also not a good option, because safe mode is a diagnostic mode that allows the system to run with minimal drivers and services, but it does not affect the data files. Safe mode can help to troubleshoot some system issues, such as malware infections, but it cannot decrypt the data files .

Using an AV to scan the affected files is also not a good option, because an AV is a software that can detect and remove some malware, but it cannot decrypt the data files. An AV can help to prevent or remove some ransomware infections, but it cannot recover the encrypted data files .

Reference: 1: CompTIA A+ Certification Exam Core 2 Objectives, page 102: CompTIA A+ Core 2 (220-1102) Complete Video Course, Lesson 26 Documentation3:How to remove .enc file virus (Ransomware virus removal guide)4:Enc File Extension - What is an .enc file and how do I open it?: CompTIA A+ Certification Exam Core 2 Objectives, page 13 : CompTIA A+ Core 2 (220-1102) Complete Video Course, Lesson 26 Documentation :What is a restore point?:How to use System Restore on Windows 10: [What is Safe Mode?] : [How to boot into Safe Mode on Windows 10] : CompTIA A+ Certification Exam Core 2 Objectives, page 10 : [Can antivirus software remove ransomware?]

Which of the following items require special e-waste recycling? (Select two).

A.
Solid-state drive
A.
Solid-state drive
Answers
B.
A/C adapter
B.
A/C adapter
Answers
C.
Surge protector
C.
Surge protector
Answers
D.
Laptop battery
D.
Laptop battery
Answers
E.
CRT monitor
E.
CRT monitor
Answers
F.
Power supply
F.
Power supply
Answers
Suggested answer: D, E

Explanation:

Some electronic items require special e-waste recycling because they contain hazardous materials that can harm the environment and human health if disposed of improperly12. Laptop batteries and CRT monitors are examples of such items.

Laptop batteries are usually made of lithium-ion or nickel-metal hydride, which are both toxic and flammable substances34.If laptop batteries are thrown in the trash, they can leak, catch fire, or explode, causing pollution and injuries5. Therefore, laptop batteries should be recycled at authorized collection centers or through manufacturer take-back programs .

CRT monitors are old types of display devices that use cathode ray tubes, which are glass tubes that emit electrons to create images on the screen . CRT monitors contain lead, mercury, cadmium, and phosphor, which are all harmful metals that can contaminate the soil, water, and air if dumped in landfills . Therefore, CRT monitors should be recycled at certified e-waste facilities or through retailer or manufacturer trade-in programs .

Reference: 1: CompTIA A+ Certification Exam Core 2 Objectives, page 132: Environmental Impacts -- CompTIA A+ 220-1102 -- 4.533: The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10-124: CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key55: [Why You Should Recycle Your Old Laptop Battery] : [How to Recycle Laptop Batteries] : [Laptop Battery Recycling] : [How to Recycle Laptop Batteries] : The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10-12 : CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key : [What is a CRT Monitor?] : [How to Recycle CRT Monitors] : [CRT Monitor Recycling] : [How to Recycle CRT Monitors]

Total 755 questions
Go to page: of 76