ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Which of the following commands can a technician use to get the MAC address of a Linux distribution?

A.
net use
A.
net use
Answers
B.
ifconfig
B.
ifconfig
Answers
C.
netstat
C.
netstat
Answers
D.
ping
D.
ping
Answers
Suggested answer: B

Explanation:

The ifconfig command is a tool for configuring network interfaces that any Linux system administrator should know.It is used to bring interfaces up or down, assign and remove addresses and routes, manage ARP cache, and much more1. One of the information that ifconfig can display is the MAC address of each network interface, which is a unique identifier of the physical layer of the network device. The MAC address is usually shown as a hexadecimal string separated by colons, such as 00:0c:29:3f:5c:1f. To get the MAC address of a Linux distribution, a technician can use the ifconfig command without any arguments, which will show the details of all the active network interfaces, or specify the name of a particular interface, such as eth0 or wlan0, to show only the details of that interface.

Reference: 1: Linux Commands - CompTIA A+ 220-1102 - 1.11 - Professor Messer IT Certification Training Courses1

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

A.
msconfig
A.
msconfig
Answers
B.
chkdsk
B.
chkdsk
Answers
C.
sfc
C.
sfc
Answers
D.
diskpart
D.
diskpart
Answers
E.
mstsc
E.
mstsc
Answers
Suggested answer: C

Explanation:

The sfc command is a tool for scanning and repairing system files that are corrupted or missing on Windows operating systems12. System files are essential files that are required for the proper functioning of the operating system, such as the GUI, drivers, services, and applications. If system files are damaged or deleted, the operating system may fail to start or run properly, causing errors, crashes, or blue screens.

The sfc command can be used to fix the issue of the PC that is unable to start the GUI, assuming that the problem is caused by corrupted or missing system files.The sfc command can be run from the command prompt, which can be accessed by booting the PC from the installation media, choosing the repair option, and selecting the command prompt option3.The sfc command can be used with different switches, such as /scannow, /verifyonly, /scanfile, or /offbootdir, depending on the situation and the desired action4.The most common switch is /scannow, which scans all the system files and repairs any problems that are found5. The syntax of the sfc command with the /scannow switch is:

sfc /scannow

The sfc command will then scan and repair the system files, and display the results on the screen. If the sfc command is able to fix the system files, the PC should be able to start the GUI normally after rebooting. If the sfc command is unable to fix the system files, the PC may need further troubleshooting or a clean installation of Windows.

Reference: 1: CompTIA A+ Certification Exam Core 2 Objectives, page 102: CompTIA A+ Core 2 (220-1102) Complete Video Course, Lesson 26 Documentation3:How to use SFC Scannow to repair Windows system files4:SFC Command (System File Checker)5:How to Repair Windows 10 using Command Prompt

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

A.
Color Management
A.
Color Management
Answers
B.
System
B.
System
Answers
C.
Troubleshooting
C.
Troubleshooting
Answers
D.
Device Manager
D.
Device Manager
Answers
E.
Administrative Tools
E.
Administrative Tools
Answers
Suggested answer: D

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

* Data recovery is easy.

Which of the following filesystem types best meets these requirements?

A.
ext3
A.
ext3
Answers
B.
FAT32
B.
FAT32
Answers
C.
exFAT
C.
exFAT
Answers
D.
NTFS
D.
NTFS
Answers
Suggested answer: A

Explanation:

The ext3 file system is a Linux native file system that meets the requirements of the question. It has the following features:

All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to the file system metadata in a special log called the journal before applying them to the actual file system.This ensures that the file system can be restored to a consistent state in case of a power failure or system crash12.

The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility of file corruption, as it avoids the need for a full file system check after an unclean shutdown.The file system can be quickly replayed from the journal and any inconsistencies can be fixed12.

Data recovery is easy.The ext3 file system supports undeletion of files using tools such as ext3grep or extundelete, which can scan the file system for deleted inodes and attempt to recover the data blocks associated with them34.

1: Introduction to Linux File System [Structure and Types] - MiniTool12: 7 Ways to Determine the File System Type in Linux (Ext2, Ext3 or Ext4) - Tecmint33: How to Recover Deleted Files in Linux with ext3grep4: How to Recover Deleted Files from ext3 Partitions

Which of the following is the best reason for sandbox testing in change management?

A.
To evaluate the change before deployment
A.
To evaluate the change before deployment
Answers
B.
To obtain end-user acceptance
B.
To obtain end-user acceptance
Answers
C.
To determine the affected systems
C.
To determine the affected systems
Answers
D.
To select a change owner
D.
To select a change owner
Answers
Suggested answer: A

Explanation:

Sandbox testing is a method of testing changes in a simulated environment that mimics the real one, without affecting the actual production system. Sandbox testing is useful for change management because it allows the testers to evaluate the change before deployment, and ensure that it works as intended, does not cause any errors or conflicts, and meets the requirements and expectations of the stakeholders. Sandbox testing also helps to protect the investment in the existing system, as it reduces the risk of introducing bugs or breaking functionality that could harm the customer experience or the business operations. Sandbox testing also gives the testers more control over the customer experience, as they can experiment with different scenarios and configurations, and optimize the change for the best possible outcome.

1: Change Management and Sandbox - Quickbase1 2: Embracing change: Build, test, and adapt in a sandbox environment - Zendesk3

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

A.
Respond to calls and text messages while on site but not when working directly with personnel.
A.
Respond to calls and text messages while on site but not when working directly with personnel.
Answers
B.
Respond to calls and text messages only from family.
B.
Respond to calls and text messages only from family.
Answers
C.
Respond to calls and text messages only when an emergency situation requires a response.
C.
Respond to calls and text messages only when an emergency situation requires a response.
Answers
D.
Respond to calls and text messages discreetly while on site.
D.
Respond to calls and text messages discreetly while on site.
Answers
Suggested answer: C

Explanation:

A technician should handle personal communication while on site in a professional and respectful manner.According to the CompTIA A+ Core 2 (220-1102) exam objectives, one of the best practices for communication skills is to ''avoid distractions and interruptions'' when working with customers1. This means that the technician should not respond to calls and text messages that are not related to the work or the customer, unless there is an emergency situation that requires a response. Responding to personal communication while on site can be seen as rude, unprofessional, and disrespectful to the customer and their time. It can also affect the quality and efficiency of the technician's work and cause errors or delays. Therefore, the technician should only respond to calls and text messages when an emergency situation requires a response, and inform the customer about the situation and apologize for the interruption.

The other options are not appropriate for handling personal communication while on site. Responding to calls and text messages while on site but not when working directly with personnel (A) is still distracting and unprofessional, as it can interfere with the technician's focus and productivity. Responding to calls and text messages only from family (B) is not a valid criterion, as the technician may receive calls and text messages from other sources that are not related to the work or the customer. Responding to calls and text messages discreetly while on site (D) is not a good practice, as it can still be noticed by the customer or other personnel and create a negative impression.

1:CompTIA A+ Certification Exam Core 2 Objectives - CompTIA

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

A.
Programs and Features
A.
Programs and Features
Answers
B.
Network and Sharing Center
B.
Network and Sharing Center
Answers
C.
User Accounts
C.
User Accounts
Answers
D.
Device Manager
D.
Device Manager
Answers
Suggested answer: B

Explanation:

The Network and Sharing Center is a Control Panel utility that allows users to view and modify network settings, such as IP address, subnet mask, default gateway, DNS servers, and network profiles. To change the IP and gateway settings of a Windows workstation, the technician can follow these steps:

Open the Network and Sharing Center by clicking on the network icon in the system tray or by searching for it in the Start menu.

Click on Change adapter settings on the left sidebar.

Right-click on the network adapter that is connected to the network and select Properties.

Double-click on Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) depending on the network protocol used.

Select Use the following IP address and enter the desired IP address, subnet mask, and default gateway for the workstation. Alternatively, select Obtain an IP address automatically if the network uses DHCP to assign IP addresses dynamically.

Click OK to save the changes and close the dialog boxes.

The Official CompTIA A+ Core 2 Study Guide (220-1102), page 2171

How to change the IP address in Windows 10 and Windows 11 (4 ways), section 12

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

A.
Only accept calls from known people.
A.
Only accept calls from known people.
Answers
B.
Disregard any suspicious emails.
B.
Disregard any suspicious emails.
Answers
C.
Update the antivirus software.
C.
Update the antivirus software.
Answers
D.
Enable two-factor authentication.
D.
Enable two-factor authentication.
Answers
E.
Install a malware scanner.
E.
Install a malware scanner.
Answers
Suggested answer: A

Explanation:

This is a scenario of a potentialtech support scam, where a fraudster pretends to be a technical support agent and tries to trick the user into giving them access to the computer, personal information, or money. The user should not trust any unsolicited calls from unknown people claiming to be from tech support, as they might be trying to install malware, steal data, or charge for fake services. The user should only accept calls from known people, such as their IT department, their service provider, or their software vendor, and verify their identity before logging in to the computer. The user should also report any suspicious calls to the appropriate authorities or organizations.

How to protect against tech support scams1

Avoid and report Microsoft technical support scams2

How to Protect Against Technical Support Scams3

How To Recognize and Avoid Tech Support Scams4

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

A.
Quarantine the computer.
A.
Quarantine the computer.
Answers
B.
Use a previous restore point.
B.
Use a previous restore point.
Answers
C.
Educate the end user about viruses.
C.
Educate the end user about viruses.
Answers
D.
Download the latest virus definitions.
D.
Download the latest virus definitions.
Answers
Suggested answer: D

Explanation:

The first step in removing a virus from a computer is to update the antivirus software with the latest virus definitions. Virus definitions are files that contain information about the characteristics and behavior of known viruses and malware. They help the antivirus software to identify and remove the malicious threats from the computer. Without the latest virus definitions, the antivirus software may not be able to detect or remove the virus that infected the user's computer. Therefore, the technician should download the latest virus definitions from the antivirus vendor's website or use the update feature in the antivirus program before scanning the computer for viruses.

How to remove malware or viruses from my Windows 10 PC, section 21

How to Remove a Virus From a Computer in 2023, section 32

The Official CompTIA A+ Core 2 Study Guide (220-1102), page 2193

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

A.
msinfo32.exe
A.
msinfo32.exe
Answers
B.
dxdiag.exe
B.
dxdiag.exe
Answers
C.
msconfig.exe
C.
msconfig.exe
Answers
D.
regedit.exe
D.
regedit.exe
Answers
Suggested answer: C

Explanation:

The msconfig.exe tool, also known as the System Configuration utility, is a tool that allows users to modify various system settings, such as startup options, services, boot options, and more. One of the features of msconfig.exe is the ability to disable or enable device drivers that are loaded during the system startup. By using msconfig.exe, a technician can prevent a driver from being loaded and used by the system, which will allow them to uninstall it without any errors. To use msconfig.exe to disable a driver, the technician can follow these steps:

Open the Run dialog box by pressing the Windows key + R.

Type msconfig.exe and press Enter.

Click on the Boot tab and then click on Advanced options.

Check the box next to No GUI boot and click OK. This will prevent the graphical user interface from loading during the boot process, which will also prevent some drivers from loading.

Click on the Services tab and check the box next to Hide all Microsoft services. This will show only the third-party services and drivers that are running on the system.

Find the service or driver that corresponds to the device that the technician wants to uninstall and uncheck the box next to it. This will disable the service or driver from starting during the system startup.

Click Apply and OK and then restart the computer.

After the computer restarts, the technician can use the Device Manager or the Control Panel to uninstall the driver that was previously in use.

How to Completely Remove/Uninstall a Driver in Windows, section 31

The Official CompTIA A+ Core 2 Study Guide (220-1102), page 2212

Total 755 questions
Go to page: of 76