ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 54

Question list
Search
Search

List of questions

Search

Related questions











Which of the following languages is used for scripting the creation of Active Directory accounts?

A.
Bash
A.
Bash
Answers
B.
SQL
B.
SQL
Answers
C.
PHP
C.
PHP
Answers
D.
PowerShell
D.
PowerShell
Answers
Suggested answer: D

Explanation:

PowerShell is a scripting language that can interact with Active Directory and other Windows components. It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell can also use the Active Directory module to access other AD-related functions and attributes. Other languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and would require additional tools or libraries to do so.

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

A.
Windows
A.
Windows
Answers
B.
Chrome OS
B.
Chrome OS
Answers
C.
Android
C.
Android
Answers
D.
iOS
D.
iOS
Answers
Suggested answer: A

Explanation:

Windows is widely used in industrial and business environments due to its major market presence, extensive support from the industry, and a broad selection of operating system options. It supports a wide variety of software, making it suitable for running complex systems like an inventory management system in a factory. Other options such as Chrome OS, Android, and iOS are either more consumer-oriented or designed for specific types of devices, making them less likely choices for an industrial application like inventory management.

Reference: Professor Messer's CompTIA 220-1102 A+ Course Notes.

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

A.
Apps and Features
A.
Apps and Features
Answers
B.
Personalization
B.
Personalization
Answers
C.
File Explorer
C.
File Explorer
Answers
D.
Task Manager
D.
Task Manager
Answers
Suggested answer: B

Explanation:

To change the wallpaper on a Windows 10 laptop, the 'Personalization' settings should be used. These settings allow users to customize themes, which include various aspects of the desktop environment such as the desktop wallpaper, screen saver, color scheme, and more. This makes 'Personalization' the correct option for customizing the wallpaper.

Reference: Official CompTIA A+ Core 1 and Core 2 Student Guide.

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.
Examine the event logs.
A.
Examine the event logs.
Answers
B.
Connect to the network.
B.
Connect to the network.
Answers
C.
Document the findings.
C.
Document the findings.
Answers
D.
Update the definitions.
D.
Update the definitions.
Answers
E.
Reimage the computer.
E.
Reimage the computer.
Answers
F.
Enable the firewall.
F.
Enable the firewall.
Answers
Suggested answer: A, D

Explanation:

When dealing with a suspected virus infection on an air-gapped computer, after an initial scan with Windows Defender shows no infection, the next steps should include examining the event logs to look for suspicious activity and updating the virus definitions for a more thorough scan. Event logs can provide insights into system changes and potential malicious activities, while updated definitions ensure the antivirus software can detect the latest threats. Connecting to the network or enabling the firewall might not be appropriate due to the risk of spreading the infection, and re-imaging the computer or documenting the findings would be subsequent steps if the initial actions don't resolve the issue.

Reference: Official CompTIA A+ Core 1 and Core 2 Student Guide.

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?

A.
nslookup
A.
nslookup
Answers
B.
tracert
B.
tracert
Answers
C.
hostname
C.
hostname
Answers
D.
gpresult
D.
gpresult
Answers
Suggested answer: C

Explanation:

The hostname command-line tool is used to display the name of the local machine. This information can be crucial for identifying the device within a network, especially when setting up remote access or sharing resources like folders and printers. Unlike other command-line tools that provide more detailed network diagnostics or configuration details, hostname straightforwardly offers the device's network identification, making it suitable for the scenario described.

Reference: Official CompTIA A+ Core 1 and Core 2 Student Guide.


A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

A.
Scan for malware and ransomware.
A.
Scan for malware and ransomware.
Answers
B.
Perform a system restore.
B.
Perform a system restore.
Answers
C.
Check the network utilization.
C.
Check the network utilization.
Answers
D.
Update the antivirus software.
D.
Update the antivirus software.
Answers
Suggested answer: A

Explanation:

The most likely cause of the user's laptop issues is that it has been infected by some type of malware or ransomware.Malware and ransomware are malicious software that can harm, exploit, or disrupt devices or networks12.They can cause symptoms such as slow performance, browser redirects, pop-up windows, data encryption, or ransom demands12.Therefore, the first step a technician should take to resolve the issue is to scan the laptop for malware and ransomware using a reliable and updated anti-malware tool34. This can help identify and remove any malicious software that may be present on the laptop. Scanning for malware and ransomware is more effective and urgent than the other options because:

Performing a system restore may not remove the malware or ransomware, as some of them can persist or hide in the system files or backup copies34.Moreover, a system restore may result in data loss or corruption, as it restores the system to a previous state and deletes any changes made after that point5.

Checking the network utilization may not help diagnose or fix the problem, as the malware or ransomware may not be using the network at all, or may be using it in a stealthy or encrypted manner34. Furthermore, checking the network utilization does not address the root cause of the issue, which is the presence of malicious software on the laptop.

Updating the antivirus software may not be sufficient to detect or remove the malware or ransomware, as some of them may evade or disable the antivirus software, or may be too new or unknown for the antivirus software to recognize34. Additionally, updating the antivirus software does not guarantee that the laptop will be scanned for malware or ransomware, as the user may need to initiate or schedule the scan manually.

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

A.
Privacy
A.
Privacy
Answers
B.
Advanced
B.
Advanced
Answers
C.
Content
C.
Content
Answers
D.
Connections
D.
Connections
Answers
E.
Security
E.
Security
Answers
Suggested answer: D

Explanation:

The Connections tab in Internet Options allows the technician to configure the proxy server settings for the workstations. The technician can enter the proxy server address and port number, and specify which websites to bypass the proxy server for. The other tabs are not relevant for configuring the proxy server settings.Reference:CompTIA A+ Certification Exam Core 2 Objectives, page 9, section 1.7;CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 140, section 1.7.

A user is experiencing the following issues with Bluetooth on a smartphone:

* The user cannot hear any sound from a speaker paired with the smartphone.

* The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

A.
Restart the smartphone.
A.
Restart the smartphone.
Answers
B.
Reset the network settings.
B.
Reset the network settings.
Answers
C.
Unpair the Bluetooth speaker.
C.
Unpair the Bluetooth speaker.
Answers
D.
Check for system updates.
D.
Check for system updates.
Answers
Suggested answer: A

Explanation:

Restarting the smartphone can resolve a wide range of technical issues, including those related to Bluetooth connectivity. This simple step can refresh the system and eliminate temporary software glitches that might be interfering with Bluetooth functions like audio output and data synchronization.

Restart the smartphone: This action clears the system's RAM and can resolve conflicts between the Bluetooth service and other processes running on the smartphone, potentially fixing both the audio and synchronization issues.

Resetting network settings (B) could also potentially fix the issue but is a more drastic step that also clears Wi-Fi networks and passwords, cellular settings, and VPN configurations, which might not be necessary. Unpairing the Bluetooth speaker (C) could help if the issue is specific to the speaker, but since there are also synchronization issues with the smartwatch, the problem seems broader. Checking for system updates (D) is a good general maintenance step, but it's more likely to help with ongoing or known issues rather than immediate connectivity problems.

A user's Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

A.
Disk Defragment
A.
Disk Defragment
Answers
B.
Registry Editor
B.
Registry Editor
Answers
C.
System Information
C.
System Information
Answers
D.
Disk Cleanup
D.
Disk Cleanup
Answers
Suggested answer: A

Explanation:

Over time, especially with frequent opening, modification, and saving of large files, a hard disk drive (HDD) can become fragmented. Fragmentation occurs when pieces of individual files are scattered across the disk, leading to longer read and write times, which can significantly slow down the computer. Disk defragmentation reorganizes these fragmented files, placing the pieces closer together on the drive, which improves access time and overall system performance.

Disk Defragment: Using the Disk Defragment tool on a Windows 10 system with an HDD will help in reorganizing the data more efficiently, thus potentially remedying the slow performance issue.

The Registry Editor (B) is a tool that allows for the viewing and editing of the Windows registry and is generally not used for performance improvement but rather for system settings and configuration adjustments. System Information (C) provides a detailed look at the computer's hardware and system details but does not offer tools for performance improvement. Disk Cleanup (D) can help free up space on the hard drive by removing temporary files and system files that are no longer needed, which can indirectly improve performance but is not the primary tool for addressing fragmentation.

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

'This site cannot be reached.'

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

A.
HTTPS
A.
HTTPS
Answers
B.
VLAN
B.
VLAN
Answers
C.
DNS
C.
DNS
Answers
D.
SMTP
D.
SMTP
Answers
Suggested answer: C

Explanation:

The error 'This site cannot be reached' often indicates a problem with DNS (Domain Name System) resolution, where the browser is unable to translate a website's domain name into its corresponding IP address. Since the laptop was set to use DHCP (Dynamic Host Configuration Protocol) at home, it's possible that it's not receiving the correct DNS server information from the home network, or the DNS servers it was using at work are not accessible from the home network.

DNS: Checking and possibly correcting the DNS settings to ensure they are appropriate for the home network might resolve the browsing issue. The user can try using public DNS servers like those provided by Google (8.8.8.8 and 8.8.4.4) or Cloudflare (1.1.1.1) if the default DNS servers provided by the home ISP are not working properly.

HTTPS (A) is a protocol for secure communication over a computer network but is not something that needs to be configured on the user's end to solve this type of issue. VLAN (B) stands for Virtual Local Area Network and is more related to network segmentation and management within larger networks, not typically applicable to home internet issues. SMTP (D) stands for Simple Mail Transfer Protocol, which is used for sending emails, not for general web browsing issues.

Total 755 questions
Go to page: of 76