ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 63

Question list
Search
Search

List of questions

Search

Related questions











A technician is troubleshooting a user's PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

A.
Install antispyware
A.
Install antispyware
Answers
B.
Reimage the system
B.
Reimage the system
Answers
C.
Disable the pop-up blocker
C.
Disable the pop-up blocker
Answers
D.
Upgrade the browser
D.
Upgrade the browser
Answers
E.
Install antivirus software
E.
Install antivirus software
Answers
Suggested answer: A

Explanation:

The presence of pop-up windows advertising free software and the error message about memory are indicative of spyware infection. Installing and running antispyware software is a practical first step to remove the unwanted software and resolve the issue without resorting to more drastic measures like re-imaging the system.

A technician needs to configure a computer for a user to work from home so the user can still securely access the user's shared files and corporate email. Which of the following tools would best accomplish this task*?

A.
MSRA
A.
MSRA
Answers
B.
FTP
B.
FTP
Answers
C.
RMM
C.
RMM
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: D

Explanation:

A Virtual Private Network (VPN) creates a secure connection over the internet to a network, allowing a user to access shared files and corporate email as if they were directly connected to the network. This makes VPN the best tool for secure remote work access, compared to the other options which do not offer the same level of secure, remote network access.

Which of the following language types enables the automation of tasks?

A.
Compiled
A.
Compiled
Answers
B.
Scripting
B.
Scripting
Answers
C.
Web
C.
Web
Answers
D.
Database
D.
Database
Answers
Suggested answer: B

Explanation:

Scripting languages are designed for automating tasks by writing scripts that can execute a series of commands. They are typically easier to write and understand compared to compiled languages and are widely used for automating repetitive tasks, making them the best option for task automation.

A technician is troubleshooting a user's PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

A.
Expired certificate
A.
Expired certificate
Answers
B.
False alert
B.
False alert
Answers
C.
Missing system files
C.
Missing system files
Answers
D.
OS update failure
D.
OS update failure
Answers
Suggested answer: B

Explanation:

The scenario described is characteristic of a malware tactic known as scareware, where users are tricked into installing malware through false alerts claiming that their system is infected. The anti-malware software installed in response to a pop-up is likely malicious, causing the system to run slowly and display frequent pop-ups.

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

A.
Trusted sources
A.
Trusted sources
Answers
B.
Valid certificates
B.
Valid certificates
Answers
C.
User training
C.
User training
Answers
D.
Password manager
D.
Password manager
Answers
Suggested answer: D

Explanation:

Using a password manager is the best way to mitigate the issue of users recording their login information in accessible areas. Password managers securely store and encrypt passwords and login details, reducing the need for users to write down or remember multiple complex passwords. This approach enhances security by encouraging the use of strong, unique passwords for different accounts without the risk of forgetting them or the unsafe practice of writing them down. Trusted sources, valid certificates, and user training are important security measures but do not directly address the problem of managing multiple secure passwords as effectively as a password manager does.

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

A.
Perform a safe mode boot.
A.
Perform a safe mode boot.
Answers
B.
Run the System Restore wizard.
B.
Run the System Restore wizard.
Answers
C.
Start the computer in the last known-good configuration.
C.
Start the computer in the last known-good configuration.
Answers
D.
Reset the BIOS settinqs.
D.
Reset the BIOS settinqs.
Answers
Suggested answer: A

Explanation:

Booting in safe mode is the initial step to diagnose a computer experiencing a blue screen of death (BSOD) following a failed Windows 10 update. Safe mode starts the computer with a minimal set of drivers and services, allowing troubleshooting and identification of the problematic software or driver causing the BSOD. This mode provides a safer environment to uninstall recent updates or drivers, perform system scans, and restore the system if necessary. Other options like System Restore wizard, last known-good configuration, and resetting BIOS settings may be subsequent steps but do not directly diagnose the issue as effectively as booting in safe mode.

Which of the following features can be used to ensure a user can access multiple versions of files?

A.
Multiple desktops
A.
Multiple desktops
Answers
B.
Remote Disc
B.
Remote Disc
Answers
C.
Time Machine
C.
Time Machine
Answers
D.
FileVault
D.
FileVault
Answers
Suggested answer: C

Explanation:

Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

A.
The application must be purchased by the company.
A.
The application must be purchased by the company.
Answers
B.
The smartphone is not on the latest OS version.
B.
The smartphone is not on the latest OS version.
Answers
C.
The smartphone is not enrolled in MDM service.
C.
The smartphone is not enrolled in MDM service.
Answers
D.
The application fails to install and launch.
D.
The application fails to install and launch.
Answers
Suggested answer: C

Explanation:

When an employee is unable to access the company portal using a VPN on their personal smartphone, the most likely cause is:

The smartphone is not enrolled in MDM service: Mobile Device Management (MDM) services often control access to company resources. If the smartphone is not enrolled, it may be blocked from accessing the VPN and, consequently, the company portal.

The application must be purchased by the company: Unlikely, as most VPN applications are free to download or included in the company's software package.

The smartphone is not on the latest OS version: While this could cause compatibility issues, it is less likely than the MDM enrollment issue.

The application fails to install and launch: This would be a different problem and would usually present specific error messages.

CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and embedded devices.

MDM configuration and access control documentation.

A systems administrator needs to access a hypervisor that went offline. After doing a port scan, the administrator notices that company policy is blocking the RDP default port. Which of the following ports should the administrator use to access the machine?

A.
22
A.
22
Answers
B.
23
B.
23
Answers
C.
80
C.
80
Answers
D.
3090
D.
3090
Answers
Suggested answer: A

Explanation:

When a systems administrator needs to access a hypervisor and the default RDP port (3389) is blocked by company policy, the administrator can use an alternative method. One common alternative is using SSH:

Port 22: This is the default port for SSH (Secure Shell), which is commonly used for secure remote access to servers and hypervisors, especially in Unix/Linux environments.

Port 23: This is the default port for Telnet, which is an unsecured protocol and generally not recommended for remote access due to security concerns.

Port 80: This is the default port for HTTP, used for web traffic, not remote access.

Port 3090: This is not a standard port for remote access protocols.

Using SSH (port 22) is a secure and widely accepted method for remote management of servers and hypervisors.

CompTIA A+ 220-1102 Exam Objectives, Section 2.6: Compare and contrast network services and protocols.

SSH and remote access documentation.

Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the following should the employees configure so the laptops can automatically connect wirelessly?

A.
Network and Internet settings
A.
Network and Internet settings
Answers
B.
Windows Firewall settings
B.
Windows Firewall settings
Answers
C.
Devices and Printers
C.
Devices and Printers
Answers
D.
Personalization settings
D.
Personalization settings
Answers
Suggested answer: A

Explanation:

To ensure that Windows 10 laptops can automatically connect to Wi-Fi networks when employees take them home, the appropriate configuration is:

Network and Internet settings: These settings allow users to manage Wi-Fi connections, configure automatic connections to known networks, and manage network profiles.

Go to Settings > Network & Internet > Wi-Fi.

Ensure the option to connect automatically to the home Wi-Fi network is enabled.

Windows Firewall settings: These are used to manage firewall rules and do not control Wi-Fi connectivity.

Devices and Printers: Used for managing connected devices and printers, not for network connections.

Personalization settings: These settings are for customizing the appearance of the Windows interface and do not affect network connections.

CompTIA A+ 220-1102 Exam Objectives, Section 1.6: Given a scenario configure Microsoft Windows networking features on a client/desktop.

Windows network configuration documentation.

Total 755 questions
Go to page: of 76