ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

Related questions











A technician, who is completing hardware upgrades at a company, is approached by a user who submitted a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's office is not listed for an upgrade. Which of the following actions should the technician take next?

A.
Ask the company's human resources department to address the issue.
A.
Ask the company's human resources department to address the issue.
Answers
B.
Notify the project manager about the user's concern.
B.
Notify the project manager about the user's concern.
Answers
C.
Tell the user that this request is not on the list to be upgraded.
C.
Tell the user that this request is not on the list to be upgraded.
Answers
D.
Ask the user's supervisor if the technician should upgrade the computer.
D.
Ask the user's supervisor if the technician should upgrade the computer.
Answers
Suggested answer: B

Explanation:

When a technician finds that a user's office is not listed for an upgrade but the user has submitted a request, the appropriate action is to:

Notify the project manager about the user's concern: The project manager oversees the upgrade process and can address any discrepancies or omissions in the upgrade list.

Ask the company's human resources department to address the issue: HR typically handles personnel matters, not hardware upgrades.

Tell the user that this request is not on the list to be upgraded: This does not resolve the user's concern and could cause frustration.

Ask the user's supervisor if the technician should upgrade the computer: The supervisor may not have the authority or information to make decisions about the upgrade list.

CompTIA A+ 220-1102 Exam Objectives, Section 4.1: Given a scenario implement best practices associated with documentation and support systems information management.

Best practices for handling user requests and project management documentation.

A customer is configuring on an old desktop an inexpensive file server to share photos and videos and wants to avoid complicated licensing. Which of the following operating systems should the technician most likely recommend?

A.
Chrome OS
A.
Chrome OS
Answers
B.
Linux
B.
Linux
Answers
C.
macOS
C.
macOS
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: B

Explanation:

For an inexpensive file server to share photos and videos while avoiding complicated licensing, the technician should recommend:

Linux: Linux is a free and open-source operating system that is ideal for setting up a file server. It offers robust file-sharing capabilities with minimal licensing complications.

Chrome OS: Designed primarily for lightweight, web-based tasks and not ideal for a file server.

macOS: Requires Apple hardware and involves more complex licensing compared to Linux.

Windows: While capable of being a file server, Windows may involve licensing fees, particularly for server editions.

CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes.

Linux documentation and its use in setting up file servers.

A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the following user roles within the Windows OS should the technician choose?

A.
Power
A.
Power
Answers
B.
Default
B.
Default
Answers
C.
Administrator
C.
Administrator
Answers
D.
Superuser
D.
Superuser
Answers
Suggested answer: C

Explanation:

In the Windows OS, to grant a user permissions equivalent to root-level permissions (which means full control over the system), the user needs to be given:

Administrator: The Administrator role provides full control over the system, including the ability to install and uninstall software, change system settings, and access all files and directories.

Power: The Power User role provides some administrative capabilities but not full control. It is a legacy role with fewer permissions than Administrator.

Default: This refers to a standard user account with limited permissions.

Superuser: This term is more commonly associated with Unix/Linux systems and is not a specific role in Windows.

CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario manage and configure basic security settings in the Microsoft Windows OS.

Windows user roles and permissions documentation.

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

A.
Move the application to the desktop and press delete.
A.
Move the application to the desktop and press delete.
Answers
B.
Identify the application in Finder and drag it to the trash can.
B.
Identify the application in Finder and drag it to the trash can.
Answers
C.
Use Spotlight to search for the application, and then run the application.
C.
Use Spotlight to search for the application, and then run the application.
Answers
D.
Use Time Machine to go back to the date before the installation.
D.
Use Time Machine to go back to the date before the installation.
Answers
Suggested answer: B

Explanation:

To uninstall an incorrect application on an iMac, the standard and recommended method is:

Identify the application in Finder and drag it to the trash can: This action removes the application from the system. After dragging the application to the trash, the user should empty the trash to complete the uninstallation.

Move the application to the desktop and press delete: This action does not uninstall the application.

Use Spotlight to search for the application, and then run the application: Running the application does not uninstall it.

Use Time Machine to go back to the date before the installation: This method can be used to restore the system to a previous state but is not necessary for uninstalling an application.

CompTIA A+ 220-1102 Exam Objectives, Section 1.10: Identify common features and tools of the macOS/desktop OS.

Apple support documentation for uninstalling applications.

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?

A.
The default gateway is up.
A.
The default gateway is up.
Answers
B.
The user has an APIPA IP address.
B.
The user has an APIPA IP address.
Answers
C.
The IP address is on the wrong subnet
C.
The IP address is on the wrong subnet
Answers
D.
The subnet mask is incorrect.
D.
The subnet mask is incorrect.
Answers
Suggested answer: D

Explanation:

The ipconfig /all output shows the following:

IPv4 Address............ 192.168.0.74 Subnet Mask............. 255.255.255.255 Default Gateway......... 192.168.0.1

The issue with the subnet mask being set to 255.255.255.255 is that it specifies a single host subnet, meaning the device cannot communicate with other devices on the network or access the internet. The correct subnet mask for a typical home network should be:

Subnet mask of 255.255.255.0: This allows for communication within the same local network (192.168.0.0/24).

Default gateway 192.168.0.1: Correct, this is the typical address for the router.

IPv4 Address 192.168.0.74: Correct, within the correct subnet range.

Changing the subnet mask to 255.255.255.0 will resolve the connectivity issue.

CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks.

IP addressing and subnetting documentation.

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

A.
Scan all of the infected files with up-to-date, anti-malware cleaning software.
A.
Scan all of the infected files with up-to-date, anti-malware cleaning software.
Answers
B.
Fully patch the server operating systems hosting the fileshares.
B.
Fully patch the server operating systems hosting the fileshares.
Answers
C.
Change the files to be read-only.
C.
Change the files to be read-only.
Answers
D.
Restore critical data from backup.
D.
Restore critical data from backup.
Answers
Suggested answer: D

Explanation:

When an organization refuses to pay the ransom for a decryption key after a ransomware attack, and all traces of the infection have been removed, the next critical step is:

Restore critical data from backup: This is the most effective way to recover from a ransomware attack without paying the ransom. Assuming the organization has good backup practices, the backups should be free from infection and can be restored to get the systems operational again.

Scan all of the infected files with up-to-date, anti-malware cleaning software: This step is important during the infection removal process but does not address restoring the encrypted files.

Fully patch the server operating systems hosting the fileshares: While this is necessary to prevent future attacks, it does not recover the encrypted files.

Change the files to be read-only: This will not help recover the encrypted data.

CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario use common data destruction and disposal methods.

Best practices for ransomware recovery.

After a user upgraded the Windows operating system to the latest feature release, the user notices that one of the legacy applications that was running correctly before the upgrade does not open some windows and is only partially functional. Which of the following actions should the user take to troubleshoot the issue?

A.
Run the application as Administrator.
A.
Run the application as Administrator.
Answers
B.
Raise the User Account Control level.
B.
Raise the User Account Control level.
Answers
C.
Turn off Windows Defender Firewall.
C.
Turn off Windows Defender Firewall.
Answers
D.
Disable compatibility mode for the application.
D.
Disable compatibility mode for the application.
Answers
Suggested answer: A

Explanation:

When a legacy application is not fully functional after upgrading the Windows operating system, the first step to troubleshoot the issue is to:

Run the application as Administrator: Legacy applications often require administrative privileges to run correctly. Running the application with these privileges can resolve issues related to permissions and access to certain system resources.

Raise the User Account Control level: This increases security prompts but does not resolve compatibility issues.

Turn off Windows Defender Firewall: This can expose the system to security risks and is unlikely to resolve application functionality issues.

Disable compatibility mode for the application: Compatibility mode should generally be enabled for legacy applications to ensure they run properly on newer OS versions.

CompTIA A+ 220-1102 Exam Objectives, Section 1.3: Given a scenario use features and tools of the Microsoft Windows 10 operating system (OS).

Windows application compatibility troubleshooting documentation.

Which of the following ensures data is unrecoverable on a lost or stolen mobile device?

A.
Device encryption
A.
Device encryption
Answers
B.
Remote wipe
B.
Remote wipe
Answers
C.
Data backup
C.
Data backup
Answers
D.
Fingerprint reader
D.
Fingerprint reader
Answers
Suggested answer: B

Explanation:

To ensure data is unrecoverable on a lost or stolen mobile device, the best solution is:

Remote wipe: This feature allows the device owner or IT administrator to remotely erase all data on the device, ensuring that it cannot be recovered by unauthorized users.

Device encryption: While important for protecting data, encryption alone does not remove data from the device.

Data backup: Ensures data is saved elsewhere but does not make it unrecoverable on the lost or stolen device.

Fingerprint reader: Provides security for accessing the device but does not affect data recovery if the device is compromised.

CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and embedded devices.

Mobile device security practices documentation.

A user is unable to see transaction details on a website, and nothing happens when the user clicks the details button. Which of the following should the user do to fix this issue?

A.
Clear the browser cache.
A.
Clear the browser cache.
Answers
B.
Disable the pop-up blocker.
B.
Disable the pop-up blocker.
Answers
C.
Configure private browsing.
C.
Configure private browsing.
Answers
D.
Verify valid certificates.
D.
Verify valid certificates.
Answers
Suggested answer: B

Explanation:

Pop-up blockers can sometimes prevent essential pop-up windows required by websites to display transaction details.

Clear the browser cache: Helps with loading issues but not specific to pop-ups.

Disable the pop-up blocker: The correct solution, as it allows the blocked pop-up to be displayed.

Configure private browsing: Prevents storing browsing data but does not affect pop-ups.

Verify valid certificates: Ensures secure connections but does not resolve pop-up issues.

A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add the majority of the workstations, but failed on a couple. Which of the following menus should the technician check in order to complete the task manually?

A.
User Accounts
A.
User Accounts
Answers
B.
System Properties
B.
System Properties
Answers
C.
Windows Firewall
C.
Windows Firewall
Answers
D.
Network and Sharing
D.
Network and Sharing
Answers
Suggested answer: B

Explanation:

To manually add a workstation to a domain, the technician needs to access the System Properties menu where domain settings are configured.

User Accounts: Manages user accounts but does not handle domain membership.

System Properties: The correct place to add or change domain membership settings.

Windows Firewall: Manages firewall settings but not domain membership.

Network and Sharing: Manages network connections and sharing but not domain settings.

Total 755 questions
Go to page: of 76