ExamGecko
Home Home / CompTIA / 220-1102

CompTIA 220-1102 Practice Test - Questions Answers, Page 69

Question list
Search
Search

List of questions

Search

Related questions











A technician is configuring security for a computer that is located in a common are a. A sign above the computer indicates only authorized users can use the computer. Guests visiting the office must walk past the computer to enter and leave the office. Which of the following will offer the best protection against physical threats?

A.
Using screen lock
A.
Using screen lock
Answers
B.
Installing a privacy screen
B.
Installing a privacy screen
Answers
C.
Implementing password complexity
C.
Implementing password complexity
Answers
D.
Locking the computer case
D.
Locking the computer case
Answers
E.
Enabling drive encryption
E.
Enabling drive encryption
Answers
Suggested answer: D

Explanation:

The best protection against physical threats, especially in a common area where the computer is publicly accessible, involves physically securing the hardware.

Option A: Using screen lock Screen locks are good for securing access temporarily but do not protect against physical tampering or theft.

Option B: Installing a privacy screen Privacy screens prevent visual access but do not secure the hardware.

Option C: Implementing password complexity Password complexity helps secure digital access but does not prevent physical threats.

Option D: Locking the computer case Physically securing the case prevents unauthorized individuals from tampering with internal components or stealing the computer.

Option E: Enabling drive encryption Encryption protects data but does not prevent physical access to the hardware itself.

CompTIA A+ 220-1102 Objective 2.1 (Physical security), particularly physical security measures like locking the computer case.

A user's Android phone has been randomly restarting. A technician investigates and finds several applications have been installed that are not available within the standard marketplace. Which of the following is most likely the cause of the issue?

A.
The OS update failed.
A.
The OS update failed.
Answers
B.
The user downloaded malware.
B.
The user downloaded malware.
Answers
C.
The device is In developer mode.
C.
The device is In developer mode.
Answers
D.
The over-the-air carrier update failed.
D.
The over-the-air carrier update failed.
Answers
Suggested answer: B

Explanation:

Random restarting of an Android phone and the presence of applications not from the standard marketplace strongly suggest the possibility of malware.

Option A: The OS update failed While an OS update failure can cause issues, it is less likely to result in random restarts compared to malware.

Option B: The user downloaded malware Malware is a common cause of erratic behavior, including random restarts, especially when applications are installed from unofficial sources.

Option C: The device is in developer mode Developer mode alone does not typically cause random restarts. It may make the device more susceptible to issues if improper apps are installed.

Option D: The over-the-air carrier update failed Similar to the OS update, this would more likely cause consistent issues rather than random restarts.

CompTIA A+ 220-1102 Objective 2.3 (Detect, remove, and prevent malware) and Objective 3.5 (Mobile OS and application security issues).

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

A.
Issuing a laptop to the user with increased font size to be used only for meetings
A.
Issuing a laptop to the user with increased font size to be used only for meetings
Answers
B.
Using display settings to adjust the text size during meetings
B.
Using display settings to adjust the text size during meetings
Answers
C.
Adding a local user account, which has a larger font size set, for the user to log In to during meetings
C.
Adding a local user account, which has a larger font size set, for the user to log In to during meetings
Answers
D.
Adding a second monitor to the user's desktop and increase the font size for only that display
D.
Adding a second monitor to the user's desktop and increase the font size for only that display
Answers
Suggested answer: B

Explanation:

Changing the text size efficiently for different scenarios, such as meetings and regular work tasks, can be managed directly through the Windows display settings. This method is both quick and easily reversible, making it the most efficient solution compared to the other options provided.

Option A: Issuing a laptop to the user with increased font size to be used only for meetings This option is not efficient as it requires additional hardware and setup time, which is impractical for simply adjusting text size.

Option B: Using display settings to adjust the text size during meetings Correct Answer. Windows provides built-in functionality to adjust the text size on the display. This can be accessed via:

Windows Settings > System > Display.

Under 'Scale and layout,' you can change the size of text, apps, and other items. This method allows for quick changes and can be reverted just as quickly after meetings.

Option C: Adding a local user account, which has a larger font size set, for the user to log in to during meetings

This approach involves additional steps of logging out and logging back in, which is less efficient than simply adjusting the display settings.

Option D: Adding a second monitor to the user's desktop and increase the font size for only that display While this can be a solution, it is not the most efficient way as it involves additional hardware and configuration. It's more suited for scenarios requiring constant dual-display use rather than just changing text size occasionally.

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

A.
The switch Is only providing IPv6 addresses.
A.
The switch Is only providing IPv6 addresses.
Answers
B.
The OS must be updated to be compatible with the imaging software.
B.
The OS must be updated to be compatible with the imaging software.
Answers
C.
The switch has port security enabled.
C.
The switch has port security enabled.
Answers
D.
The switch does not support multicast traffic.
D.
The switch does not support multicast traffic.
Answers
Suggested answer: C

Explanation:

When upgraded computers are not able to obtain an IP address, the issue often lies in the network configuration. Here's a detailed explanation:

Option A: The switch is only providing IPv6 addresses. This is unlikely because if the switch were providing IPv6 addresses, the devices would still receive an IP address, albeit an IPv6 one. The issue described indicates no IP address is being obtained at all.

Option B: The OS must be updated to be compatible with the imaging software. This option is unrelated to obtaining an IP address. Compatibility with imaging software would not prevent the devices from getting an IP address.

Option C: The switch has port security enabled. Correct Answer. Port security on a switch restricts access based on MAC addresses. If the MAC addresses of the upgraded computers are not recognized or have not been added to the allowed list, the switch will not provide network access, resulting in the computers not obtaining an IP address.

Option D: The switch does not support multicast traffic.

This is unrelated to obtaining an IP address. Multicast traffic deals with specific types of network communication and would not affect the basic DHCP IP address assignment process.

The camera and microphone on an iPhone user's device are activating without any user input. The user's friend recently modified the device to allow applications to be installed outside the normal App Store. Which of the following is the issue?

A.
The user connected a counterfeit Lightning cable to the iPhone.
A.
The user connected a counterfeit Lightning cable to the iPhone.
Answers
B.
The device is unenrolled from Mobile Device Management.
B.
The device is unenrolled from Mobile Device Management.
Answers
C.
The device was jailbroken to remove internal security protections.
C.
The device was jailbroken to remove internal security protections.
Answers
D.
The iPhone has an out-of-date operating system.
D.
The iPhone has an out-of-date operating system.
Answers
Suggested answer: C

Explanation:

The camera and microphone on an iPhone activating without user input, especially after allowing applications to be installed outside the normal App Store, is a classic sign of the device being jailbroken. Jailbreaking an iPhone removes many of the built-in security features and restrictions, allowing the installation of apps from third-party sources. These third-party apps can be malicious and can gain unauthorized access to system resources like the camera and microphone.

A . The user connected a counterfeit Lightning cable to the iPhone. While counterfeit cables can be harmful, they typically cause charging or connectivity issues rather than security vulnerabilities that would enable camera and microphone activation without user input.

B . The device is unenrolled from Mobile Device Management. Unenrolling from MDM removes organizational controls but does not directly cause unauthorized camera and microphone activation.

D . The iPhone has an out-of-date operating system. An outdated OS can have vulnerabilities, but the scenario specifically mentions modifications to allow third-party app installations, pointing to jailbreaking as the primary cause.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 2.3: Security measures and their purposes including mobile device security.

A technician needs to import a new digital certificate and place it in the proper location. Which of the following Control Panel utilities should the technician use to import the certificate?

A.
Internet Options
A.
Internet Options
Answers
B.
Network and Sharing Center
B.
Network and Sharing Center
Answers
C.
Credential Manager
C.
Credential Manager
Answers
D.
Security and Maintenance
D.
Security and Maintenance
Answers
Suggested answer: A

Explanation:

To import a new digital certificate and place it in the proper location, the technician should use the 'Internet Options' utility in the Control Panel. This utility allows users to manage various settings related to internet connections and security, including the import and management of digital certificates under the 'Content' tab.

B . Network and Sharing Center is used for managing network connections and sharing settings but not for managing digital certificates.

C . Credential Manager is used to store and manage login credentials for websites and applications but not for importing digital certificates.

D . Security and Maintenance provides an overview of the security and maintenance status of the system but does not directly handle digital certificate management.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.4: Using Control Panel utilities including Internet Options for managing digital certificates.

Which of the following environmental effects can be the result of using virtualization?

A.
Greater energy consumption
A.
Greater energy consumption
Answers
B.
Noise pollution
B.
Noise pollution
Answers
C.
Reduced space requirements
C.
Reduced space requirements
Answers
D.
Fewer maintenance needs
D.
Fewer maintenance needs
Answers
Suggested answer: C

Explanation:

One of the key environmental benefits of using virtualization is the reduction in physical space requirements. Virtualization allows multiple virtual machines to run on a single physical server, reducing the need for multiple physical servers. This consolidation leads to fewer physical machines, saving space in data centers and reducing the overall physical footprint.

A . Greater energy consumption is incorrect as virtualization typically leads to reduced energy consumption due to the consolidation of hardware.

B . Noise pollution can be reduced because fewer physical machines often mean less overall noise.

D . Fewer maintenance needs is a possible benefit but not directly related to environmental effects like reduced space requirements.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.5: Summarizing environmental impacts and local environmental controls, including the benefits of virtualization.

A customer recently upgraded their computer to the latest Windows version and is now having issues with the display. The icons and text are too large, and the colors are not accurate. Which of the following Control Panel options should the technician adjust to help the customer?

A.
Ease of Access
A.
Ease of Access
Answers
B.
Device Manager
B.
Device Manager
Answers
C.
Network and Sharing Center
C.
Network and Sharing Center
Answers
D.
Programs andFeatures
D.
Programs andFeatures
Answers
Suggested answer: B

Explanation:

When a customer experiences display issues such as large icons and inaccurate colors after a Windows upgrade, the most appropriate Control Panel option to address these issues is 'Device Manager.' The technician can use Device Manager to check and update display drivers, which are often the cause of such problems after an OS upgrade. Updating or reinstalling the correct drivers can help resolve display resolution and color issues.

A . Ease of Access focuses on accessibility features and does not directly address display driver issues.

C . Network and Sharing Center is related to network settings and does not affect display settings.

D . Programs and Features is used for managing installed programs and features but is not relevant for updating display drivers.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.3: Using features and tools of the Microsoft Windows OS, including Device Manager for managing hardware drivers.


A technician is assisting a customer who is having difficulty accessing the company's website. Which of the following should the technician do first?

A.
Ask the customer for their log-in credentials.
A.
Ask the customer for their log-in credentials.
Answers
B.
Check the company's internal knowledge base for solutions.
B.
Check the company's internal knowledge base for solutions.
Answers
C.
Refer the customer to a more experienced technician.
C.
Refer the customer to a more experienced technician.
Answers
D.
Record the details of the issue in the company's ticketing system.
D.
Record the details of the issue in the company's ticketing system.
Answers
Suggested answer: D

Explanation:

When a customer is having difficulty accessing the company's website, the technician should first document the issue in the company's ticketing system. This step ensures that the problem is officially logged, which allows for proper tracking, prioritization, and assignment to the appropriate personnel if needed. Recording the details helps in maintaining a record of the issue and the troubleshooting steps taken, which is useful for future reference and analysis.

A . Ask the customer for their log-in credentials. This is not appropriate as it breaches security protocols and is not the first step in troubleshooting.

B . Check the company's internal knowledge base for solutions. While useful, this step comes after the issue has been documented.

C . Refer the customer to a more experienced technician. This might be necessary later, but initially, the issue should be documented.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.1: Documentation and support systems, including the use of ticketing systems for tracking incidents.

An application is not performing well and will occasionally shut down with no error provided. Which of the following Task Manager tabs should be used to troubleshoot the application while it is active?

A.
Users
A.
Users
Answers
B.
Services
B.
Services
Answers
C.
Performance
C.
Performance
Answers
D.
Startup
D.
Startup
Answers
Suggested answer: C

Explanation:

When troubleshooting an application that is not performing well and occasionally shuts down with no error, the 'Performance' tab in Task Manager is the most appropriate tool to use. This tab provides real-time data on CPU, memory, disk, and network usage, which can help identify resource bottlenecks or spikes that could be causing the application to malfunction. Monitoring these metrics while the application is running can offer insights into whether the issue is related to system resources.

A . Users tab shows which users are currently logged into the system and their resource usage but does not provide detailed performance metrics for troubleshooting application issues.

B . Services tab shows the status of background services but does not provide direct information about the application's performance.

D . Startup tab manages which applications start with Windows and their impact on startup time but is not useful for monitoring active application performance.

CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.3: Using features and tools of the Microsoft Windows OS, including Task Manager's Performance tab.

Total 755 questions
Go to page: of 76