CompTIA 220-1202 Practice Test - Questions Answers

List of questions
Question 1

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?
Restricted log-in times
Secure master password
TPM module
Windows lock screen
A credential manager encrypts and stores multiple credentials behind a single master password. Ensuring that this master password is strong and kept secure is critical; if it's compromised, all stored credentials become vulnerable.
Question 2

Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?
Call
Authenticator
Hardware token
SMS
Modern authenticator apps (such as Microsoft Authenticator or Google Authenticator with push capability) can send a push notification to the user's registered device. The user approves or denies the login request via the notification, providing a quick and secure second factor for authentication.
Question 3

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)
SPICE
SSH
RDP
VPN
RMM
WinRM
RDP (Remote Desktop Protocol): Allows the user to connect to and control the Windows PC's desktop environment from home.
VPN (Virtual Private Network): Establishes a secure tunnel into the office network so the user's home device can reach the Windows PC before initiating the RDP session.
Question 4

A company wants to use a single operating system for its workstation and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?
Linux
Windows
macOS
Chrome OS
Linux distributions are open-source and generally free of licensing fees, making them suitable for both desktop workstations and servers. Organizations can use the same Linux OS across all their systems without incurring per-seat or per-server costs, unlike proprietary systems such as Windows or macOS.
Question 5

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?
The user does not have Wi-Fi enabled.
The website's subscription has run out.
The bandwidth is not fast enough.
The mobile device storage is full.
Streaming HD video requires substantial network throughput, typically several Mbps. With only a 3G connection showing two bars, the available bandwidth is likely too limited or inconsistent to sustain an HD stream, resulting in timeouts.
Question 6

SIMULATION
You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.
INSTRUCTIONS
Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.
Then, click the + sign to place each device in its appropriate location.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Wireless AP LAN
Firewall Screened Subnet
See explanation below
The completed configuration:
1. Wireless AP (LAN side)
1. LAN IP: 192.168.10.1
2. Encryption: WPA2 PSK
2. Router (port-forward rule)
1. Allow TCP Any 3389
This forwards inbound RDP traffic (TCP/3389) from the Internet to the Windows PC, enabling Remote Desktop access.
3. Firewall (screened subnet side)
1. LAN IP: 10.100.0.1
4. Device placement
1. PC: place behind the router (where the port-forward rule points).
2. Game console: place on the Wireless AP (so it can use chat and extra services over WPA2 PSK).
3. Firewall: place in front of the screened subnet (with its 10.100.0.1 IP facing that subnet).
Question 7

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?
VPN
VNC
SSH
RDP
Comprehensive and Detailed Explanation From Exact Extract:
The correct answer is VNC (Virtual Network Computing). VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It is platform-independent and widely supported on Linux, which makes it ideal for providing interactive remote support for a Linux-based operating system. It allows the technician not only to view the remote desktop session but also to control it, fulfilling the need to see and interact with the user's session.
A . VPN (Virtual Private Network) creates a secure tunnel to a network but does not provide desktop sharing or session control by itself.
C . SSH (Secure Shell) provides secure command-line access to Unix/Linux systems but does not offer graphical desktop interaction, which is a requirement in this case.
D . RDP (Remote Desktop Protocol) is primarily a Microsoft protocol, and although it can be made to work on Linux, it is not natively supported on legacy Linux systems, and thus less suitable than VNC in this scenario.
CompTIA A+ 220-1102 Core 2 Objective
Reference:
Objective 1.8 -- Given a scenario, use features and tools of the operating system.
Under this objective, candidates are expected to be familiar with remote access technologies, including RDP, SSH, and VNC, and understand their appropriate uses and limitations on different platforms such as Windows and Linux.
Question 8

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:
IP Address -- 192.168.1.210
Subnet Mask -- 255.255.255.0
Gateway -- 192.168.1.1
DNS1 -- 8.8.8.8
DNS2 -- 1.1.1.1
Server -- 192.168.1.10
Which of the following should the technician do to fix the issue?
Change the DNS settings.
Assign a static IP address.
Configure a subnet mask.
Update the default gateway.
Comprehensive and Detailed Explanation From Exact Extract:
The issue described---''domain cannot be found'' despite the ability to ping the server and access the internet---indicates a DNS resolution problem, not a network connectivity issue. The workstation is currently using public DNS servers (8.8.8.8 and 1.1.1.1) which cannot resolve internal domain names, such as the ones used in Active Directory environments. To resolve this, the technician needs to change the DNS settings to point to the internal DNS server, which in most domain setups is the domain controller itself (likely 192.168.1.10 in this case).
Here's the breakdown of the incorrect options:
B . Assign a static IP address: The IP is already assigned and functioning; the device can ping and reach the network and internet.
C . Configure a subnet mask: The subnet mask is appropriate for the network range (Class C /24).
D . Update the default gateway: The gateway is valid and allows internet access; this is not the issue.
CompTIA A+ 220-1102 Core 2 Objective
Reference:
Objective 1.8 -- Given a scenario, use features and tools of the operating system.
Under this objective, candidates must know how to troubleshoot OS-based network configurations, including proper DNS settings in domain environments.
Question 9

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?
Implement the change
Approve the change.
Propose the change.
Schedule the change.
In a structured change-management process, the very first step is to propose (or formally request) the change via a Request for Change (RFC). This ensures stakeholders review the need, assess risks, and determine the priority before any approvals, scheduling, or implementation occur.
Question 10

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?
Verify the date and time settings.
Apply mobile OS patches.
Uninstall and reinstall the application.
Escalate to the website developer.
Time-based one-time password (TOTP) MFA apps rely on accurate clock synchronization. Traveling can desynchronize the device's clock, causing generated codes to be invalid. Ensuring the smartphone's date/time (and time zone) are correct will typically restore MFA functionality immediately.
Question