ExamGecko
Home / CompTIA / 220-1202 / List of questions
Ask Question

CompTIA 220-1202 Practice Test - Questions Answers

Add to Whishlist

List of questions

Question 1

Report Export Collapse

A technician is using a credential manager to safeguard a large number of credentials. Which of the following is important for using this application?

Restricted log-in times

Restricted log-in times

Secure master password

Secure master password

TPM module

TPM module

Windows lock screen

Windows lock screen

Suggested answer: B
Explanation:

A credential manager encrypts and stores multiple credentials behind a single master password. Ensuring that this master password is strong and kept secure is critical; if it's compromised, all stored credentials become vulnerable.

asked 27/05/2025
Jonathan Marboux
41 questions

Question 2

Report Export Collapse

Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?

Call

Call

Authenticator

Authenticator

Hardware token

Hardware token

SMS

SMS

Suggested answer: B
Explanation:

Modern authenticator apps (such as Microsoft Authenticator or Google Authenticator with push capability) can send a push notification to the user's registered device. The user approves or denies the login request via the notification, providing a quick and secure second factor for authentication.

asked 27/05/2025
Juan Tovar
46 questions

Question 3

Report Export Collapse

A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)

SPICE

SPICE

SSH

SSH

RDP

RDP

VPN

VPN

RMM

RMM

WinRM

WinRM

Suggested answer: C, D
Explanation:

RDP (Remote Desktop Protocol): Allows the user to connect to and control the Windows PC's desktop environment from home.

VPN (Virtual Private Network): Establishes a secure tunnel into the office network so the user's home device can reach the Windows PC before initiating the RDP session.

asked 27/05/2025
haythem BRIGUI
39 questions

Question 4

Report Export Collapse

A company wants to use a single operating system for its workstation and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?

Linux

Linux

Windows

Windows

macOS

macOS

Chrome OS

Chrome OS

Suggested answer: A
Explanation:

Linux distributions are open-source and generally free of licensing fees, making them suitable for both desktop workstations and servers. Organizations can use the same Linux OS across all their systems without incurring per-seat or per-server costs, unlike proprietary systems such as Windows or macOS.

asked 27/05/2025
Sweet Don
43 questions

Question 5

Report Export Collapse

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media streaming website. The user is receiving connection timeout errors. The mobile reception icon area is showing two bars next to 3G. Which of the following is the most likely cause of the issue?

The user does not have Wi-Fi enabled.

The user does not have Wi-Fi enabled.

The website's subscription has run out.

The website's subscription has run out.

The bandwidth is not fast enough.

The bandwidth is not fast enough.

The mobile device storage is full.

The mobile device storage is full.

Suggested answer: C
Explanation:

Streaming HD video requires substantial network throughput, typically several Mbps. With only a 3G connection showing two bars, the available bandwidth is likely too limited or inconsistent to sustain an HD stream, resulting in timeouts.

asked 27/05/2025
Akash Patel
43 questions

Question 6

Report Export Collapse

SIMULATION

You are configuring a home network for a customer. The customer has requested the ability to access a Windows PC remotely, and needs all chat and optional functions to work in their game console.

INSTRUCTIONS

Use the drop-down menus to complete the network configuration for the customer. Each option may only be used once, and not all options will be used.

Then, click the + sign to place each device in its appropriate location.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Wireless AP LAN

CompTIA 220-1202 image Question 6 63883969897630118056835

Firewall Screened Subnet

CompTIA 220-1202 image Question 6 63883969897630118056835

CompTIA 220-1202 image Question 6 63883969897630118056835

See explanation below

See explanation below

Suggested answer: A
Explanation:

The completed configuration:

1. Wireless AP (LAN side)

1. LAN IP: 192.168.10.1

2. Encryption: WPA2 PSK

2. Router (port-forward rule)

1. Allow TCP Any 3389

This forwards inbound RDP traffic (TCP/3389) from the Internet to the Windows PC, enabling Remote Desktop access.

3. Firewall (screened subnet side)

1. LAN IP: 10.100.0.1

4. Device placement

1. PC: place behind the router (where the port-forward rule points).

2. Game console: place on the Wireless AP (so it can use chat and extra services over WPA2 PSK).

3. Firewall: place in front of the screened subnet (with its 10.100.0.1 IP facing that subnet).

asked 27/05/2025
christopher patrick
35 questions

Question 7

Report Export Collapse

A technician needs to provide remote support for a legacy Linux-based operating system from their Windows laptop. The solution needs to allow the technician to see what the user is doing and provide the ability to interact with the user's session. Which of the following remote access technologies would support the use case?

VPN

VPN

VNC

VNC

SSH

SSH

RDP

RDP

Suggested answer: B
Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The correct answer is VNC (Virtual Network Computing). VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It is platform-independent and widely supported on Linux, which makes it ideal for providing interactive remote support for a Linux-based operating system. It allows the technician not only to view the remote desktop session but also to control it, fulfilling the need to see and interact with the user's session.

A . VPN (Virtual Private Network) creates a secure tunnel to a network but does not provide desktop sharing or session control by itself.

C . SSH (Secure Shell) provides secure command-line access to Unix/Linux systems but does not offer graphical desktop interaction, which is a requirement in this case.

D . RDP (Remote Desktop Protocol) is primarily a Microsoft protocol, and although it can be made to work on Linux, it is not natively supported on legacy Linux systems, and thus less suitable than VNC in this scenario.

CompTIA A+ 220-1102 Core 2 Objective

Reference:

Objective 1.8 -- Given a scenario, use features and tools of the operating system.

Under this objective, candidates are expected to be familiar with remote access technologies, including RDP, SSH, and VNC, and understand their appropriate uses and limitations on different platforms such as Windows and Linux.

asked 27/05/2025
Mohammedsaleh Ibrahim
44 questions

Question 8

Report Export Collapse

A technician is attempting to join a workstation to a domain but is receiving an error message stating the domain cannot be found. However, the technician is able to ping the server and access the internet. Given the following information:

IP Address -- 192.168.1.210

Subnet Mask -- 255.255.255.0

Gateway -- 192.168.1.1

DNS1 -- 8.8.8.8

DNS2 -- 1.1.1.1

Server -- 192.168.1.10

Which of the following should the technician do to fix the issue?

Change the DNS settings.

Change the DNS settings.

Assign a static IP address.

Assign a static IP address.

Configure a subnet mask.

Configure a subnet mask.

Update the default gateway.

Update the default gateway.

Suggested answer: A
Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The issue described---''domain cannot be found'' despite the ability to ping the server and access the internet---indicates a DNS resolution problem, not a network connectivity issue. The workstation is currently using public DNS servers (8.8.8.8 and 1.1.1.1) which cannot resolve internal domain names, such as the ones used in Active Directory environments. To resolve this, the technician needs to change the DNS settings to point to the internal DNS server, which in most domain setups is the domain controller itself (likely 192.168.1.10 in this case).

Here's the breakdown of the incorrect options:

B . Assign a static IP address: The IP is already assigned and functioning; the device can ping and reach the network and internet.

C . Configure a subnet mask: The subnet mask is appropriate for the network range (Class C /24).

D . Update the default gateway: The gateway is valid and allows internet access; this is not the issue.

CompTIA A+ 220-1102 Core 2 Objective

Reference:

Objective 1.8 -- Given a scenario, use features and tools of the operating system.

Under this objective, candidates must know how to troubleshoot OS-based network configurations, including proper DNS settings in domain environments.

asked 27/05/2025
Mr. Michael Mettam
37 questions

Question 9

Report Export Collapse

A network technician notices that most of the company's network switches are now end-of-life and need to be upgraded. Which of the following should the technician do first?

Implement the change

Implement the change

Approve the change.

Approve the change.

Propose the change.

Propose the change.

Schedule the change.

Schedule the change.

Suggested answer: C
Explanation:

In a structured change-management process, the very first step is to propose (or formally request) the change via a Request for Change (RFC). This ensures stakeholders review the need, assess risks, and determine the priority before any approvals, scheduling, or implementation occur.

asked 27/05/2025
Updesh Kumar
46 questions

Question 10

Report Export Collapse

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?

Verify the date and time settings.

Verify the date and time settings.

Apply mobile OS patches.

Apply mobile OS patches.

Uninstall and reinstall the application.

Uninstall and reinstall the application.

Escalate to the website developer.

Escalate to the website developer.

Suggested answer: A
Explanation:

Time-based one-time password (TOTP) MFA apps rely on accurate clock synchronization. Traveling can desynchronize the device's clock, causing generated codes to be invalid. Ensuring the smartphone's date/time (and time zone) are correct will typically restore MFA functionality immediately.

asked 27/05/2025
Vitalii Kucher
39 questions
Total 75 questions
Go to page: of 8
Search

Related questions