220-1102 Practice Test Questions

739 Questions


Topic 1: Exam Pool A

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?


A. Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never


B. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never


C. Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never


D. Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing





D.
  Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Explanation:
The laptop has an additional option under power and sleep settings that desktops do not have. Switching to do nothing prevents the screen from turning off when closed.

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:
Protocol/PortActionDirection 1 AllowOut
445 BlockOut
53 BlockOut
123 BlockOut
80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?


A. 1


B. 53


C. 80


D. 123


E. 445





B.
  53

Which of the following Wi-Fi protocols is the MOST secure?


A. WPA3


B. WPA-AES


C. WEP


D. WPA-TKIP





A.
  WPA3

Which of the following language types enables the automation of tasks?


A. Compiled


B. Scripting


C. Web


D. Database





B.
  Scripting

Explanation: Scripting languages are designed for automating tasks by writing scripts that can execute a series of commands. They are typically easier to write and understand compared to compiled languages and are widely used for automating repetitive tasks, making them the best option for task automation.

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?


A. Scan and remove the malware


B. Schedule automated malware scans


C. Quarantine the system


D. Disable System Restore





C.
  Quarantine the system

Explanation:
The technician should quarantine the system first.
Reference:
CompTIA A+ Certification Exam: Core 2 Objectives Version 4.0. Retrieved from https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-examobjectives-( 3-0)

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?


A. FAT32


B. ext4


C. NTFS


D. exFAT





D.
  exFAT

Explanation:
exFAT is a file system that is supported by both Linux and Windows and can handle large files1.

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).


A. Degauss


B. Delete


C. Incinerate


D. Recycle


E. Format


F. Shred





C.
  Incinerate

F.
  Shred

Which of the following features can be used to ensure a user can access multiple versions of files?


A. Multiple desktops


B. Remote Disc


C. Time Machine


D. FileVault





C.
  Time Machine

Explanation: Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?


A. Changing channels


B. Modifying the wireless security


C. Disabling the SSIO broadcast


D. Changing the access point name





A.
  Changing channels

Explanation:
Changing channels can best resolve interference from other nearby SSIDs. Wireless networks operate on different channels, and changing the channel can help to avoid interference from other nearby networks.

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?


A. Request physical media


B. Mount the ISO file.


C. Install a third-party software.


D. Download an appropriate 32-bit/64-bit OS file.





B.
  Mount the ISO file.

Explanation: If a technician is unable to run an OS installation file and receives a message indicating no software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?


A. Lock all devices in a closet


B. Ensure all devices are from the same manufacturer.


C. Change the default administrative password


D. Install the latest operating system and patches





C.
  Change the default administrative password

Explanation:
The technician should change the default administrative password FIRST to ensure the network equipment is secured against external threats on the Internet. Changing the default administrative password is a basic security measure that can help prevent unauthorized access to the network equipment. Locking all devices in a closet is a physical security measure that can help prevent theft or damage to the devices, but it does not address external threats on the Internet. Ensuring all devices are from the same manufacturer is not a security measure and does not address external threats on the Internet. Installing the latest operating system and patches is important for maintaining the security of the network equipment, but it is not the first action the technician should take.

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?


A. Move the application to the desktop and press delete


B. Identify the application in Finder and drag it to the trash can.


C. Use Spotlight to search for the application, and then run the application.


D. Use Time Machine to go back to the date before the installation.





B.
  Identify the application in Finder and drag it to the trash can.

Explanation: On macOS, uninstalling an application typically involves locating the app in Finder and dragging it to the Trash. This method is straightforward and commonly used for removing unwanted applications. The other options do not directly relate to the standard process of uninstalling applications on a Mac.


Page 18 out of 62 Pages
Previous