220-1102 Practice Test Questions

739 Questions


Topic 2: Exam Pool B

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?


A. Implementing a support portal


B. Creating a ticketing system


C. Commissioning an automated callback system


D. Submitting tickets through email





A.
  Implementing a support portal

Explanation:
A support portal is an online system that allows customers to access customer service tools, submit requests and view status updates, as well as access information such as how-to guides, FAQs, and other self-service resources. This would be the best solution for the service desk, as it would allow them to easily manage the volume of requests by allowing customers to submit their own requests and view the status of their requests. Additionally, the portal would provide customers with self-service resources that can help them resolve their own issues, reducing the amount of tickets that need to be handled by the service desk.

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?


A. Internal antenna connections


B. Static IP settings


C. Airplane mode


D. Digitizer calibration





A.
  Internal antenna connections

Explanation: Given that the smartphone's screen was recently repaired and now experiences issues with Wi-Fi connectivity, despite showing that it is connected to a network, the problem could be related to the internal antenna connections that might have been disturbed or disconnected during the repair process.
Internal Antenna Connections: Smartphones use internal antennas for Wi-Fi and cellular connections. If these antennas are not properly connected, the device may show as connected to a Wi-Fi network but fail to transmit data effectively, resulting in no internet access. Checking static IP settings (B) would be relevant if the device were not obtaining an IP address at all, but the device does have an IP address. Airplane mode (C) would prevent the device from connecting to Wi-Fi networks entirely. Digitizer calibration (D) is related to the touchscreen functionality and would not affect Wi-Fi connectivity.

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?


A. Trojan


B. Boot sector virus


C. Spyware


D. Rootkit





B.
  Boot sector virus

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?


A. DNS settings


B. Static IP


C. WWAN


D. Meteredconnection





B.
  Static IP

Explanation: Configuring a static IP address for a network printer in a SOHO (Small Office/Home Office) environment ensures that the printer maintains the same IP address over time. This consistency is crucial for networked devices like printers, as computers and other devices rely on this specific address to connect to the printer. If the printer's IP address were to change (as it might with DHCP), devices would no longer be able to communicate with it without reconfiguration.
Static IP: Assigning a static IP address to the printer ensures it always uses the same IP, making it reliably accessible to all computers in the house regardless of network changes or router reboots.
DNS settings (A) are generally not necessary to configure directly on most network printers unless you're dealing with advanced network configurations or using the printer for scanning to email functions. WWAN (C) stands for Wireless Wide Area Network, which is not typically relevant for a standard network printer setup in a home or small office.
Metered connection (D) is a Windows feature that helps reduce data usage on a connection, it's not relevant to configuring a printer's network settings.

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use?


A. DRM


B. NDA


C. EULA


D. MOU





C.
  EULA

Explanation:
The most likely agreement in use here is a EULA (End User License Agreement). This is a legally binding agreement between the user and the software developer, outlining the terms and conditions that the user must agree to in order to use the software. It is important that the user understands and agrees to the EULA before they can proceed with downloading and installing the software. As stated in the CompTIA A+ Core 2 exam objectives, users should be aware of the EULA before downloading any software.

A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?


A. Services in Control Panel to check for overutilization


B. Performance Monitor to check for resource utilization


C. System File Checker to check for modified Windows files


D. Event Viewer to identify errors





C.
  System File Checker to check for modified Windows files

Explanation:
System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows utility that can be used to scan for and restore corrupt Windows system files. SFC can be used to detect and fix any modified or corrupted system files on a computer, and thus should be checked first when a user reports that their computer has been running slowly since the installation of security applications [1][2]. By checking SFC, any modified or corrupted system files can be identified and fixed, potentially improving the overall performance of the computer.

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

•The install phase must be scripted to run over the network
• Each computer requires a new SSD as the system drive,
• The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).


A. net use


B. robocopy


C. winver


D. diskpart


E. sfc


F. r.etstat


G. ping


H. chkdsk





A.
  net use

B.
  robocopy

D.
  diskpart

Explanation: For scripted network installations requiring new SSDs and keeping HDDs as backup, the necessary tools are: 'net use' to connect to network shares, 'robocopy' to copy files efficiently from the network share to the local drive, and 'diskpart' to manage disk partitions, including initializing and formatting the new SSD. The other options are not relevant to the installation process as described.

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?


A. Cross-site scripting


B. SQL injection


C. Brute-force attack


D. DDoS attack





B.
  SQL injection

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?


A. Run the antivirus scan


B. Add the required snap-in.


C. Restore the system backup


D. use the administrator console.





B.
  Add the required snap-in.

Explanation:
Local Users and Groups is a Microsoft Management Console (MMC) snap-in that allows you to manage user accounts or groups on your computer1. If you cannot find it in the MMC console, you can add it manually by following these steps2:
Press Windows key + R to open the Run dialog box, or open the Command Prompt.
Type mmc and hit Enter. This will open a blank MMC console.
Click File and then Add/Remove Snap-in.
In the Add or Remove Snap-ins window, select Local Users and Groups from the Available snap-ins list, and click Add.
In the Select Computer window, choose Local computer or Another computer, depending on which computer you want to manage, and click Finish.
Click OK to close the Add or Remove Snap-ins window. You should now see Local Users and Groups in the MMC console.

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?


A. Zero day


B. Vishing


C. DDoS


D. Evil twin





B.
  Vishing

Explanation:
Vishing, also known as voice phishing, is a type of social engineering attack where the attacker tricks the victim into divulging sensitive information over the phone. In this case, the attacker tricked the user into providing login credentials for a website.

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone
•Connected to Wi-Fi
•Disabled metered data

Which of the following should the technician do next?


A. Restore the factory settings.


B. Clean the browser history.


C. Uninstall and reinstall the applications.


D. Clear the cache.





D.
  Clear the cache.

Explanation: After rebooting the phone, connecting to Wi-Fi, and disabling metered data, the next step the technician should take is to Clear the cache (D). Clearing the cache can resolve issues with the phone's performance and is often necessary before updating software to ensure that the updates can be downloaded and installed without issues. It removes temporary files that may be interfering with the update process.

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?


A. Enable multifactor authentication


B. Increase the failed log-in threshold.


C. Remove complex password requirements


D. Implement a single sign-on with biometrics





A.
  Enable multifactor authentication

Explanation:
Multifactor authentication (MFA) is a security measure that requires users to provide multiple pieces of evidence when logging in to an account or system. This can include a combination of something the user knows (e.g. a password or PIN), something the user has (e.g. a security token or smartphone) and something the user is (e.g. biometrics such as a fingerprint or face scan). By enabling MFA, the systems administrator can ensure that users are required to provide multiple pieces of evidence when logging in, making it more difficult for unauthorized users to gain access to the system. This can help reduce the number of help desk tickets submitted due to forgotten passwords.


Page 24 out of 62 Pages
Previous