220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

Which of the following would allow physical access to a restricted area while maintaining a record of events?


A. Hard token


B. Access control vestibule


C. Key fob


D. Door Lock





B.
  Access control vestibule

Explanation: Access control vestibule is the correct answer for this question. An access control vestibule is a physical security device that consists of two doors that form an enclosed space between them. The first door opens only after verifying the identity of the person entering, such as by using a card reader, biometric scanner, or keypad. The second door opens only after the first door closes, creating a buffer zone that prevents unauthorized access or tailgating. An access control vestibule also maintains a record of events, such as who entered or exited, when, and how. Hard token, key fob, and door lock are not sufficient to meet the requirements of this question. A hard token is a device that generates a one-time password or code for authentication purposes. A key fob is a small device that can be attached to a key ring and used to unlock doors or start vehicles remotely. A door lock is a mechanism that secures a door from opening without a key or a code.

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?


A. Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.


B. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.


C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.


D. Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.





C.
  Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

Explanation: Installing new software on an organization’s system or device can have various implications, such as compatibility, security, performance, licensing, and compliance issues. Therefore, it is important to follow the best practices for software installation, such as doing research on the software, checking the system requirements, scanning the installation file for malware, and obtaining the proper license345. The technician should not install the software without formal approval from the management team, as this could violate the organization’s policies or regulations. The technician should also not install the software without investigating the software and its impact on the organization, as this could introduce potential risks or problems to the system or device. The technician should indicate to the developer that formal approval is needed, and then work with the IT team to evaluate the software and its suitability for the organization before installing it

Which of the following is the most likely reason a filtration system is critical for data centers?


A. Plastics degrade over time.


B. High humidity levels can rust metal.


C. Insects can invade the data center.


D. Dust particles can clog the machines.





B.
  High humidity levels can rust metal.

Explanation: A filtration system is critical for data centers because it can control the humidity and temperature levels in the environment. High humidity levels can cause condensation and corrosion on the metal components of the servers and other equipment, leading to malfunction and damage. A filtration system can also prevent dust, dirt, and other contaminants from entering the data center and clogging the machines or causing overheating.

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?


A. Scan for malware and ransomware.


B. Perform a system restore.


C. Check the network utilization.


D. Update the antivirus software.





A.
  Scan for malware and ransomware.

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).


A. Temperature levels


B. Location of the servers


C. Humidity levels


D. Noise levels


E. Lighting levels


F. Cable management





A.
  Temperature levels

C.
  Humidity levels

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?


A. Privacy


B. Advanced


C. Content


D. Connections


E. Security





D.
  Connections

Explanation: The Connections tab in Internet Options allows the technician to configure the proxy server settings for the workstations. The technician can enter the proxy server address and port number, and specify which websites to bypass the proxy server for. The other tabs are not relevant for configuring the proxy server settings. References: CompTIA A+ Certification Exam Core 2 Objectives, page 9, section 1.7; CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 140, section 1.7.

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?


A. Brute force


B. Zero day


C. Denial of service


D. On-path





B.
  Zero day

Explanation:
A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerability
Configuring AAA Services. Retrieved from
https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 0/security/configuration/guide/sc40crsbook_chapter1.html

Which of the following is the MOST important environmental concern inside a data center?


A. Battery disposal


B. Electrostatic discharge mats


C. Toner disposal


D. Humidity levels





D.
  Humidity levels

Explanation:
One of the most important environmental concerns inside a data center is the level of humidity. High levels of humidity can cause condensation, which can result in corrosion of components and other equipment. Low levels of humidity can cause static electricity to build up, potentially leading to electrostatic discharge (ESD) and damage to components. Therefore, it is crucial to maintain a relative humidity range of 40-60% in a data center to protect the equipment and ensure proper operation.

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)


A. Scan the computer with the company-provided antivirus software


B. Install a new hard drive and clone the user's drive to it


C. Deploy an ad-blocking extension to the browser


D. Uninstall the company-provided antivirus software


E. Click the link in the messages to pay for virus removal


F. Perform a reset on the user's web browser





C.
  Deploy an ad-blocking extension to the browser

F.
  Perform a reset on the user's web browser

Explanation:
"The user thought the company-provided antivirus software would prevent this issue." The most likely steps to resolve the issue are to deploy an ad-blocking extension to the browser and perform a reset on the user’s web browser. Ad-blocking extensions can help to prevent pop-ups and other unwanted content from appearing in the browser, and resetting the browser can help to remove any malicious extensions or settings that may be causing the issue.

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?


A. nslookup


B. tracert


C. hostname


D. gpresult





C.
  hostname

Explanation: The hostname command-line tool is used to display the name of the local machine. This information can be crucial for identifying the device within a network, especially when setting up remote access or sharing resources like folders and printers. Unlike other command-line tools that provide more detailed network diagnostics or configuration details, hostname straightforwardly offers the device's network identification, making it suitable for the scenario described.References: Official CompTIA A+ Core 1 and Core 2 Student Guide

A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook?


A. macOS


B. Linux


C. Chrome OS


D. Windows





C.
  Chrome OS

Explanation:
4. Chrome OS. Retrieved from https://en.wikipedia.org/wiki/Chrome_OS 5. What is Chrome OS? Retrieved from https://www.google.com/chromebook/chrome-os/
A netbook with a web-based, proprietary operating system is most likely running Chrome OS. Chrome OS is a web-based operating system developed by Google that is designed to work with web applications and cloud storage. It is optimized for netbooks and other lowpower devices and is designed to be fast, secure, and easy to use.

Which of the following file extensions should a technician use for a PowerShell script?


A. .ps1


B. .py


C. .sh


D. .bat


E. .cmd





A.
  .ps1

Explanation: A PowerShell script is a plain text file that contains one or more PowerShell commands. Scripts have a .ps1 file extension and can be run on your computer or in a remote session. PowerShell scripts can be used to automate tasks and change settings on Windows devices. To create and run a PowerShell script, you need a text editor (such as Visual Studio Code or Notepad) and the PowerShell Integrated Scripting Environment (ISE) console. You also need to enable the correct execution policy to allow scripts to run on your system


Page 3 out of 62 Pages
Previous