220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 16-Dec-2024

Topic 5: Exam Pool E

A user's company phone was stolen. Which of the following should a technician do next?


A. Perform a low-level format.


B. Remotely wipe the device.


C. Degauss the device.


D. Provide the GPS location of the device.





B.
  Remotely wipe the device.

Explanation: Remotely wiping the device is the best option to prevent unauthorized access to the company data stored on the phone. A low-level format, degaussing, or providing the GPS location of the device are not feasible or effective actions to take in this scenario. References: The Official CompTIA A+ Core 2 Study Guide1, page 315.

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two). Install the latest GPU drivers.


A. Reinstall the OS.


B. Increase the RAM.


C. Increase the hard drive space.


D. Uninstall unnecessary software.


E. Disable scheduled tasks.





C.
  Increase the hard drive space.

E.
  Disable scheduled tasks.

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?


A. Run one scan and schedule future scans.


B. Back up the uninfected files and reimage the computer.


C. Restore the clean backup copies of the infected files.


D. Run repeated remediation scans until the malware is removed.





D.
  Run repeated remediation scans until the malware is removed.

Explanation: Malware is malicious software that can cause damage or harm to a computer system or network4. A technician has verified a computer is infected with malware by observing unusual behavior, such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the anti-malware software to prevent further infection or spread of the malware. The next step is to run repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and removes malware from the system. Running one scan may not be enough to remove all traces of malware, as some malware may hide or regenerate itself.

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?


A. To determine which party had the machine and when.


B. To remotely wipe sensitive data from the machine.


C. To gather the information needed to replace the machine.


D. To alert the owner that the password needs to be changed.





A.
  To determine which party had the machine and when.

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?


A. Network share


B. Group Policy


C. BitLocker


D. Static IP





C.
  BitLocker

Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1. BitLocker helps mitigate unauthorized data access by enhancing file and system protections, rendering data inaccessible when BitLocker- protected devices are decommissioned or recycled1. Network share, Group Policy, and Static IP are not features that can prevent unauthorized data access if a computer is lost or stolen. References: BitLocker overview - Windows Security | Microsoft Learn1 The Official CompTIA A+ Core 2 Study Guide2, page 315.

Which of the following languages is used for scripting the creation of Active Directory accounts?


A. Bash


B. SQL


C. PHP


D. PowerShell





D.
  PowerShell

Explanation: PowerShell is a scripting language that can interact with Active Directory and other Windows components. It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell can also use the Active Directory module to access other AD-related functions and attributes. Other languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and would require additional tools or libraries to do so.

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?


A. Educate the end user on best practices for security.


B. Quarantine the host in the antivirus system.


C. Investigate how the system was infected with malware.


D. Create a system restore point.





A.
  Educate the end user on best practices for security.

Explanation: Educating the end user on best practices for security is the next step that the technician should take after successfully removing malicious software from an infected computer. Educating the end user on best practices for security is an important part of preventing future infections and mitigating risks. The technician should explain to the end user how to avoid common sources of malware, such as phishing emails, malicious websites, or removable media. The technician should also advise the end user to use strong passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently. Educating the end user on best practices for security can help the end user become more aware and responsible for their own security and reduce the likelihood of recurrence of malware infections. Quarantining the host in the antivirus system, investigating how the system was infected with malware, and creating a system restore point are not the next steps that the technician should take after successfully removing malicious software from an infected computer. Quarantining the host in the antivirus system is a step that the technician should take before removing malicious software from an infected computer. Quarantining the host in the antivirus system means isolating the infected computer from the network or other devices to prevent the spread of malware. Investigating how the system was infected with malware is a step that the technician should take during or after removing malicious software from an infected computer. Investigating how the system was infected with malware means identifying the source, type, and impact of malware on the system and documenting the findings and actions taken. Creating a system restore point is a step that the technician should take before removing malicious software from an infected computer. Creating a system restore point means saving a snapshot of the system’s configuration and settings at a certain point in time, which can be used to restore the system in case of failure or corruption.

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?


A. msinfo32.exe


B. dxdiag.exe


C. msconfig.exe


D. regedit.exe





C.
  msconfig.exe

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?


A. User accounts


B. Access control lists


C. Authenticator applications





A.
  User accounts

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?


A. Respond to calls and text messages while on site but not when working directly with personnel.


B. Respond to calls and text messages only from family.


C. Respond to calls and text messages only when an emergency situation requires a response.


D. Respond to calls and text messages discreetly while on site.





C.
  Respond to calls and text messages only when an emergency situation requires a response.

Explanation: A technician should handle personal communication while on site in a professional and respectful manner. According to the CompTIA A+ Core 2 (220-1102) exam objectives, one of the best practices for communication skills is to “avoid distractions and interruptions” when working with customers1. This means that the technician should not respond to calls and text messages that are not related to the work or the customer, unless there is an emergency situation that requires a response. Responding to personal communication while on site can be seen as rude, unprofessional, and disrespectful to the customer and their time. It can also affect the quality and efficiency of the technician’s work and cause errors or delays. Therefore, the technician should only respond to calls and text messages when an emergency situation requires a response, and inform the customer about the situation and apologize for the interruption. The other options are not appropriate for handling personal communication while on site. Responding to calls and text messages while on site but not when working directly with personnel (A) is still distracting and unprofessional, as it can interfere with the technician’s focus and productivity. Responding to calls and text messages only from family (B) is not a valid criterion, as the technician may receive calls and text messages from other sources that are not related to the work or the customer. Responding to calls and text messages discreetly while on site (D) is not a good practice, as it can still be noticed by the customer or other personnel and create a negative impression.


Page 1 out of 74 Pages

CompTIA A+ 220-1102 Exam Details


Exam Code: 220-1102
Exam Name: CompTIA A+ Core 2 Exam
Certification Name: A+
Certification Provider: CompTIA
Exam Questions: 90
Type of Questions: MCQs, drag and drops and performance-based
Exam Time: 90 minutes
Passing Score: 700
Exam Price: $253