220-1102 Practice Test Questions

739 Questions


Topic 2: Exam Pool B

A user is unable to access a website, which is widely used across the organization, and receives the following error message: The security certificate presented by this website has expired or is not yet valid. The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?


A. Reboot the computer


B. Reinstall the OS.


C. Configure a static 12


D. Check the computer's date and time.





D.
  Check the computer's date and time.

Explanation:
The error message indicates that the security certificate presented by the website has either expired or is not yet valid. This can happen if the computer's clock has the wrong date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too much, it may cause the certificate to fail to validate. Therefore, the technician should check the computer's date and time and ensure that they are correct.

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?


A. Family Options


B. Update & Security


C. Ease of Access


D. Network & Internet


E. Privacy





A.
  Family Options

Explanation: Windows 10 includes a set of parental controls within the "Family Options" section of the Windows settings. This feature allows parents to manage their children's computing activities, including setting time limits on device use, filtering web content, managing privacy and online safety settings, and viewing activity reports.
Family Options: By enabling and configuring Family Options, the user can set specific times when their children can use the device and access the internet, effectively limiting their overall screen time and internet usage.
Update & Security (B) mainly deals with Windows updates and security features but does not directly provide settings for time management. Ease of Access (C) is focused on accessibility settings and does not include time management options. Network & Internet (D) settings control network connectivity and do not offer parental controls or time limits. Privacy (E) settings manage which applications can access device features and user data but do not include time management options.

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?


A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.


B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it.


C. Delete the microphone from Device Manager and scan for new hardware,


D. Replace the USB microphone with one that uses a traditional 3.5mm plug.





B.
  Enable the microphone under Windows Privacy settings to allow desktop applications to access it.

Explanation:
In Windows 10, there are privacy settings that control access to certain devices, such as microphones, cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP application to allow it to access the microphone.
Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5mm plug is not recommended, as it would require purchasing a new microphone and may not solve the issue.

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?


A. Replacing non-mobile users' laptops with wired desktop systems


B. Increasing the wireless network adapter metric


C. Adding wireless repeaters throughout the building


D. Upgrading the current mesh network to support the 802.11 n specification





D.
  Upgrading the current mesh network to support the 802.11 n specification

Explanation: When a WAP (Wireless Access Point) mesh network is experiencing a higher than anticipated amount of traffic, leading to degraded network service, upgrading the network to a more advanced wireless standard can help alleviate the problem. The 802.11n specification, also known as Wireless-N, offers significant improvements over earlier standards like 802.11b/g in terms of speed, range, and reliability. It allows for increased data throughput and better coverage, which can support a higher number of wireless users effectively.
Upgrading to 802.11n: This involves replacing existing WAPs with those that support the 802.11n standard or higher. The upgrade can result in improved network performance by accommodating more wireless connections with higher data rates, reducing congestion and improving overall network efficiency.
Replacing non-mobile users' laptops with wired desktop systems (A) could reduce wireless traffic but may not be feasible or desirable for all users. Increasing the wireless network adapter metric (B) would affect route priority but not overall network capacity. Adding wireless repeaters (C) can extend the range but might also introduce additional latency and does not necessarily increase the network's capacity to handle more users efficiently.

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?


A. resmon_exe


B. dfrgui_exe


C. msinf032exe


D. msconfig_exe





A.
  resmon_exe

Explanation:
If a technician suspects high disk I/O, the technician should use the Resource Monitor (resmon.exe) to identify the process that is causing the high disk I/O1. Resource Monitor provides detailed information about the system’s resource usage, including disk I/O1. The technician can use this information to identify the process that is causing the high disk I/O and take appropriate action1.

Which of the following operating systems was the app file type designed to run under as an application file bundle?


A. macOS


B. Chrome


C. Windows


D. Linux





A.
  macOS

Explanation: The app file type is designed to run under macOS as an application file bundle. macOS uses application bundles to store executable files and related resources, such as libraries, image files, and localized content, in a single directory hierarchy. This approach simplifies application management and execution within the macOS environment.

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?


A. Run the virus scanner in an administrative mode


B. Reinstall the operating system


C. Reboot the system in safe mode and rescan.


D. Manually delete the infected files





C.
  Reboot the system in safe mode and rescan.

Explanation:
Rebooting the system in safe mode will limit the number of programs and processes running, allowing the antivirus system to more effectively identify and remove the malware. Rescanning the system will allow the antivirus system to identify and remove the malware while preserving the user's files.

Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?


A. System time


B. IP address


C. DNS servers


D. Windows updates





C.
  DNS servers

Explanation:
When a user experiences unexpected or erratic behavior while browsing the internet, it could be caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP addresses, which computers can use to communicate with web servers. If the DNS servers are not functioning correctly or have been compromised, it can result in the browser being redirected to unintended websites.

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?


A. Rearranging the monitor's position in display settings


B. Swapping the cables for the monitors


C. Using the Ctrl+AIt+> to correct the display orientation


D. Updating the display drivers for the video card





B.
  Swapping the cables for the monitors

Explanation:
The correct answer is B. Swapping the cables for the monitors. When the second monitor is connected with the HDMI port, it is necessary to swap the cables for the monitors so that the mouse can move from the original monitor to the new monitor. This is because the HDMI port is designed to only support one monitor, and the mouse will not be able to move from one to the other without the cables being swapped.
According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the cables used to connect the displays must be swapped between the displays. For example, if a monitor is connected to a system using a VGA cable, the VGA cable must be moved to the next display to allow the mouse to move between the two displays."

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?


A. The user is not connected to the VPN.


B. The file server is offline


C. A low battery is preventing the connection


D. The log-in script failed.





A.
  The user is not connected to the VPN.

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?


A. .py


B. .js


C. .vbs


D. .sh





D.
  .sh

Which of the following should be used to control security settings on an Android phone in a domain environment?


A. MDM


B. MFA


C. ACL


D. SMS





A.
  MDM

Explanation:
The best answer to control security settings on an Android phone in a domain environment is to use “Mobile Device Management (MDM)”. MDM is a type of software that is used to manage and secure mobile devices such as smartphones and tablets. MDM can be used to enforce security policies, configure settings, and remotely wipe data from devices. In a domain environment, MDM can be used to manage Android phones and enforce security policies such as password requirements, encryption, and remote wipe capabilities12.


Page 26 out of 62 Pages
Previous