220-1102 Practice Test Questions

739 Questions


Topic 6, Exam Pool F

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?


A. Disk Defragment


B. Registry Editor


C. System Information


D. Disk Cleanup





A.
  Disk Defragment

Explanation: Over time, especially with frequent opening, modification, and saving of large files, a hard disk drive (HDD) can become fragmented. Fragmentation occurs when pieces of individual files are scattered across the disk, leading to longer read and write times, which can significantly slow down the computer. Disk defragmentation reorganizes these fragmented files, placing the pieces closer together on the drive, which improves access time and overall system performance. Disk Defragment: Using the Disk Defragment tool on a Windows 10 system with an HDD will help in reorganizing the data more efficiently, thus potentially remedying the slow performance issue.
The Registry Editor (B) is a tool that allows for the viewing and editing of the Windows registry and is generally not used for performance improvement but rather for system settings and configuration adjustments. System Information (C) provides a detailed look at the computer's hardware and system details but does not offer tools for performance improvement. Disk Cleanup (D) can help free up space on the hard drive by removing temporary files and system files that are no longer needed, which can indirectly improve performance but is not the primary tool for addressing fragmentation.

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal?


A. Security and Maintenance


B. Network and Sharing Center


C. Windows Defender Firewall


D. Internet Options





D.
  Internet Options

Explanation:
The best choice for accessing the necessary configuration to configure the desktop systems to use a new proxy server is the Internet Options utility. This utility can be found in the Control Panel and allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+ Core 2 exam objectives, technicians should be familiar with the Internet Options utility and how to configure proxy settings.

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?


A. Incremental backup


B. System image


C. System restore point


D. Differential backup





B.
  System image

Explanation: A system image is a complete snapshot of everything on a device's storage at a given point in time, including the operating system, installed programs, system settings, and all user files. This method is the best way to back up the OS and data comprehensively because it allows for the restoration of a system to its exact state at the time the image was taken. This is particularly useful in disaster recovery scenarios where it's crucial to restore a system quickly and efficiently to minimize downtime.

A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?


A. WPA3


B. MFA


C. TACACS+


D. RADIUS





C.
  TACACS+

Explanation: To implement a system that handles both authentication and authorization, TACACS+ (Terminal Access Controller Access-Control System Plus) is the best option. TACACS+ is a security protocol that provides centralized Authentication, Authorization, and Accounting (AAA) services for networked access control, meeting the requirement for both authentication and authorization management.

A company wants to take advantage of modern technology and transition away from face- to-face meetings. Which of the following types of software would benefit the company the most? (Select two).


A. Videoconferencing


B. File transfer


C. Screen-sharing


D. Financial


E. Remote access


F. Record-keeping





A.
  Videoconferencing

C.
  Screen-sharing

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?


A. Perform a safe mode boot.


B. Run the System Restore wizard.


C. Start the computer in the last known-good configuration.


D. Reset the BIOS settinqs.





A.
  Perform a safe mode boot.

Explanation: Booting in safe mode is the initial step to diagnose a computer experiencing a blue screen of death (BSOD) following a failed Windows 10 update. Safe mode starts the computer with a minimal set of drivers and services, allowing troubleshooting and identification of the problematic software or driver causing the BSOD. This mode provides a safer environment to uninstall recent updates or drivers, perform system scans, and restore the system if necessary. Other options like System Restore wizard, last known-good configuration, and resetting BIOS settings may be subsequent steps but do not directly diagnose the issue as effectively as booting in safe mode.

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?


A. Windows 10


B. macOS


C. Linux


D. Chrome OS


E. iOS





C.
  Linux

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?


A. UEFI password


B. Secure boot


C. Account lockout


D. Restricted user permissions





B.
  Secure boot

Explanation:
A technician setting up a new laptop must ensure that users cannot install virtual machines as the company's security policy states One way to prevent users from enabling virtual technology is by implementing Secure Boot. Secure Boot is a feature of UEFI firmware that ensures the system only boots using firmware that is trusted by the manufacturer. It verifies the signature of all bootloaders, operating systems, and drivers before running them, preventing any unauthorized modifications to the boot process. This will help prevent users from installing virtual machines on the laptop without authorization.

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?


A. A bad antivirus signature update was installed.


B. A router was misconfigured and was blocking traffic.


C. An upstream internet service provider was flapping.


D. The time or date was not in sync with the website.





B.
  A router was misconfigured and was blocking traffic.

Explanation:
The most likely cause of this issue is that a router was misconfigured and was blocking traffic. This would explain why remote users who were not connected to corporate resources did not have any issues.

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?


A. The instructions from the software company are not being followed.


B. Security controls will treat automated deployments as malware.


C. The deployment script is performing unknown actions.


D. Copying scripts off the internet is considered plagiarism.





C.
  The deployment script is performing unknown actions.

Explanation:
The risks in running this script are that the deployment script is performing unknown actions. Running the script blindly could cause unintended actions, such as deploying malware or deleting important files, which could negatively impact the organization’s network and data1.

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?


A. Power off the machine


B. Run a full antivirus scan.


C. Remove the LAN card


D. Install a different endpoint solution





A.
  Power off the machine

Explanation:
Ransomware is a type of malware that encrypts the files on a system and demands a ransom for their decryption1. Ransomware can also spread to other systems on the network or exfiltrate sensitive data to the attackers2. Therefore, it is important to isolate the infected machine as soon as possible to contain the infection and prevent further damage3. Powering off the machine is a quick and effective way of disconnecting it from the network and stopping any malicious processes running on it12. The other options are not directly related to preventing ransomware damage or may not be effective. Running a full antivirus scan may not be able to detect or remove the ransomware, especially if it is a new or unknown variant1. Removing the LAN card may disconnect the machine from the network, but it may not stop any malicious processes running on it or any data encryption or exfiltration that has already occurred2. Installing a different endpoint solution may not be possible or helpful if the system is already infected and locked by ransomware1.

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?


A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.


B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.


C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.


D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.





D.
  The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Explanation:
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. This is the most common method of force quitting a program in macOS. This can be done by clicking on the Apple icon in the top left of the screen, selecting Force Quit, selecting the frozen application in the list, and then clicking Force Quit. This will force the application to quit and the spinning round cursor will disappear.


Page 29 out of 62 Pages
Previous