Professor Messer's CompTIA 220-1102 A+ Core 2 Practice Exams PDF
Document Details
Uploaded by Deleted User
2022
CompTIA
James "Professor" Messer
Tags
Related
- CompTIA A+ 220-1101 Troy McMillan Chapter 1 PDF
- Professor Messer's CompTIA 220-1102 A+ Course Notes (2022) PDF
- Professor Messer - Professor Messers's CompTIA A+ 220-1001 2.1 network ports.pdf
- CompTIA A+ 220-1101 Q&A 346.pdf
- CompTIA A+ Core 1 (220-1101) Extended Mock Exam.docx
- CompTIA A+ 220-1102 Study Guide PDF
Summary
This PDF document is a set of practice exams for the CompTIA A+ Core 2 certification exam (220-1102). The exams cover various domains, including operating systems, security, software troubleshooting, and operational procedures. Detailed answers and explanations are provided.
Full Transcript
Professor Messer’s CompTIA 220-1102 A+ Core 2 Practice Exams by James “Professor” Messer http://www.ProfessorMesser.com Professor Messer’s CompTIA 220-1102 A+ Core 2 Practice Exams Written by James “Professor” Messer Copyright © 2022 by Messer Studios, LLC https://www.ProfessorMess...
Professor Messer’s CompTIA 220-1102 A+ Core 2 Practice Exams by James “Professor” Messer http://www.ProfessorMesser.com Professor Messer’s CompTIA 220-1102 A+ Core 2 Practice Exams Written by James “Professor” Messer Copyright © 2022 by Messer Studios, LLC https://www.ProfessorMesser.com All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher. First Edition: September 2022 This is version 1.90 Trademark Acknowledgments All product names and trademarks are the property of their respective owners, and are in no way associated or affiliated with Messer Studios LLC. "Professor Messer" is a registered trademark of Messer Studios LLC. "CompTIA," "A+," "Network+," and "Security+" are registered trademarks of CompTIA, Inc. Warning and Disclaimer This book is designed to provide information about the CompTIA 220-1102 Core 2 A+ certification exam. However, there may be typographical and/or content errors. Therefore, this book should serve only as a general guide and not as the ultimate source of subject information. The author shall have no liability or responsibility to any person or entity regarding any loss or damage incurred, or alleged to have incurred, directly or indirectly, by the information contained in this book. Contents Introduction The CompTIA A+ Core 2 Certification i How to Use This Book ii Practice Exam A Performance-Based Questions 1 Multiple Choice Questions 5 Multiple Choice Quick Answers 33 Performance-Based Answers 35 Multiple Choice Detailed Answers 41 Practice Exam B Performance-Based Questions 129 Multiple Choice Questions 133 Multiple Choice Quick Answers 161 Performance-Based Answers 163 Multiple Choice Detailed Answers 171 Practice Exam C Performance-Based Questions 259 Multiple Choice Questions 263 Multiple Choice Quick Answers 291 Performance-Based Answers 293 Multiple Choice Detailed Answers 299 About the Author James Messer is an information technology veteran whose career has included supercomputer operations, system administration, network management, and cybersecurity. James is also the founder and CEO of Messer Studios, a leading publisher of training materials for IT certification exams. With over 140 million videos viewed and 640,000 subscribers, Professor Messer's training programs have helped thousands realize their goals of a profession in information technology. Introduction The CompTIA A+ is one of the most popular IT certifications in the industry, and I think it's also one of the most enjoyable study experiences. Whether you're just getting started in information technology or you're a seasoned veteran, you have to appreciate the vast array of hardware and software that's covered in the A+ exams. If you love technology, then the A+ certification is for you. I've created these sample exams to help you learn what you'll need to pass the exam, but I also hope they provide some additional context and knowledge that you can use once the certification process is over. In information technology, the learning process never ends. I wish you the best success on your journey! - Professor Messer The CompTIA A+ Core 2 Certification The 220-1102 A+ Core 2 certification covers many different topics, and includes everything from IT security to software troubleshooting. Here's the breakdown of each domain and the percentage of each topic on the 220-1102 A+ exam: Domain 1.0 - Operating Systems- 31% Domain 2.0 - Security - 25% Domain 3.0 - Software Troubleshooting - 22% Domain 4.0 - Operational Procedures- 22% The practice exams in this book follow this breakdown, so you should find that the distribution of questions on a practice exam will be very similar to what you'll see on the actual exam. i How to Use This Book This book contains three separate 90-question practice exams; Exam A, Exam B, and Exam C. The exams are designed to emulate the format and complexity of the actual Core 2 A+ exam. Take one exam at a time. The difficulty levels are similar between exams, so it doesn't matter which exam you take first. The 220-1102 A+ exam is 90 minutes in length, so try setting a timer when you start your practice exam. Time management is an important part of the exam. The first section of each practice exam is the list of questions. There's a link next to every question ("Quick Answer" or "The Details") that will jump immediately to the quick answer page or the detailed answer page. If you're using the digital version, your PDF reader keys can quickly jump back to the question page. Adobe Reader in Windows uses Alt-Left arrow and macOS Preview uses Command-[ to move back to the previous view. Be sure to check your PDF reader for specific navigation options. The quick answer page is a consolidated list of the answers without any detail or explanation. If you want to quickly check your answer sheet, this is the page for you. A detailed answer is available for each exam question. This section repeats the question, the possible answers, and shows the answer with a detailed explanation. This section is formatted to show only one answer per page to avoid giving away the answer to any other questions. Digital readers can use your PDF reader's back button to quickly jump back to the questions. As you go through the exam, write down the answers on a separate sheet of paper. You can check the answers after the 90 minutes have elapsed. You can grade your results against the quick answer page. For incorrect responses, be sure to check the detailed answer pages for information on why certain answers were considered correct or incorrect. After each detailed answer, a video link is available for more information on the topic. You can click the link in your PDF or use your camera to view the QR (Quick Response) code on the page. Your camera app will provide a notification message that will launch the video page in your browser. The URL is also provided for manual entry. ii You have the option of using each practice test as a 90 minute timed exam, or as a casual Q&A. Try stepping through each question, picking an answer, and then jumping to the detailed explanation to learn more about each possible answer. Here's a scoring chart: Less than 63 questions correct / 70% and lower - Use the exam objectives at the end of each detailed answer to determine where you might need some additional help. 63 to 72 questions correct / 70% to 80% - You're so close! Keep working on the areas you're missing and fill in those gaps. 73 to 81 questions correct / 80% to 90% - This is a strong showing, but some additional studying will help you earn points on the real exam. Although the actual 220-1102 A+ exam does not calculate the final score as a percentage, getting an 85% on the practice exam can be roughly considered a passing grade. More than 81 questions correct / over 90% - You're ready for the real thing! Book your exam and pass your 220-1102 A+ exam! The detailed answer pages break down every correct answer and every incorrect answer. Although it's useful to know when you got a question right, it's more important if you understand exactly why a question was marked wrong. If you understand all of the technologies on these sample exams, then you'll be ready for the real thing. iii Practice Exam A Performance-Based Questions A1. A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system files may have been modified. From the command line, analyze and repair any damaged operating system files. Answer Page: 35 Practice Exam A - Questions 1 A2. A technician has been tasked with removing malware from a desktop computer. Arrange these malware removal tasks in the correct order to successfully remove the malware. Schedule scans and run updates Educate the end user Enable System Restore Quarantine infected systems Remediate Identify malware symptoms Disable System Restore Answer Page: 36 2 Practice Exam A - Questions A3. Match the technology with the description. Some descriptions will not have a match. Technologies: Descriptions: The proper use of computers, tablets, and other EULA devices is part of the employee handbook. Software can be used on one computer and one PII copy can be stored for backup purposes A database includes all client first names, last GFS names, and home addresses A spark is seen and felt when touching the AUP outside case of a desktop computer. A company needs to dispose of recently updated batteries in twenty UPS systems. A backup series consists of monthly, weekly, and daily backup data. Answer Page: 37 A4. A user needs to access a file located on the \\gate-room server. The file is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:. Answer Page: 39 Practice Exam A - Questions 3 A5. Match the commands to the description. Some descriptions will not have a match. Commands: Descriptions: dir Identify the name of a database server gpupdate Repair logical file system errors diskpart Change to a different working directory hostname Process changes made in Group Policy List the contents of a Windows directory List the volume names on a storage drive View the "About Windows" dialog Answer Page: 40 4 Practice Exam A - Questions Practice Exam A Multiple Choice Questions A6. A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST? ❍ A. Equipment grounding Quick Answer: 33 ❍ B. Air filtration ❍ C. Cable management The Details: 41 ❍ D. Waste disposal regulations A7. A user has opened a help desk ticket regarding the battery life on their mobile phone. The battery in the phone held a charge for most of the day prior to connecting to the corporate network. The battery now only lasts about half a day and the back of the phone is warmer than usual. The phone is configured as follows: Storage: 216.2 GB of 512 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance? ❍ A. Enable auto-lock Quick Answer: 33 ❍ B. Connect to the VPN ❍ C. Increase available storage space The Details: 42 ❍ D. Disable Wi-Fi Practice Exam A - Questions 5 A8. A user in the accounting department has received this error message: “The print spooler service is not running.” The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step? ❍ A. Reinstall all printer drivers Quick Answer: 33 ❍ B. Restart the spooler service ❍ C. Reboot the computer The Details: 44 ❍ D. Power cycle the printer A9. A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop? ❍ A. Biometrics Quick Answer: 33 ❍ B. Badge reader ❍ C. USB token The Details: 45 ❍ D. Cable lock A10. Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process? ❍ A. Surge suppressor Quick Answer: 33 ❍ B. Temperature sensor ❍ C. Face mask The Details: 46 ❍ D. ESD mat 6 Practice Exam A - Questions A11. A user is attempting to AirDrop a document to an associate, but they do not see any destination devices in their list of available AirDrop locations. Which of the following would be the MOST likely reason for this issue? ❍ A. Low battery Quick ❍ B. Rotation lock is enabled Answer: 33 ❍ C. Low storage space The Details: 47 ❍ D. Wi-Fi and Bluetooth are disabled A12. The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire? ❍ A. Water-based extinguisher Quick Answer: 33 ❍ B. Foam-based extinguisher ❍ C. Disconnect the power The Details: 48 ❍ D. Carbon dioxide extinguisher A13. Which of these Windows features provides full disk encryption for all data on a storage drive? ❍ A. Domain Services Quick Answer: 33 ❍ B. EFS ❍ C. RDP The Details: 49 ❍ D. BitLocker A14. A company maintains data retention requirements of five years for all customer names, addresses, and phone numbers. Which of the following would BEST describe this data? ❍ A. Credit card transactions Quick Answer: 33 ❍ B. Government-issued information ❍ C. PII The Details: 50 ❍ D. Healthcare data Practice Exam A - Questions 7 A15. A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality? ❍ A. Full device encryption Quick Answer: 33 ❍ B. Remote backup ❍ C. IoT isolation The Details: 51 ❍ D. Remote wipe A16. Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page? ❍ A. Splash screen Quick Answer: 33 ❍ B. Acceptable use policy ❍ C. Standard operating procedures The Details: 52 ❍ D. Topology diagram A17. A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would provide access to these settings? ❍ A. Device Manager Quick Answer: 33 ❍ B. System Information ❍ C. Event Viewer The Details: 53 ❍ D. User Accounts A18. An office power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue? ❍ A. Power down when not actively working Quick Answer: 33 ❍ B. Confirm that the building has an electrical ground ❍ C. Connect a surge suppressor to each system The Details: 54 ❍ D. Maintain an inventory of replacement power supplies 8 Practice Exam A - Questions A19. What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB Quick Answer: 33 ❍ B. 8 GB ❍ C. 16 GB The Details: 55 ❍ D. 192 GB A20. Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details? ❍ A. Event Viewer Quick ❍ B. Task Manager Answer: 33 ❍ C. Startup Repair The Details: 56 ❍ D. Safe Mode A21. An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type? ❍ A. Spoofing Quick Answer: 33 ❍ B. Social engineering ❍ C. Brute force attack The Details: 57 ❍ D. DDoS A22. A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state? ❍ A. Rollback plan Quick ❍ B. Disaster recovery plan Answer: 33 ❍ C. Incident response plan The Details: 58 ❍ D. Power plan Practice Exam A - Questions 9 A23. When connecting a new USB webcam to Windows 10, a message appears stating "The controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step? Quick ❍ A. Close all large-memory processes Answer: 33 ❍ B. Modify the BCD The Details: 59 ❍ C. Move the webcam to a different USB interface ❍ D. Use System Restore to rollback to a previous configuration A24. A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installations. Which of the following will be the MOST likely method of Quick accessing this data? Answer: 33 ❍ A. Map the shared folder to an available drive letter The Details: 60 ❍ B. Download the shared folder through a proxy ❍ C. Link the images to a cloud storage service ❍ D. Access the folder using a remote access client A25. A desktop administrator is installing a 64-bit version of Windows 10 Pro on a workstation, but the installation will not start. The workstation configuration is: 1 GHz CPU 2 GB of RAM 15 GB of free storage space 1280 x 720 video resolution Which of the following would allow this installation to proceed? ❍ A. Increase free storage space to 32 GB Quick Answer: 33 ❍ B. Decrease resolution to 800 x 600 ❍ C. Upgrade to a faster processor The Details: 61 ❍ D. Increase RAM to 4 GB 10 Practice Exam A - Questions A26. A security technician has identified malware running in the OS kernel. Traditional anti-malware scans were not able to identify any problems on the computer. Which of the following would be the BEST description of this malware? ❍ A. Rootkit Quick Answer: 33 ❍ B. Worm The Details: 62 ❍ C. Botnet ❍ D. Cryptominer A27. A help desk technician has been called to a training room that uses Android tablets as presentation devices. An application used for the training program will not start on any of the tablets. When the application is selected, the splash screen appears for a moment and then completely disappears with no error message. Which of the following would be the best NEXT troubleshooting step? ❍ A. Install all operating system updates Quick Answer: 33 ❍ B. Uninstall the application ❍ C. Power cycle the tablets The Details: 63 ❍ D. Roll back to the previous application version A28. A user on the headquarters network has opened a help desk ticket about their Windows desktop. When starting their computer, the login process proceeds normally but the Windows desktop takes fifteen minutes to appear. Yesterday, the desktop would appear in just a few seconds. Which of the following would be the MOST likely reason for this issue? ❍ A. Slow profile load Quick Answer: 33 ❍ B. Incorrect boot device order ❍ C. Faulty RAM The Details: 64 ❍ D. Incorrect username and password Practice Exam A - Questions 11 A29. A system administrator has been asked to install a new application on a server, but the application is 64-bit and the server operating system is 32-bit. Which of the following describes the issue associated with this installation? ❍ A. File permissions Quick Answer: 33 ❍ B. OS compatibility The Details: 65 ❍ C. Installation method ❍ D. Available drive space A30. A security guard has reported that a person was seen passing through a secure door without using a door badge. The intruder slipped through the door by closely following the person in front of them. Which of these would best describe these actions? ❍ A. Dumpster diving Quick Answer: 33 ❍ B. Brute force ❍ C. Phishing The Details: 66 ❍ D. Tailgating A31. A Linux administrator needs to modify the configuration text file for a service. Which of the following utilities would provide this functionality? ❍ A. nano Quick ❍ B. chmod Answer: 33 ❍ C. df The Details: 67 ❍ D. sudo A32. An internal audit has found that a server in the DMZ appears to be infected with malware. The malware does not appear to be part of a file in the OS, and the malware is started each time system is started. What type of malware would be MOST likely found on this server? ❍ A. Trojan Quick ❍ B. Ransomware Answer: 33 ❍ C. Keylogger The Details: 68 ❍ D. Spyware ❍ E. Boot sector virus 12 Practice Exam A - Questions A33. A user has delivered a broken laptop to the help desk, and they are visibly upset and quite vocal about the problem they're having. The user is also asking for a very specific repair that doesn't appear to have any relationship to his issue. What's the best way to handle this situation? Quick ❍ A. Repeat your understanding of the issue to Answer: 33 the customer and provide an estimate and The Details: 69 follow-up time ❍ B. Refuse the repair until the customer calms down ❍ C. Inform the customer of his mistake with the proposed repair ❍ D. Refuse to make any commitments until the computer is examined A34. Daniel, a user in the finance department, has purchased a new Android smartphone and has installed a number of productivity apps. After a day of use, Daniel finds the phone displaying a large number of advertisements when browsing the Internet. Which of the following tasks should Daniel perform after completing a factory reset? ❍ A. Disable Bluetooth Quick Answer: 33 ❍ B. Check app sharing permissions ❍ C. Run a speed test on the cellular connection The Details: 70 ❍ D. Verify the source of each app before installation A35. A network administrator has configured all of their wireless access points with WPA3 security. Which of the following technologies would be associated with this configuration? ❍ A. RC4 Quick Answer: 33 ❍ B. TACACS The Details: 71 ❍ C. TKIP ❍ D. GCMP Practice Exam A - Questions 13 A36. A user has been provided with a username and password to access the corporate VPN. The user has also been provided with a hardware device displaying a six digit code, and the code changes every 30 seconds. Which of the following would BEST describe the use of this device? ❍ A. ACL Quick Answer: 33 ❍ B. Group Policy ❍ C. SMS The Details: 72 ❍ D. Least privilege ❍ E. MFA A37. A user has installed multiple applications over the last week. During the startup process, the computer now takes over fifteen minutes to display the Windows 10 desktop. Which of the following utilities would help the system administrator troubleshoot this issue? ❍ A. defrag Quick Answer: 33 ❍ B. Performance Monitor ❍ C. Task Manager The Details: 73 ❍ D. robocopy A38. A server administrator is replacing the memory in a database server. Which of the following steps should be followed FIRST? ❍ A. Remove the existing memory modules Quick Answer: 33 ❍ B. Wear an air filter mask ❍ C. Disconnect all power sources The Details: 74 ❍ D. Connect an ESD strap 14 Practice Exam A - Questions A39. A technician is dismantling a test lab for a recently completed project, and the lab manager would like to use the existing computers on a new project. However, the security administrator would like to ensure that none of the data from the previous project is accessible on the existing hard drives. Which of the following would be the best way to accomplish this? ❍ A. Quick format Quick Answer: 33 ❍ B. Deguass ❍ C. Regular format The Details: 75 ❍ D. Reinstall the operating system A40. A system administrator needs to view a set of application log files contained in a folder named “logs.” Which of the following commands should be used to make this folder the current directory? ❍ A. cd logs Quick ❍ B. mv logs Answer: 33 ❍ C. dir logs The Details: 76 ❍ D. md logs A41. A system administrator is configuring a server to use eight bootable partitions on a single SSD. Which of the following partition styles would be the BEST choice for this configuration? ❍ A. MBR Quick Answer: 33 ❍ B. NTFS The Details: 77 ❍ C. diskpart ❍ D. GPT Practice Exam A - Questions 15 A42. A technician is installing a fresh Windows operating system on a file server. Unfortunately, the drive controller in the system is not recognized during the installation process. Which of the following would be the BEST way to manage this issue? ❍ A. Load third-party drivers Quick Answer: 33 ❍ B. Restart the system ❍ C. Use a remote network installation The Details: 78 ❍ D. Boot from the recovery partition A43. A user has noticed their system has been running very slowly over the last few days. They have also noticed files stored on their computer randomly disappear after the files are saved. The user has rebooted the computer, but the same problems continue to occur. Which of the following should the user perform to resolve these issues? ❍ A. Boot to Safe Mode Quick Answer: 33 ❍ B. Release and renew the network connection ❍ C. Install anti-malware software The Details: 79 ❍ D. Upgrade the system RAM A44. A user in the sales department is attempting to upgrade the operating system of their smartphone, but the smartphone will not start the installation when selected. Which of the following is the MOST likely reason for this issue? ❍ A. Bluetooth is enabled Quick Answer: 33 ❍ B. The smartphone storage is nearly full ❍ C. Rotation lock is disabled The Details: 80 ❍ D. The phone is connected to a power source 16 Practice Exam A - Questions A45. The hard drive in a macOS desktop has failed and none of the data on the drive was recoverable. A new storage drive has now been installed. Which of the following should be used to restore the data on the computer? ❍ A. Backup and Restore Quick Answer: 33 ❍ B. Mission Control ❍ C. Time Machine The Details: 81 ❍ D. Disk Utility A46. A user purchased a copy of home tax software and has installed it on their company computer. This morning, the user logs in and finds that the tax software has been automatically removed from the system. Which of the following would be the MOST likely reason for this result? ❍ A. The company per-seat licenses are all in use Quick ❍ B. The software uses an open-source license Answer: 33 ❍ C. The user has installed a personal license The Details: 82 ❍ D. The software requires a USB key for DRM A47. A system administrator is upgrading four workstations from Windows 8.1 to Windows 11. All of the user files and applications are stored on the server, and no documents or settings need to be retained between versions. Which of these installation methods would be the BEST way to provide this upgrade? ❍ A. Factory reset Quick ❍ B. Repair installation Answer: 33 ❍ C. Clean install The Details: 83 ❍ D. In-place upgrade A48. A computer on a manufacturing floor has been identified as a malware-infected system. Which of the following should be the best NEXT step to resolve this issue? ❍ A. Disconnect the network cable Quick Answer: 33 ❍ B. Perform a malware scan ❍ C. Disable System Restore The Details: 84 ❍ D. Download the latest anti-malware signatures Practice Exam A - Questions 17 A49. A technician has been called to resolve an issue with a networked laser printer that is not printing. When the technician arrives on-site, they find the printer will require a hardware replacement. All hardware is managed by a third-party and will take a week before the printer is operational again. Which of the following would be the technician’s best NEXT step? ❍ A. Work on the next ticket in the queue Quick Answer: 33 ❍ B. Add a follow-up event for one week later The Details: 85 ❍ C. Inform the user of the repair status ❍ D. Order a printer maintenance kit A50. An administrator is upgrading a Windows 8.1 Enterprise x64 computer to Windows 10. The user would like to maintain all applications and files during the upgrade process. Which of the following upgrade options would meet this requirement? ❍ A. Windows 10 Enterprise x86 Quick Answer: 33 ❍ B. Windows 10 Pro x64 ❍ C. Windows 10 Enterprise x64 The Details: 86 ❍ D. Windows 10 Pro x86 A51. A user in the marketing department is using an application that randomly shuts down during normal use. When the problem occurs, the application suddenly disappears and no error messages are shown on the screen. Which of the following would provide the system administrator with additional information regarding this issue? ❍ A. System Configuration Quick Answer: 33 ❍ B. Event Viewer The Details: 87 ❍ C. Device Manager ❍ D. Group Policy Editor ❍ E. SFC 18 Practice Exam A - Questions A52. A workstation on a manufacturing floor is taking much longer than normal to boot. Which of the following would be the BEST way to troubleshoot this issue? ❍ A. Replace the CPU Quick Answer: 33 ❍ B. Disable the startup applications ❍ C. Upgrade the RAM The Details: 88 ❍ D. Install the latest OS patches A53. A Windows 10 user is installing a new application that also installs a service. Which of the following permissions will be required for this installation? ❍ A. Guest Quick Answer: 33 ❍ B. Power User ❍ C. Administrator The Details: 89 ❍ D. Standard user A54. A user working from home is not able to print to a laser printer at the corporate office. Which of the following would be the MOST likely reason for this issue? ❍ A. WPA3 settings Quick Answer: 33 ❍ B. Outdated anti-virus signatures ❍ C. Disconnected VPN The Details: 90 ❍ D. MDM configuration A55. An employee has modified the NTFS permissions on a local file share to provide read access to Everyone. However, users connecting from a different computer do not have access to the file. Which of the following is the reason for this issue? ❍ A. The NTFS permissions were not synchronized Quick ❍ B. Share permissions restrict access from Answer: 33 remote devices The Details: 91 ❍ C. The user is an Administrator ❍ D. Remote users are connecting with Guest accounts Practice Exam A - Questions 19 A56. A healthcare company has replaced some of their desktop computers with laptops and will be disposing of the older computers. The security administrator would like to guarantee none of the existing data on the hard drives could be recovered once the systems are sent to the recycling center. Which of the following methods would meet this requirement? Quick ❍ A. Quick format Answer: 33 ❍ B. Reinstall the OS The Details: 92 ❍ C. Remove all user folders ❍ D. Shred the drives A57. A technician has been assigned a support ticket that urgently requests a laptop repair, but there are already many open support tickets ahead of this request. The technician doesn’t recognize the name associated with the ticket. Which of these choices would be the best path to take? ❍ A. Place the ticket into the queue as first-come, Quick first-served Answer: 33 ❍ B. Prioritize the support tickets by device type The Details: 93 ❍ C. Triage the queue and prioritize the tickets in order of repair complexity ❍ D. Contact the end-user and determine the urgency of the repair A58. A user has received a pop up message on their computer that states applications on their computer are infected with a virus. A technician has determined that the pop up message is a hoax that needs to be removed from the computer. The technician has disabled System Restore to remove all previous restore points. Which of the following tasks would be the best NEXT step? Quick ❍ A. Update the anti-virus signatures Answer: 33 ❍ B. Educate the end-user The Details: 94 ❍ C. Schedule anti-virus scans for midnight each day ❍ D. Boot the system with the original installation media 20 Practice Exam A - Questions A59. A network administrator needs to manage a switch and firewall in the local data center. Which of the following would be the BEST choice for this requirement? ❍ A. RDP Quick Answer: 33 ❍ B. VPN ❍ C. SSH The Details: 95 ❍ D. VNC A60. A user is using a smartphone at their desk, and they occasionally receive a security warning in the browser. After some additional troubleshooting, the technician determines the security warnings are fake. Which of the following should a technician follow to BEST resolve this issue? Quick ❍ A. Put the phone into airplane mode Answer: 33 ❍ B. Connect to the corporate network using a VPN The Details: 96 connection ❍ C. Run an anti-malware scan on the smartphone ❍ D. Remove any paired Bluetooth devices A61. Sam, a user on the research and development team, reports that her computer displays the message “Missing operating system” during boot. A technician runs hardware diagnostics and finds that the RAM, CPU, storage drive, and power supply all pass the tests. The technician then finds that a connected USB flash drive was causing the issue. Which of the following would prevent this issue from occurring in the future? ❍ A. Create a login script Quick Answer: 33 ❍ B. Install the latest OS patches The Details: 97 ❍ C. Run SFC ❍ D. Modify the BIOS boot order Practice Exam A - Questions 21 A62. Jack, a user, has opened a help desk ticket relating to desktop alerts randomly appearing throughout the day. Most of the alerts contain information about third-party products and services. Which of the following is the MOST likely cause of these messages? ❍ A. On-path attack Quick ❍ B. Corrupted email database Answer: 33 ❍ C. OS update failure The Details: 98 ❍ D. Adware A63. In which of the following file types would a system administrator expect to see the command, “cd c:\source”? ❍ A..sh Quick ❍ B..vbs Answer: 33 ❍ C..py The Details: 99 ❍ D..bat A64. A malware infection has recently been removed from a computer. When starting the operating system, Windows shows errors during the startup process indicating some core operating system files are missing. Which of the following should be used to restore these missing files? ❍ A. gpupdate Quick Answer: 33 ❍ B. winver ❍ C. sfc The Details: 100 ❍ D. diskpart 22 Practice Exam A - Questions A65. A desktop administrator has determined that an employee in the corporate office has been using their computer to share copyrighted materials to others on the Internet. Which of the following should be the best NEXT step? ❍ A. Create a firewall rule to block Internet access to this computer Quick ❍ B. Create a hash for each file that was shared Answer: 33 ❍ C. Compile a list of licenses for each set of The Details: 101 copyrighted materials ❍ D. Retrieve and securely store the computer A66. A system administrator would like to require a specific password complexity for all Active Directory users. Which of the following would be the BEST way to complete this requirement? ❍ A. Login script Quick Answer: 33 ❍ B. Folder redirection ❍ C. Port security The Details: 102 ❍ D. Group Policy A67. A system administrator is creating a series of shared folders that should not be visible when users browse the network for available resources. What symbol should be added to the end of a share name to provide this functionality? ❍ A.. (period) Quick Answer: 33 ❍ B. $ (dollar sign) The Details: 103 ❍ C. ! (exclamation mark / bang) ❍ D. # (hash sign / number sign) Practice Exam A - Questions 23 A68. Jack, a user, is having problems with the 802.11 wireless connection on his iOS phone. Although there are names appearing in the network list, his phone does not show any connectivity to a wireless network. Jack has confirmed that airplane mode is not enabled, Bluetooth is on, and VPN is not enabled. Which of the following is the MOST likely reason for this lack of wireless connectivity? ❍ A. The phone does not include a data plan Quick Answer: 33 ❍ B. The wireless network is disabled ❍ C. The Bluetooth connection is conflicting The Details: 104 with the Wi-Fi ❍ D. The Wi-Fi password is incorrect ❍ E. The wireless radio is disabled A69. A desktop administrator is upgrading the video adapter in a workstation. Which of the following should the administrator use during this process? ❍ A. Tone generator Quick Answer: 33 ❍ B. Anti-static strap ❍ C. Safety goggles The Details: 105 ❍ D. Toner vacuum A70. A help desk director would like to identify and track computer systems that have been returned for service or moved from one location to another. Which of the following would be the BEST solution for these requirements? ❍ A. Cable labels Quick Answer: 33 ❍ B. Asset tags ❍ C. Topology diagrams The Details: 106 ❍ D. Login names 24 Practice Exam A - Questions A71. A technician is troubleshooting a computer infected with a virus. The user thought they were opening a spreadsheet, but the file was actually a virus executable. Which of the following Windows options were MOST likely associated with this issue? ❍ A. Always show icons, never thumbnails Quick Answer: 33 ❍ B. Display the full path in the title bar ❍ C. Always show menus The Details: 107 ❍ D. Hide extensions for known file types A72. A financial management company would like to ensure mobile users are configured with the highest level of wireless encryption while working in the office. They would also like to include an additional user verification step during the login process. Which of the following would provide this functionality? (Choose TWO) ❍ A. RADIUS Quick ❍ B. UPnP Answer: 33 ❍ C. Multi-factor authentication The Details: 108 ❍ D. TKIP ❍ E. TACACS ❍ F. Kerberos ❍ G. WPA3 A73. A network consulting firm is upgrading the Internet firewalls for a large corporation. The proposal includes a description of the project and the network topology changes required to support the upgrade. The proposal also describes the risks involved in the process of making this upgrade. Which of the following would be the LAST step in this upgrade? ❍ A. Detailed upgrade plan Quick Answer: 33 ❍ B. Backout plan The Details: 110 ❍ C. Change control application ❍ D. End-user acceptance Practice Exam A - Questions 25 A74. An organization has been tasked with increasing the minimum password length. A systems administrator has created a policy to require all passwords to be at least ten characters long for all users. When testing this policy in the lab, a laptop computer allowed the creation of eight- character passwords. Which of the following commands should be used to apply this new policy on the laptop? ❍ A. net use Quick Answer: 33 ❍ B. gpupdate ❍ C. sfc The Details: 111 ❍ D. tasklist A75. A technician has been tasked with removing malware on a training room laptop. After updating the anti-virus software and removing the malware, the technician creates a backup of the system. After the training class ends, the technician is notified that the malware has returned. Which of the following steps was missed and caused the system to be infected again? ❍ A. Boot to a pre-installation environment Quick Answer: 33 ❍ B. Identify malware symptoms The Details: 112 ❍ C. Disable System Restore before removal ❍ D. Update to the latest BIOS version A76. A data center manager requires each server to maintain at least fifteen minutes of uptime during a power failure. Which of these would be the BEST choice for this requirement? ❍ A. Cloud-based storage Quick Answer: 33 ❍ B. UPS The Details: 113 ❍ C. Redundant power supplies ❍ D. Surge suppressor 26 Practice Exam A - Questions A77. A financial corporation is deploying tablets to their salespeople in the field. The company would like to ensure that the data on the tablets would remain private if the devices were ever stolen or lost. Which of the following would be the BEST way to meet this requirement? ❍ A. Use full device encryption Quick Answer: 33 ❍ B. Require multi-factor authentication The Details: 114 ❍ C. Install a locator application ❍ D. Use a firewall app A78. A system administrator is adding an additional drive to a server and extending the size of an existing volume. Which of the following utilities would provide a graphical summary of the existing storage configuration? ❍ A. Disk Management Quick Answer: 33 ❍ B. Performance Monitor ❍ C. Event Viewer The Details: 115 ❍ D. Task Scheduler ❍ E. Device Manager A79. While using a laptop during presentations, a company vice president has found her system randomly locks up. While the problem is occurring, the screen continues to display the last presentation slide but none of the mouse or keyboard buttons will work. To regain control, the vice president must power down and reboot her computer. Which of the following would be the BEST option for troubleshooting this issue? Quick ❍ A. Examine the Task Manager Answer: 33 ❍ B. Install an anti-malware utility The Details: 116 ❍ C. Run the presentation software in Safe Mode ❍ D. Check the Event Viewer Practice Exam A - Questions 27 A80. A system administrator needs to upgrade a training room of twenty systems to the latest Windows version. Which of the following would be the MOST efficient method of performing this upgrade process? ❍ A. Recovery partition Quick Answer: 33 ❍ B. Remote network installation The Details: 117 ❍ C. Repair installation ❍ D. USB key A81. A user has opened a help desk ticket for application slowdowns and unwanted pop-up windows. A technician updates the anti-virus software, scans the computer, and removes the malware. The technician then schedules future scans and creates a new restore point. Which of the following should be the NEXT step in the removal process? ❍ A. Disable System Restore Quick Answer: 33 ❍ B. Update the anti-virus signatures The Details: 118 ❍ C. Quarantine the system ❍ D. Educate the end user A82. A technician is cleaning out a laser printer with a toner spill. Which of the following would be the MOST important for this cleaning process? ❍ A. ESD mat Quick Answer: 33 ❍ B. UPS ❍ C. Anti-static bag The Details: 119 ❍ D. Air filter mask 28 Practice Exam A - Questions A83. Sam, a user in the accounting department, has opened a help desk ticket due to problems accessing the website of the company’s payroll service provider. While testing other website connections on Sam’s computer, the technician finds that many pop-up windows are displayed. Which of the following would be the BEST way for the technician to resolve this issue? ❍ A. Uninstall the browser and reinstall with a different version Quick Answer: 33 ❍ B. Restore the workstation from a known good backup The Details: 120 ❍ C. Start in Safe Mode and connect to the payroll website ❍ D. Modify the browser’s proxy settings A84. A business partner in a different country needs to access an internal company server during the very early morning hours. The internal firewall will limit the partner’s access to this single server. Which of these would be the MOST important security task to perform on this server? Quick ❍ A. Install the latest OS patches Answer: 33 ❍ B. Remove the server from the Active Directory domain The Details: 121 ❍ C. Use only 64-bit applications ❍ D. Run a weekly anti-virus scan A85. A Linux administrator has been asked to upgrade the web server software on a device. Which of the following would provide the administrator with the appropriate rights and permissions for this upgrade? ❍ A. chmod Quick ❍ B. apt-get Answer: 33 ❍ C. dig The Details: 122 ❍ D. sudo Practice Exam A - Questions 29 A86. A user is connecting their laptop to an external monitor and keyboard, but the laptop goes into sleep mode if the laptop screen is shut. Which of the following would modify this configuration to keep the laptop running when the lid is closed? ❍ A. Power Options Quick Answer: 33 ❍ B. Device Manager The Details: 123 ❍ C. Personalization ❍ D. User Accounts A87. A network administrator is configuring a wireless network at a small office. The administrator would like to allow wireless access for all computers but exclude a single kiosk in the lobby. Which of the following configuration settings would meet this requirement? ❍ A. SSID suppression Quick Answer: 33 ❍ B. Content filtering ❍ C. Static IP addressing The Details: 124 ❍ D. DHCP reservation ❍ E. MAC filtering A88. After booting, a laptop computer is showing a black screen instead of the normal Windows login prompt. The logs from the update server show drivers on the laptop were automatically updated overnight. Which of the following would be the BEST way to resolve this issue? ❍ A. Reinstall the operating system Quick Answer: 33 ❍ B. Rebuild the User Profile ❍ C. Start in VGA mode and roll back the driver The Details: 126 ❍ D. Upgrade the BIOS A89. A security administrator has received an alert that a user’s workstation in the shipping department has attempted to communicate to a command and control server for a well-known botnet. The logs on the workstation show that the user manually installed a new Internet browser the previous day. Which of the following would be the BEST next step for troubleshooting this issue? ❍ A. Uninstall the new browser Quick Answer: 33 ❍ B. Backup the user's documents ❍ C. Roll back to a previous restore point The Details: 127 ❍ D. Disable the user's account A90. A technician is installing a new wireless network in a small remote office. Which of the following should the technician choose to provide the highest level of security on the network? ❍ A. WPA3 Quick Answer: 33 ❍ B. MAC filtering The Details: 128 ❍ C. Static IP addressing ❍ D. SSID suppression Practice Exam A - Questions 31 32 Practice Exam A - Questions Practice Exam A Multiple Choice Quick Answers A6. A A36. E A66. D A7. A A37. C A67. B A8. B A38. C A68. D A9. D A39. C A69. B A10. C A40. A A70. B A11. D A41. D A71. D A12. D A42. A A72. C and G A13. D A43. C A73. D A14. C A44. B A74. B A15. B A45. C A75. C A16. A A46. C A76. B A17. D A47. C A77. A A18. C A48. A A78. A A19. A A49. C A79. D A20. A A50. C A80. B A21. C A51. B A81. D A22. A A52. B A82. D A23. C A53. C A83. B A24. A A54. C A84. A A25. A A55. B A85. D A26. A A56. D A86. A A27. C A57. D A87. E A28. A A58. A A88. C A29. B A59. C A89. D A30. D A60. C A90. A A31. A A61. D A32. E A62. D A33. A A63. D A34. D A64. C A35. D A65. D Practice Exam A - Answers 33 34 Practice Exam A - Questions Practice Exam A Performance-Based Answers A1. A technician has recently removed malware from a Windows computer, but the technician is concerned that some of the system files may have been modified. From the command line, analyze and repair any damaged operating system files. The sfc (System File Checker) utility will scan the integrity of all protected system files and replace any files that may be corrupted. More information: 220-1102, Objective 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 Practice Exam A - Answers 35 A2. A technician has been tasked with removing malware from a desktop computer. Arrange these malware removal tasks in the correct order to successfully remove the malware. Identify malware symptoms Quarantine infected systems Disable System Restore Remediate Schedule scans and run updates Enable System Restore Educate the end user To properly remove malware, it's important to follow a strict set of guidelines. Missing one of these steps or following them out of order could cause the malware to remain on the computer or to have it easily reinfect after rebooting. More information: 220-1102, Objective 3.3 - Removing Malware https://professormesser.link/1102030301 36 Practice Exam A - Answers A3. Match the technology with the description. Some descriptions will not have a match. Technologies: Descriptions: Software can be used on one computer and one EULA copy can be stored for backup purposes The EULA (End User Licensing Agreement) determines how the software can be used by the end user. The user will commonly be required to agree to the terms of the EULA before the software can be installed. A database includes all client first names, last PII names, and home addresses PII (Personally Identifiable Information) is any data that could be associated with an individual. For example, your name, address, phone number, and email address are considered PII. A backup series consists of monthly, weekly, and GFS daily backup data. GFS (Grandfather, Father, Son) is a backup strategy using three different backup intervals to maintain and manage large amounts of data. The grandfather backup is generally done once a month, the father backups are performed weekly, and the son backups are captured each day. The proper use of computers, tablets, and other AUP devices is part of the employee handbook. An AUP (Acceptable Use Policy) is a set of rules, regulations, or policies used to document the proper use of technology devices and software. These guidelines are often managed through the employee handbook. Practice Exam A - Answers 37 A spark is seen and felt when touching the ESD outside case of a desktop computer. The ESD (Electrostatic Discharge) is the discharge of static electricity, and it can damage sensitive electronics equipment. A good best practice is to use anti-ESD wrist straps and pads to help prevent any type of unexpected static discharge. A company needs to dispose of recently updated MSDS batteries in twenty UPS systems. An MSDS (Material Safety Data Sheet) provides information about the composition, hazard information, first aid measures, and more for all products with hazardous chemicals. More information: 220-1102, Objective 4.6 - Privacy, Licensing, and Policies https://professormesser.link/1102040601 More information: 220-1102, Objective 4.3 - Managing Backups https://professormesser.link/1102040301 More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 38 Practice Exam A - Answers A4. A user needs to access a file located on the \\gate-room server. The file is located in a share called ship-diagnostics. Use the command line to connect to this share using drive g:. The Windows net use command is used to map a network share to a drive letter. The syntax is: net use drive: \\\ More information: 220-1102, Objective 1.2 The Windows Network Command Line https://professormesser.link/1102010202 Practice Exam A - Answers 39 A5. Match the commands to the description. Some descriptions will not have a match. Commands: Descriptions: dir List the contents of a Windows directory The dir (directory list) command provides a list of files and directories. gpupdate Process changes made in Group Policy Any changes made to Group Policy usually take effect during the login process. To update changes to a computer without going through the login process, it's common to run the gpupdate (Group Policy Update) command. diskpart List the volume names on a storage drive Diskpart (Disk Partitioning) provides command line access to disk and partition configuration settings. hostname Identify the name of a database server The hostname command simply displays the name of the host at the command line. This can be a very useful utility when three or more remote console windows are open. chkdsk Repair logical file system errors The chkdsk (Check Disk) command can fix logical file system error and locate and recover data from bad sectors on a hard drive. cd Change to a different working directory The cd (Change Directory) command is used with the backslash (\) to change the working directory to a different volume or folder name. winver View the "About Windows" dialog The winver (Windows Version) command launches the "About Windows" dialog box from the command prompt. More information: 220-1102, Objective 1.2 - Windows Command Line Tools https://professormesser.link/1102010201 40 Practice Exam A - Answers Practice Exam A Multiple Choice Detailed Answers A6. A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST? ❍ A. Equipment grounding ❍ B. Air filtration ❍ C. Cable management ❍ D. Waste disposal regulations The Answer: A. Equipment grounding Electrical safety is one of the highest priorities because of its association with personal safety. Before a single computer can be turned on, the facility has to be properly grounded and the power systems must be installed properly. The incorrect answers: B. Air filtration Cleaning the inside of a system or printer can cause dust and particles to become airborne. Using a mask or air filtration system can keep those particles out of your mouth, nose, and lungs. C. Cable management Proper cable management will help prevent any trip hazards. Before addressing the cable management system, it will be more important to resolve any electrical problems in the facility. D. Waste disposal systems The waste disposal system would not be a cause of the electrical issues described this in question. More information: 220-1102, Objective 4.4 - Safety Procedures https://professormesser.link/1102040402 Practice Exam A - Answers 41 A7. A user has opened a help desk ticket regarding the battery life on their mobile phone. The battery in the phone held a charge for most of the day prior to connecting to the corporate network. The battery now only lasts about half a day and the back of the phone is warmer than usual. The phone is configured as follows: Storage: 216.2 GB of 512 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance? ❍ A. Enable auto-lock ❍ B. Connect to the VPN ❍ C. Increase available storage space ❍ D. Disable Wi-Fi The Answer: A. Enable auto-lock The backlight of a mobile phone requires constant battery use, and the phone in an active state will use more battery than one that is locked or in a standby state. The incorrect answers: B. Connect to the VPN Connecting to a VPN would most likely increase the amount of battery used due to the encryption and decryption that would need to occur. 42 Practice Exam A - Answers C. Increase available storage space The battery life on a phone is not based on the amount of storage space in use. Increasing storage space would not extend the life of the battery. D. Disable Wi-Fi Wi-Fi does not have a significant impact on battery performance when compared to the screen backlight and active phone services. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam A - Answers 43 A8. A user in the accounting department has received this error message: “The print spooler service is not running.” The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step? ❍ A. Reinstall all printer drivers ❍ B. Restart the spooler service ❍ C. Reboot the computer ❍ D. Power cycle the printer The Answer: B. Restart the spooler service The spooler operates as a background service in Windows. Once the problem is identified and corrected, the spooler service would need to be restarted. The incorrect answers: A. Reinstall all printer drivers The print spooler service is not dependent on the print drivers. Reinstalling print drivers would not commonly resolve a problem with the print spooler not running. C. Reboot the computer Although rebooting the computer may cause the services to restart, it's an unnecessary step that takes time away from problem resolution. It's much easier and faster to simply restart the service. D. Power cycle the printer If the print spooler service isn't running, then the printer won't receive a print job. Power cycling the printer won't cause the print spooler to restart. More information: 220-1102, Objective 3.1 - Troubleshooting Solutions https://professormesser.link/1102030102 44 Practice Exam A - Answers A9. A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop? ❍ A. Biometrics ❍ B. Badge reader ❍ C. USB token ❍ D. Cable lock The Answer: D. Cable lock A cable lock is portable, it can be installed and uninstalled quickly, and it can be wrapped around an existing table or chair to prevent a computer from theft. The incorrect answers: A. Biometrics Biometrics, such as fingerprints or face scanning, is useful for preventing access through a door or to an operating system. However, biometrics won't stop someone from physically taking a laptop from a table. B. Badge reader A badge reader can be used to authenticate to a device or unlock a door, but it won't prevent a laptop from being stolen from a table. C. USB token A USB token is often used to control the use of certain applications. A USB token will not protect a laptop from being stolen. More information: 220-1102, Objective 2.1 - Physical Security https://professormesser.link/1102020101 Practice Exam A - Answers 45 A10. Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process? ❍ A. Surge suppressor ❍ B. Temperature sensor ❍ C. Face mask ❍ D. ESD mat The Answer: C. Face mask A technician working in an area of dust or debris in the air should use a face mask to prevent any particles in the air from entering their lungs. The incorrect answers: A. Surge suppressor Surge suppressors would protect systems from power surges, but it wouldn't help with the cleaning process on an assembly line. B. Temperature sensor There's no mention of any temperature issues, so monitoring the temperature during the cleaning process would not be the most important item to include. D. ESD mat If the technicians were working inside of a computer, an ESD (Electrostatic Discharge) mat may be important to include. However, this question only mentioned cleaning the outside of the computers. More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 46 Practice Exam A - Answers A11. A user is attempting to AirDrop a document to an associate, but they do not see any destination devices in their list of available AirDrop locations. Which of the following would be the MOST likely reason for this issue? ❍ A. Low battery ❍ B. Rotation lock is enabled ❍ C. Low storage space ❍ D. Wi-Fi and Bluetooth are disabled The Answer: D. Wi-Fi and Bluetooth are disabled An Apple iOS and iPadOS devices uses both Wi-Fi and Bluetooth to provide location and transfer functionality for AirDrop. Both wireless options should be enabled to use the AirDrop feature. The incorrect answers: A. Low battery A low battery is always a concern, but it doesn't have any direct effect on transferring files using AirDrop. B. Rotation lock is enabled The rotation lock will prevent a device from alternating between portrait and landscape views. Rotation lock does not prevent AirDrop from working properly. C. Low storage space Low storage space would not prevent a device from sending a document using AirDrop. More information: 220-1102, Objective 3.4 - Troubleshooting Mobile Devices https://professormesser.link/1102030401 Practice Exam A - Answers 47 A12. The motherboard of a server in the corporate data center has started smoking, and flames can be seen inside the computer case. Which of the following would be the BEST way to extinguish this fire? ❍ A. Water-based extinguisher ❍ B. Foam-based extinguisher ❍ C. Disconnect the power ❍ D. Carbon dioxide extinguisher The Answer: D. Carbon dioxide extinguisher For an electrical fire, it's best to use carbon dioxide, FM-200, or other dry chemicals to extinguish any flames. The incorrect answers: A. Water-based extinguisher Water and electricity don't go well together, and that applies just as strongly if a fire is involved. B. Foam-based extinguisher Foam-based extinguishers have a similar effect as a water extinguisher, and you shouldn't use them with electrical equipment. C. Disconnect the power Although it's important to disconnect the power source, the more important task will be to put out the fire. Removing the power source would not extinguish an electrical fire once it has started. More information: 220-1102, Objective 4.4 - Safety Procedures https://professormesser.link/1102040402 48 Practice Exam A - Answers A13. Which of these Windows features provides full disk encryption for all data on a storage drive? ❍ A. Domain Services ❍ B. EFS ❍ C. RDP ❍ D. BitLocker The Answer: D. BitLocker BitLocker provides full disk encryption (FDE) for Windows operating system volumes. The incorrect answers: A. Domain Services Windows Domain Services are used as a centralized database for management of large-scale Windows implementations. Domain Services itself is not an encryption mechanism. B. EFS EFS (Encrypting File System) is a feature of the NTFS (NT File System) that provides encryption at the file system level. Individual files and folders can be encrypted in Windows using EFS. C. RDP RDP (Remote Desktop Protocol) is commonly used to remotely control the desktop of a Windows computer. RDP is not used for encryption of files on the system. More information: 220-1102, Objective 1.1 - Windows Features https://professormesser.link/1102010102 Practice Exam A - Answers 49 A14. A company maintains data retention requirements of five years for all customer names, addresses, and phone numbers. Which of the following would BEST describe this data? ❍ A. Credit card transactions ❍ B. Government-issued information ❍ C. PII ❍ D. Healthcare data The Answer: C. PII PII (Personally Identifiable Information) is any data which could be used to identify an individual. A name, address, and phone number would be common examples of PII. The incorrect answers: A. Credit card transactions Financial information is considered to be sensitive information, and the credit card number and transaction details are important data security concerns. B. Government-issued information Governments commonly issue documents and identification cards to support government services and documentation for the citizens. A person's name, address, and phone numbers are not commonly issued by a governmental entity. D. Healthcare data Healthcare data often contains health status information, health care records, and more. A persons name, address, and phone number are not considered to be related to healthcare data. More information: 220-1102, Objective 4.6 - Privacy, Licensing, and Policies https://professormesser.link/1102040601 50 Practice Exam A - Answers A15. A user in the accounting department would like to ensure that their mobile device data is always available. If the user's smartphone is damaged or stolen, they would like to replace the device and restore all data as quickly as possible. Which of the following would provide this functionality? ❍ A. Full device encryption ❍ B. Remote backup ❍ C. IoT isolation ❍ D. Remote wipe The Answer: B. Remote backup A cloud-based remote backup solution will constantly backup all user data to a remote service. If the device is replaced, all of the user data can be restored directly from this backup in the cloud. The incorrect answers: A. Full device encryption Most remote devices support the encryption of all data stored on the system. With this encryption enabled, a third-party with physical access to the mobile device would not be able to access the data. C. IoT isolation IoT (Internet of Things) devices can provide smart devices and wearable devices, but isolating IoT devices to their own network would not provide data recovery if a system is no longer available. D. Remote wipe If a device is stolen, it's useful to send a remote wipe command to delete everything on the device. This functionality would not backup or restore the user's data, however. More information: 220-1102, Objective 2.7 - Mobile Device Security https://professormesser.link/1102020701 Practice Exam A - Answers 51 A16. Each time a user starts a specific corporate application, a page of disclaimers and usage requirements is shown before the login prompt. Which of the following would BEST describe this page? ❍ A. Splash screen ❍ B. Acceptable use policy ❍ C. Standard operating procedures ❍ D. Topology diagram The Answer: A. Splash screen A splash screen displays a message, logo, or graphic during the startup process. This screen often contains a legal disclaimer regarding access to the system and information about the data contained in the application. The incorrect answers: B. Acceptable use policy An acceptable use policy (AUP) is a formal set of rules and regulations, and it's usually maintained in a central repository such as the employee handbook. C. Standard operating procedures Standard operating procedures (SOP) are a set of procedures for handling operations, software upgrades, and other normal and expected business functions. A list of standard operating procedures would not be shown when an application is started. D. Topology diagram Topology diagrams are useful for identifying the configuration of switches, routers, and other infrastructure devices. A topology diagram is not shown during the startup process for an application. More information: 220-1102, Objective 4.1 - Document Types https://professormesser.link/1102040103 52 Practice Exam A - Answers A17. A system administrator is troubleshooting an older application on a Windows 10 computer and needs to modify the UAC process. Which of the following options would provide access to these settings? ❍ A. Device Manager ❍ B. System Information ❍ C. Event Viewer ❍ D. User Accounts The Answer: D. User Accounts UAC (User Account Control) settings are contained in the Control Panel's User Accounts applet. The incorrect answers: A. Device Manager The Device Manager allows a user to enable, disable, and manage device drivers, but it doesn't provide any access to the UAC settings. B. System Information The System Information utility can provide information about a system's hardware, components, and software environment. UAC controls are not located in the System Information utility. C. Event Viewer The Event Viewer provides a consolidated view of all system logs, but it doesn't provide any access to the User Account Control settings. More information: 220-1102, Objective 2.5 - Windows Security Settings https://professormesser.link/1102020503 Practice Exam A - Answers 53 A18. An office power system occasionally experiences minor voltage spikes during the business day. Which of the following would be the BEST way to address this power issue? ❍ A. Power down when not actively working ❍ B. Confirm that the building has an electrical ground ❍ C. Connect a surge suppressor to each system ❍ D. Maintain an inventory of replacement power supplies The Answer: C. Connect a surge suppressor to each system A surge suppressor can help to even out voltage spikes in an electrical system. It's common to use a surge suppressor at each workstation to limit the effect of these voltage spikes. The incorrect answers: A. Power down when not actively working Although powering down a system would certainly protect it from voltage issues, it would not be a very efficient way of working. B. Confirm that the building has an electrical ground A good ground is an important part of any building's electrical system, but the ground won't help filter out the occasional voltage spike. D. Maintain an inventory of replacement power supplies If you don't use surge suppressors and you have constant power spikes, you might need replacement power supplies. However, it would be more effective to use surge suppressors instead of replacing power supplies. More information: 220-1102, Objective 4.5 - Environmental Impacts https://professormesser.link/1102040501 54 Practice Exam A - Answers A19. What is the maximum amount of RAM supported by a 32-bit version of an operating system? ❍ A. 4 GB ❍ B. 8 GB ❍ C. 16 GB ❍ D. 192 GB The Answer: A. 4 GB The limited address space of a 32-bit operating system can only support 4 GB of system memory. The incorrect answers: B. 8 GB A 32-bit operating system is limited to 4 GB of addressable memory. Although there are some techniques to work around this 4 GB limitation, they're not often implemented in practice. C. 16 GB 4 GB is the limit for 32-bit operating systems. D. 192 GB 192 GB would be well over the limit for 32-bit operating systems. More information: 220-1102, Objective 1.7 - Installing Applications https://professormesser.link/1102010701 Practice Exam A - Answers 55 A20. Daniel, a user, is attempting to start an application on his laptop computer. Each time the application shows the starting graphic, it suddenly disappears and the application icon disappears from the taskbar. A technician would like to get more information about each previous occurrence of the application crash. Which of these choices would provide these details? ❍ A. Event Viewer ❍ B. Task Manager ❍ C. Startup Repair ❍ D. Safe Mode The Answer: A. Event Viewer Event Viewer contains a consolidated log of all system and application logs. A technician can use Event Viewer to review all past events on the system. The incorrect answers: B. Task Manager Task Manager provides a real-time view of performance across many different system metrics, but it doesn't provide a way to review historical performance or events. C. Startup Repair Startup Repair is a useful tool when a system is not able to boot. Startup Repair does not resolve problems with applications that will not properly start. D. Safe Mode Safe Mode is useful for testing in a minimal operating system environment, but it doesn't provide any additional method of viewing application crash event logs. More information: 220-1102, Objective 1.3 The Microsoft Management Console https://professormesser.link/1102010302 56 Practice Exam A - Answers A21. An attacker is using every combination of letters, numbers, and special characters in an attempt to discover a user's password. Which of the following would describe this attack type? ❍ A. Spoofing ❍ B. Social engineering ❍ C. Brute force attack ❍ D. DDoS The Answer: C. Brute force attack A brute force attack attempts to determine a user's password by trying every possible combination of letters, numbers, and special characters until the proper combination is found. The incorrect answers: A. Spoofing Spoofing is a technique where one device pretends to be another device. Trying every possible password option would not be associated with a spoofing attack. B. Social engineering Social engineering is an attack method that uses many different psychological techniques to obtain access or information. A brute force attack is not categorized as social engineering. D. DDoS DDoS (Distributed Denial of Service) is an attack type that uses many different and distributed systems to force a service to fail. A brute force attack is not associated with a DDoS attack. More information: 220-1102, Objective 2.4 - Password Attacks https://professormesser.link/1102020405 Practice Exam A - Answers 57 A22. A system administrator is upgrading an email service in the corporate data center. During the upgrade, an error message appears and the upgrade fails. Subsequent attempts to perform the upgrade also fail. Which of the following processes should the system administrator follow to return the email server to its previous state? ❍ A. Rollback plan ❍ B. Disaster recovery plan ❍ C. Incident response plan ❍ D. Power plan The Answer: A. Rollback plan Even with the best planning, there can always be unexpected events. Every planned change needs to have a rollback plan to return the environment to its original state. The incorrect answers: B. Disaster recovery plan A disaster recovery plan is written for major events that impact a large portion of an organization. An email upgrade that goes badly does not meet the scope of needing a disaster recovery plan. C. Incident response plan An incident response plan is commonly used to address a security event. Issues discovered during the planned upgrade of an email server would not be associated with an incident response plan. D. Power plan The Windows operating system allows users to modify the power use on their systems using built in power plans. These environmental controls are not associated with the change control process. More information: 220-1102, Objective 4.2 - Change Management https://professormesser.link/1102040201 58 Practice Exam A - Answers A23. When connecting a new USB webcam to Windows 10, a message appears stating "The controller does not have enough resources for this device." Which of the following would be the BEST next troubleshooting step? ❍ A. Close all large-memory processes ❍ B. Modify the BCD ❍ C. Move the webcam to a different USB interface ❍ D. Use System Restore to rollback to a previous configuration The Answer: C. Move the webcam to a different USB interface The resources associated with a USB (Universal Serial Bus) interface can vary based on the interface type and USB controller version. If these resources are exceeded on a USB controller, the system will display a message explaining the lack of resources. The incorrect answers: A. Close all large-memory processes The resources associated with the USB interface are not related to the available RAM in the operating system. B. Modify the BCD The Windows BCD (Boot Configuration Data) is used during startup to identify the location of the Windows installation. Updating the BCD will not resolve USB-related resource contention. D. Use System Restore to rollback to a previous configuration This issue is related to the hardware connected to a USB controller. Changing the configuration of the operating system will not resolve this issue. More information: 220-1102, Objective 3.1 - Troubleshooting Windows https://professormesser.link/1102030101 Practice Exam A - Answers 59 A24. A system administrator has created a shared folder on a server to store operating system images. Technicians access the shared folder to download the latest images when performing large-scale system installatio