We provide real 220-1102 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass CompTIA 220-1102 Exam quickly & easily. The 220-1102 PDF type is available for reading and printing. You can print more and practice many times. With the help of our CompTIA 220-1102 dumps pdf and vce product and material, you can easily pass the 220-1102 exam.

Online 220-1102 free questions and answers of New Version:

NEW QUESTION 1
A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

  • A. Power Plans
  • B. Hibernate
  • C. Sleep/Suspend
  • D. Screensaver

Answer: A

Explanation:
Power Plans are Windows settings that allow a user to configure how a laptop’s screen behaves when plugged in or running on battery power. They can adjust the screen brightness and the time before the screen turns off due to inactivity. Hibernate, Sleep/Suspend and Screensaver are other Windows settings that affect how a laptop’s screen behaves, but they do not allow changing the screen brightness or turning off time. Verified References: https://www.comptia.org/blog/windows-power-plans https://www.comptia.org/certifications/a
220-1102 dumps exhibit

NEW QUESTION 2
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

  • A. Run sfc / scannow on the drive as the administrator.
  • B. Run clearnmgr on the drive as the administrator
  • C. Run chkdsk on the drive as the administrator.
  • D. Run dfrgui on the drive as the administrator.

Answer: C

Explanation:
The technician should verify bad sectors on the user’s computer by running chkdsk on the drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and repairs disk errors, including bad sectors. It runs a scan of the disk and displays any errors that are found
220-1102 dumps exhibit

NEW QUESTION 3
A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason?

  • A. 220-1102 dumps exhibitThe domain's processor compatibility is not met
  • B. The laptop has Windows 10 Home installed
  • C. The laptop does not have an onboard Ethernet adapter
  • D. The Laptop does not have all current Windows updates installed

Answer: B

Explanation:
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)

NEW QUESTION 4
A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following security log:
220-1102 dumps exhibitSRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture The technician analyses the following Windows firewall information:
220-1102 dumps exhibit
Which of the following protocols most likely allowed the data theft to occur?

  • A. 1
  • B. 53
  • C. 110
  • D. 445

Answer: D

Explanation:
The protocol that most likely allowed the data theft to occur is SMB over TCP port 445. SMB is a network file sharing protocol that enables access to files, printers, and other resources on a network. Port 445 is used by SMB to communicate directly over TCP without the need for NetBIOS, which is an older and less secure protocol. The security log shows that the source IP address 192.168.1.1 sent a file named secrets.zip using SMB protocol to the destination IP address 192.168.1.50, which captured the file. The Windows firewall information shows that port 445 is enabled for inbound and outbound traffic, which means that it is not blocked by the firewall. Therefore, port 445 is the most likely port that was exploited by the attacker to steal the data from the corporate laptop.
References:
✑ SMB port number: Ports 445, 139, 138, and 137 explained1
✑ What is an SMB Port + Ports 445 and 139 Explained2
✑ CompTIA A+ Certification Exam Core 2 Objectives3
220-1102 dumps exhibit

NEW QUESTION 5
Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

  • A. Testing
  • B. Rollback
  • C. Risk
  • D. Acceptance

Answer: B

Explanation:
Rollback refers to the steps to be taken if an issue occurs during a change implementation. It means restoring the system to its previous state before the change was applied, using backup data or configuration files. It can minimize the impact and downtime caused by a failed change. Testing refers to the steps to be taken before a change implementation, to verify that the change works as expected and does not cause any errors or conflicts. Risk refers to the potential negative consequences of a change implementation, such as data loss, security breach, performance degradation, etc.
220-1102 dumps exhibitAcceptance refers to the steps to be taken after a change implementation, to confirm that the change meets the requirements and expectations of the stakeholders. Verified References: https://www.comptia.org/blog/change-management-process https://www.comptia.org/certifications/a

NEW QUESTION 6
220-1102 dumps exhibitWhich of the following allows access to the command line in macOS?

  • A. PsExec
  • B. command.com
  • C. Terminal
  • D. CMD

Answer: C

Explanation:
Terminal is an application that allows access to the command line in macOS. The command line is an interface that allows users to interact with the operating system and perform various tasks by typing commands and arguments. Terminal can be used to launch programs, manage files and folders, configure settings, troubleshoot issues, and run scripts in macOS. PsExec, command.com, and CMD are not applications that allow access to the command line in macOS.

NEW QUESTION 7
Which of the following wireless security features can be enabled lo allow a user to use login credentials to attach lo available corporate SSIDs?

  • A. TACACS+
  • B. Kerberos
  • C. Preshared key
  • D. WPA2/AES

Answer: D

Explanation:
WPA2/AES (Wi-Fi Protected Access 2/Advanced Encryption Standard) is a wireless security standard that supports enterprise mode, which allows a user to use login credentials (username and password) to authenticate to available corporate SSIDs (service set identifiers). TACACS+ (Terminal Access Controller Access-Control System Plus) and Kerberos are network authentication protocols, but they are not wireless security features. Preshared key is another wireless security feature, but it does not use login credentials. Verified References: https://www.comptia.org/blog/wireless-security-standards https://www.comptia.org/certifications/a
220-1102 dumps exhibit

NEW QUESTION 8
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?

  • A. Internet-based upgrade
  • B. Repair installation
  • C. Clean install
  • D. USB repair
  • E. 220-1102 dumps exhibitIn place upgrade

Answer: C

Explanation:
The desktop specialist should use a clean install to refresh the laptop. A clean install will remove all data and applications from the laptop and install a fresh copy of Windows 10, ensuring that the laptop is ready for the newly hired employee.

NEW QUESTION 9
A department has the following technical requirements for a new application:
220-1102 dumps exhibit
The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?

  • A. CPU
  • B. Hard drive
  • C. RAM
  • D. Touch screen

Answer: C

Explanation:
https://www.makeuseof.com/tag/difference-32-bit-64-bit-windows/
After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully take advantage of the RAM of the computer. This is because a 64-bit operating system is able to use larger amounts of RAM compared to a 32-bit operating system, which may benefit the system’s overall performance if it has more than 4GB of RAM installed

NEW QUESTION 10
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

  • A. Run an antivirus and enable encryption.
  • B. Restore the defaults and reimage the corporate OS.
  • C. Back up the files and do a system restore.
  • D. Undo the jailbreak and enable an antivirus.

Answer: B

Explanation:
The best course of action for the technician is to restore the defaults and reimage the corporate OS on the device. This will remove the jailbreak and any unauthorized or malicious apps that may have been installed on the device, as well as restore the security features and policies that the company has set for its devices. This will also ensure that the device can receive the latest updates and patches from the manufacturer and the company, and prevent any data leakage or compromise from the device.
Jailbreaking is a process of bypassing the built-in security features of a device to install software other than what the manufacturer has made available for that device1. Jailbreaking allows the device owner to gain full access to the root of the operating system and access all the features1. However, jailbreaking also exposes the device to various risks, such as:
✑ The loss of warranty from the device manufacturers2.
✑ Inability to update software until a jailbroken version becomes available2.
✑ Increased security vulnerabilities32.
✑ Decreased battery life2.
✑ Increased volatility of the device2.
220-1102 dumps exhibitSome of the signs of a jailbroken device are:
✑ A high number of ads, which may indicate the presence of adware or spyware on the device3.
✑ Receiving data-usage limit notifications, which may indicate the device is sending or receiving data in the background without the user’s knowledge or consent3.
✑ Experiencing slow response, which may indicate the device is running unauthorized or malicious apps that consume resources or interfere with the normal functioning of the device3.
✑ Finding apps or icons that the user did not install or recognize, such as Cydia, which is a storefront for jailbroken iOS devices1.
The other options are not sufficient or appropriate for dealing with a jailbroken device. Running an antivirus and enabling encryption may not detect or remove all the threats or vulnerabilities that the jailbreak has introduced, and may not restore the device to its original state or functionality. Backing up the files and doing a system restore may not erase the jailbreak or the unauthorized apps, and may also backup the infected or compromised files. Undoing the jailbreak and enabling an antivirus may not be possible or effective, as the jailbreak may prevent the device from updating or installing security software, and may also leave traces of the jailbreak or the unauthorized apps on the device.
References:
✑ CompTIA A+ Certification Exam Core 2 Objectives4
✑ CompTIA A+ Core 2 (220-1102) Certification Study Guide5
✑ What is Jailbreaking & Is it safe? - Kaspersky1
✑ Is Jailbreaking Safe? The ethics, risks and rewards involved - Comparitech3
✑ Jailbreaking : Security risks and moving past them2

NEW QUESTION 11
Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

  • A. A forgotten keychain password
  • B. An employee's Apple ID used on the device
  • C. An operating system that has been jailbroken
  • D. An expired screen unlock code

Answer: B

Explanation:
Activation Lock is a feature that prevents anyone from erasing or activating an iOS device without the owner’s Apple ID and password. If a corporate-owned iOS device is linked to an employee’s Apple ID, it will have an Activation Lock issue when the employee leaves the company or forgets their Apple ID credentials.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 4.1

NEW QUESTION 12
An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

  • A. Login times
  • B. Screen lock
  • C. User permission
  • D. Login lockout attempts

Answer: B

Explanation:
Screen lock is a feature that returns a computer to the login screen after a period of inactivity, requiring the user to enter their credentials to resume their session. Screen lock can be configured using Group Policy settings, such as Screen saver timeout and Interactive logon: Machine inactivity limit. Screen lock can help prevent unauthorized access to a computer when the user is away from their desk. Login times are not a feature that returns a computer to the login screen, but a measure of how long it takes for a user to log in to a system. User permission is not a feature that returns a computer to the login screen, but a set of rights and privileges that determine what a user can do on a system. Login lockout attempts are not a feature that returns a computer to the login screen, but a security policy that locks out a user account after a number of failed login attempts. https://woshub.com/windows-lock-screen-after-idle-via-gpo/

NEW QUESTION 13
220-1102 dumps exhibitA user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

  • A. The smartphone's line was not provisioned with a data plan
  • B. The smartphone's SIM card has failed
  • C. The smartphone's Bluetooth radio is disabled.
  • D. The smartphone has too many applications open

Answer: A

Explanation:
The smartphone’s line was not provisioned with a data plan. The user is unable to use any internet-related functions on the smartphone when it is not connected to Wi-Fi because the smartphone’s line was not provisioned with a data plan. The user can send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi because these functions do not require an internet connection1

NEW QUESTION 14
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

  • A. Keylogger
  • B. Cryptominers
  • C. Virus
  • D. Malware

Answer: D

Explanation:
The most likely cause of the user’s issue of applications opening without being launched and browser redirects when trying to go to certain websites is malware. Malware is a general term that refers to any software or code that is malicious or harmful to a computer or system. Malware can perform various unwanted or unauthorized actions on a computer or system, such as opening applications, redirecting browsers, displaying ads, stealing data, encrypting files or damaging hardware. Malware can infect a computer or system through various means, such as email attachments, web downloads, removable media or network connections. Keylogger is a type of malware that records and transmits the keystrokes made by a user on a keyboard. Keylogger can be used to steal personal or sensitive information, such as passwords, credit card numbers or chat messages. Keylogger does not typically open applications or redirect browsers but only captures user inputs. Cryptominers are a type of malware that use the computing resources of a computer or system to mine cryptocurrency, such as Bitcoin or Ethereum. Cryptominers can degrade the performance and increase the power consumption of a computer or system. Cryptominers do not typically open applications or redirect browsers but only consume CPU or GPU cycles. Virus is a type of malware that infects and replicates itself220-1102 dumps exhibiton other files or programs on a computer or system.

NEW QUESTION 15
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

  • A. Zero day
  • B. SOL injection
  • C. Cross-site scripting
  • D. Distributed denial of service

Answer: D

Explanation:
The company is experiencing a distributed denial of service (DDoS) attack. A DDoS attack is a type of cyber attack in which multiple compromised systems are used220-1102 dumps exhibitto target a single system, causing a denial of service for users of the targeted system.

NEW QUESTION 16
A technician needs to ensure that USB devices are not suspended by the operating system Which of the following Control Panel utilities should the technician use to configure the setting?

  • A. System
  • B. Power Options
  • C. Devices and Printers
  • D. Ease of Access

Answer: B

Explanation:
The correct answer is B. Power Options. The Power Options utility in the Control Panel allows you to configure various settings related to how your computer uses and saves power, such as the power plan, the sleep mode, the screen brightness, and the battery status. To access the Power Options utility, you can follow these steps:
✑ Go to Control Panel > Hardware and Sound > Power Options.
✑ Click on Change plan settings for the power plan you are using.
220-1102 dumps exhibit✑ Click on Change advanced power settings.
✑ Expand the USB settings category and then the USB selective suspend setting subcategory.
✑ Set the option to Disabled for both On battery and Plugged in.
✑ Click on OK and then on Save changes.
This will prevent the operating system from suspending the USB devices to save power . System, Devices and Printers, and Ease of Access are not the utilities that should be used to configure the setting. System is a utility that provides information about your computer’s hardware and software, such as the processor, memory, operating system, device manager, and system protection. Devices and Printers is a utility that allows you to view and manage the devices and printers connected to your computer, such as adding or removing devices, changing device settings, or troubleshooting problems. Ease of Access is a utility that allows you to customize your computer’s accessibility options, such as the narrator, magnifier, high contrast, keyboard, mouse, and speech recognition. None of these utilities have any option to configure the USB selective suspend setting.

NEW QUESTION 17
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?

  • A. Golden image
  • B. Remote network install
  • C. In-place upgrade
  • D. Clean install

Answer: C

Explanation:
An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it will retain all user files and preferences, can be done locally, and can be done one station at a time. An in-place upgrade involves installing the new version of Windows over the existing version, and can be done quickly and easily.

NEW QUESTION 18
......

P.S. Easily pass 220-1102 Exam with 402 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 220-1102 Dumps: https://www.2passeasy.com/dumps/220-1102/ (402 New Questions)