Test Online Free CompTIA 220-1102 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 220-1102 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes.
Which of the following encryption solutions should the technician choose?
Answer:
Question 2Selectable Answer
A user calls the help desk and reports a workstation is infected with malicious software.
Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).
Answer:
Question 3Selectable Answer
A technician needs to exclude an application folder from being cataloged by a Windows 10 search.
Which of the following utilities should be used?
Answer:
Question 4Selectable Answer
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software.
Which of the following should the technician do to MOST likely resolve the issue?
Answer: Explanation:
The new laptop was set up with the static IP it needs to connect to the software. The old desktop is still configured with that IP, hence the conflict.
Question 5Selectable Answer
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing.
Which of the following methods can the administrator use to troubleshoot the server effectively?
Answer:
Question 6Selectable Answer
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization. The certificate will be used in conjunction with the user's existing username and password
Which of the following BEST describes the security benefits realized after this deployment?
Answer:
Question 7Selectable Answer
A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected.
Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).
Answer:
Question 8Selectable Answer
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network.
Which of the following configurations should the technician employ to achieve this goal?
Answer:
Question 9Selectable Answer
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server.
Which of the following is MOST likely to be of concern to the IT manager?
Answer:
Question 10Selectable Answer
The command cac cor.ptia. txt was issued on a Linux terminal.
Which of the following results should be expected?
Answer:
Question 11Selectable Answer
A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded.
Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?
Answer:
Question 12Selectable Answer
A call center technician receives a call from a user asking how to update Windows
Which of the following describes what the technician should do?
Answer:
Question 13Written Answer
CORRECT TEXT
Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.
INSTRUCTIONS
Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Answer:
Graphical user interface, application
Description automatically generated
Click on 802.11 and Select ac
Graphical user interface, application
Description automatically generated
Click on SSID and select CORP
Graphical user interface, text, application, Teams
Description automatically generated
Click on Frequency and select 5GHz
A picture containing background pattern
Description automatically generated
At Wireless Security Mode, Click on Security Mode
Graphical user interface, text, application
Description automatically generated
Select the WPA2
Graphical user interface, application, Teams
Description automatically generated with medium confidence
Ann needs to connect to the BYOD SSID, using 2.4GHZ. The selected security method chose should be WPA PSK, and the password should be set to TotallySecret.
Graphical user interface, application
Description automatically generated
Question 14Selectable Answer
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device.
Which of the following features BEST addresses the user's concern?
Answer:
Question 15Selectable Answer
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out.
Which of the following is the BEST reason to follow the change management process in this scenario?