Comptia 220-1002
Comptia 220-1002
Comptia 220-1002
A technician has installed two new drives in one of the computers in the computer lab. Disk1 will
be utilized for user and application data. Disk 2 has already been properly configured and has
production data on in. The technician has been unable to format the appropriate disk from the
command prompt.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition
must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in
size and mapped to drive G.
The new partitions must be formatted to ensure that user’s files can be secured from other users
and that the disk must be configured to account for future redundancy.
The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition
must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in
size and mapped to drive G.
The new partitions must be formatted to ensure that user’s files can be secured from other users
and that the disk must be configured to account for future redundancy.
INSTRUCTIONS:
Conduct the necessary steps within the Disk Manager to accomplish these tasks.
If at any time you would like to bring back the initial state of the simulation, please click the Reset
All button.
Answer:
Please review explanation for detailed answer.
Explanation:
QUESTION NO: 2
A technician arrives on site to find that two users who have the same model on Android
smartphone are having the same issue with a specific application.
Whenever they attempt to launch the application, it fails and gives an error message. Which of the
following should the technician do FIRST?
A.
Reinstall the application
B.
Roll back the application to the earlier version
C.
Clear the application cache
D.
Update the OS of the smartphones
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com 10
CompTIA 220-1002 Exam
Explanation:
QUESTION NO: 3
Which of the following commands should the technician use to correct this issue? (Choose two.)
A.
dir
B.
chkdsk
C.
dism
D.
ipconfig
E.
format
F.
diskpart
Answer: B,C
Explanation:
QUESTION NO: 4
Which of the following settings should the administrator modify to increase server security?
(Choose two.)
A.
Change the default access port
C.
Put the terminal server into the router’s DMZ
D.
Disable logon time restrictions
E.
Block all unused ports on the LAN smart switch
F.
Use the local client certificate for server authentication
Answer: C,E
Explanation:
QUESTION NO: 5
A company has hired a new IT firm to manage its network switches and routers. The firm is
geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
A.
Telnet
B.
SSH
C.
RDP
D.
VNC
Answer: B
Explanation:
A small office’s wireless network was compromised recently by an attacker who brute forced a PIN
to gain access. The attacker then modified the DNS settings on the router and spread malware to
the entire network.
Which of the following configurations MOST likely allowed the attack to take place? (Choose two.)
A.
Guest network
B.
TKIP
C.
Default login
D.
Outdated firmware
E.
WPS
F.
WEP
Answer: C,F
Explanation:
QUESTION NO: 7
A client wants a technician to create a PC naming convention that will make the client’s PCs
easier to track and identify while in use.
Which of the following naming convention formats should the technician follow?
A.
Domain name, location, IP address
B.
Domain name, location, asset ID
C.
"Pass Any Exam. Any Time." - www.actualtests.com 13
CompTIA 220-1002 Exam
Asset ID, MAC address
D.
Location, RFID
Answer: C
Explanation:
QUESTION NO: 8
Which of the following provide the BEST security for a server room? (Choose two.)
A.
Badge reader
B.
Bollard
C.
Biometric lock
D.
Cable lock
E.
USB token
F.
Privacy window shades
Answer: A,C
Explanation:
QUESTION NO: 9
A.
Whaling
"Pass Any Exam. Any Time." - www.actualtests.com 14
CompTIA 220-1002 Exam
B.
Impersonation
C.
Spoofing
D.
Spear phishing
Answer: D
Explanation:
QUESTION NO: 10
A technician receives an invalid certificate error when visiting a website with port 443 enabled.
Other computers on the same LAN do not exhibit this symptom.
Which of the following needs to be adjusted on the workstation to fix the issue?
A.
Date and time
B.
UEFI boot mode
C.
Logon times
D.
User access control
Answer: A
Explanation:
QUESTION NO: 11
A department in an organization set up a proxy server to manage its Internet stage. A technician is
configuring the Windows workstations to use the new proxy server.
A.
Internet Options – Advanced
B.
Internet Options – Connections
C.
Internet Options – Security
D.
Internet Options – Content
E.
Internet Options – Privacy
Answer: B
Explanation:
QUESTION NO: 12
Which of the following is the amount of memory a user is limited to with a 32-bit version of
Windows?
A.
2GB
B.
4GB
C.
8GB
D.
16GB
Answer: B
Explanation:
A technician is working at a help desk firm and receives a call from a user who has experienced
repeated BSODs. The technician is scheduled to take a break just after the call comes in.
Which of the following is the BEST choice for the technician to make?
A.
Politely ask the user to call back
B.
Ask another technician to take the call
C.
Troubleshoot the issue for the user
D.
Input the issue as a ticket and escalate to Tier 2
E.
Put the user on hold and troubleshoot after the scheduled break
Answer: B
Explanation:
QUESTION NO: 14
A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped
because the data is very valuable.
A.
Fingerprint lock
B.
Passcode lock
C.
Swipe lock
D.
PIN lock
"Pass Any Exam. Any Time." - www.actualtests.com 17
CompTIA 220-1002 Exam
Answer: A
Explanation:
QUESTION NO: 15
Which of the following devices are MOST likely to have a grounding wire attached to them based
on the manufacturer’s design? (Choose two.)
A.
UPS
B.
Server rack
C.
PoE phone
D.
Desktop printer
E.
Modem
F.
Patch panel
Answer: A,B
Explanation:
QUESTION NO: 16
A technician has just finished installing a secondary OS on a workstation. After rebooting the
computer, the technician receives the following error: No OS found. The technician confirms the
boot.ini file is correct.
A.
The computer has GRUB Legacy installed
C.
An incompatible partition is marked as active
D.
An unsupported version of Windows is installed
Answer: C
Explanation:
QUESTION NO: 17
Which of the following password practices should the technician implement on the PC to secure
network access?
A.
Remove the guest account from the administrators group
B.
Disable single sign-on
C.
Issue a default strong password for all users
D.
Require authentication on wake-up
Answer: D
Explanation:
QUESTION NO: 18
Joe, an employee, took a company-issued Windows laptop home, but is having trouble connecting
to any of the shares hosted on his home media server. Joe has verified he is connected to the
Internet.
A.
An IP conflict is present
B.
A corporate VPN is enabled
C.
A firewall exception must be set
D.
HomeGroup must be enabled
Answer: C
Explanation:
QUESTION NO: 19
A user believes there is a virus on a laptop. The user installs additional real-time protection
antivirus software but is now experiencing extremely slow performance on the laptop.
Which of the following should a technician do to resolve the issue and avoid recurrence?
A.
Activate real-time protection on both antivirus software programs
B.
Uninstall one antivirus software program and install a different one
C.
Run OS updates
D.
Enable the quarantine feature on both antivirus software programs
E.
Remove the user-installed antivirus software
Answer: E
Explanation:
QUESTION NO: 20
A user who is running Windows XP calls a technician to upgrade the computer to a newer
Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space
with a 1.7GHz processor.
Which of the following OSs should the technician recommended to ensure the BEST performance
on this computer?
A.
Windows 7
B.
Windows 8
C.
Windows 8.1
D.
Windows 10
Answer: A
Explanation:
QUESTION NO: 21
Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After
about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician
is wasting his time because he has already tried everything that has been suggested.
A.
Since Joe is concerned about time, suggest calling back later when Joe has more time to
troubleshoot
B.
Record the call and send it to the local intranet for future technicians to learn how to deal with calls
like this one
D.
Inform the customer that there is a troubleshooting script that must be followed to get the issue
resolved
Answer: C
Explanation:
QUESTION NO: 22
Which of the following security methods BEST describes when a user enters a username and
password once for multiple applications?
A.
SSO
B.
Permission propagation
C.
Inheritance
D.
MFA
Answer: A
Explanation:
QUESTION NO: 23
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users
will have access to only the application needed for customer interaction. The technician must also
ensure that whenever the computer is rebooted or powered on it logs in automatically without a
password.
Which of the following account types would the technician MOST likely set up on this kiosk
A.
Guest
B.
Administrator
C.
Power User
D.
Remote Desktop User
Answer: A
Explanation:
QUESTION NO: 24
A technician has been asked to recommend antivirus software for a home PC, but the user does
not want to pay for a license.
A.
Open license
B.
Personal license
C.
Corporate license
D.
Enterprise license
Answer: A
Explanation:
QUESTION NO: 25
Which of the following can Joe do to ensure the backups will work if needed?
A.
Frequently restore the servers from backup files and test them
B.
Configure the backups to restore to virtual machines for quick recovery
C.
Set up scripts that automatically rerun failed backup jobs
D.
Set up alerts to let administrators know when backups fail
E.
Store copies of the backups off-side in a secure datacenter
Answer: D
Explanation:
QUESTION NO: 26
A SOHO customer has recently experienced a major hurricane. The customer has no backups
and has lost all data and hardware associated with the company. The customer calls a contractor
to assist in the rebuilding process and needs suggestions on the best way to prevent this from
happening again.
Which of the following recommendations should the contractor give to the customer? (Choose
two.)
A.
Backup testing
B.
Cloud storage
C.
Local storage backups
D.
E.
Hot site
F.
Waterproof devices
Answer: B,E
Explanation:
QUESTION NO: 27
A technician is running updates on a Windows PC. Some of the updates install properly, while
others appear as failed. While troubleshooting, the technician restarts the PC and attempts to
install the failed updates again. The updates continue to fail.
A.
Visit the Microsoft Update website to see if there is an issue with a specific update
B.
Look up the error number associated with the failed update
C.
Look at the system Event Viewer to find more information on the failure
D.
Download the failed update to install manually
Answer: B
Explanation:
QUESTION NO: 28
A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.
Which of the following Control Panel utilities should the technician use?
"Pass Any Exam. Any Time." - www.actualtests.com 25
CompTIA 220-1002 Exam
A.
System
B.
Display
C.
Folder Options
D.
Indexing Options
Answer: C
Explanation:
QUESTION NO: 29
Which of the following should the technician do NEXT according to malware removal best
practices?
A.
Enable System Restore and create a restore point so no data is lost
B.
Educate the user about how to avoid malware in the future
C.
Update the antivirus software and run a full system scan
D.
Move the infected system to a lab with no network connectivity
Answer: D
Explanation:
QUESTION NO: 30
A user’s Windows laptop has become consistently slower over time. The technician checks the
"Pass Any Exam. Any Time." - www.actualtests.com 26
CompTIA 220-1002 Exam
CPU utilization and sees that it varies between 95% and 100%. After the technician closes some
running applications, the CPU utilization drops to approximately 20%, and the laptop runs much
faster. The next day the same user calls again with the same problem.
Which of the following is a tool the technician can use to resolve the issue?
A.
Task Manager
B.
MSTSC
C.
MSConfig
D.
PerfMon
Answer: A
Explanation:
QUESTION NO: 31
A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown
while providing at least one hour of uptime in case of extreme weather conditions.
A.
Uninterruptible power supply
B.
Surge protector
C.
Power strip
D.
Power distribution unit
Answer: A
QUESTION NO: 32
Which of the following installation types would require the use of an answer file to install the OS?
A.
Unattended
B.
Clean
C.
Repair
D.
Upgrade
Answer: A
Explanation:
QUESTION NO: 33
A Mac user’s operating system became corrupted, and files were deleted after malware was
downloaded. The user needs to access the data that was previously stored on the Mac.
A.
Time Machine
B.
Snapshot
C.
System Restore
D.
Boot Camp
QUESTION NO: 34
A manager requests remote access to a server after hours and on weekends to check data. The
manager insists on using the server.
Before granting the access, which of the following is the MOST important step a technician can
take to protect against possible infection?
A.
Create a policy to remove Internet access from the server during off hours
B.
Set the local antivirus software on the server to update and scan daily
C.
Ensure the server is patched with the latest security updates
D.
Educate the manager on safe Internet browsing practices
Answer: C
Explanation:
QUESTION NO: 35
A manager with a restricted user account receives the following error message:
Windows Update cannot currently check for updates because the service is not running.
The manager contacts the help desk to report the error. A technician remotely connects to the
user’s computer and identifies the problem.
B.
Restart the network services
C.
Roll back the device drivers
D.
Rebuild the Windows profiles
Answer: B
Explanation:
QUESTION NO: 36
A SOHO technician recently moved some data from one server to another to increase storage
capacity. Several users are now reporting they cannot access certain shares on the network.
When the users attempt to access the shares, they get the following error: Access Denied. The
technician confirms the users are all in the proper security groups and have the proper access, but
they are still unable to access the shares.
Which of the following are the MOST likely reasons for these issues? (Choose two.)
A.
Administrative share permissions
B.
Mapped drives
C.
Group Policy hours restriction
D.
Denied write/delete permissions
E.
Disabled proxy settings
Answer: B,D
Explanation:
QUESTION NO: 37
A.
Brute force
B.
Spoofing
C.
DDoS
D.
Zero-day
Answer: B
Explanation:
QUESTION NO: 38
An employee reported that a suspicious individual was looking through the recycle bin.
A.
Phishing
B.
Spear phishing
C.
Dumpster diving
D.
Impersonation
Answer: C
Explanation:
QUESTION NO: 39
A SOHO user reports desktop applications are performing slowly, and no emails have been
received all morning. A technician remotes in and determines Internet pages load slowly or not at
all, CPU performance is normal, and the local router can successfully ping. The remote connection
drops periodically.
Which of the following steps should the technician take NEXT to resolve the problem?
A.
Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
B.
Update the antivirus software, run an antivirus scan, verify the browser settings, and check all
email settings
C.
Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
D.
Send a test email, open a command prompt to check the file system, and empty the browser
cache
Answer: B
Explanation:
QUESTION NO: 40
A.
Untrusted software
B.
Outdated antivirus
C.
MDM policies
"Pass Any Exam. Any Time." - www.actualtests.com 32
CompTIA 220-1002 Exam
D.
Inactive VPN
Answer: D
Explanation:
QUESTION NO: 41
A network administrator has given a technician documentation detailing the switchports the
technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the
technician?
A.
Process diagram
B.
Physical network diagram
C.
Fiber backbone diagram
D.
Logical topology diagram
Answer: B
Explanation:
QUESTION NO: 42
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked
with limiting removable hard drive access to certain network users. USB ports are used for many
devices, including scanners, printers, and signature pads, so a policy is created to deny access to
removable hard drives only. When testing the policy, a removable drive is plugged in but can still
be accessed.
Which of the following command-line tools should the technician use to apply the new policy?
B.
diskpart
C.
gpresult
D.
net use
Answer: A
Explanation:
QUESTION NO: 43
A network administrator notifies a technician that the company is experiencing a DDoS attack.
Several internal Windows PCs are the source of the traffic. The network administrator gives the
technician the Windows computer names and states they be scanned and cleaned immediately.
With which of the following types of infections are the PCs MOST likely infected? (Choose two.)
A.
Spyware
B.
Zombies
C.
Virus
D.
Ransomware
E.
Worm
F.
Botnet
Answer: B,E
Explanation:
QUESTION NO: 44
Ann, a user, is attempting to log in to her email service form a third-party email client on her
phone. When Ann enters her usual username and password, she receives an error message
saying the credentials are invalid. Ann then decides to reset her email password, but after the
reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
A.
Full device encryption
B.
Account lock
C.
Multifactor authentication
D.
Strong password requirements
Answer: C
Explanation:
QUESTION NO: 45
Joe, a user, returns his computer to the technician who performed a virus removal on it the week
before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
A.
End-user education
B.
Pre-installation environment cleaning
C.
Disabling of System Restore
Answer: A
Explanation:
QUESTION NO: 46
In which of the following file extension types would a user expect to see the command. “net use
T:\\server\files”?
A.
.bat
B.
.vbs
C.
.js
D.
.py
Answer: A
Explanation:
QUESTION NO: 47
A user contacts a technician to troubleshoot server errors. The user explains that some files will
not open on the server, the data backups are operational, and the weather has been bad. The
technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?
A.
System memory
B.
Surge protector
"Pass Any Exam. Any Time." - www.actualtests.com 36
CompTIA 220-1002 Exam
C.
Hard drives
D.
Battery backup
Answer: D
Explanation:
QUESTION NO: 48
Which of the following steps should a technician take FIRST to prevent an electrical hazard when
repairing a PC?
A.
Put on an ESD strap.
B.
Place components on an ESD mat
C.
Disconnect the power before servicing the PC
D.
Place the PC on a grounded work bench
Answer: C
Explanation:
QUESTION NO: 49
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the
memory, power supply, and monitor are all working. The technician runs internal diagnostics on
the PC, but the hard drive is not recognized.
A.
NTLDR not found
"Pass Any Exam. Any Time." - www.actualtests.com 37
CompTIA 220-1002 Exam
B.
No boot device available
C.
Operating system not found
D.
BIOS ROM checksum error
Answer: B
Explanation:
QUESTION NO: 50
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she
appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name
is listed as “ConnectMe” and appears as unsecure.
Which of the following should the help desk perform to fix the issue?
A.
Remote into Ann’s system and restart the wireless adapter
B.
Ask Ann to open a browser and watch for a redirect page
C.
Advice Ann to plug an Ethernet cable into her laptop
D.
Direct Ann to run an antivirus program on her laptop
Answer: B
Explanation:
QUESTION NO: 51
A project team is organized to implement a new wireless solution for a school. The team has
already done the network diagrams and knows the locations that will need to be addressed in the
Which of the following would the project team MOST likely add to the SOW?
A.
Risk analysis
B.
Plan to change
C.
Backout plan
D.
Change board approvals
Answer: C
Explanation:
QUESTION NO: 52
A user calls the help desk regarding a new Windows issue that started in the morning. The user
can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not
fix the problem.
A.
Roll back updates
B.
Disable the Windows Update service
C.
Check for updates
D.
Restore hidden updates
Answer: A
QUESTION NO: 53
Which of the following operations would be the BEST to resolve this issue with minimal expense?
(Choose two.)
A.
Remove applications from startup
B.
Defragment the hard drive
C.
Install additional RAM
D.
Install a faster hard drive
E.
End the processes in Task Manager
F.
Run the Disk Cleanup utility
Answer: A,B
Explanation:
QUESTION NO: 54
A technician is setting up a SOHO wireless network for a healthcare office that does not have a
server. The user requires the highest level of wireless security and various levels of desktop
authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement?
(Choose two.)
B.
WPA2
C.
WEP
D.
TKIP
E.
RADIUS
F.
Multifactor
G.
TACACS
H.
SSO
Answer: B,F
Explanation:
QUESTION NO: 55
Which of the following is the technician MOST likely performing on the computer?
A.
Image deployment
B.
Multiboot configuration
C.
In-place upgrade
D.
System repair
QUESTION NO: 56
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s
website. Joe, the technician, is able to log in successfully with his credentials before going to
Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same
issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up
notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
A.
Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
B.
Verify Ann’s laptop has the correct browser settings
C.
Check all browser cached files on Ann’s laptop and log on to another vendor’s website
D.
Attempt to log on to another vendor’s website from Ann’s laptop
E.
Ask Ann about the notification and review the installed programs
F.
Reinstall the browser, reboot the laptop, and check the vendor’s website again
Answer: C,E
Explanation:
QUESTION NO: 57
Which of the following is the maximum RAM limit of a Windows 32-bit version?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 42
CompTIA 220-1002 Exam
no limit
B.
4GB
C.
8GB
D.
32GB
Answer: B
Explanation:
QUESTION NO: 58
A user’s smartphone is making the camera shutter noise even when the user is not taking
pictures.
When the user opens the photo album, there are no new pictures. Which of the following steps
should be taken FIRST to determine the cause of the issue?
A.
Uninstall the camera application
B.
Check the application permissions
C.
Reset the phone to factory settings
D.
Update all of the applications on the phone
E.
Run any pending OS updates
Answer: B
Explanation:
Joe, an end user, has been prompted to provide his username and password to access the payroll
system.
A.
Single-factor
B.
Multifactor
C.
RADIUS
D.
TACACS
Answer: A
Explanation:
QUESTION NO: 60
A.
battery backup
B.
surge suppressor
C.
rack grounding
D.
line conditioner
Answer: A
Explanation:
QUESTION NO: 61
Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot.
When she opens a browser, she gets a message indicating the page cannot be displayed. She
notices there is a “?” in the radio icon in the toolbar. She has verified Bluetooth is active, airplane
mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance.
A.
There is unauthenticated wireless connectivity
B.
She has exceeded the data allowance
C.
The phone is only 3G capable
D.
It is an unrooted phone
E.
The SIM card was not activated
F.
A data plan was not purchased
Answer: A
Explanation:
QUESTION NO: 62
Which of the following shell commands would allow the administrator to gain the necessary
permissions to update the software?
A.
sudo
C.
grep
D.
pwd
Answer: A
Explanation:
QUESTION NO: 63
A small business has an open wireless network so vendors can connect to the network without
logging in. The business owners are concerned that a nearby company is connecting and using
the wireless connection without permission.
If the small business requires that the network remain open, which of the following configuration
settings should be changed to address these concerns?
A.
Default SSID
B.
MAC filtering
C.
Power levels
D.
Content filtering
E.
Firewall
Answer: C
Explanation:
QUESTION NO: 64
A.
Reboot into safe mode and roll back the updates
B.
Repair the Windows Registry
C.
Configure boot options in the BIOS
D.
Disable Windows services and applications
Answer: A
Explanation:
QUESTION NO: 65
A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch,
even when it is put away. The device is relatively new, so the user is concerned it is defective. A
technician inspects the device and sees the following:
A.
Privacy – Maps
B.
Display – Brightness
C.
Storage – Photos
D.
Mail – Work
Answer: B
Explanation:
QUESTION NO: 66
A.
Guest
B.
Power User
C.
Administrator
D.
Standard User
Answer: A
Explanation:
QUESTION NO: 67
An end user is browsing the Internet when multiple browser pages open by themselves. The user
notices the PC is running slowly, even while not browsing the Internet.
A.
Update antivirus definitions
B.
Install anti-malware software
C.
Enable the pop-up blocker
D.
Reboot the PC
Answer: B
Explanation:
A desktop technician is attempting to upgrade several machines to Windows 10. After realizing
there is only one disc for the installation, the technician decides to upgrade over the network.
A.
SSD
B.
Optical drive
C.
Flash drive
D.
PXE
Answer: D
Explanation:
QUESTION NO: 69
A network administrator wants to plan a major OS upgrade of the router, which acts as a default
gateway in an organization. The administrator has documented the purpose of the change, scoped
the change, and completed a comprehensive risk analysis.
Which of the following is an important part of the change request process for which the
administrator still must plan?
A.
Inform management regarding the anticipated amount of downtime
B.
Document a backout plan to roll back changes to the router
C.
Configure a redundant data path to eliminate downtime
D.
Make the downtime window larger than actually anticipated
QUESTION NO: 70
A company brings in contractors several times a year to perform inventory, and the contractors
use company-supplied laptops. The company’s security policy states that once the inventory is
completed, the contractors should not be able to log in to the laptops until the next inventory.
A.
Delete the user accounts
B.
Disable the user accounts
C.
Restrict the user accounts
D.
Reset the user accounts
Answer: B
Explanation:
QUESTION NO: 71
A wireless access point is going to be configured in a small office located in a crowded building.
Which of the following should the installation technician perform to increase the security of the
wireless network? (Choose two.)
A.
Reduce the transmit power
B.
Reduce the channel availably
D.
Enable QoS management
E.
Disable the SSID broadcast
F.
Implement WPA encryption
Answer: A,E
Explanation:
QUESTION NO: 72
2GB of memory
A.
Increase the number of CPUs
B.
Increase the amount of memory
C.
Increase the amount of hard drive space
D.
Increase the screen resolution
Answer: C
QUESTION NO: 73
A technician is working on a user’s workstation and notices a lot of unknown processes running in
the background. The user informs the technician that an application was recently downloaded from
the Internet.
Which of the following types of infection does the user MOST likely have?
A.
Rootkit
B.
Keylogger
C.
Trojan
D.
Ransomware
Answer: A
Explanation:
QUESTION NO: 74
Which of the following features has undergone the most significant changes from Windows 7 to
Windows 10 and greatly simplified the operating system installation process?
A.
Driver detection
B.
Metro interface
C.
Account control
D.
"Pass Any Exam. Any Time." - www.actualtests.com 53
CompTIA 220-1002 Exam
PXE installation
Answer: A
Explanation:
QUESTION NO: 75
A.
PHI
B.
End-user license agreement
C.
Digital Millennium Copyright Act
D.
DRM
Answer: A
Explanation:
QUESTION NO: 76
A small business has an open WiFi network for employees but does not want customers to
connect to the access point. A technician has been dispatched to address the business’s
concerns.
Which of the following configuration settings should the technician change to satisfy the
requirements of the business? (Choose two.)
A.
Default SSID
B.
MAC filtering
D.
QoS
E.
Signal strength
F.
Encryption
Answer: B,E
Explanation:
QUESTION NO: 77
A security team is auditing a company’s network logs and notices that a USB drive was previously
inserted into several of the servers. Many login attempts were then successfully performed using
common login information.
Which of the following actions should be taken to close the vulnerability? (Choose two.)
A.
Disable guest account
B.
Remove admin permissions
C.
Modify AutoRun settings
D.
Change default credentials
E.
Run OS security updates
F.
Install a software firewall
Answer: A,C
Explanation:
QUESTION NO: 78
A technician is installing the latest OS on a user’s system. The user wants all of the settings and
files to remain intact during the installation.
A.
network installation
B.
clean install
C.
in-place upgrade
D.
image deployment
Answer: C
Explanation:
QUESTION NO: 79
A team needs to deploy a temporary server room at a site to provide support during construction.
Which of the following should they use at this site while setting up the server room?
A.
Air filters
B.
Privacy screens
C.
Vacuums
D.
ESD mats
QUESTION NO: 80
A computer becomes infected with malware, which manages to steal all credentials stored on the
PC. The malware then uses elevated credentials to infect all other PCs at the site. Management
asks the IT staff to take action to prevent this from reoccurring.
A.
Use an antivirus product capable of performing heuristic analysis
B.
Use a host-based intrusion detection system on each computer
C.
Disallow the password caching of accounts in the administrators group
D.
Install a UTM in between PC endpoints to monitor for suspicious traffic
E.
Log all failed login attempts to the PCs and report them to a central server
Answer: A
Explanation:
QUESTION NO: 81
Which of the following techniques is used by malicious employees to obtain user passwords?
A.
Main-in-the-middle
B.
Phishing
C.
D.
Shoulder surfing
Answer: D
Explanation:
QUESTION NO: 82
Which of the following methods is MOST appropriate for ensuring data has been removed from
the PCs?
A.
Standard formatting
B.
HD drilling
C.
Low-level formatting
D.
HD partitioning
Answer: C
Explanation:
QUESTION NO: 83
A user reports that when opening a web browser, the initial page loads to a search engine the user
does not recognize. When the user performs searches on the site, the results are often irrelevant,
and there are many pop-ups.
Which of the following should a technician do to resolve these issues? (Choose two.)
B.
Delete the user’s cached images, temporary files, and cookies
C.
Reboot the user’s computer and install a secondary antivirus
D.
Convince the user to use a different web browser that is currently unaffected
E.
Download the update to the user’s web browser of choice
F.
Remove any unapproved applications from the user’s startup items
Answer: A,F
Explanation:
QUESTION NO: 84
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to
make sure all of the applications, user profiles, documents, and PST files are preserved.
Which of the following methods would the technician MOST likely perform on the computer?
A.
Unattended installation
B.
Refresh upgrade
C.
Clean installation
D.
In-place upgrade
Answer: B
Explanation:
QUESTION NO: 85
A.
AES
B.
WPA
C.
WPA2
D.
WEP
Answer: A
Explanation:
QUESTION NO: 86
Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior
while he is working on it. The technician verifies the files and directories. Joe is working on locally
cannot be opened in any application, and the computer is running extremely slow.
A.
Files disappearing
B.
File permission changes
C.
Application crash
D.
Too many startup items
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com 60
CompTIA 220-1002 Exam
Explanation:
QUESTION NO: 87
Corporate management is concerned about the security of the company’s mobile phones, in the
event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices
is not accessible by unauthorized users.
Which of the following would provide the BEST level of protection in this scenario? (Choose two.)
A.
Use full device encryption
B.
Enable a pattern lock
C.
Implement remote wipe features
D.
Use device lockout policies
E.
Require complex administrator passwords
F.
Disable unknown application installations
Answer: A,C
Explanation:
QUESTION NO: 88
A technician repaired a laptop for a customer. The customer then complained the repair took too
long and questioned the steps the technician took to fix the problem.
A.
"Pass Any Exam. Any Time." - www.actualtests.com 61
CompTIA 220-1002 Exam
Provide documentation of the repair to the customer
B.
Allow the customer to voice concerns and post the story to social media later
C.
Inform the customer the job is done and return to the office
D.
Defend each step and why it was necessary
Answer: A
Explanation:
QUESTION NO: 89
A user is attempting to install an application and receives an error stating there is not enough
space to install the application.
A.
Installation method
B.
System requirements
C.
OS compatibility
D.
File permissions
Answer: B
Explanation:
QUESTION NO: 90
Ann, an end user, is working with highly regulated data and often notices the high volume of traffic
in her work area. Ann requests help with limiting the exposure of data as people walk by.
"Pass Any Exam. Any Time." - www.actualtests.com 62
CompTIA 220-1002 Exam
Which of the following security measures should be used?
A.
Biometric device
B.
Common access card
C.
Cable lock
D.
Privacy screen
E.
Mantrap
Answer: D
Explanation:
QUESTION NO: 91
A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining
user settings. The users currently have Windows 8 and want to upgrade to Windows 10.
Which of the following installation methods would the technician MOST likely use to accomplish
this quickly?
A.
Unattended installation
B.
Remote network installation
C.
In-place upgrade
D.
Clean installation
Answer: A
Explanation:
QUESTION NO: 92
A technician received 300 old desktops following a recent computer upgrade. After taking
inventory of the old machines, the technician must destroy the data on the HDDs.
Which of the following would be the MOST effective method to accomplish this task?
A.
Drill
B.
Hammer
C.
Low-level format
D.
Degaussing
Answer: D
Explanation:
QUESTION NO: 93
A user reports malware activity on an isolated workstation used for testing. It is running an end-of-
life OS, and a USB drive is the only method used to transfer files. After removing the malware and
replacing the USB drive with a brand new one, the technician gives the approval to use the
equipment. The next day the user reports the same malware activity is present after powering on
the system.
A.
Connect to the network and update the OS with the latest security patches
B.
Scan and clean the USB device used to transfer data from the equipment
C.
Disable System restore and remove all restore points from the system
"Pass Any Exam. Any Time." - www.actualtests.com 64
CompTIA 220-1002 Exam
D.
Update the local antivirus and set it to scan automatically every evening
Answer: D
Explanation:
QUESTION NO: 94
A corporate network was recently infected by a malicious application on a flash drive that
downloaded sensitive company files and injected a virus, which spread onto the network.
Which of the following best practices could have prevented the attack?
A.
Implementing strong passwords
B.
Changing default credentials
C.
Disabling AutoRun
D.
Removing Guest account
E.
Encrypting data
Answer: C
Explanation:
QUESTION NO: 95
Which of the following technologies can be utilized in a wireless network environment to provide
secure SSO access for WiFi and network resources?
A.
WPA2
C.
MAC filtering
D.
RADIUS
E.
WPS
Answer: D
Explanation:
QUESTION NO: 96
A technician has installed a second monitor for a customer, but the desktop font sizes do not
match.
Which of the following display settings should the technician adjust to correct this issue?
A.
Resolution
B.
Refresh rate
C.
Extended monitor
D.
Color depth
Answer: A
Explanation:
QUESTION NO: 97
B.
Administrator
C.
Guest
D.
Standard User
Answer: A
Explanation:
QUESTION NO: 98
A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the
installation, the computer displayed the following error message: No Operating System Found.
However, after unplugging the new hard drive, the error message no longer appeared. The
technician then reconnected the new drive to continue troubleshooting.
A.
Reboot into safe mode
B.
Check the boot order
C.
Format the drive
D.
Perform Windows Recovery
E.
Run the chkdsk command
Answer: B
Explanation:
Joe, a user who is travelling for business, reports that his mobile phone was getting approximately
35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the
device as a GPS to visit customers and as a hotspot to check work email and watch movies
online.
Which of the following is the MOST likely cause of Joe’s slow data speeds?
A.
Joe’s data transmission is over the limit
B.
The phone needs to be rebooted from overuse
C.
The use of GPS interferes with data speeds
D.
There is unintended Bluetooth pairing
Answer: A
Explanation:
After a security audit, a technician is tasked with implementing new measures to help secure
company workstations. The new policy states that all workstations must be signed off at night, a
password is necessary to boot the computer, and encryption must be enabled.
Which of the following features should the technician implement to BEST meet these
requirements? (Choose three.)
A.
Screen locks
B.
Screensaver passwords
C.
UEFI passwords
E.
Strong passwords
F.
Multifactor authentication
G.
BitLocker
H.
Credential Manager
I.
Smart card
J.
Biometric authentication
Answer: A,B,G
Explanation:
A new business will be using credit cards in a physical location as well as its web presence.
A.
PHI certification
B.
PCI compliance
C.
POTS implementation
D.
PII filtering
Answer: B
A technician has been dispatched to resolve a malware problem on a user’s workstation. The
antivirus program discovered several hundred potential malware items on the workstation and
removed them successfully. The technician decides to schedule daily scans on the system,
enables System Restore, and creates a restore point.
A.
Run the scan again to ensure all malware has been removed
B.
Quarantine the infected workstation from the network
C.
Install all of the latest Windows Updates to patch the system
D.
Educate the user on safe browsing practices
Answer: C
Explanation:
A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a
technician that the device functions properly when at work or in the car.
Which of the following troubleshooting steps should the technician take NEXT?
A.
Reset the device’s network settings
B.
Check the data usage statistics on the device
D.
Run any pending application or OS updates
Answer: C
Explanation:
A company’s security policy does not allow USB drives to be available in workstations. However,
an exception needs to be made for a user. The network administrator changes the policy for the
user.
Which of the following commands should the administrator run on the user’s workstation?
A.
chkdsk
B.
netstat
C.
gpupdate
D.
diskpart
Answer: C
Explanation:
A user’s computer is suspected of hosting illegal files. The IT department has removed the
computer and placed it in a secured, cypher-locked room, where it will remain until the local
authorities arrive.
B.
Identify violations of acceptable use
C.
Collect evidence of illegal activity
D.
Report through proper channels
Answer: A
Explanation:
Which of the following would a technician use to store memory chips from a laptop safely after an
upgrade?
A.
Mylar bags
B.
Cardboard boxes
C.
Antistatic containers
D.
Paper envelopes
Answer: C
Explanation:
Joe, a user, reports that several of his colleagues have received a suspicious email from his
account that he did not send. A technician asks one of the colleagues to forward the email for
inspection. After ruling out spoofing, the technician verifies the email originated from the corporate
Which of the following is the FIRST step the technician should take to correct this issue?
A.
See if Joe’s email address has been blacklisted
B.
Change the password on Joe’s email account
C.
Update the antivirus and perform a full scan on the PC
D.
Isolate Joe’s computer from the network
Answer: D
Explanation:
A user notices recent print jobs are not printing to the local printer despite printing fine yesterday.
There are no errors indicated on the taskbar printer icon.
A.
Check to ensure the printer selected is the default printer
B.
Check the status of the print server queue
C.
Cancel all documents and print them again
D.
Check that the printer is not in offline print mode
Answer: B
Explanation:
A systems administrator has discovered a folder on the server with numerous inappropriate
pictures and videos, which is in violation of the company’s AUP.
A.
Promptly notify the administrator’s immediate supervisor
B.
Rename the folder on the server, and notify the information security officer
C.
Move the folder to another location on the server, and notify the local authorities
D.
Ask the owner to move the files from the server to a local computer
Answer: A
Explanation:
A technician is disposing of computer hardware that contains PHI. The drive must be reusable.
A.
Degauss
B.
Drive wipe
C.
Standard format
D.
Low-level format
Answer: B
Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)
A.
Access control lists
B.
Multifactor authentication
C.
Organizational unit
D.
Trusted software sources
E.
Data loss prevention
F.
Pre-shared key
Answer: B,D
Explanation:
A network administrator needs to be able to securely connect to a local router from within the
office.
Which of the following protocols should the administrator ensure is enabled on the router?
A.
RDP
B.
SSH
D.
HTTP
Answer: B
Explanation:
A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J”
assigned only to the drive.
Which of the following types of partitioning should be performed to give the customer full use of
the 3 TB drive?
A.
GPT
B.
Dynamic
C.
Basic
D.
Extended
Answer: A
Explanation:
Users notify the help desk of an email that was just received. The email came from the help desk’s
email address and asked the users to click on an embedded link.
B.
zombie.
C.
whaling.
D.
spoofing.
Answer: D
Explanation:
A technician responds to a call from a user who claims to have a virus on a workstation. The
technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains
known malware.
Which of the following should the technician complete to secure the computer with MINIMAL
impact to the user?
A.
Compare the startup items and services to a known clean image, and remove any startup items
not found in the other image. Run an anti-malware scan.
B.
Validate that the alerts are false positives, and disable security software on the workstation to
prevent further false notifications.
C.
Back up the user’s files. Restore the system to the original system image designated by corporate
IT policies. Restore the user’s files.
D.
Request a content filter exception to allow access to the link from the notification. Once available,
follow the instructions on the linked site.
"Pass Any Exam. Any Time." - www.actualtests.com 77
CompTIA 220-1002 Exam
Answer: A
Explanation:
A user’s corporate email is missing the shared inbox folders that were present before the user
went on vacation. The technician verifies the user is connected to the domain and can still send
and receive email.
Which of the following is MOST likely causing the missing folders issue?
A.
The Internet security options have changed
B.
The operating system updates have changed
C.
The network directory permissions have changed
D.
The user account permissions have changed
Answer: C
Explanation:
During the firmware upgrade of a web server, a power outage occurred. The outage caused a
failure within the upgrade.
Which of the following plans must be implemented to revert back to the most recent version of the
firmware?
A.
Backout plan
B.
Contingency plan
"Pass Any Exam. Any Time." - www.actualtests.com 78
CompTIA 220-1002 Exam
C.
Alternative plan
D.
Backup plan
Answer: D
Explanation:
An office manager emails a technical support contractor about a new desktop for one of the
workers. The office manager provides a specific configuration for the desktop. The technician
notes the request will require the purchase of a new system. New system purchases are not in the
scope of the support agreement.
A.
Create a risk analysis report for review
B.
Submit a change order for approval
C.
Insist the worker accepts the standard desktop
D.
Document the request and place the order
Answer: B
Explanation:
Which of the following installation methods will allow a technician to resolve issues that may arise
while the installation is being performed?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 79
CompTIA 220-1002 Exam
Unattended installation
B.
Remote installation
C.
Repair installation
D.
Image deployment installation
Answer: D
Explanation:
A new company policy states that all end-user access to network resources will be controlled
based on the users’ roles and responsibilities within the organization.
Which of the following security concepts has the company just enabled?
A.
Certificates
B.
Least privilege
C.
Directory permissions
D.
Blacklists
Answer: B
Explanation:
A technician receives a phone call regarding ransomware that has been detected on a PC in a
remote office.
"Pass Any Exam. Any Time." - www.actualtests.com 80
CompTIA 220-1002 Exam
Which of the following steps should the technician take FIRST?
A.
Disconnect the PC from the network
B.
Perform an antivirus scan
C.
Run a backup and restore
D.
Educate the end user
Answer: A
Explanation:
A technician performs a virus cleaning on a computer that has been redirecting all browsers to a
phishing website. System Restore was turned off before the cleaning. The technician runs the
machine through several scanners, and then tests for redirection. A smaller number of sites are
still redirecting to the phishing website. The antivirus software correctly blocks the website.
A.
Check the contents of the hosts file
B.
Do a System Restore to a date before the infection
C.
Rerun the antivirus scan with higher sensitivity
D.
Rebuild the OS on the machine
Answer: A
Explanation:
A user calls a technician to report issues when logging in to a vendor’s website. The technician is
able to log in successfully before going to the office. However, the technician is unable to log in
when in the user’s office. The user also informs the technician of strange pop-up notifications.
Which of the following are the MOST likely causes of these issues? (Choose two.)
A.
System files have been deleted
B.
Proxy settings are configured improperly
C.
The OS has been updated recently
D.
There are disabled services on the vendor website
E.
Program file permissions have changed recently
F.
There is a rogue anti-malware program
Answer: B,F
Explanation:
A.
Protects against accidental static discharge
B.
Protects against dust/dirt contamination
C.
Protects against accidental scratches
D.
Answer: A
Explanation:
A.
Device compatibility
B.
Increased security
C.
TACACS
D.
Multifactor authentication
Answer: A
Explanation:
When a user browses to a favorite website on a Windows laptop, a different website opens. A
technician installs an additional web browser, but it also opens to the same unfamiliar site. The
technician resets the web browser settings back to default, but the issue persists.
Which of the following troubleshooting steps should the technician complete NEXT?
A.
Change the browser’s home page
B.
Check the Windows host file
C.
"Pass Any Exam. Any Time." - www.actualtests.com 83
CompTIA 220-1002 Exam
Update the default web browser
D.
Restore Windows to a previous date
Answer: B
Explanation:
Which of the following Windows OS technologies is used to store remote data accessed via a
WAN connection on local servers for user access?
A.
BranchCache
B.
Swap partition
C.
Domain access
D.
Proxy server
Answer: A
Explanation:
Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi
hotspot on his phone is extremely slow. The technician runs a speed test from a laptop connected
to the hotspot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a
hotspot on her phone, and the speed test result on that hotspot is 15Mbps. The technician checks
the hotspot settings on Joe’s phone and sees the following:
A.
Joe should be using WEP security on his hotspot for faster throughput
B.
Someone else is using Joe’s hotspot due to weak password
C.
Joe’s hotspot gave him an invalid IP address
D.
Joe is likely in a poor signal area and should try another area
Answer: B
Explanation:
A user who is running Windows 10 logs into a machine and notices that shared drives are missing,
the “My Documents” folder is empty, and personal settings are reset.
A.
Remove the registry entry and rename the local account folder
B.
Delete or rename the local user folder
C.
"Pass Any Exam. Any Time." - www.actualtests.com 85
CompTIA 220-1002 Exam
Run DISM and re-add the local power user account
D.
Remove the user account in Credential Manager and restart the PC
Answer: C
Explanation:
A technician accessed a network share from a computer joined to workgroup. The technician
logged in as “user1” and directed the computer to save the username and password. Several
weeks later, the technician wants to log in to this network share using the administrator account.
The computer does not prompt for a username and password, but it automatically logs in to the
network share under the “user1” account.
Which of the following would allow the technician to log in using the “administrator” username?
A.
Use the command: net use Z: \\fileserver\share
B.
Go to the Sync Center and disable the offline files feature.
C.
Delete the “user” account for the network share in Credential Manager.
D.
Join the computer and file server to a domain and delegate administrator rights to “user1”.
E.
Use the Advanced Sharing options in the Network and Sharing Center and enable “turn on
network discovery”.
Answer: A
Explanation:
A.
Disable System Restore.
B.
Create a restore point.
C.
Apply system updates.
D.
Restart into safe mode.
Answer: D
Explanation:
Which of the following user types should be used in a Windows environment to grant Internet
access without allowing the permanent storage of files on the system?
A.
Local Administrator
B.
Standard User
C.
Power User
D.
Guest User
Answer: D
Explanation:
A company has just experienced a data breach that affected all mobile devices. Which of the
following would BEST secure access to user’s mobile devices? (Choose two.)
A.
Full device encryption
B.
Remote backup application
C.
SSO authentication
D.
Device profiles update
E.
OS security updates
F.
Biometric authentication
Answer: A,F
Explanation:
A technician is troubleshooting a printer issue on a Windows computer and wants to disable the
printer to test a theory.
A.
Devices and Printers
B.
Sync Center
C.
Device Manager
D.
Answer: C
Explanation:
ps -aux | grep vi
Which of the following MOST accurately describes the effect of the command?
A.
It kills any running programs starting with the letters vi.
B.
It opens a list of directories that start with the letters vi.
C.
It creates a new file named grep in the current working directory.
D.
If finds a list of processes running a text editor.
Answer: D
Explanation:
A small office calls a technician to investigate some “invalid certificate” errors from a concerned
user. The technician observes that whenever the user attempts to access a secure website from
the Windows desktop, this error is encountered. No other users in the office are experiencing this
error.
B.
Assist the user with purchasing an SSL certificate and save the certificate to the desktop.
C.
Disable the SPI firewall on the office’s gateway and any other routers.
D.
Instruct the user to ignore the certificate error since the user is connecting to a secure website.
E.
Create an outbound rule in Windows Firewall named after the user’s homepage.
F.
Run anti-malware scans and download the latest Windows updates.
Answer: A,F
Explanation:
A.
Performance Monitor
B.
Component Services
C.
Task Manager
D.
Event Viewer
Answer: D
Explanation:
Following an incident, an administrator is gathering forensic evidence from a server for a human
resources investigation.
Which of the following best practices is MOST important to document throughout the process to
maintain integrity of the findings?
A.
Acceptable use policy violations
B.
Server configuration
C.
Chain of custody
D.
Data loss incidents
Answer: C
Explanation:
Which of the following should the technician do to protect the computer from accidental voltage
spikes?
A.
Practice electrical fire safety.
B.
Clean tools properly before use.
C.
Remove any jewelry.
D.
"Pass Any Exam. Any Time." - www.actualtests.com 91
CompTIA 220-1002 Exam
Connect a proper ESD strap.
Answer: D
Explanation:
A.
Acceptable use policy
B.
Topology diagram
C.
Knowledge base
D.
Incident documentation
Answer: C
Explanation:
Which of the following would provide the BEST security for the room? (Choose two.)
A.
Universal serial bus locks
B.
Personal identity verification cards
C.
Privacy screen
E.
Door locks
F.
Privacy window
Answer: E,F
Explanation:
A network administrator has noticed unusual activity with a user’s login credentials on the network.
The user is attempting multiple simultaneous login across the network, some of which are
attempting to access workstations and servers to which the user does not have access.
A.
Delete the user’s AD account.
B.
Decrease the user’s AD privileges.
C.
Disable the user’s AD account.
D.
Reset the password on the user’s AD account.
Answer: C
Explanation:
Which of the following encryption methods is used by WPA2 to improve data security as compared
to previous wireless encryption protocols?
B.
TKIP
C.
S/MIME
D.
3DES
Answer: A
Explanation:
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error
message.
A.
Small hard drive
B.
Insufficient RAM
C.
OS compatibility
D.
Folder permissions
Answer: C
Explanation:
A sales representative regularly modifies confidential files on a laptop and needs them to be
"Pass Any Exam. Any Time." - www.actualtests.com 94
CompTIA 220-1002 Exam
available all the time. The sales representative will be on a six-month business trip in two weeks. A
technician has been asked to assist the sales representative with saving files.
Which of the following is the BEST method to implement to prevent any data loss for the sales
representative?
A.
Give the sales representative a USB security lock.
B.
Encrypt the laptop’s image on the server.
C.
Create a redundant cloud storage drive.
D.
Give the sales representative an external hard drive.
Answer: C
Explanation:
A technician is contacted by a user who is working from home but is unable to connect to any
office resources (e.g., files, printers). The user is able to access the Internet.
A.
VPN
B.
DHCP
C.
NAT
D.
DNS
Answer: A
A technician must remove data from the human resources computers. The technician plans to
reuse the drives in the computers.
Which of the following data destruction methods should the technician perform to ensure the data
is removed completely?
A.
Degaussing
B.
Standard format
C.
Overwrite
D.
Low-level format
Answer: D
Explanation:
A user’s mobile device is losing its battery charge very quickly. The user reports a 90% charge at
9:00 a.m., but has 22% battery by 1:00 p.m. The user has installed several applications, and the
phone is a relatively new, high-end phone. The user claims most of the usage involves checking
emails for a few minutes three or four times per hour.
Which of the following should a technician perform FIRST to diagnose the issue properly?
A.
Check the applications and their resource usage.
B.
Order a replacement battery and see if the phone maintains its charge.
"Pass Any Exam. Any Time." - www.actualtests.com 96
CompTIA 220-1002 Exam
C.
Configure the email software to work on a fetch schedule instead of the push setting.
D.
Wipe the phone entirely and reset all settings to their default states.
E.
Decrease the screen brightness to 30%.
F.
Uninstall all the applications on the phone and see if the battery issues remain.
Answer: A
Explanation:
A customer’s computer is having difficulty opening programs and regularly receives error
messages regarding low system resources. Which of the following performance setting changes
would BEST help the customer temporarily until a proper upgrade can be made?
A.
Data execution prevention
B.
Page-file size
C.
Visual effects
D.
Processor scheduling
Answer: B
Explanation:
Which of the following is a community-supported, open-source OS used for both servers and
workstations?
B.
Windows 10
C.
Linux
D.
OS X
Answer: C
Explanation:
Joe, a customer, requests to have a technician rename his laptop to the name of his favorite
sports team. Which of the following documents MUST the technician consider before performing
this action?
A.
Acceptable use policy
B.
Inventory management
C.
EULA
D.
MDM policy
Answer: B
Explanation:
A user reports that a cell phone application is loading slowly and not functioning properly. Which of
the following should a technician do FIRST to remedy this issue?
B.
Hard reset the cell phone.
C.
Reconnect the wireless network connection.
D.
Close all running applications
Answer: D
Explanation:
Which of the following types of scripts would be seen on the user end of a web page?
A.
.bat
B.
.js
C.
.sh
D.
.vbs
Answer: D
Explanation:
Which of the following can be applied directly to an organizational unit in Active Directory to
provide security to both the user and the machine?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 99
CompTIA 220-1002 Exam
Folder Redirection
B.
Group Policy
C.
Security Groups
D.
Home Folder
Answer: C
Explanation:
A user’s personal settings are not saving, and a technician suspects the user’s local Windows
profile is corrupt. The technician wants to check the size of the ntuser.dat file, but it does not
appear in the user’s profile directory. Which of the following Control Panel utilities should the
technician use to correct this?
A.
Folder Options
B.
Sync Center
C.
Display Settings
D.
User Accounts
Answer: A
Explanation:
Which of the following file types should be opened when executing a PowerShell script?
B.
.vbs
C.
.sh
D.
.ps1
E.
.psd
Answer: D
Explanation:
Which of the following must be enabled to configure 20 new machines to be booted over a
network?
A.
Multi-boot
B.
Dynamic
C.
PXE
D.
GPT
Answer: C
Explanation:
A.
Follow up with the customer after project completion
B.
Maintain a positive attitude during the project.
C.
Disclose project experiences on social media
D.
Communicate with the customer clearly.
Answer: D
Explanation:
An employee contacts the help desk because the battery in a company-provided smartphone lasts
only a short period of time when the worker is in the office. Which of the following would MOST
likely reduce this symptom? (Select TWO).
A.
Close applications when tasks are completed.
B.
Increase the time to dim the screen automatically.
C.
Increase the frequency for syncing corporate email.
D.
Set the smartphone display to maximum brightness.
E.
Connect to the office WiFi network automatically.
F.
Disable 802.11ac and use mobile data exclusively.
Answer: A,E
Which of the following BEST describes the Guest account on a Windows system?
A.
This account is designed to have the ability to set permissions for other users on the system.
Users of this account have the capability to perform any operation or task on the system.
B.
This account is designed to provide basic permissions for completing common daily tasks. Users
of this account are restricted from performing things like installing new software.
C.
This account is designed for users who require specific administrator rights or permissions. Users
of this account are restricted from installing software but can change time zones.
D.
This account is designed for users who require temporary access to a computer and do not need
to store user-specific settings. Users of this account have very limited permissions.
Answer: D
Explanation:
A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to
have protection from physical connections and ensure that employees cannot access applications
or personal emails. Which of the following would the technician MOST likely configure on the new
network device to accommodate this SOHO user’s request? (Select TWO).
A.
MAC filtering
B.
Default SSID
C.
Radio power levels
"Pass Any Exam. Any Time." - www.actualtests.com 103
CompTIA 220-1002 Exam
D.
Content filtering
E.
Physical security
Answer: D,E
Explanation:
A technician needs to connect to a network switch in a remote location. The technician wants to
make sure the data passed over the wire is encrypted so it cannot be read by someone using a
sniffer. Which of the following connection protocols should the technician use?
A.
Telnet
B.
SSH
C.
SMB
D.
HTTP
E.
SFTP
Answer: B
Explanation:
A customer’s computer is powered on and working, but the customer is unable to get to any wired
network resources, shared drives, printers, or the Internet. Which of the following command-line
tools should be used to troubleshoot this scenario?
B.
hwconfig
C.
Nbtstat
D.
Nslookup
Answer: A
Explanation:
A technician wants to deploy a solution to manage a computer remotely. The technician is not
allowed to modify any network configuration and is not able to forward any ports on the router to
internal devices. Which of the following remote access technologies would be BEST suited for this
situation?
A.
Remote desktop protocol
B.
Telnet client
C.
Virtual network computer
D.
Third-party tools
E.
Secure shell
Answer: C
Explanation:
A.
Task Scheduler
B.
Device Manager
C.
Drive Status
D.
Performance
Answer: D
Explanation:
A.
16MB
B.
2048MB
C.
4GB
D.
1024GB
E.
2TB
F.
8TB
Answer: C
Explanation:
The IT department has installed new software in the folder C:\Program Files\Business Application\.
Ann, a user, runs the business application and tries to save her work. When doing so, Ann
receives the following error:
Which of the following would be the MOST secure solution to this error?
A.
Add Ann to the local Power Users group
B.
Set the software to save to the %APPDATA% folder
C.
Add Ann to the local administrator group
D.
Give Ann write access to C:\Program Files\
E.
Give Ann permission to elevate her permissions through a UAC prompt
Answer: E
Explanation:
A user calls a technician regarding an iOS mobile device that is having problems with standby time
after a new update was applied. The technician verifies no new applications were installed since
the update, but the device still has poor standby time even after the update is removed. Which of
the following is the MOST likely cause of the issue?
A.
Zero-day malware
B.
Safari code injection
"Pass Any Exam. Any Time." - www.actualtests.com 107
CompTIA 220-1002 Exam
C.
OS corruption
D.
Overheating
E.
Time sync failure
Answer: D
Explanation:
Ann, a customer, calls a technician and states that she is very concerned about the privacy of her
home computer and the security of her home network while browsing the Internet. Which of the
following would the technician MOST likely discuss with Ann to educate her on security concepts
addressing her concerns? (Choose two.)
A.
Firewall
B.
Antivirus
C.
Email filtering
D.
ACLs
E.
VPN
Answer: A,E
Explanation:
A user is working on a shared computer and attempts to open the email application, which freezes
A.
Check for and apply software updates
B.
Perform repair installation on the application
C.
Add the user to the local administrators group
D.
Rebuild the user’s mail profile
Answer: D
Explanation:
A technician is called to troubleshoot a user’s Windows workstation that fails to boot. The user
reports that, after updating the workstation’s graphics driver to a beta version, the machine gives a
“Stop” error on every boot. Which of the following should the technician complete to resolve the
issue?
A.
Boot the workstation in safe mode and disable the graphics driver system tray menu
B.
Boot the workstation in safe mode with networking and install the latest stable graphics driver
C.
Boot the workstation in safe mode and disable Windows driver signing requirements
D.
Boot the workstation in safe mode with Command Prompt and enable Driver Verifier with standard
settings
Answer: A
Explanation:
While attempting to install a new program, an end user is notified the workstation meets the
memory requirements, but it does not meet the requirements for free space. Due to time
constraints, the user needs a quick way to install and access the program. Which of the following
is the user’s BEST option given the situation?
A.
Install to a network drive
B.
Install to a USB drive
C.
Install to a DVD-RW
D.
Install to a secondary internal HDD
Answer: A
Explanation:
A technician has set up a new computer for a customer and needs to add a login with
administrative privileges. Which of the following tools should the technician use?
A.
Component Services
B.
System Configuration
C.
Security Policy
D.
Local Users and Groups
Answer: D
Explanation:
A security administrator does some network testing and identifies significant issues with security
on desktop computers. As part of remediation, the network administrator is developing
documentation based on best practices for applying updates to end users’ computers. The
network administrator must create the process documentation needed to submit back to the
security administrator for approval. Which of the following process documents would the network
administrator MOST likely create? (Choose two.)
A.
Risk analysis
B.
End-user acceptance
C.
Backout plan
D.
Plan for change
E.
Business processes
F.
Request for proposal
Answer: C,D
Explanation:
Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the
second support call of the day, Joe realizes the issue will require much more time than initially
scheduled, and several support calls will not be completed. Which of the following would be the
appropriate action for Joe?
A.
Contact his supervisor so the supervisor can make scheduling changes.
B.
"Pass Any Exam. Any Time." - www.actualtests.com 111
CompTIA 220-1002 Exam
Move the appointments to the next business day.
C.
Reach out to a colleague to assist in completing the jobs.
D.
Continue to work on the current call, and get to the other as soon as possible.
Answer: A
Explanation:
Which of the following operating systems utilizes the web browser named Edge, replacing its older
browser software?
A.
Windows 7
B.
Windows 8
C.
Windows 8.1
D.
Windows 10
Answer: D
Explanation:
A user’s computer is running slow even when only one program is open. A technician discovers
the CPU is running at 100%, and there is a significant amount of outgoing network traffic.
Which of the following is MOST likely causing the high resource usage?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 112
CompTIA 220-1002 Exam
A keylogger is running
B.
The computer is part of a botnet
C.
The computer is receiving a DDoS attack
D.
A software firewall is blocking traffic
Answer: B
Explanation:
Joe, a technician, receives notification that a share for production data files on the network is
encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see
which departments have access. He then searches the user directories of those departmental
users who are looking for encrypted files. He narrows his search to a single user’s computer.
Once the suspected source of the virus is discovered and removed from the network, which of the
following should Joe do NEXT?
A.
Educate the end user on safe browsing and email habits.
B.
Scan and remove the malware from the infected system.
C.
Create a system restore point and reboot the system.
D.
Schedule antivirus scans and perform Windows updates.
Answer: B
Explanation:
Which of the following should the technician do NEXT to proceed with disposal of the batteries?
A.
Place securely in trash receptacles.
B.
Refer to the manufacturer’s specific usage.
C.
Review the material safety data sheet.
D.
Conduct an Internet search of disposal techniques.
Answer: B
Explanation:
Ann, an external user, has received several calls from a company asking why she has been
sending the company communications with internal users’ names in the “from field”. Ann calls a
technician and explains she has not been sending any communications and would like this issue
fixed. The technician investigates and determines the PC is not infected with any viruses or
malware.
A.
Hijacked email
B.
DNS entries
C.
Hosts file
D.
POP3 errors
Joe, an end user, just changed his network password. A pop-up box appears a few minutes later,
prompting him to enter his password. Joe enters his new network password and is able to
continue working. A few minutes later, the same pop-up box appears again, asking him to enter
his network password.
Which of the following Control Panel utilities can Joe use to help with this situation?
A.
Credential Manager
B.
Network and Sharing Center
C.
Security and Maintenance
D.
Troubleshooting
Answer: A
Explanation:
A technician is working on a virtual server migration project. The technician has already completed
the SOW; however, the servers will not work without a critical network configuration that was
missed in the original SOW. The technician needs to make the adjustments quickly.
Which of the following best practice processes should the technician perform NEXT?
A.
Obtain end-user acceptance for the proposed changes and submit a change plan for additional
work.
C.
Notify the change team of the changes needed and perform the changes.
D.
Escalate to stakeholders and obtain override approval for out-of-scope changes.
E.
Document the changes and perform the work.
Answer: E
Explanation:
Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the
stylus, but it registers in the correct spot when she uses her finger.
A.
Restart the tablet.
B.
Disable and then reenable Bluetooth.
C.
Calibrate the touchscreen sensor.
D.
Disconnect and then reconnect the stylus.
Answer: D
Explanation:
Which of the following should be enacted to reduce a company’s liability and exposure to a
"Pass Any Exam. Any Time." - www.actualtests.com 116
CompTIA 220-1002 Exam
potential lawsuit?
A.
Acceptable use policy
B.
Incident documentation policy
C.
Password compliance policy
D.
Change control policy
Answer: A
Explanation:
Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The
message has taken over the entire screen, and no icons are displayed. Joe, further explains that
the message still appears after several reboot attempts. Upon further inspection of the affected
PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.
A.
Ransomware
B.
Cryptomining
C.
Rootkit
D.
Keylogger
Answer: A
Explanation:
A user receives an email on a company smartphone. When trying to open the email, the user gets
a message stating the email is encrypted, and the user cannot open it. The user forwards the
email to a personal email account and receives the same message. The user calls the IT
department to ask for help. To decrypt the message, the technician tells the user to contact the
sender of the message to be able to exchange:
A.
keys
B.
passwords
C.
root CA
D.
tokens
Answer: A
Explanation:
A Linux user reports that an application will not open and gives the error. Only one instance of the
application may run at one time. A root administrator logs on to the device and opens a terminal.
Which of the following pairs of tools will be needed to ensure no other instances of the software
are currently running?
A.
pad and chmod
B.
sudo and vi
C.
ls and chown
D.
ps and kill
E.
cp and rm
"Pass Any Exam. Any Time." - www.actualtests.com 118
CompTIA 220-1002 Exam
Answer: D
Explanation:
A technician responds to a report that a user’s desktop is operating much slower after upgrading
the Windows OS to the latest version. The technician notices responsiveness is erratic, and the
symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all
systems pass. The technician checks the properties for each device in Device Manager and the
hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message:
This device is working properly. Which of the following should the technician attempt that will
MOST likely resolve the performance issue?
A.
Roll back the OS upgrade. Continue using the older version of Windows
B.
Reset the PC to its factory conditions. Perform the OS upgrade again
C.
Update the SATA controller driver from the manufacturer’s website
D.
Perform a full backup and replace the hard drive
Answer: C
Explanation:
Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and
the user has to reboot. A technician is dispatched and sees an antivirus pop-up in the system tray,
indicating the computer is severely damaged, and a "click here” button to resolve it. There is a
timer in the pop-up, counting down the time until the computer is no longer usable.
A.
Research the pop-up to see if it is a legitimate malware solution.
"Pass Any Exam. Any Time." - www.actualtests.com 119
CompTIA 220-1002 Exam
B.
Click on the pop-up window to resolve the issue before the time runs out.
C.
Send an email to all staff members warning them of malware on their system.
D.
Disconnect the Ethernet cable from the workstation and disable WiFi.
Answer: D
Explanation:
Which of the following NTFS security settings overrides all other settings?
A.
Deny
B.
Modify
C.
Read
D.
Write
Answer: A
Explanation:
A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing
Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound
network traffic on port 25 is very high, while inbound network traffic is low. Which of the following
tasks should be done FIRST?
A.
B.
Update the antivirus software.
C.
Run an antivirus scan.
D.
Shut down the PC.
Answer: A
Explanation:
A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s
laptop is currently using the corporate network for access to network resources as well as the
cloud. Which of the following should the help desk recommend performing prior to using the hotel
network?
A.
Add a country code exception to the firewall
B.
Unmap all network drives
C.
Change the proxy settings
D.
Enable Remote Assistance
Answer: B
Explanation:
An executive has contacted you through the help-desk chat support about an issue with a mobile
device.
INSTRUCTIONS
If at any time you would like to bring back the initial state of the simulation, please click the Reset
All button.
A.
Close the ticket out
B.
Educate the user on the solution that was performed
C.
Tell the user to take time to fix it themselves next time
D.
Send an email to Telecom to inform them of the issue and prevent reoccurrence
A Windows 7 machine appears to have a failure. Every time it is rebooted, the message
“BOOTMGR is missing” appears.
You have previously inserted a Windows 7 installation DVD into the DVD-ROM.
Please repair this failure without overwriting the customers’ local user profiles.
INSTRUCTIONS
Use the Windows recovery and repair utilities to remediate the issue.
If at any time you would like to bring back the initial state of the simulation, please click the Reset
All button.
Answer:
Please see explanation.
Explanation:
A user wants to see the workstations present on the LAN in a workgroup environment. Which of
the following settings must be enabled to make this possible?
A.
Turn off public folder sharing
B.
Turn on network discovery
C.
Use 128-bit encryption
D.
Turn on file and folder sharing
Answer: B
Explanation:
The medical records department of a local hospital recently upgraded its computers. A technician
needs to ensure the data stored on the hard drives is unrecoverable. Which of the following
methods should the technician use to meet the requirement?
A.
Standard format
B.
Low-level format
C.
Overwrite
D.
"Pass Any Exam. Any Time." - www.actualtests.com 128
CompTIA 220-1002 Exam
Degauss
Answer: D
Explanation:
A large corporation wants to secure its wireless network so only employees can connect. Which of
the following technologies should be used to control access by user account?
A.
RADIUS
B.
WPA2
C.
TKIP
D.
AES
Answer: A
Explanation:
A company needs to destroy several SSDs that contain sensitive information. Which of the
following methods is BEST suited for the total destruction of the SSDs?
A.
Overwriting
B.
Formatting
C.
Incinerating
D.
"Pass Any Exam. Any Time." - www.actualtests.com 129
CompTIA 220-1002 Exam
Degaussing
Answer: C
Explanation:
Joe, a user, believes his computer is infected with malware. The device is having difficulty
accessing some websites, and web services are not responding from any of the web browsers,
although Joe can access these services from his smartphone without issue. The computer’s
malware scanner has the latest definitions installed. Which of the following would BEST explain
why the computer is functioning this way?
A.
Expired root certificate
B.
OS update failures
C.
Pop-up blocker
D.
Hijacked email
Answer: A
Explanation:
Which of the following is protected data that can be found in a medical record?
A.
PII
B.
PHI
C.
D.
SPI
Answer: B
Explanation:
A network support technician takes a call from an office manager who wants to change the
wireless security key on the access point in that particular office. The office manager explains that
a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following
should the technician use to connect securely to the access point to make the change?
A.
RDP to 10.0.100.2
B.
SSH to 10.0.100.2
C.
HTTP to 10.0.100.2
D.
Telnet to 10.0.100.2
Answer: B
Explanation:
A technician is troubleshooting a computer that may have some corrupt operating system files.
Which of the following command line tools should the technician use to check these files?
A.
dism
B.
C.
diskpart
D.
sfc
Answer: B
Explanation:
A.
a user acceptance policy
B.
regulatory and compliance policy
C.
a password policy
D.
an acceptable use policy
Answer: D
Explanation:
A systems administrator creates a new folder in the user profile. The administrator wants it to have
different NTFS permissions than its parent folder. Which of the following settings should the
administrator change?
A.
File attributes
B.
"Pass Any Exam. Any Time." - www.actualtests.com 132
CompTIA 220-1002 Exam
Share permissions
C.
Local share
D.
Inheritance
Answer: D
Explanation:
A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited
connection. Each time the user tries to access a website, the browser redirects to an unfamiliar
authentication page. Which of the following should the user check to troubleshoot the cause of the
issue?
A.
The existing wireless network connection
B.
The signal strength from the ISP regional satellite
C.
The data speeds from the user’s ISP
D.
The user’s default gateway settings
Answer: A
Explanation:
Six months after a new version of an OS was released to the market, end users began to lose
access to application updates. Which of the following was MOST likely the reason for this issue?
A.
B.
Limited access
C.
End-of-life
D.
Network connection
Answer: C
Explanation:
A.
Impact to the workstations
B.
Impact to the users
C.
Impact to the network
D.
Impact to the DHCP pool
Answer: C
Explanation:
A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician
use to prevent damage to the SSD during the replacement?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 134
CompTIA 220-1002 Exam
Antistatic bags
B.
Needle-nose pliers
C.
Safety goggles
D.
ESD straps
Answer: D
Explanation:
An office building lost power, and the generator started up. Users on several floors have reported
their machines will not start, even though the generator is running. A technician works to divert
power from other floors until all users are able to work. Which of the following is the BEST solution
for the technician to recommend?
A.
Add more redundancy to the power cabling
B.
Purchase more battery backups for individual users
C.
Implement desktop virtualization
D.
Increase the capacity of the backup generator
Answer: D
Explanation:
Several users at an office have noticed their computers have been behaving erratically over the
past hour. A technician suspects there may be a network worm or a hardware failure because all
A.
Download antivirus updates
B.
Update the device drivers
C.
Quarantine the affected systems
D.
Perform hardware diagnostics
Answer: C
Explanation:
A technician is installing a new system in a facility that requires zero downtime. The facility uses a
backup generator in case of power loss. Into which of the following power sources should the
technician plug the system to offer optimal uptime?
A.
Only a surge protector is needed due to the backup generator
B.
Plug directly into the emergency power source
C.
Plug a surge protector directly into the UPS
D.
Connect to a UPS that utilizes the emergency power source
Answer: D
Explanation:
A.
GDPR
B.
PII
C.
PCI
D.
PHI
Answer: B
Explanation:
A technician determines a newly installed service is keeping a device from functioning in Windows.
Which of the following tools should the technician use to keep the service from being loaded on
the PC reboot?
A.
Task Scheduler
B.
MSINFO32
C.
System Restore
D.
MSConfig
Answer: D
Explanation:
A.
Shoulder surfing
B.
Phishing
C.
Tailgating
D.
Dumpster diving
Answer: D
Explanation:
Which of the following key and mouse combinations can be used to run an application as a
different user?
A.
FN + Right-click
B.
Shift + Right-click
C.
Alt + Right-click
D.
Ctrl + Right-click
Answer: B
Explanation:
A.
Spear phishing
B.
Impersonation
C.
Dumpster diving
D.
Whaling
Answer: D
Explanation:
A Windows user reports that clicking on links when browsing the Internet results in unexpected
destination pages with advertisements or virus infection warnings. The user reboots the computer,
but the issue persists. Which of the following should a technician perform to identify and resolve
the issue? (Choose two.)
A.
Run a virus scan with updated signature files
B.
Uninstall any unknown browser extensions or add-ons
C.
Install the latest version of the Internet browser
D.
Enable SSL 3.0 in the browser settings
E.
Delete all unknown registry keys and reboot
Answer: A,B
Which of the following variable types should be used to store the data “Chicago” within a script or
code?
A.
Integer
B.
String
C.
Boolean
D.
Float
Answer: B
Explanation:
A technician receives a call from an end user in the human resources department who needs to
load an older stand-alone application on a computer to retrieve employee information. The
technician explains the application can be run in compatibility mode, but it will need to be removed
as soon as the user obtains the required information. Which of the following BEST describes the
technician’s concern with loading this application on the user’s computer?
A.
Incompatibility
B.
Impact to the network
C.
Impact to the user
D.
Answer: D
Explanation:
A technician is installing a new SOHO wireless router and wants to ensure it is using the latest
feature set and is secure. Which of the following should the technician perform FIRST?
A.
Change the default SSID
B.
Enable MAC filtering
C.
Update the firmware
D.
Set encryption
Answer: C
Explanation:
A.
Change management policy
B.
EULA
C.
D.
Business continuity plan
E.
MDM policy
F.
Time-based login policies
Answer: C,E
Explanation:
Which of the following is used for building entry and computer access?
A.
Smart card
B.
Personal identity verification card
C.
Hardware tokens
D.
Key fobs
Answer: D
Explanation:
A user updated an iOS smartphone and is now having issues connecting to the Internet. The
phone shows 1x for signal strength while making calls. Which of the following are the MOST likely
causes of these issues? (Choose two.)
A.
"Pass Any Exam. Any Time." - www.actualtests.com 142
CompTIA 220-1002 Exam
Slow performance
B.
Slow data speeds
C.
No wireless connectivity
D.
Baseband
E.
Application hang
F.
Overheating
Answer: B,C
Explanation:
A technician is acquiring hardware devices and setting up a computer lab with virtual desktops.
The lab computers must have the ability to connect automatically to the remote session upon boot
and must be started remotely. Which of the following solutions must the hardware be able to
support? (Choose two.)
A.
Image deployment
B.
Multiboot
C.
PXE
D.
Unattended installation
E.
USB
F.
Wake-on-LAN
A technician is setting up a computer that needs to be configured so a few users can access it
using Remote Desktop. For security reasons, the users should not be able to install software or
change system settings. Which of the following Control Panel utilities should the technician use to
accomplish this task?
A.
Network and Sharing Center
B.
Sync Center
C.
Credential Manager
D.
User Accounts
Answer: D
Explanation:
A technician recently updated a printer driver on all the computers in an office. Shortly after the
update, several users’ accounts and passwords were compromised. Which of the following MOST
likely explains the compromised accounts?
A.
Botnet
B.
Ransomware
C.
Antivirus definitions
Answer: A
Explanation:
A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s
usage behaviors being unchanged from previous periods. Which of the following troubleshooting
steps should the user take FIRST?
A.
Check network access permissions on recently loaded applications.
B.
Limit data usage to WiFi networks only.
C.
Wipe the device and restore to the factory default.
D.
Change the lock screen password.
Answer: A
Explanation:
A company wants to move the contents of its users’ My Documents folders from their local hard
drives to a file server so they are backed up every night. Which of the following security concepts
does this describe?
A.
Organizational units
B.
Folder redirection
D.
Login script
Answer: A
Explanation:
Which of the following Microsoft operating systems defaults to a tiled menu instead of the
desktop?
A.
Windows 7
B.
Windows 8
C.
Windows 8.1
D.
Windows 10
Answer: D
Explanation:
A contract technician is working on a network printer when a print job starts and completes. The
technician notices it is a spreadsheet that appears to be an annual salary report. Which of the
following actions should the technician take?
A.
Continue to work on the assigned task
B.
C.
Remove the print job from the output tray
D.
Disconnect the printer from the network to prevent further print jobs
Answer: B
Explanation:
32-bit Windows OS
The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of
the following would correct the issue?
A.
16GB DDR4 memory
B.
64-bit Windows OS
C.
Dual hexa-core processors
D.
512GB SSD drive
Answer: B
A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half
of its capacity right now, but would like to be able to increase the size of the partition at a later
date. Which of the following filesystem types would the customer’s drive require?
A.
NTFS
B.
Ext4
C.
HFS
D.
FAT32
Answer: B
Explanation:
A technician receives the Chief Executive Officer’s (CEO’s) Windows 10 laptop, which has been
infected with malware. The technician wants to make sure best practices are followed for
troubleshooting and remediating the malware. Which of the following best practices should the
technician perform FIRST in this scenario? (Choose three.)
A.
Disconnect the device from the network
B.
Identify and research the symptoms
C.
Restore the computer to the previous checkpoint
D.
E.
Create a restore point
F.
Educate the end user
G.
Schedule scans and run updates
Answer: A,B,D
Explanation:
While preparing a computer that will be issued to a new user, the technician discovers the
computer’s former user configured a supervisor password in the BIOS. Which of the following can
the technician do to allow the password to be removed?
A.
Reimage the machine from a network share
B.
Change the boot order and boot to an external drive
C.
Remove and then replace the CMOS battery
D.
Use the BIOS user password to reset the supervisor password
Answer: C
Explanation:
Which of the following wireless security protocols supports the use of a 40-bit encryption key?
A.
"Pass Any Exam. Any Time." - www.actualtests.com 149
CompTIA 220-1002 Exam
TKIP
B.
WEP
C.
WPA
D.
WPA2
Answer: B
Explanation:
A customer is having issues with an Android-based smartphone after a recent application update.
The application becomes unresponsive immediately after attempting to open it. Auto-sync is not
enabled, and no recent backups exist for the smartphone. Without losing any critical information,
which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)
A.
Reboot into safe mode
B.
Clear the application data
C.
Contact the application’s developer
D.
Reinstall the application
E.
Do a force stop
F.
Clear the application cache
Answer: E,F
Explanation:
A new user has joined a company, and human resources has given the user several documents to
sign regarding compliance and regulations for company computers. The user has also received
web links to documentation for applications, as well as processes and procedures to do jobs in
accordance with those programs. Which of the following types of documentation has the user
MOST likely received? (Choose two.)
A.
Inventory management policy
B.
Knowledge base articles
C.
End-user acceptance document
D.
Acceptable use policy
E.
Incident documentation
F.
Network diagrams
Answer: B,D
Explanation:
A.
Increase the amount of RAM
B.
Reboot the server
C.
Check the system logs
Answer: C
Explanation:
A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine
which ports are being utilized for TCP listening. Which of the following commands should the
technician use?
A.
netstat
B.
net use
C.
nslookup
D.
ping
Answer: A
Explanation:
Which of the following are typically too dangerous to be disassembled by an in-house technician?
(Choose two.)
A.
LCD monitor
B.
Power supply
C.
D.
CRT monitor
E.
Motherboard
F.
Tablet
Answer: B,D
Explanation:
A Mac user needs to configure a network device using a serial connection to enable a remote
network connection. Which of the following utilities would MOST likely be used to make the
necessary changes?
A.
Terminal
B.
Disk maintenance
C.
iCloud
D.
Image recovery
Answer: A
Explanation:
An office location regularly experiences brownouts. Which of the following would be the MOST
appropriate solution to protect the office computers?
B.
Voltage regulator
C.
Surge suppressor
D.
Generator
Answer: A
Explanation:
A technician is attempting to recover data from a damaged laptop that was running Windows 10.
The technician removes the drive and places it in a known-good computer. The computer boots
and sees the drive, but no data is displayed. Which of the following is the reason the technician is
experiencing this issue?
A.
exFAT security
B.
Ext3 security
C.
HFS security
D.
EFS security
E.
CDFS security
Answer: D
Explanation:
A.
Enable System Restore on the file server and make frequent restore points.
B.
Disable full disk encryption on the file server.
C.
Install a next-generation firewall at the network edge.
D.
Use a host-based intrusion detection system and continuously monitor filesystem changes.
E.
Use granular file permissions on the share and follow the principle of least privilege.
Answer: D
Explanation:
A technician must manually modify the HOSTS system file in order to resolve a website address to
a specified local destination. Which of the following utilities should the technician use to BEST
accomplish the task?
A.
Regedit
B.
services.msc
C.
Msinfo32
D.
Notepad
E.
Answer: D
Explanation:
An application is installed and configured locally on a workstation, but it writes all the save files to
a different workstation on the network. Which of the following accurately describes the
configuration of the application?
A.
Network-based
B.
Client/server
C.
Application streaming
D.
Peer-to-peer
Answer: B
Explanation:
A.
SSH
B.
SFTP
C.
RDP
Answer: A
Explanation:
A customer brings an old PC to a computer repair shop and asks for advice with regard to its
repair or replacement. The PC has numerous errors during the boot process and is running a very
outdated operating system. Which of the following should the technician do?
A.
Ask if the customer would like to donate the PC to a school
B.
Offer to sell a slightly newer computer to the customer
C.
Work on the computer and bill the customer for the time
D.
Advise the customer that the cost of repair is more than a new PC
Answer: D
Explanation:
A technology team is creating limits and guidelines for the use of company-provided software,
equipment, and Internet access. Which of the following policies is needed?
A.
Password policy
B.
Acceptable use policy
C.
D.
Compliance policy
Answer: B
Explanation:
An IT professional recently assisted Ann, a customer, with updating her password and regaining
access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails,
thanking her for subscribing to an organization’s mailing list. Which of the following should be
performed to remove and prevent any further emails from this organization?
A.
Click the “Unsubscribe” button on each unwanted email
B.
Send the unwanted items to the spam or junk folder
C.
Deploy an email address whitelist
D.
Create domain-based filters
Answer: D
Explanation:
A technician is having issues with the WiFi connection while working on a Mac. The technician
wants to check which SSID the computer is connected to and some statistics about the
connection. Which of the following terminal commands should the technician use?
A.
apt-get
C.
sudo
D.
ifconfig
Answer: B
Explanation:
A technician submitted a change control request to upgrade the firmware on all company switches
at the same time, during off hours, and through automation. Which of the following change
management documents is MOST important to create to ensure the upgrade will not adversely
affect the business?
A.
Plan for the change
B.
Scope of the change
C.
Risk analysis of the change
D.
Documentation of the change
Answer: C
Explanation:
An end user reports a Windows computer is infected with a virus. Which of the following should be
the technician’s FIRST troubleshooting step?
B.
Disable System Restore
C.
Run Windows Update
D.
Educate the end user
Answer: A
Explanation:
A user has changed the MAC address of a laptop to gain access to a network. This is an instance
of:
A.
spoofing
B.
brute force
C.
man-in-the-middle
D.
a botnet
Answer: A
Explanation:
Ann, a technician, is dispatched to a corporate customer that has reported a malware infection.
Upon arrival, Ann notices the system is shut off, and she is able to start the computer without
incident. Ann also notices numerous pop-ups appear when the web browser is opened. Which of
A.
Report the incident to the appropriate contact
B.
Clear the system logs and browser history
C.
Take a screenshot of the pop-ups
D.
Advise the customer to use the browser in private mode
Answer: A
Explanation:
A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly
the same hardware. The screens present glitches every time the users move their mouse pointers
over the screen. The technician discovers there was a recent OS update deployed throughout the
company, which includes new versions for video drivers. Restarting the laptop in safe mode will
not present the issue. Which of the following should the technician do NEXT?
A.
Roll back the video card device drivers for all computers and escalate the issue to the video card
vendor.
B.
Remove the current video drivers from all computers and advise users to work this way until the
issue gets fixed.
C.
Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video
card vendor.
D.
Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers,
then rerun the updates manually excluding the video drivers.
Answer: A
A user is surprised that a newly installed third-party smartphone application requires permissions
to access the camera, location, and microphone. Unaware of a reason why permissions are
needed for the application to function as advertised, the user contacts the help desk for
assistance. Which of the following should the help desk team recommend the user do in this
situation?
A.
After granting these permissions, disable the camera and GPS
B.
Install the application and change the permissions later
C.
Cancel installation of the application and report it to the application source
D.
Accept these permission requests and install the application
Answer: C
Explanation:
Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when
trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?
A.
Services
B.
Device Manager
C.
Event Viewer
D.
Answer: B
Explanation:
Which of the following would BEST support an 8TB hard drive with one partition?
A.
GPT
B.
FAT16
C.
FAT32
D.
EFS
Answer: A
Explanation:
A user installed a new company-approved application on a Windows PC. The installation required
a reboot. After the reboot and logon, the system froze. A technician has been called to fix the
problem. Which of the following should the technician do FIRST?
A.
Contact the application vendor support staff for more information
B.
Boot into safe mode, and then load the ERD and restore the most recent files
C.
Boot the PC, run msconfig, check the safe boot box under the Boot tab, and then restart
D.
"Pass Any Exam. Any Time." - www.actualtests.com 163
CompTIA 220-1002 Exam
Log in as an administrative user and determine if the problem persists
Answer: D
Explanation:
A.
chmod
B.
grep
C.
ifconfig
D.
sudo
Answer: C
Explanation:
Ann, a network engineer, wants to use FTP to back up and push configurations to several
switches she is updating. Ann starts the FTP service on her PC and places the new configuration
in the correct directory. However, she cannot communicate with the PC using FTP from the switch.
Which of the following must Ann do to allow FTP communications?
A.
Create a static DNS entry on the server for the PC
B.
Change her NIC IP address to dynamic
D.
Make sure the PC’s IP is in the management VLAN
Answer: C
Explanation:
A user is unable to access a network share but can access email. A technician has confirmed the
user has the appropriate permissions to access the share. Which of the following commands
should the technician use FIRST?
A.
ping
B.
nslookup
C.
net use
D.
ipconfig
Answer: C
Explanation:
A user is unable to print to the office’s networked laser printer from a Windows desktop. A
technician attempts to print a test page, but nothing comes out of the printer. The technician tries
to print from a label printer, which is connected via USB, but there is no output from that printer
either. Which of the following actions are MOST likely to restore printing functionality to both
printers? (Choose two.)
A.
B.
Restart the Windows Firewall service
C.
Power cycle the label printer
D.
Power cycle the desktop
E.
Power cycle the laser printer
F.
Restart the print spooler service
Answer: D,F
Explanation:
Which of the following social engineering vulnerabilities occurs when someone follows a
technician into a server room without using a key card?
A.
Shoulder surfing
B.
Man-in-the-middle
C.
Tailgating
D.
Impersonation
Answer: C
Explanation:
A.
.vbs
B.
.txt
C.
.exe
D.
.zip
E.
.bat
F.
.xlsx
Answer: A,E
Explanation:
Which of the following uses a remote access server to forward a user’s logon password to an
authentication server, allowing or denying access to a system?
A.
WPA2-PSK
B.
AES
C.
TACACS
D.
TKIP
Answer: C
Explanation:
A Linux user wants to use the grep command to identify every file name in the current directory
that contains the word “mandatory”. Which of the following commands would BEST accomplish
this?
A.
grep –d mandatory *
B.
grep –i mandatory *
C.
grep mandatory file
D.
grep mandatory *
Answer: B
Explanation:
A customer’s smartphone has been overheating frequently and becoming unresponsive since
installing an OS update. A technician has already performed a soft reboot of the device. Which of
the following should the technician perform NEXT? (Choose two.)
A.
Roll back the OS update
B.
Update the PRL
C.
Force stop running applications
D.
Enable airplane mode
E.
Perform a factory reset
G.
Reset network settings
Answer: A,F
Explanation:
Which of the following Windows versions introduced using applications in the Metro interface?
A.
Windows 7
B.
Windows 8
C.
Windows 8.1
D.
Windows 10
Answer: B
Explanation:
A security team recommends a disaster recovery plan with the following requirements:
B.
Store backups on premises and burst to the public cloud if needed
C.
Store backups both on premises and in a public cloud infrastructure
D.
Store all the backups in a public cloud with no on-premises backup storage
Answer: A
Explanation:
Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate
the settings he intends to change, but the online vendor documentation has instructions for
configuring those settings. Which of the following should the technician perform?
A.
Configure content filtering
B.
Check for a firmware update
C.
Disable the SSID broadcast
D.
Change the firewall settings
Answer: B
Explanation:
B.
PHI
C.
PGP
D.
PII
Answer: A
Explanation:
A user lives in a location that experiences frequent lightning storms. Which of the following would
be the LEAST expensive solution to protect the user’s computer hardware?
A.
A surge protector
B.
Grounding
C.
A power generator
D.
An uninterruptible power supply
Answer: A
Explanation:
A.
"Pass Any Exam. Any Time." - www.actualtests.com 171
CompTIA 220-1002 Exam
Zero-day
B.
Man-in-the-middle
C.
Spoofing
D.
Phishing
Answer: D
Explanation:
A user installed an application that now requires a license key to enable full functionality. The user
contacts support, and the technician decides to enter a license key in the software GUI on behalf
of the user. Which of the following will support this task?
A.
SSH
B.
RDP
C.
FTP
D.
Telnet
Answer: B
Explanation:
B.
Server lock and badge reader
C.
Security guard and entry control roster
D.
Biometric lock and hardware token
Answer: D
Explanation:
After a virus outbreak due to USB usage, a technician must deny users access to removable hard
drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any
users. Which of the following is the BEST way for the technician to perform this security feature?
A.
Push a group policy
B.
Assign a local security policy
C.
Create a network login script
D.
Update the AUP
Answer: B
Explanation:
A user recently connected a Windows laptop to a free WiFi hotspot. After returning to the office,
the user cannot access network shares. Which of the following is the MOST likely cause?
B.
The local firewall settings are incorrect
C.
Location-based settings are not turned on
D.
The network shares are hidden
Answer: B
Explanation:
When hackers execute code against a vulnerability in the hope that it has not yet been addressed,
this is known as a:
A.
zero-day attack
B.
spoofing attack
C.
DDoS attack
D.
brute force attack
Answer: A
Explanation:
A technician successfully removed malware from a user’s computer, and recent scans do not
report any infections. However, the computer has begun experiencing issues accessing websites
with Internet Explorer after a few hours of use. Some remote websites return error messages, and
A.
Internet Options – Advanced
B.
System – Remote Settings
C.
Folder Options – View Options
D.
Display Settings – Resolution
Answer: A
Explanation:
A technician is monitoring a network and notices an outage has occurred that could potentially
cause a major disruption to the business workflow. Which of the following should the technician do
NEXT?
A.
Identify the issue and its impact to the business
B.
Report the incident to the proper teams or management for awareness
C.
Start a root cause analysis and create documentation
D.
Create an action plan and implement the solution
Answer: A
Explanation:
Which of the following Windows Control Panel utilities should the technician use to resolve this
issue?
A.
Folder Options
B.
Display Settings
C.
Device Manager
D.
Internet Options
Answer: A
Explanation:
A technician is scheduled to upgrade a grocery store’s network equipment at 11:00 p.m. There are
only a few shoppers in the store; therefore, the store manager wants the technician to start the
upgrade early. Which of the following is the NEXT step the technician should perform?
A.
Create a back-out plan for the store
B.
Review the change request document
C.
Draft the new network diagrams
D.
"Pass Any Exam. Any Time." - www.actualtests.com 176
CompTIA 220-1002 Exam
Get approval from the Change Advisory Board
Answer: D
Explanation:
A technician is adding a folder to a structure that is several levels down from the top level. The
technician wants to make sure the new folder will have the same permissions as the top level.
Which of the following should the technician configure?
A.
Attributes
B.
Shares
C.
Inheritance
D.
Replication
Answer: C
Explanation:
A user moves a file from one NTFS disk to another NTFS disk. Which of the following describes
the changes to the file permissions?
A.
The file has both the source and destination permissions
B.
The file keeps the source permissions
C.
The file permissions have to be set manually
Answer: A
Explanation:
A customer recently lost data because it was accidentally deleted. The customer calls a technician
and asks to have a Windows backup solution installed. The customer needs to ensure all
company data is backed up and quickly recoverable every time a change is made. Which of the
following solutions would the technician MOST likely recommend? (Choose two.)
A.
File level
B.
Bare metal
C.
Snapshot
D.
Shadow Copy
E.
Critical applications
F.
Image level
Answer: C,D
Explanation:
A technician is updating a Windows computer to the latest OS version. The customer does not
want to lose any settings or have to reinstall any programs. Which of the following installation
types should a technician use to meet the customer’s requirements?
B.
Unattended
C.
Clean
D.
Repair
Answer: A
Explanation:
A user browses to a company’s intranet page and receives an invalid certificate message. A
technician discovers the certificate has expired. A new certificate is put in place and installed on
the user’s computer; however, the user still receives the same message when going to the intranet
page. The technician tries with a third-party browser and connects without error. The technician
needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following
Internet Options should the technician use to ensure the old certificate is removed?
A.
Advanced
B.
Clear SSL state
C.
Publishers
D.
Certificates
Answer: D
Explanation:
A.
A list of network addresses for each device
B.
A list of the ports on each device and what they are connected to
C.
Technical specifications and performance ratings for the devices
D.
Settings, configuration details, and notes on proper operations
E.
A list of devices that need replacement within the next 6-12 months
F.
The MAC address and serial number of each device on the network
Answer: A,B
Explanation:
A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains
drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and
proprietary applications made by the company’s IT department. The self-checkout machine is
experiencing errors, and the store employees are instructed to reload the OS. Which of the
following would be the BEST option to restore full functionality to this machine with the least
administrative effort?
A.
CD-RW
B.
BD-R
C.
Thin client
D.
Network boot
A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to
bring a laptop. The company has emailed several large presentation files and the links to several
videos that will be streamed during the presentation. While showing the last video, it starts to
buffer, times out, and will not display. The CEO restarts the phone that is being used for the
presentation and verifies there is enough free storage space, but the video still will not play. Which
of the following is MOST likely causing the issue?
A.
Data transmission over limit
B.
Unauthorized account access
C.
Resource over use
D.
Unintended Bluetooth pairing
Answer: A
Explanation:
A desktop technician is responsible for the OS migration of 300 end users. As part of the
migration, the technician must save the end users’ data to a temporary shared drive. The data
must include any hidden files to ensure 100% of the data is retained. Which of the following
commands will achieve this result by default?
A.
robocopy
B.
copy
D.
cp
Answer: A
Explanation:
A technician needs to connect to a server using a secure terminal application. The technician must
be able to reboot the server quickly and restart all the daemons with this application. Which of the
following methods will the technician MOST likely use? (Choose two.)
A.
SSH
B.
Telnet
C.
Putty
D.
HTTPS
E.
Remote Assistance
F.
RDP
Answer: A,F
Explanation:
A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After
verifying there are no other infected PCs on the network, which of the following is the SAFEST
A.
Download and apply the security patch that addresses the vulnerability that was exploited
B.
Use System Restore to bring the PC back to a previous restore point
C.
Reimage the computer and update it with all the latest patches
D.
Download another antivirus software that will quarantine the virus
Answer: C
Explanation:
A network administrator audited applications on a user’s desktop and noticed a program used to
sync a mobile device to the desktop’s calendar. To ensure corporate data is not exchanged to
cloud servers, which of the following mobile security methods should be implemented?
A.
Remote wipe
B.
Device encryption
C.
Biometric authentication
D.
Enterprise sandbox
Answer: D
Explanation:
A.
The administrator account was disabled during the installation of the OS
B.
The laptop was not joined to the domain when the OS was installed
C.
The laptop’s hard drive was formatted with FAT32 during the OS installation
D.
The OS was not installed with the correct drivers for the laptop’s input devices
Answer: B
Explanation:
A customer’s computer was turned off overnight. When the customer restarts the computer, an
advanced startup menu is displayed. The startup repair option is unsuccessful and causes the
computer to reboot repeatedly until the advanced startup screen reappears. Which of the following
should a technician attempt FIRST?
A.
Go back to the previous build
B.
Refresh the PC
C.
Run System Restore
D.
Perform System Image Recovery
E.
Reset the PC
Answer: C
Ann, an employee, has been trying to use a company-issued mobile device to access an internal
fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is
now unable to access company information. Ann calls the help desk for assistance, and a
technician verifies she can make calls and access websites. Which of the following should the
technician suggest NEXT to try to fix the issue?
A.
Navigate to the VPN profile in the device settings, delete the pre-shared key, and restart the
device
B.
Instruct Ann to open the company’s MDM application to ensure proper functionality
C.
Navigate to the corporate intranet page and use hyperlinks to access the fileshare
D.
Instruct Ann to disable TLS 1.0 in the device settings
Answer: A
Explanation:
Which of the following steps should a technician perform when the included Windows driver for a
video card does not have the needed features?
A.
Install the third-party driver from the manufacturer’s website
B.
Update the included Windows driver from Windows Update
C.
Flash the firmware on the BIOS to the latest version
Answer: B
Explanation:
Which of the following installation methods allows a technician to install Windows from a remote
location?
A.
USB
B.
NetBoot
C.
PXE
D.
CD-ROM
Answer: C
Explanation:
A customer is having trouble opening several files on a computer. The customer renames one of
the files, but then the correct program will no longer open it. Which of the following settings is a
solution to the issue?
A.
Set the view options to detail
B.
Hide the extensions
C.
D.
View the system files
Answer: B
Explanation:
A company is implementing multifactor authentication and requires a solution that utilizes TCP.
Which of the following will the company MOST likely select?
A.
SNMP
B.
TACACS+
C.
DHCP
D.
RADIUS
E.
Kerberos
Answer: B
Explanation:
A technician is restoring files, which were deleted more than one month ago, from a backup on
Mac OS X. Using the available GUI utility, which of the following utilities should the technician
launch to accomplish this task?
A.
Dock
C.
Keychain
D.
Boot Camp
Answer: B
Explanation:
When a computer accesses an HTTPS website, which of the following describes how the browser
determines the authenticity of the remote site?
A.
Certificates
B.
Software tokens
C.
Firewall
D.
Port security
Answer: A
Explanation:
A new policy requires all users to log on to their corporate workstations using smart card
authentication. Which of the following best practices should be implemented to further secure
access to workstations?
A.
B.
Screen lock timeouts
C.
Required screensavers
D.
Strong passwords
Answer: B
Explanation:
Following a recent password change, a user can log on successfully to an Apple computer but
cannot access a web-based service. An error message displays each time the user attempts to
authenticate to the service. Prior to changing the password, the computer had no communication
issues. Which of the following should a technician use to continue troubleshooting the issue?
A.
passwd
B.
FileVault
C.
Keychain
D.
Gatekeeper
Answer: C
Explanation:
B.
Knowledge base articles
C.
System requirements documentation
D.
Installation instructions
Answer: B
Explanation:
A user’s PC has been running slowly. The user says there have been no changes to the PC.
Which of the following tools should the technician use to troubleshoot the cause of the speed
reduction?
A.
DxDiag
B.
Windows Memory Diagnostic
C.
Performance tab in Task Manager
D.
Disk defragmenter
Answer: C
Explanation:
After connecting to the corporate VPN, a user’s workstation is no longer to browse Internet
websites. A technician discovers launching a different web browser on the same computer
A.
Verify the browser’s proxy configuration settings
B.
Instruct the user to use the alternate web browser instead
C.
Flush the workstation’s DNS cache
D.
Scan the user’s workstation for malware
E.
Disconnect and reconnect from the corporate VPN
Answer: A
Explanation:
A user is unable to open a document on a shared drive from a Linux workstation. Which of the
following commands would help the user gain access to the document?
A.
chmod
B.
ifconfig
C.
pwd
D.
grep
Answer: A
Explanation:
A customer is shopping for a new tablet. The customer is primarily concerned about transferring
applications from the old tablet to the new one. Which of the following specifications is MOST
important when selecting a new tablet?
A.
Screen size
B.
Storage
C.
Wireless speed
D.
Operating system
Answer: D
Explanation:
A technician needs to ensure users are prompted or warned when an installation takes place on a
Windows system. Which of the following would meet this requirement?
A.
Educate the user to run the installation with runas
B.
Add the user to the local administrators group
C.
Enable UAC on the workstation
D.
Log in as the administrator to install the application
Answer: C
Explanation:
An end user submits a request for the IT specialist to install new software on a workstation. The
workstation has the following specifications:
The minimum software requirements for the new application are a dual-core, 64-bit OS with 4GB
of RAM and 60GB storage. Which of the following conditions will the technician encounter when
attempting to install the software?
A.
Insufficient RAM
B.
Incompatible processor
C.
Insufficient storage
D.
Incompatible system architecture
E.
Insufficient network bandwidth
Answer: C
Explanation:
A home user reports slow computer performance and application crashes after clicking a “repair”
button on a pop-up warning while browsing the Internet. Which of the following are the FIRST
steps a technician should take to identify and resolve the issue? (Choose two.)
"Pass Any Exam. Any Time." - www.actualtests.com 193
CompTIA 220-1002 Exam
A.
Perform a system file check and replace any changed files with their original versions
B.
Enable the pop-up blocker on the Internet browser
C.
Uninstall any recently installed unknown programs and browser extensions
D.
Perform a hard shutdown and cold boot the computer
E.
Scan the RAM and hard drive using an up-to-date antivirus program
Answer: B,C
Explanation:
A user spills a small amount of toner from a laser printer onto the floor. Which of the following is
the safest way to clean up the toner?
A.
Use a wet/dry vacuum
B.
Use a broom and dust pan
C.
Use damp paper towels
D.
Spray the toner with canned air
Answer: A
Explanation:
Which of the following would be the BEST way to fix the issue?
A.
Start up in safe mode, verify the USB device in Device Manager, restart the computer, and boot
from USB.
B.
Disable Secure Boot, restart the computer, and boot from USB.
C.
Use Bootsect.exe to modify the boot priority, restart the computer, and boot from USB.
D.
Boot into recovery console, navigate to the USB drive, and boot from USB.
Answer: B
Explanation:
A technician is investigating connectivity issues over the corporate network. The technician
attempts to Telnet into an access point in the break room, which is labeled AP-1, but is unable to
proceed any further or authenticate.
Which of the following commands will be MOST beneficial in determining the connectivity issues?
A.
netstat
B.
tracert
C.
ipconfig
D.
nslookup
A user can access the company's internal website properly, but some e-commerce websites have
stopped loading and been replaced with an error message. The technician who is troubleshooting
the issue tries to update the malware scanner over the network, but the automatic update fails.
However, a manual update is successful from a USB drive. No viruses are detected on the device
after a full system scan.
A.
Incorrect time
B.
Browser redirection
C.
Hijacked email
D.
Rogue antivirus
Answer: B
Explanation:
Which of the following would MOST likely be used in secure client-server communication?
A.
Redirection
B.
Certificates
C.
D.
Group Policy
Answer: B
Explanation:
Which of the following would MOST likely be used by an attacker to identify the hash value of a
strong password quickly?
A.
Brute force
B.
Key stretching
C.
Rainbow table
D.
Dictionary attack
Answer: C
Explanation:
A technician performs a risk assessment and determines a requested change has low risk and low
impact.
Which of the following best practices should the technician follow to proceed with implementing
the change?
A.
Update the ticket with the results of the risk assessment and implement the change.
C.
Obtain approval from the department and implement the change.
D.
Provide a risk assessment to colleagues for peer review.
Answer: D
Explanation:
A technician is in the process of removing a recently discovered Trojan horse application from a
user’s laptop.
Which of the following should the technician complete to prevent reinfection of the same machine?
A.
Reenable Windows System Restore after rebooting the device.
B.
Research the symptoms to identify the threat.
C.
Update the operating system and anti-malware signatures.
D.
Isolate the infected machine from all networks.
Answer: C
Explanation:
A technician is setting up a new virtualization server, which will be initially used to host a client VM
that will manage print jobs. The client, however, has future plans to utilize the server to host other
VMs.
A.
Cloud storage backup
B.
Large file storage
C.
Image-level backup
D.
Uninterruptible power supply
Answer: C
Explanation:
Which of the following would MOST likely prevent a recurrence of the same malware?
A.
Enable Shadow Copy.
B.
Disable System Restore.
C.
Update root certificates.
D.
Modify file permissions.
Answer: B
Explanation:
Which of the following BEST describes the effect this will have?
A.
Devices must match a list of allowed MAC addresses before accessing the network.
B.
Devices need to conform to the policies set forth by the MDM software.
C.
Data loss prevention software will be monitoring for data exfiltration on the port.
D.
A firewall is actively monitoring the network traffic using heuristic analysis.
Answer: A
Explanation:
A window appears on a user's screen stating the computer’s files have been encrypted and an
access code must be used to unlock the user's data.
A.
ransomware.
B.
incorrect file permissions.
C.
a virus.
D.
an invalid certificate.
Answer: A
Explanation:
Joe, a user, cannot read encrypted email messages on a corporate smartphone, but he has been
able to read them in the past. A technician restarts Joe's smartphone, but the issue remains. The
technician deletes the corporate email account and has Joe re-add it, verifying all settings are
correct. Despite these steps, the issue persists.
A.
The certificate is expired.
B.
The TPM is bad.
C.
The phone is not encrypted.
D.
The incorrect mail server is selected in settings.
Answer: A
Explanation:
A user reports that an application has been closing unexpectedly for the past two days when
posting transactions. When an administrator attempts to access the application, it generates an
error stating a data library is missing.
A.
Uninstall and reinstall the application using the Windows Control Panel.
B.
Reinstall the application using the Windows Control Panel
C.
Repair the application using the Windows Control Panel.
D.
Answer: C
Explanation:
A technician wants to write a script that will check data line by line until the end of the file.
A.
Loop
B.
Integer
C.
String
D.
Variable
Answer: A
Explanation:
Joe, a mobile device user, reached his monthly quota of data about halfway through the current
billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his
usage patterns have not changed over the past month.
A.
There are unintended WiFi connections.
B.
Location tracking has been enabled.
"Pass Any Exam. Any Time." - www.actualtests.com 202
CompTIA 220-1002 Exam
C.
Applications are causing high resource utilization.
D.
Malware is causing excessive data transmission.
Answer: A
Explanation:
A technician is installing the Mac OS X operating system. The technician is prompted to select the
filesystem.
Which of the following filesystems should the technician utilize to install the listed operating
system?
A.
Ext2
B.
FAT32
C.
HFS
D.
NTFS
Answer: C
Explanation:
An administrator is creating a new user account and wants to grant access to only the resources
required to perform the user's assigned job duties.
B.
Multifactor authentication
C.
Directory permissions
D.
Principle of least privilege
Answer: D
Explanation:
Many of the files in a user's network folder have a new file extension and are inaccessible. After
some troubleshooting, a technician discovers a text document that states the files were
intentionally encrypted, and a large sum of money is required to decrypt them.
A.
Restore the network folder from a backup.
B.
Perform a System Restore on the computer.
C.
Update the malware scanner and run a full scan.
D.
Disconnect the computer from the network.
Answer: D
Explanation:
A.
Uninstall and reinstall the browser.
B.
Confirm the proper proxy settings.
C.
Disable the firewall.
D.
Disable and re-enable the network adapter.
Answer: B
Explanation:
A business unit wants to upgrade the current version of its loan processing software. A manager is
putting together a change management request and gathering information on the software.
Which of the following would be MOST important during this phase of the request process?
A.
Back-out plan
B.
End-user acceptance
C.
Risk analysis
D.
Test plan
Answer: B
Explanation:
A user's computer was infected with malware, and a technician successfully removed the
infection. However, the user reports certain web-based services are still inaccessible.
Which of the following should the technician perform FIRST to resolve the issue?
A.
Turn off System Restore.
B.
Update the malware signatures.
C.
Reset the Internet Explorer settings.
D.
Check the hosts file.
Answer: C
Explanation:
A customer wants to format a 4TB external drive with a filesystem that is compatible with both
Windows and Linux OSs.
Which of the following should the technician suggest the customer use?
A.
Ext4
B.
exFAT
C.
NFS
D.
FAT32
E.
CDFS
"Pass Any Exam. Any Time." - www.actualtests.com 206
CompTIA 220-1002 Exam
Answer: D
Explanation:
A user received a call from a bank to confirm a wire transfer; however, the user created no such
request. While troubleshooting, a technician discovers there are rules on the user’s account that
are forwarding the emails to an external email address and deleting the emails from the bank.
A.
spam email.
B.
invalid certificates.
C.
hijacked email.
D.
browser pop-ups.
Answer: C
Explanation:
A technician is remediating a virus on an infected workstation. All user files are set to system and
hidden.
Which of the following should a technician perform NEXT to remediate the system?
A.
Back up user data and rebuild the user profile.
B.
Restore user data and reset the user file attributes via a command line.
D.
Perform a clean install of the OS and restore the user data.
E.
Reset all file attributes on the user’s profile via command line.
Answer: C
Explanation:
Joe, a user, is receiving automated replies but does not remember sending any emails to those
recipients. He checks the sent items folder and sees email messages he did not send.
Which of the following would be the BEST way to resolve this issue?
A.
Reset Joe's email password.
B.
Set up a rule to delete the automated replies.
C.
Mark the automated replies as spam.
D.
Rebuild Joe's profile.
Answer: A
Explanation:
After purchasing an Ultrabook, Ann, a home user, has a technician come to her home and install
an operating system.
A.
Flash drive
B.
PXE
C.
Optical disc
D.
Cloned drive
Answer: A
Explanation:
A.
Preserve the data on an external drive.
B.
Report the discovery through proper channels.
C.
Document the findings.
D.
Erase the data and inform the user.
Answer: C
Explanation:
A.
PHI.
B.
PCI.
C.
PII.
D.
PGP.
Answer: B
Explanation:
A.
Phone number
B.
Credit card number
C.
Salary information
D.
Employer information
Answer: A
Explanation:
Which of the following is MOST likely to be specified as a system requirement for the installation of
a photo editing application in Microsoft Windows?
A.
HDD speed
B.
RAM quantity
C.
Network bandwidth
D.
CPU compatibility
Answer: B
Explanation:
A technician needs to recommend a disaster recovery solution for a company that has three
offices across two states. The technician must ensure the solution has:
• High availability
Which of the following solutions will the technician MOST likely recommend? (Choose two.)
A.
Cold storage of all corporate data
B.
Redundant network links
C.
Hot site
D.
"Pass Any Exam. Any Time." - www.actualtests.com 211
CompTIA 220-1002 Exam
Servers at each location
E.
Clustered backups
F.
Cloud replication
G.
Local backups
Answer: B,F
Explanation:
A folder on an NTFS volume has the following permissions enabled for the administrators group:
full control, modify, and write. A technician adds a permissions entry to the folder’s security
settings, denying the administrators group write and modify access.
Which of the following permissions will the administrators group effectively have? (Choose two.)
A.
Write
B.
Read
C.
Full control
D.
Modify
E.
Execute
F.
Special permissions
Answer: B,E
Explanation:
A technician encounters a previously unidentified issue. The technician conducts some research,
finds a solution, and resolves the issue.
According to best practices, which of the following should the technician do so the issue can be
addressed if it is encountered again?
A.
Inform the immediate supervisor about the findings.
B.
Email all the other technicians to explain the problem and resolution.
C.
Enter the resolution in the ticket and close it.
D.
Add the findings to the knowledge base.
Answer: D
Explanation:
Which of the following filesystem types has native read/write support on all desktop operating
systems?
A.
FAT32
B.
ReFS
C.
NTFS
D.
Ext4
Several mobile users are reporting issues connecting to the WLAN within a warehouse. A
technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users
can connect to the Internet using cellular service, but they cannot access any internal resources
on the WLAN. The technician received alerts of devices failing throughout the network due to a
power outage.
A.
SSID is configured to not broadcast.
B.
The system locked out for all wireless users.
C.
The DHCP scope for WLAN is full.
D.
The WAP in the warehouse is down.
Answer: D
Explanation:
A user tries to open a client/server application, but a prompt appears for the username and
password. The user is able to open and use the email client with no issues. The user’s workstation
is a loaner laptop. Everyone at the company is given administrator rights on their individual
workstations.
Which of the following is MOST likely preventing the user from running this program?
A.
B.
NTFS
C.
UTP
D.
UAC
Answer: D
Explanation:
The technician runs hardware diagnostics on the computer and verifies the computer’s NIC is
functioning correctly. The technician attempts to access the Internet and receives the message:
page cannot be displayed. The technician runs a command to verify the computer network settings
and sees the following information:
IP address: 192.168.0.100
Gateway: 192.168.0.1
DNS: 192.168.0.1
The technician confirms other computers on the network can access the Internet.
A.
"Pass Any Exam. Any Time." - www.actualtests.com 215
CompTIA 220-1002 Exam
Rogue antivirus
B.
Firewall rule
C.
Ransomware
D.
Proxy settings
Answer: D
Explanation:
A technician is removing malware from a workstation. The malware was installed via a phishing
attack, which was initiated from a link that was included in an email.
Which of the following should the technician do to address this issue? (Choose two.)
A.
Ensure the anti-rootkit utility is up to date and run it to remove the threat.
B.
Update the host firewall to block port 80 on the workstation.
C.
Restore the system using the last known-good configuration from the recovery console.
D.
Ensure antivirus is up to date and install the latest patches.
E.
Educate the user on verifying email links by hovering over them before clicking.
F.
Ensure endpoint protection is up to date and run the utility to remove the threat.
Answer: C,E
Explanation:
A technician needs to manage a Linux workstation remotely. This workstation contains highly
sensitive data, and therefore, it must be accessed in the most secure method possible.
Which of the following technologies should the technician use to manage this system?
A.
Telnet
B.
HTTPS
C.
SSH
D.
RDP
E.
SFTP
Answer: C
Explanation:
A.
Surge suppressor
B.
Battery backup
C.
Power supply
D.
Electrical cable
Answer: C
A technician is working on an infected computer that is currently turned off. The technician is
concerned the boot sector is affected.
Which of the following is the BEST method for the technician to use to scan the boot sector?
A.
Mount the drive using a forensic platform.
B.
Boot into safe mode.
C.
Boot to last known good configuration.
D.
Boot the drive in another computer.
Answer: A
Explanation:
An administrator wants to search a file on a Linux server for the plus symbol (+).
A.
ls
B.
sh
C.
cat
Answer: D
Explanation:
A user in a SOHO wants to allow Joe, a remote technician, to connect securely to the user's
workstation. Joe informs the user that the VPN was successful, but he still cannot connect.
Which of the following settings in the SOHO router MOST likely need to be adjusted?
A.
Encryption
B.
Firewall
C.
DHCP
D.
DNS
E.
NAT
Answer: B
Explanation:
A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with
a yellow warning graphic.
B.
BitLocker has locked the drive, and it is no longer accessible.
C.
BitLocker is suspended, and the drive is no longer encrypted.
D.
BitLocker has encountered an error, and the user should run the check disk utility.
Answer: A
Explanation:
Which of the following best practices should a technician observe to reduce the risk of electrical
shock?
A.
Keep components in an anti-static bag.
B.
Remove metallic jewelry.
C.
Utilize proper cable management.
D.
Wear an ESD wrist strap.
Answer: D
Explanation:
A user received a brand new mobile device about six months ago. The device is now running very
slowly and is hotter than normal, and certain applications crash when they are started.
A.
Check for any applications that are running and stop them.
B.
Check the device's battery and replace it.
C.
Check the smartphone's screen and replace it.
D.
Check the smartphone's charging cable to ensure it is working properly.
E.
Check for any unnecessary applications and uninstall them.
F.
Check for any OS updates and install them.
Answer: B,E
Explanation:
A Windows user logs on to a network domain computer after recently being switched to a roaming
profile. The user reports extremely long startup times.
A.
The amount of data on the user's desktop.
B.
The total quantity of RAM installed on the computer.
C.
The free space available on the network share.
D.
The size of the Windows swap file.
Answer: A
Which of the following should be configured to ensure the administrator's computer retains
network access?
A.
Alternative IP address
B.
Wake-on-LAN
C.
APIPA
D.
Proxy setting
Answer: B
Explanation:
A recent outbreak of a virus has uncovered that a company must put a security template in place
to mitigate future virus outbreaks.
Which of the following best practices would a technician MOST likely implement as part of the
security template? (Choose two.)
A.
Failed attempts lockout policy
B.
Restricting user permissions
D.
Setting strong passwords
E.
Patch/update management
Answer: B,E
Explanation:
A technician is setting up a SOHO wireless router and needs to adhere to the following
requirements:
• All devices in the office must be able to access network resources and the Internet.
Which of the following should the technician perform to meet these requirements?
A.
Assign static IP addresses on all devices.
B.
Set up MAC filtering for all devices.
C.
Place all devices in a DMZ.
D.
Enable port forwarding for all devices.
Answer: A
Explanation:
Which of the following would enable the technician to use BitLocker on these machines?
A.
A USB key
B.
A firmware update
C.
A local disk
D.
Two-factor authentication
Answer: A
Explanation:
In which of the following operating systems has the publisher removed the ability to turn off
automatic updates with the Control Panel applet?
A.
Windows Server 2012 R2
B.
Windows Server 2016
C.
Windows 7
D.
Windows 8.1
E.
Windows 10
Answer: E
Explanation:
Which of the following operating systems has versions for servers, workstations, and phones?
A.
Android
B.
iOS
C.
Chrome OS
D.
Windows
Answer: D
Explanation:
A user’s mobile device has slow data speeds. The user first noticed the slow speeds after
downloading a large application to the device. The application download MOST likely caused:
A.
a hardware issue on the device.
B.
the device to run more slowly.
C.
the user to exceed the monthly data limit.
D.
the device to change to WiFi settings.
Answer: C
Explanation:
Which of the following is an authentication protocol that can be used for users in the field?
A.
WEP
B.
WPA2
C.
RADIUS
D.
TKIP
Answer: C
Explanation:
After installing an application on a smartphone, a user starts receiving pop-up ads for recently
visited physical stores. The user also receives prompts to install other applications. Which of the
following permissions should be revoked to disable the unwanted notifications?
A.
Account access
B.
Mobile data
C.
Location access
D.
Contacts access
Answer: A
Explanation:
A user is having trouble accessing websites on a computer. A technician troubleshoots and tries to
access a site the user typically visits but is instead presented with a completely different site.
Which of the following should the technician do NEXT?
A.
Clear the DNS cache and check the hosts file.
B.
Verify the default gateway settings are correct.
C.
Ensure the outbound firewall rules are accurate.
D.
Configure the workstation for IPv6.
Answer: A
Explanation:
A technician is helping a remote user who has a Windows issue. The user is working from a
shared office space and is not on the corporate network. Which of the following remote access
methods is MOST likely to be successful in this case?
A.
Telnet
B.
Remote desktop
C.
Third-party screen sharing
D.
Secure shell
Answer: A
Explanation:
A technician is able to connect to a website; however, the technician receives the following error
when attempting to access a different website: Page cannot be displayed. Which of the following
command line tools would be BEST to identify the root cause of the connection problem?
A.
ipconfig
B.
tracert
C.
nslookup
D.
netstat
E.
ping
Answer: C
Reference: https://docs.microsoft.com/en-us/troubleshoot/windows-server/identity/this-page-cant-
displayed
A technician replaced the hard drive for the organization’s Chief Financial Officer (CFO). The
technician wants to reuse the old drive in another system. Which of the following actions would be
MOST appropriate?
A.
Format the drive.
B.
Degauss the drive.
C.
Wipe the drive.
D.
"Pass Any Exam. Any Time." - www.actualtests.com 228
CompTIA 220-1002 Exam
Drill the drive.
E.
Shred the drive.
Answer: C
Reference: https://www.lifewire.com/how-to-wipe-a-hard-drive-2624527
A.
Roll back recent driver updates.
B.
Replace the defective keyboard.
C.
Reset all the settings in the Internet Options.
D.
Unplug the Ethernet cable.
Answer: A
Explanation:
A.
TACACS+
B.
LDAP
"Pass Any Exam. Any Time." - www.actualtests.com 229
CompTIA 220-1002 Exam
C.
RADIUS
D.
MDM
Answer: C
Reference:
https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Auth
entication_with_WPA2-Enterprise
A company is upgrading the desktops of all its employees. Users in the multimedia department
would like to keep the RAM from their current desktops to upgrade their new devices. Following
change management best practices, which of the following actions should a technician perform
NEXT?
A.
Report the request to the board.
B.
Document the change in the project notes.
C.
Consult the back-out plan for guidance.
D.
Perform the RAM upgrade as requested.
Answer: C
Explanation:
A user opens a phishing email and types logon credentials into a fake banking website. The
computer’s antivirus software then reports it has quarantined several temporary Internet files. A
technician disconnects the computer from the network. Which of the following should the
technician perform NEXT?
"Pass Any Exam. Any Time." - www.actualtests.com 230
CompTIA 220-1002 Exam
A.
Have the user change the password.
B.
Update the antivirus software and run scans.
C.
Disable the user’s local computer account.
D.
Quarantine the phishing email.
Answer: C
Explanation:
A cybersecurity researcher purchased several used laptops at an auction. While the hard drives
appeared to be blank, the researcher was able to recover all the data that previously existed on
the drives. Which of the following methods did the original owner MOST likely use to clear the
drives’ contents?
A.
Standard format
B.
Drive degaussing
C.
Disk encryption
D.
Drive wipe
Answer: A
Explanation:
A technician needs to update the network firewall, which will cause a temporary outage. The
A.
Back-out plan
B.
Scope of the change
C.
Risk analysis
D.
End-user acceptance
Answer: C
Explanation:
A technician is completing the documentation for a major OS upgrade of a Linux distribution that
will impact a company’s web services. The technician finishes the risk assessment and documents
the change process. Which of the following should the technician complete NEXT?
A.
Scope of the change
B.
Back-out plan
C.
Purpose of the change
D.
Change request
Answer: D
Explanation:
A.
Review all existing case notes from previous calls and restate the issue.
B.
Apologize for the inconvenience and then escalate the call to a supervisor.
C.
Ask the user to walk through each step taken that created the issue.
D.
Establish a theory of probable cause based on what the user reported.
Answer: A
Explanation:
Which of the following is the MOST common method of allowing outside access through a wireless
SOHO router for specific program access?
A.
Enabling port forwarding
B.
Create a content filter whitelist
C.
Increasing radio power levels
D.
Properly placing access points
Answer: C
Reference: https://www.pearsonitcertification.com/articles/article.aspx?p=2990394&seqNum=11
A.
Establish a remote connection, install free third-party malware software, scan the machine for
malware, and restart the machine.
B.
Explain the steps to access safe mode with networking, establish a remote connection, run
approved malware tools, and restart the machine.
C.
Establish a remote connection, install a free third-party backup tool, back up the user’s software,
and instruct the user on how to reinstall Windows.
D.
Explain the steps to access safe mode with networking, set a restore point, run company-
approved malware tools, and restart the machine.
Answer: B
Explanation:
Which of the following application installation methods requires the use of a valid IP address?
A.
USB
B.
Network-based
C.
Script-based
D.
CD-ROM
Answer: B
Explanation:
A customer is missing files from the Desktop and Documents folders after logging on to a PC. A
technician looks in the Recycle Bin for the items, but nothing is there. Which of the following steps
should the technician take NEXT?
A.
Disable application startup.
B.
Rebuild the user profile.
C.
Reinstall the operating system.
D.
Disable Update Services.
Answer: D
Explanation:
A technician has been asked to review the configuration of an executive’s SOHO network
following a recent news report regarding home Internet routers that are being added to botnets for
malicious purposes. Which of the following would be BEST to prevent the router from being added
to a botnet? (Choose two.)
A.
Upgrading to an enterprise-grade router
B.
Enabling WPA2-Enterprise encryption
C.
Changing the default credentials
D.
Updating to the latest firmware
E.
Reducing the transmit power levels
F.
"Pass Any Exam. Any Time." - www.actualtests.com 235
CompTIA 220-1002 Exam
Disabling the SSID from being broadcast
Answer: C,D
Explanation:
Which of the following should a technician do FIRST before opening a computer case to replace a
part?
A.
Remove all jewelry.
B.
Put on an ESD strap.
C.
Perform self-grounding.
D.
Disconnect the power.
Answer: D
Explanation:
A technician plugs a 16GB jump drive into a Windows PC, and it has multiple smaller partitions
that are unwritable. Which of the following single DiskPart commands can be used to restore the
drive, allowing it to be formatted to full capacity?
A.
extend
B.
merge
C.
clean
Answer: C
Reference: https://recoverit.wondershare.com/flashdrive-recovery/restore-usb-drive-back-to-full-
capacity.html
A.
Create a new local user for peer-to-peer share access.
B.
Provide other users with the Microsoft account information.
C.
Set the share permissions to Everyone/Full Control.
D.
Enable the local guest account access.
Answer: D
Explanation:
Which of the following are best practices to avoid ESD-related damage when handling internal
computer components? (Choose two.)
A.
Ground oneself before touching components.
B.
Avoid exposing components to sources of RFI.
D.
Handle cards by their edges to avoid contacting ICs.
E.
Wear adequate eye protection at all times.
F.
Ensure hardware is plugged into a grounded outlet.
Answer: A,D
Reference: https://turbofuture.com/computers/Electrostatic-Discharge-ESD
A technician is updating a network switch at a location facility. The technician needs to ensure the
data is not sent in plaintext over untrusted networks. Which of the following should the technician
use? (Choose two.)
A.
SSH
B.
SCP
C.
TFTP
D.
FTP
E.
RDP
F.
VNC
Answer: A,B
Explanation:
The Chief Information Security Officer (CISO) wants to ensure the company is prepared in case of
a ransomware attack. The CISO has requested network vulnerability scans, firewall audits, and
ACL logs. Which of the following should the CISO also request?
A.
Audits of the cloud storage platform
B.
Tests of the data backups
C.
Physical penetration tests
D.
NIDS signature updates
Answer: C
Reference: https://digitalguardian.com/blog/ransomware-protection-attacks
A user’s computer is quick to boot up but very slow at login. It tends to get faster throughout the
day. A technician checks the RAM usage, and it looks fine during the day. The slowdown is MOST
likely being caused by too many:
A.
boot devices.
B.
startup applications.
C.
device drivers.
D.
Windows profiles loading.
Answer: B
Explanation:
Which of the following security settings can be changed on a folder to stop permission propagation
and assign new rights?
A.
Inheritance
B.
Ownership
C.
Sharing
D.
Encryption
Answer: A
Reference: https://www.varonis.com/blog/permission-propagation/
A technician was contacted regarding an issue affecting hundreds of users on a domain network.
Which of the following would be MOST effective at remediating future issues through
documentation?
A.
Take personal notes for future reference.
B.
Document the findings in the technician ticketing system.
C.
Document the solution in a user-facing FAQ page.
D.
Brief upper management in a meeting regarding the findings.
Answer: B
A technician is hardening a Windows workstation. One of the hardening requirements for the
workstation is to prevent potential privilege escalation attacks on the local system. Which of the
following steps should the technician perform to BEST meet this requirement?
A.
End the lsass.exe service running on the system.
B.
Uninstall and reinstall the antivirus program.
C.
Disable and rename the administrator account.
D.
Update the system with the latest security updates.
Answer: D
Explanation:
An administrator wants to deploy updates during the company’s off-hours. Which of the following
properties should the administrator implement to facilitate the deployment of the updates?
A.
Wake-on-LAN
B.
Proxy settings
C.
Remote Assistance
D.
Quality of service
A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility,
but it does not find any errors. Which of the following printer settings should the technician check
NEXT?
A.
Duplex
B.
Spooler
C.
Collate
D.
Resolution
Answer: B
Reference: https://www.ldproducts.com/blog/troubleshooting-printer-problems/
An administrator is loading a new Linux server. Which of the following filesystems will the
administrator MOST likely select for the primary partition?
A.
ExFAT
B.
NTFS
C.
ext3
D.
"Pass Any Exam. Any Time." - www.actualtests.com 242
CompTIA 220-1002 Exam
Swap
Answer: C
Reference: https://devconnected.com/how-to-create-disk-partitions-on-linux/
An administrator created a connection to a private network using TLS 1.2. The Linux servers on
the network do not support secure protocols. Which of the following will the administrator MOST
likely use to log in to these servers?
A.
SSL
B.
RDP
C.
SSH
D.
Telnet
Answer: A
Reference: https://kinsta.com/knowledgebase/ssl-handshake-failed/
A technician needs to make changes to a production system. Before doing so, which of the
following should be completed in case the changes have unintended consequences beyond their
original scope?
A.
Draft a complete scope of the changes.
B.
Formulate a back-out plan for the changes.
D.
Create a risk analysis involving the changes.
Answer: D
Explanation:
Ann, a user, is setting up a new mobile phone, and the phone is asking for an authentication
method to enroll the device. Ann is not sure which method is acceptable. Which of the following
methods would a technician MOST likely tell Ann to use?
A.
Face lock
B.
Voice lock
C.
Passcode lock
D.
Fingerprint lock
Answer: C
Explanation:
A user visited a website and infected a Windows 10 computer with a virus. A technician
troubleshoots the issue, but the virus runs every time the computer is restarted. Which of the
following should the technician try NEXT to resolve the issue?
A.
Use Advanced Startup to run a System Image Recovery.
C.
Boot to safe mode and run Task Manager.
D.
Use Advanced Startup to run Windows System Restore.
Answer: B
Reference: https://www.thewindowsclub.com/run-system-file-checker-safe-mode-boot-time
A technician needs to view hidden files. Which of the following Control Panel utilities would be
used for this purpose?
A.
Credential Manager
B.
BitLocker
C.
System
D.
Folder Options
Answer: D
Reference: https://helpdeskgeek.com/windows-10/how-to-show-hidden-files-in-windows-10/
The IT department is assisting with an upgrade of the third-party software the payroll department
uses to track time and create paychecks. When modifications were made three years ago, there
were issues with the upgrade. Which of the following change management processes should the
IT department use after scoping the change but before implementing the new version of the
software?
"Pass Any Exam. Any Time." - www.actualtests.com 245
CompTIA 220-1002 Exam
A.
Risk analysis
B.
Managerial approvals
C.
Economic feasibility
D.
Software compatibility
E.
Backout plan
Answer: A
Explanation:
A network technician is creating a set of scripts to help complete some common tasks. The
technician wants to leave notes within the scripts to explain the purpose of each section and allow
for changes later. Which of the following should the technician use?
A.
Inline comments
B.
End-user documentation
C.
Change management
D.
Environmentally aware variables
Answer: A
Explanation:
A.
chown
B.
ls
C.
grep
D.
cp
Answer: A
Reference: https://devblogs.microsoft.com/commandline/chmod-chown-wsl-improvements/
A.
192.168.0.1
B.
192.168.9.1
C.
192.168.10.254
D.
192.168.15.10
A user’s login screen does not look normal when booting the computer. A technician states the
computer was showing the company’s workstation imaging system screen, but it has since been
fixed. Which of the following did the technician update?
A.
Operating system
B.
Drivers
C.
Boot order
D.
BIOS firmware
Answer: A
Explanation:
A.
gpresult
B.
ipconfig
C.
nslookup
D.
Answer: C
Reference: https://smallbusiness.chron.com/hostname-ip-address-47400.html
A special type of ESD-safe vacuum cleaner may be necessary to safely clean large spills of:
A.
toner.
B.
battery acid.
C.
ink.
D.
flament.
Answer: A
Reference: https://atrix.com/applications/electronics-esd-safe-laser-toner/
A customer has a Windows 7 x86 computer with 4GB of RAM and needs to upgrade the RAM to
meet the minimum specifications for a new piece of software. Which of the following should a
technician recommend to the customer FIRST?
A.
Migrating to a Linux OS
B.
Installing a new SSD
C.
Using a 64-bit architecture
Answer: D
Explanation:
A.
Perform a PXE boot on the workstations.
B.
Install virtualization software.
C.
Utilize Mission Control on the Mac workstations.
D.
Install Boot Camp on the workstations.
Answer: B
Explanation:
BSODs
Which of the following tools should the technician use to analyze the computer’s behavior?
"Pass Any Exam. Any Time." - www.actualtests.com 250
CompTIA 220-1002 Exam
A.
Computer Management
B.
Event Viewer
C.
Performance Monitor
D.
Task Manager
Answer: B
Explanation:
A technician discovers a user’s home computer has Windows Update disabled and suspects
malware has replaced several Windows OS files. After completing a malware scan, which of the
following command line utilities would the technician MOST likely run before enabling Windows
Update?
A.
xcopy
B.
chkdsk
C.
sfc
D.
gpupdate
Answer: C
Reference: https://www.lifewire.com/sfc-command-system-file-checker-2626020
Which of the following security principles help to prevent employees from changing files they are
"Pass Any Exam. Any Time." - www.actualtests.com 251
CompTIA 220-1002 Exam
intended only to view?
A.
DLP
B.
MDM
C.
ACL
D.
MFA
Answer: A
Reference: https://searchinform.com/infosec-blog/2019/04/14/dlp-systems-what-is-a-dlp-system-
and-how-does-it-work/
A.
Run an antivirus tool.
B.
Boot to the Recovery Console.
C.
Update the software firewall.
D.
Restore from backup.
Answer: C
Explanation:
A.
Network settings
B.
Weak signal
C.
Data limits
D.
Airplane mode
Answer: B
Explanation:
An end user who travels frequently receives a lot of spam and ransomware emails. The user has
asked a technician to help ensure the data is secure and duplicated regularly without the need for
equipment. Which of the following would be the BEST method?
A.
Account recovery
B.
Local restore point
C.
Cloud storage
D.
File-level encryption
Answer: C
Explanation:
Which of the following operating systems is based on UNIX source code and is closed source?
A.
Android
B.
Windows
C.
macOS
D.
Linux
Answer: C
Reference: https://www.techwalla.com/articles/open-vs-closed-source-operating-system
A technician is installing new software on an older laptop that has a current OS. The software
contains a database back end that also requires installation. Which of the following should the
technician review to ensure the software will run before installing it? (Choose two.)
A.
Memory usage
B.
Display settings.
C.
Network utilization
D.
Storage capacity
E.
Firewall rules
F.
Antivirus signatures
A user needs to transfer some information from a work computer to a server. The user plugs a
personal USB into the computer but is denied access to save information on the storage medium
due to the security policy. This is an example of:
A.
port security.
B.
an access control list.
C.
a Trojan horse.
D.
data loss prevention.
Answer: D
Explanation:
Which of the following OS types provides a lightweight option for workstations that need an easy-
to-use browser-based interface?
A.
macOS
B.
Windows
C.
Linux
D.
Chrome
Which of the following security measures would BEST prevent unauthorized individuals from being
granted access to a secure location?
A.
An infrared retina scanner and RFID lock
B.
Smart cards with a chip and PIN reader
C.
Barcoded ID badges and an electronic scanner
D.
Keys and a mechanical deadbolt lock
E.
Key fobs and wireless entry locks
Answer: A
Explanation:
A technician needs to install Windows 10 on a 4TB hard drive. Which of the following should the
technician perform to accomplish this task?
A.
Format the drive to use exFAT.
B.
Configure the drive to use the GPT.
C.
Configure the drive to use an MBR.
Answer: B
Explanation:
A.
Apply all known updates to the updated OS.
B.
Roll back the in-place upgrade to the original OS.
C.
Run the application in compatibility mode.
D.
Reinstall the original OS.
Answer: C
Reference: https://support.microsoft.com/en-us/windows/make-older-apps-or-programs-
compatible-with-windows-10-783d6dd7-b439-bdb0-0490-54eea0f45938
Which of the following malware types would MOST likely require reimaging?
A.
Botnet
B.
Spyware
D.
Keylogger
Answer: C
Explanation:
A technician is removing a virus from a user’s Windows workstation. The virus was installed by the
user while downloading pirated software from the Internet. Which of the following should the
technician do to address this issue?
A.
End the current explorer.exe task. Update and run an antivirus scanning utility to remove the
threat. Relaunch explorer.exe using Task Manager.
B.
End the current explorer.exe task using the command line. Update and run an antivirus scanning
utility to remove the threat.
C.
Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove
the threat.
D.
Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task
Manager.
Answer: D
Explanation:
Which of the following basic scripting components can be used to repeat an operation until a
specific requirement is met?
B.
String variables
C.
Conditional loop
D.
Goto statement
Answer: C
Reference: https://www.openbookproject.net/books/bpp4awd/ch04.html
A user is trying to access a popular email website but is being redirected to a different website that
asks for login credentials. The user calls a technician, who promptly notices a security issue.
Which of the following should the technician do to remove the threat from the system?
A.
Remove all parameters after the FQDN website address.
B.
Remove all files from the temporary folder and restart the computer.
C.
Remove and reinstall the web browser in safe mode.
D.
Remove all lines that are not comments from the hosts file.
Answer: B
Explanation:
B.
Authentication permissions
C.
Microsoft Management Console
D.
Administrator rights
Answer: A
Reference: https://www.g2.com/articles/what-is-single-sign-on
A technician is reinstalling Windows for a user and wants to keep the user’s files and settings.
Afterward, the user notices that personal files are no longer available and settings have been
restored to default. Which of the following did the technician MOST likely execute to cause this
issue?
A.
System reset
B.
System update
C.
System Restore
D.
System refresh
Answer: A
Reference: https://support.microsoft.com/en-us/windows/how-to-refresh-reset-or-restore-your-pc-
51391d9a-eb0a-84a7-69e4-c2c1fbceb8dd
A.
Educate the end user.
B.
Schedule scans and run updates.
C.
Disable System Restore.
D.
Remediate the infected system.
Answer: B
Explanation:
A technician needs to format a 64GB flash drive. Which of the following formats will the technician
MOST likely use?
A.
FAT
B.
ExFAT
C.
FAT32
D.
CDFS
Answer: C
Explanation:
A.
Internet Options
B.
Programs and Features
C.
Device Manager
D.
Network Options
Answer: A
Reference: https://answers.microsoft.com/en-us/ie/forum/ie11-iewindows_10/set-up-internet-
options-for-xp-vista-7-8-and-10/12c19ab0-0c7a-45a4-8c11-75c464c9cb17
A technician needs to secure a SOHO network against unauthorized access. A switch has been
deployed, and all endpoints have been patched; however, not all of the endpoints are in use. A
solution must be implemented to secure the unused endpoints. Which of the following should the
technician do FIRST?
A.
Implement firewall rules and restrictions.
B.
Disable the inactive ports.
C.
Implement a NAC solution.
D.
Enable MAC filtering.
Answer: A
Reference: https://resources.infosecinstitute.com/topic/network-design-firewall-idsips/
An issue with a user’s computer was addressed several times by multiple technicians, but the user
has continued to experience the issue. The user calls the help desk and insists on speaking to a
supervisor; however, the supervisor is away at lunch. Which of the following should the technician
perform FIRST?
A.
Offer to address the concern since the supervisor is currently unavailable.
B.
Show the work orders to the customer as proof the issue was resolved.
C.
Tell the customer to return at a later time when the supervisor is available.
D.
Call the supervisor on the phone and let the customer talk to the supervisor directly.
Answer: A
Explanation:
Which of the following is the maximum amount of RAM a computer can access if it is using a 32-
bit version of the Windows OS?
A.
2GB
B.
4GB
C.
6GB
D.
8GB
Answer: B
A customer keeps receiving the following message: Website blocked due to PUP. The customer
asks a technician to resolve the issue immediately. Which of the following should the technician do
to help resolve the customer’s issue?
A.
Check the customer’s computer for a rogue antivirus.
B.
Update the antivirus software and run a scan.
C.
Advise the customer to not revisit the website.
D.
Enable pop-ups for the website the customer is attempting to visit.
Answer: D
Reference: https://digicruncher.com/website-blocked-due-to-pup/
A vendor requires remote access to a specific server to maintain proprietary software system.
Security policy restricts the use of port 3389 to employees but does allow command-line access to
non-employees. Which of the following would MOST likely need to be enabled?
A.
RDP
B.
Telnet
C.
SSH
D.
FTP
"Pass Any Exam. Any Time." - www.actualtests.com 264
CompTIA 220-1002 Exam
Answer: A
Reference: https://www.cisecurity.org/white-papers/security-primer-remote-desktop-protocol/
A technician is troubleshooting a PC and identifies the issue as malware. To remediate the PC,
the technician attempts to download a malware removal tool but finds the PC cannot connect to
the Internet. Which of the following MOST likely explains why the PC cannot access the Internet?
A.
The PC is quarantined.
B.
System Restore is disabled.
C.
The PC is currently running antivirus.
D.
Malware corrupted the NIC drivers.
Answer: D
Explanation:
A healthcare institute has asked the IT department to help protect medical and financial data.
Which of the following regulations is the healthcare provider MOST concerned about? (Choose
two.)
A.
EULA
B.
DRM
C.
PHI
D.
"Pass Any Exam. Any Time." - www.actualtests.com 265
CompTIA 220-1002 Exam
PCI
E.
GDPR
F.
PII
Answer: C,F
Reference: https://www.csoonline.com/article/3215864/how-to-protect-personally-identifiable-
information-pii-under-gdpr.html
Which of the following identifies changes in the environment, such as alternating current failure?
A.
UPS monitor
B.
MSDS
C.
ESD mat
D.
Surge suppressor
Answer: B
Reference: https://www.msdsonline.com/sds-search/
A user’s PC has become infected with malware that has a known remediation. Which of the
following would MOST likely prevent this from happening again?
A.
Create a restore point.
C.
Disable System Restore.
D.
Keep software up to date.
Answer: D
Explanation:
Users are reporting slow connections on their mobile devices when trying to download large data
files from the network servers, but users on wired connections are not having any issues. A
network technician notices multiple alerts about wireless access points going offline, and several
devices connecting to the WLAN are unable to authenticate successfully. Which of the following
issues are the mobile users experiencing?
A.
Over-limit data transmission
B.
Unauthorized account access
C.
Leaked personal data
D.
Dropped signals
Answer: D
Explanation:
A Microsoft application will not open when a user clicks on it. Instead, the following error message
pops up: This application has crashed. Would you like to send an error report to Microsoft? Which
of the following should the user try FIRST to resolve this issue?
"Pass Any Exam. Any Time." - www.actualtests.com 267
CompTIA 220-1002 Exam
A.
Open the application with administrative privileges.
B.
Open a run command and then type the application name.
C.
Reboot the computer into safe mode and try to open the program.
D.
Uninstall the program after saving any associated data and reinstall the program.
Answer: D
Explanation:
A company requires multifactor authentication. When accessing one of the available RemoteApp
programs that requires authentication, the user is not prompted to enter a pin. Which of the
following BEST describes this scenario?
A.
Principle of least privilege
B.
Password expiration
C.
Single sign-on
D.
Permission inheritance
Answer: D
Explanation:
A technician is implementing multifactor authentication for logins to the network. The network
already requires a username and password to authenticate users. Which of the following should
A.
Passphrase
B.
Knowledge-based authentication
C.
PIN
D.
Thumbprint
Answer: C
Explanation:
A technician maps a network printer for a few users in an office. The users are initially able to
print, but about a week later, they cannot print to the network printer. Which of the following should
the technician do to ensure all users can print?
A.
Configure the printer NIC to use full duplexing.
B.
Locally attach the printer to the user’s device.
C.
Configure the printer to use a dynamic IP address.
D.
Map the printer by hostname rather than IP address.
Answer: C
Explanation:
A.
Wipe the drives.
B.
Format the drives.
C.
Degauss the drives.
D.
Delete the drive partitions.
Answer: A
Explanation:
A user downloaded a program from a website. After saving the file, the user cannot find the
executable. Which of the following is MOST likely the cause?
A.
The file was quarantined by an anti-malware software.
B.
The host-based firewall blocked the download.
C.
The file is incompatible with the operating system.
D.
File permissions do not allow the user to access the file.
Answer: A
Explanation:
A user reports unwanted pop-ups are appearing on a computer’s screen, and the system is
performing slowly. Which of the following should a technician do FIRST to troubleshoot the threat?
(Choose two.)
A.
Kill all processes that are not related to Windows.
B.
Restart the computer in safe mode.
C.
Run antivirus and anti-malware scans.
D.
Search for software related to the pop-ups.
E.
Uninstall the network driver from the Device Manager.
F.
Disable all non-Microsoft services.
Answer: B,C
Explanation:
Which of the following security tools can leverage the onboard TPM to protect data at rest?
A.
Encrypted file system
B.
Access control list
C.
BitLocker
D.
Secure file transfer protocol
A technician is updating a Linux server that had been in storage. After booting into single-user
mode, a command is issued that displays the technician’s current location in the filesystem. Which
of the following commands was issued?
A.
pwd
B.
passwd
C.
apt-get
D.
grep
Answer: D
Explanation:
A Chief Information Officer (CIO) recently learned a critical update is required to secure several
servers within the organization. The CIO asks a technician to:
Ensure the servers and applications are functioning properly after the deployment.
Which of the following steps will the technician most likely take NEXT?
A.
Document the business processes.
"Pass Any Exam. Any Time." - www.actualtests.com 272
CompTIA 220-1002 Exam
B.
Scope the change.
C.
Perform a risk analysis.
D.
Develop a back-out plan.
E.
Document the changes.
Answer: C
Explanation:
A technician needs to remove malware from a Windows system. The technician has already
performed research on the malware and determined it is a memory virus. Which of the following
steps should the technician take NEXT?
A.
Disable the restore points.
B.
Remediate the affected system.
C.
Educate the user.
D.
Quarantine the affected system.
Answer: D
Explanation:
Which of the following would MOST likely be connected to a computer to provide electricity in case
of a blackout?
B.
Surge suppressor
C.
Portable generator
D.
Power inverter
Answer: A
Explanation:
Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is
functioning properly. Joe never powers off his computer and typically leaves all applications open.
No other users are reporting email issues. Which of the following is MOST likely the cause of the
issue?
A.
There is an OS update failure.
B.
Out-of-office is turned on.
C.
There is an Internet connectivity issue.
D.
SMTP services are not running.
Answer: C
Explanation:
A technician needs to allow RDP access for a user. Port forwarding is already set up for port 3389.
A.
Local firewall
B.
MSTSC
C.
MSINFO32
D.
Services
Answer: D
Reference: https://upcloud.com/community/tutorials/resolve-problems-windows-remote-desktop/
A company would like to increase its security measures because a workstation was recently
hacked. Which of the following would offer the BEST protection from unauthorized access of
workstations?
A.
Implementing strong passwords
B.
Restricting user permissions
C.
Encrypting the filesystem
D.
Disabling AutoRun
Answer: A
Explanation:
A.
Encrypting File System
B.
Administrative shares
C.
BitLocker
D.
Deny permissions
Answer: D
Reference: https://docs.microsoft.com/en-us/troubleshoot/windows-client/windows-
security/permissions-on-copying-moving-files
A smartphone user has been receiving unsolicited emails that contain PII in the webmail inbox
associated with the device. Which of the following steps should the user take FIRST to identify the
cause of the issue?
A.
Report the emails as spam.
B.
Check the permissions on all installed third-party applications.
C.
Delete the webmail account and create a new one.
D.
Restore the smartphone to factory default settings.
Answer: B
Explanation:
Which of the following Microsoft operating systems comes with a PDF printer as part of the OS
functionality?
A.
Windows 7
B.
Windows 8
C.
Windows 8.1
D.
Windows 10
Answer: A
Reference: https://helpx.adobe.com/acrobat/using/using-pdf-printer.html
After setting up a replacement macOS device, Ann, a user, notices none of her previously saved
passwords are automatically populating in her applications. Which of the following would have
prevented this scenario?
A.
Enabling FileVault on the OS drive
B.
Using the passwd command to manage her passwords
C.
Configuring Gatekeeper to use the most secure setting
D.
Configuring Keychain to save to an iCloud account
Answer: D
Reference: https://support.apple.com/en-gb/HT203783
"Pass Any Exam. Any Time." - www.actualtests.com 277
CompTIA 220-1002 Exam
A folder has the share permissions of everyone – change, while the folder’s NTFS permissions are
set to everyone – read. Which of the following would be the MOST effective permissions for
someone who is accessing the folder via the share?
A.
Read
B.
Change
C.
Write
D.
Modify
Answer: A
Reference: https://www.dnsstuff.com/ntfs-vs-share-permissions
A user’s mobile social media application is sending emails on behalf of the user. However, the
user has not authorized any new permissions for the social media application. The user only has
this application installed on their smart phone and no other devices. Which of the following should
a technician perform to resolve the issue?
A.
Run a malware scan on the device.
B.
Instruct the user to change the device’s password.
C.
Disable access to the user’s contacts.
D.
Deny access to text messages.
A.
Telnet
B.
SSH
C.
SFTP
D.
RDP
Answer: A
Reference: https://security.sdsc.edu/self-help/no-plaintext/
A user’s desktop will not run an accounting program. The program’s splash screen pops up, and
then the software freezes. Which of the following actions should a technician take FIRST to help
resolve the issue?
A.
Uninstall, reinstall, and restart the application.
B.
Reseat the memory.
C.
Ensure the PC meets the minimum requirements.
Answer: A
Explanation:
A.
TKIP
B.
RADIUS
C.
AES
D.
TACACS
Answer: D
Reference: https://www.networkworld.com/article/2838882/radius-versus-tacacs.html
A user receives an error message when trying to upgrade an application on a work computer.
Which of the following is the MOST likely reason the user cannot complete this task?
A.
The computer does not meet the application’s minimum requirements.
B.
The program is being deployed via optical media.
C.
The user account lacks administrative rights.
Answer: C
Explanation:
A user is trying to find a file that contains a specific string on a Linux workstation. The user locates
the file and then needs to navigate to another directory to work with it. Which of the following
commands should the user enter to accomplish both of these tasks? (Choose two.)
A.
grep
B.
chmod
C.
rm
D.
pwd
E.
sudo
F.
cd
Answer: A,F
Explanation:
A technician has completed troubleshooting and repairing a newly found bug on a user’s
workstation. The technician wants to share the repair steps with the rest of the team. Which of the
following methods will the technician MOST likely use?
B.
Team chat message
C.
Email to the team leader
D.
Incident documentation
Answer: D
Explanation:
Ann, a user, has asked a technician for help with her computer. Ann has been trying to speed it up
with simple upgrades but has not been successful. She added memory and removed unnecessary
applications that were no loner in use. After removing the applications, however, the computer
seemed to get slower. Which of the following is the BEST solution?
A.
Defragment the hard drive.
B.
Kill the removed tasks.
C.
Perform software updates.
D.
Rebuild the user profile.
Answer: A
Explanation:
Which of the following would be the FASTEST method to perform a clean install of the latest
A.
USB media
B.
Optical drive
C.
Network boot
D.
In-place upgrade
Answer: A
Reference: https://www.zdnet.com/article/windows-10-whats-the-right-way-to-do-a-clean-install/
A company is creating a disaster recovery plan. Which of the following should be implemented to
BEST ensure the company’s data can be successfully restored in the event of a disaster?
A.
File-level backups
B.
Backups for critical applications
C.
Regular backup testing
D.
Backups to cloud storage
E.
Redundant backups on site
Answer: A
Explanation:
A user ran updates on a Windows computer recently. Since then, the external CD drive no longer
reads discs. The user has connected the external drive to another computer that has not been
updated and then successfully ran the discs. Which of the following should the user do to fix the
issue?
A.
Upgrade the drive.
B.
Replace the discs.
C.
Roll back the drivers.
D.
Reinstall the firmware.
Answer: C
Explanation:
A user receives the following error message while browsing the Internet on a PC: The connection
is not private. Upon inspection, a technician discovers the issue only occurs on the user’s banking
website, and the issue can be duplicated on another PC. The function to view the certificate shows
it is valid and has yesterday’s date as the expiration. Which of the following should the technician
do NEXT?
A.
Ignore the error and accept the certificate.
B.
Report the certificate error to the bank.
C.
Download an updated certificate.
D.
Stop and restart the certificate services.
E.
Reimage the desktop, as it contains malware.
"Pass Any Exam. Any Time." - www.actualtests.com 284
CompTIA 220-1002 Exam
Answer: D
Explanation:
Joe, a user, reports the programs and icons on his Windows desktop are much larger than they
were the day before. He tried changing the screen resolution and restarting the computer, but it
still does not look right. Joe also states the computer showed it was finishing updates when he first
powered it on. Which of the following should a technician perform NEXT?
A.
Reboot the computer.
B.
Roll back the video driver.
C.
Reload the OS.
D.
Boot into safe mode.
Answer: B
Explanation:
A customer has been using a computer to download and copy files to a USB flash drive. The
customer accidentally stepped on the power strip, and the computer suddenly powered off. When
the computer turned back on, it displayed an error message: No OS found. Which of the following
should a technician perform NEXT?
A.
Connect a UPS.
B.
Repair the OS.
C.
Check the boot order.
"Pass Any Exam. Any Time." - www.actualtests.com 285
CompTIA 220-1002 Exam
D.
Run hardware diagnostics.
Answer: C
Explanation:
Malware has been identified on a critical system that is currently quarantined. Which of the
following should a technician do after the malware symptoms are correctly identified?
A.
Educate the power user for that system.
B.
Schedule weekly scans and run routine updates.
C.
Disable System Restore.
D.
Remediate the infected system.
Answer: B
Explanation:
A user’s antivirus recently expired, so the user downloaded and installed a free system protection
application. The application found numerous rootkits, Trojans, viruses, and missing critical
patches. It was unable to fix all the issues, however, and suggested the user call technical
support. Which of the following is the FIRST step to begin repairing the computer?
A.
Remove the rogue antivirus.
B.
Install Windows Updates.
D.
Call the technical support number.
Answer: B
Explanation: