Pass4Future also provide interactive practice exam software for preparing CompTIA A+ Core 2 (220-1102) Exam effectively. You are welcome to explore sample free CompTIA 220-1102 Exam questions below and also try CompTIA 220-1102 Exam practice test software.
Do you know that you can access more real CompTIA 220-1102 exam questions via Premium Access? ()
Which of the following applications allows a user to create backups in macOS?
Answer : A
Detailed
Time Machine (Option A) is macOS's built-in backup application. It allows users to automatically back up their entire system, including apps, music, photos, emails, and system files. Time Machine provides an easy way to restore files from a previous state or recover from a system failure.
FileVault (Option B) is used for encrypting data, not for backups.
Keychain (Option C) is a password management tool.
Mission Control (Option D) manages open windows and desktops but has no backup functionality.
CompTIA A+ Core 2 Reference:
1.10 - Features and tools of macOS, including backup options like Time Machine.
A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?
Answer : C
Detailed
The appropriate method to prevent unauthorized access to sensitive data is to wipe the drives (Option C). Wiping ensures that all data is securely erased, preventing any possibility of recovery. This is essential when handling drives containing Personally Identifiable Information (PII).
Degaussing (Option A) erases data but is more commonly used for magnetic tapes.
Drilling through the drives (Option B) physically destroys the drives, which may not be necessary if they are being reused.
Reimaging (Option D) would overwrite the current data with new data but may not guarantee complete data destruction.
CompTIA A+ Core 2 Reference:
2.8 - Use common data destruction and disposal methods, including securely wiping drives.
The following error is displayed on a user's computer screen:
No operating system found
Which of the following is the first troubleshooting step a technician should complete?
Answer : A
Detailed
The first step is to disconnect external storage (Option A). Sometimes, the system may be attempting to boot from an external drive or USB device instead of the internal hard drive. By removing the external storage, the system will attempt to boot from the correct drive.
Flashing the BIOS (Option B) is more complex and typically unnecessary for this issue.
Replacing the SATA cable (Option C) may help if there's a hardware issue, but it's not the first troubleshooting step.
Turning on the device in safe mode (Option D) would not work if no operating system is detected.
CompTIA A+ Core 2 Reference:
5.1 - Apply troubleshooting methodologies, including steps for resolving boot issues.
A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?
Answer : B
Detailed
RADIUS (Remote Authentication Dial-In User Service) (Option B) is a network protocol that allows users to authenticate using their network credentials, such as usernames and passwords, typically stored in a central directory like Active Directory. It ensures that users can log in to the Wi-Fi using their existing network credentials.
AES (Option A) is an encryption standard but does not handle authentication.
TKIP (Option C) is a deprecated encryption protocol and not related to network login management.
WPA3 (Option D) is the latest Wi-Fi security standard but does not specifically handle centralized login management like RADIUS does.
CompTIA A+ Core 2 Reference:
2.2 - Compare and contrast wireless security protocols and authentication methods, including RADIUS.
A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?
Answer : A
Detailed
The technician should disconnect the computer from the network (Option A) first to prevent any further spread of the infection or data loss. Once the machine is isolated from the network, the technician can safely investigate the malware without risking infection to other systems.
Running an antivirus scan (Option B) comes after isolating the system.
Rebooting the computer (Option C) could lead to the loss of critical information or make it harder to diagnose the issue.
Educating the user (Option D) is important but should happen after resolving the immediate issue.
CompTIA A+ Core 2 Reference:
3.3 - Best practices for malware removal, including isolating the system first.