A+ Certification Exam: Core 2

Here you have the best CompTIA 220-1102 practice exam questions

  • You have 548 total questions to study from
  • Each page has 5 questions, making a total of 110 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 25, 2024
Question 1 of 548

SIMULATION -

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect to the wireless network. Other users have reported that their personal devices are connecting without issues. She has asked you to assist with getting the device online without adjusting her home WiFi configuration.

INSTRUCTIONS -

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Correct Answer:

    See explanation below.

    Click on 802.11 and Select ac -

    Click on SSID and select BYOD -

    Click on Frequency and select 5GHz

    At Wireless Security Mode, Click on Security Mode

    Select the WPA and the password should be set to TotallySecure!

Question 2 of 548

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

    Correct Answer: B

    When dealing with a Linux server and experiencing issues with the graphical user interface (GUI), the best method to troubleshoot the server is by using SSH (Secure Shell). SSH provides a secure way to access the server's command line interface remotely, which is essential when the GUI is not functioning properly. Methods such as SFTP, VNC, or MSRA are less suitable in this context; SFTP is mainly for transferring files, VNC requires a functioning GUI to be effective, and MSRA is specific to Windows environments. Hence, SSH is the most appropriate tool for troubleshooting in this scenario.

Question 3 of 548

A company wants to remove information from past users' hard drives in order to reuse the hard drives. Which of the following is the MOST secure method?

    Correct Answer: C

    The most secure method to remove information from past users' hard drives in order to reuse the hard drives is to use disk-wiping software. Reinstalling Windows, performing a quick format, or deleting files via the command-line interface does not permanently erase data as it can still be retrieved with specialized tools. Disk-wiping software, however, overwrites the entire drive multiple times, making data recovery virtually impossible.

Question 4 of 548

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

    Correct Answer: B

    If a user is experiencing issues after installing a new application, particularly high network utilization and repeated security warnings, the most immediate action should be to uninstall the fraudulent application. This is the first step in mitigating the issue as it directly addresses the root cause of the problem without resorting to more drastic measures like resetting the phone to factory settings. Increasing the data plan limits or disabling the mobile hotspot would not address the underlying issue caused by a potentially malicious application.

Question 5 of 548

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

    Correct Answer: C

    After a change advisory board approves a change request, the most likely next step in the process is to communicate the approved change to all relevant stakeholders. This involves informing affected parties such as end users, managers, and other teams about the change, its impact, and any necessary actions or preparations they need to take. Effective communication ensures everyone is aware of the upcoming change and can plan accordingly, facilitating a smooth implementation and minimizing disruptions.