Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA 220-1102 Exam

Certification Provider: CompTIA
Exam Name: CompTIA A+ Core 2 Exam
Number of questions in our database: 534
Exam Version: Feb. 22, 2024
220-1102 Exam Official Topics:
  • Topic 1: Summarize various security measures and their purposes/ Explain common methods for securing mobile and embedded devices
  • Topic 2: Summarize environmental impacts and local environmental controls/ Identify basic features of Microsoft Windows editions
  • Topic 3: Given a scenario, perform OS installations and upgrades in a diverse OS environment/ Explain basic change-management best practices
  • Topic 4: Given a scenario, install and configure browsers and relevant security settings/ Identify common features and tools of the Linux client/desktop OS
  • Topic 5: Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts/ Given a scenario, use the appropriate Microsoft command-line tool
  • Topic 6: Given a scenario, configure Microsoft Windows networking features on a client/desktop/ Explain common social-engineering attacks, threats, and vulnerabilities
  • Topic 7: Given a scenario, use best practice procedures for malware removal/ Given a scenario, apply application installation and configuration concepts
  • Topic 8: Given a scenario, configure a workstation to meet best practices for security/ Compare and contrast wireless security protocols and authentication methods
  • Topic 9: Given a scenario, use proper communication techniques and professionalism/ Given a scenario, use features and tools of the Microsoft
  • Topic 10: Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods/ Given a scenario, use the appropriate Microsoft Windows 10
  • Topic 11: Given a scenario, troubleshoot common mobile OS and application security issues/ Given a scenario, manage and configure basic security settings in the Microsoft Windows OS
  • Topic 12: Given a scenario, implement workstation backup and recovery methods/ Identify common features and tools of the macOS/desktop OS
  • Topic 13: Given a scenario, troubleshoot common personal computer (PC) security issues/ Given a scenario, troubleshoot common mobile OS and application issues
  • Topic 14: Given a scenario, use remote access technologies/ Given a scenario, use common data destruction and disposal methods

Free CompTIA 220-1102 Exam Actual Questions

The questions for 220-1102 were last updated On Feb. 22, 2024

Question #2

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Reveal Solution Hide Solution
Correct Answer: B

Isolating the machine from the network is the best way to identify the source of the attack, because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating the machine can also help preserve the evidence of the attack, such as the malware files, the network connections, the registry entries, or the system logs. By isolating the machine, a technician can safely analyze the machine and determine the source of the attack, such as a phishing email, a compromised website, a removable media, or a network vulnerability.


Question #3

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Reveal Solution Hide Solution
Correct Answer: B

One of the common reasons for a slow smartphone performance is having too many apps installed and running in the background. These apps consume the device's memory (RAM) and CPU resources, which can affect the speed and responsiveness of the phone. Rebooting the phone can temporarily clear the RAM and stop some background processes, but they may resume after a while. Connecting to a different network does not affect the performance of the phone, unless the network is congested or has a poor signal.The user can improve the phone's performance by uninstalling unused apps, clearing app caches, and restricting background activities12.Malware can also slow down a phone, but it is not the most likely cause in this scenario, as the user does not report any other symptoms of infection, such as pop-ups, battery drain, or data usage spikes3. Jailbreaking a phone can also affect its performance, but it is not a cause, rather a consequence, of the user's actions.Jailbreaking is the process of removing the manufacturer's restrictions on a phone, which allows the user to install unauthorized apps, customize the system, and access root privileges4.However, jailbreaking also exposes the phone to security risks, voids the warranty, and may cause instability or compatibility issues5.

Reference 1: Speed up a slow Android device - Android Help - Google Help 2: Why your phone slows down over time and what you can do to stop it | TechRadar 3: How to tell if your phone has a virus | Norton 4: What is Jailbreaking?- Definition from Techopedia 5: What is Jailbreaking an iPhone? - Lifewire


Question #4

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Reveal Solution Hide Solution
Correct Answer: C

Maintaining the chain of custody is important to control evidence and maintain integrity. The chain of custody is a process that documents who handled, accessed, or modified a piece of evidence, when, where, how, and why. The chain of custody ensures that the evidence is preserved, protected, and authenticated throughout the incident response process. Maintaining the chain of custody can help prevent tampering, alteration, or loss of evidence, as well as establish its reliability and validity in legal proceedings. Maintaining an information security policy, properly identifying the issue, and gathering as much information as possible are not reasons why maintaining the chain of custody is important. Maintaining an information security policy is a general practice that defines the rules and guidelines for securing an organization's information assets and resources. Properly identifying the issue is a step in the incident response process that involves analyzing and classifying the incident based on its severity, impact, and scope. Gathering as much information as possible is a step in the incident response process that involves collecting and documenting relevant data and evidence from various sources, such as logs, alerts, or witnesses.Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 26


Question #5

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Reveal Solution Hide Solution
Correct Answer: A

The correct answer is

A) Verify the DNS server settings. This is because the DNS server is responsible for resolving domain names to IP addresses, which is necessary for accessing the internet or named network resources. If the DNS server settings are incorrect or the DNS server is down, the technician will not be able to access these resources even if they have a valid IP address and can ping the default gateway1.

1: CompTIA A+ Certification Exam: Core 2 Objectives, page 16, section 1.10.



Unlock all 220-1102 Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now
Disscuss CompTIA 220-1102 Topics, Questions or Ask Anything Related

Save Cancel