220-1102 Exam Questions

Total 739 Questions

Last Updated Exam : 7-Jul-2025

Topic 1: Exam Pool A

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?


A. Internet-based upgrade


B. Repair installation


C. Clean install


D. USB repair


E. In place upgrade





C.
  Clean install

Explanation:
The desktop specialist should use a clean install to refresh the laptop. A clean install will remove all data and applications from the laptop and install a fresh copy of Windows 10, ensuring that the laptop is ready for the newly hired employee.

Which of the following commands can a technician use to get the MAC address of a Linux distribution? net use


A. ifconfig


B. netstat


C. ping





B.
  netstat

Explanation: The ifconfig command is a tool for configuring network interfaces that any Linux system administrator should know. It is used to bring interfaces up or down, assign and remove addresses and routes, manage ARP cache, and much more1. One of the information that ifconfig can display is the MAC address of each network interface, which is a unique identifier of the physical layer of the network device. The MAC address is usually shown as a hexadecimal string separated by colons, such as 00:0c:29:3f:5c:1f. To get the MAC address of a Linux distribution, a technician can use the ifconfig command without any arguments, which will show the details of all the active network interfaces, or specify the name of a particular interface, such as eth0 or wlan0, to show only the details of that interface.

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?


A. The contents of the text comptia.txt will be replaced with a new blank document


B. The contents of the text comptia. txt would be displayed


C. The contents of the text comptia.txt would be categorized in alphabetical order.


D. The contents of the text comptia. txt would be copied to another comptia. txt file





B.
  The contents of the text comptia. txt would be displayed

Explanation:
The command cac cor.ptia. txt was issued on a Linux terminal. This command would display the contents of the text comptia.txt.

A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to input the SSID and password?


A. Network & Internet


B. System


C. Personalization


D. Accounts





A.
  Network & Internet

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?


A. Default gateway


B. Host address


C. Name server


D. Subnet mask





A.
  Default gateway

Explanation:
The technician most likely needs to change the default gateway on the workstation to resolve the issue. The default gateway is the IP address of the router that connects the workstation to the internet, and it is responsible for routing traffic between the workstation and the internet. If the default gateway is incorrect, the workstation will not be able to access external web pages.

Which of the following are mobile operating systems used on smartphones? (Select two).


A. macOS


B. Windows


C. Chrome OS


D. Linux


E. iOS


F. Android





E.
  iOS

F.
  Android

Explanation: iOS and Android are the two most popular and widely used mobile operating systems for smartphones. They are both based on Unix-like kernels and provide a variety of features and applications for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as iPhones and iPads. Android is developed by Google and runs on a range of devices from different manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?


A. Full


B. Differential


C. Off-site


D. Grandfather-father-son





B.
  Differential

Explanation:
The differential backup method would best address these concerns. Differential backups only back up files that have changed since the last full backup, which means that only a few files would be backed up each time. This would help to mitigate the risk of ransomware attacks, as only a few files would be affected if an attack occurred. Additionally, differential backups require less storage space than full backups.

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use?


A. DHCP reservation


B. Port forwarding


C. DNS A record


D. NAT





A.
  DHCP reservation

Explanation:
The technician should use DHCP reservation to maintain the same IP address for the server at all times. DHCP reservation allows the server to obtain an IP address dynamically from the DHCP server, while ensuring that the same IP address is assigned to the server each time it requests an IP address.

Which of the following involves sending arbitrary characters in a web page request?


A. SMS


B. SSL


C. XSS


D. VPN





C.
  XSS

Explanation: XSS stands for cross-site scripting, which is a web security vulnerability that allows an attacker to inject malicious code into a web page that is viewed by other users1. XSS involves sending arbitrary characters in a web page request, such as a query string, a form field, a cookie, or a header, that contain a malicious script. The web server does not validate or encode the input, and returns it as part of the web page response. The browser then executes the script, which can perform various actions on behalf of the attacker, such as stealing cookies, session tokens, or other sensitive information, redirecting the user to a malicious site, or displaying fake content

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?


A. MDM


B. EULA


C. IRP


D. AUP





D.
  AUP

Explanation:
AUP (Acceptable Use Policy) should be updated to reflect this new requirement. The AUP is a document that outlines the acceptable use of technology within an organization. It is a set of rules that employees must follow when using company resources. The AUP should be updated to include a policy on cryptocurrency mining on work desktops.


Page 16 out of 74 Pages
Previous