DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CompTIA 220-1102 Exam Questions 2024 Updated: Get Ready for Exams, CompTIA A+ Core Exam | SPOTO

Prepare for the CompTIA A+ Core Exam 220-1102 with confidence using SPOTO's updated exam questions for 2024! Our comprehensive collection of exam questions and answers is designed to help you get ready for the exams efficiently. Dive into our practice tests and sample questions covering operating systems, security, software, and operational procedures to ensure thorough preparation. Access our mock exams to simulate real exam scenarios and refine your test-taking skills. With SPOTO's exam materials and answers, you'll have everything you need to succeed in your CompTIA A+ certification journey. Utilize our online exam questions and exam simulator to enhance your exam practice and boost your confidence. Trust SPOTO to provide you with the most effective resources for exam preparation, guiding you towards success in your CompTIA A+ exams. Start preparing today and ace your exams with SPOTO!
Take other online exams

Question #1
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
A. Restore the device to factory settings
B. Uninstall the unapproved application
C. Disable the ability to install applications from unknown sources
D. Ensure the device is connected to the corporate WiFi network
View answer
Correct Answer: D
Question #2
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?
A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger
View answer
Correct Answer: A
Question #3
An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?
A. Uninstall and reinstall the application
B. Reset the phone to factory settings
C. Install an alternative application with similar functionality
D. Clear the application cache
View answer
Correct Answer: B
Question #4
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue. Which of the following should a technician do to remediate the issue?
A. Roll back the updates
B. Increase the page file
C. Update the drivers
D. Rebuild the profile
View answer
Correct Answer: C
Question #5
A user's Windows desktop continuously crashes during boot. A technician runs the following command in safe mode and then reboots the desktop: c:\Windows\system32> sfc /scannowWhich of the following BEST describes why the technician ran this command?
A. The user's profile is damageD
B. The system files are corrupteD
C. The hard drive needs to be defragmenteD
D. The system needs to have a restore performeD
View answer
Correct Answer: b
Question #6
A technician is installing M.2 devices in several workstations. Which of the following would be required when installing the devices?
A. Air filtration
B. Heat-resistant gloves
C. Ergonomic floor mats
D. Electrostatic discharge straps
View answer
Correct Answer: d
Question #7
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
A. NTFS
B. APFS
C. ext4
D. exFAT
View answer
Correct Answer: C
Question #8
A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
View answer
Correct Answer: D
Question #9
A user calls the IT help desk and explains that all the data on the user's computer is encrypteD. The user also indicates that a pop-up message on the screen is asking for payment in Bitcoins to unlock the encrypted datA.The user's computer is MOST likely infected with which of the following?
A. Botnet
B. Spyware
C. Ransomware
D. Rootkit
View answer
Correct Answer: c
Question #10
A technician has been directed to dispose of hard drives from company laptops properly. Company standards require the use of a high-powered magnet to destroy data on decommissioned hard drives.Which of the following data destruction methods should the technician choose?
A. Degaussing
B. Drilling
C. Incinerating
D. Shredding
View answer
Correct Answer: a
Question #11
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).
A. ipconfig /all
B. hostname
C. netstat /?
D. nslookup localhost
E. arp —a
F. ping :: 1
View answer
Correct Answer: C
Question #12
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?
A. Scope of change
B. Risk level
C. Rollback plan
D. End user acceptance
View answer
Correct Answer: C
Question #13
The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?
A. Data usage limits
B. Wi-Fi connection speed
C. Status of airplane mode
D. System uptime
View answer
Correct Answer: AC
Question #14
A network engineer needs to update a network firewall, which will cause a temporary outagE. The network engineer submits a change request form to perform the required maintenancE.If the firewall update fails, which of the following is the NEXT step?
A. Perform a risk analysis
B. Execute a backout plan
C. Request a change approval
D. Acquire end user acceptancE
View answer
Correct Answer: b
Question #15
Which of the following workstation operating systems uses NTFS for the standard filesystem type?
A. macOS
B. Windows
C. Chrome OS
D. Linux
View answer
Correct Answer: b
Question #16
A user reports being unable to access the Internet or use wireless headphones on a mobile devicE. The technician confirms the headphones properly connect to another devicE.Which of the following should the technician do to solve the issue?
A. Turn off airplane modE
B. Connect to a different service set identifier
C. Test the battery on the devicE
D. Disable near-field communication
View answer
Correct Answer: a
Question #17
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?
A. The UEFI settings need to be changed
B. The RAM has compatibility issues with Windows 10
C. Some of the RAM is defective
D. The newly installed OS is x86
View answer
Correct Answer: C
Question #18
Which of the following is a proprietary Cisco AAA protocol?
A. TKIP
B. AES
C. RADIUS
D. TACACS+
View answer
Correct Answer: D
Question #19
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue?
A. Quarantining system files
B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1
View answer
Correct Answer: A
Question #20
A sales staff member recently left a laptop at a hotel and needs a new one immediately. After remotely wiping the old laptop, a support technician prepares to take a new laptop out of inventory to begin the deployment process.Which of the following should the technician do FIRST?
A. Recycle all the cardboard and other shipping materials appropriately
B. Call the hotel and demand the old laptop be sent back to the repair depot
C. Confirm the shipping address for the new laptop with the sales staff member
D. Document the serial numbers and usernames for asset management
View answer
Correct Answer: d
Question #21
Which of the following symptoms is MOST likely a sign of ransomware?
A. Internet connectivity is lost
B. Battery life is reduceD
C. Files on devices are inaccessiblE
D. A large number of ads appear
View answer
Correct Answer: c

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: