Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

220-1102Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 101

A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read”. Which of the following should a support technician do FIRST?

  • A: Quarantine the host in the antivirus system.
  • B: Run antivirus scan for malicious software.
  • C: Investigate how malicious software was installed.
  • D: Reimage the computer.

Question 102

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

  • A: Copy the c:\Windows\windows.1ic file over to the machine and restart.
  • B: Redeem the included activation key card for a product key.
  • C: Insert a Windows USB hardware dongle and initiate activation.
  • D: Activate with the digital license included with the device hardware.

Question 103

Which of the following is a package management utility for PCs that are running the Linux operating system?

  • A: chmod
  • B: yum
  • C: man
  • D: grep

Question 104

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

  • A: Tum off airplane mode while at the register.
  • B: Verify that NFC is enabled.
  • C: Connect to the store's Wi-Fi network.
  • D: Enable Bluetooth on the phone.

Question 105

A technician is investigating unauthorized Wi-Fi access on a customer's home network. Individuals are able to access the customer's Wi-Fi network without a password. Which of the following is the MOST likely reason this situation is occurring?

  • A: Channel utilization is oversubscribed.
  • B: WPA2 exploits are being leveraged.
  • C: The Wi-Fi password is posted on the router.
  • D: The customer has a guest network enabled.

Question 106

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue?

  • A: Run the antivirus scan.
  • B: Add the required snap-in.
  • C: Restore the system backup.
  • D: Use the administrator console.

Question 107

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

  • A: High availability
  • B: Regionally diverse backups
  • C: On-site backups
  • D: Incremental backups

Question 108

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

  • A: Delete the application's cache.
  • B: Check for application updates.
  • C: Roll back the OS update.
  • D: Uninstall and reinstall the application.

Question 109

Which of the following physical security controls can prevent laptops from being stolen?

  • A: Encryption
  • B: LoJack
  • C: Multifactor authentication
  • D: Equipment lock
  • E: Bollards

Question 110

Image 1

Which of the following should be done NEXT?

  • A: Educate the user on the solution that was performed.
  • B: Tell the user to take time to fix it themselves next time.
  • C: Close the ticket out.
  • D: Send an email to Telecom to inform them of the issue and prevent reoccurrence.

Question 111

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

  • A: SFTP
  • B: SSH
  • C: VNC
  • D: MSRA

Question 112

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

  • A: FAT32
  • B: ext4
  • C: NTFS
  • D: exFAT

Question 113

An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?

  • A: AUP
  • B: EULA
  • C: EOL
  • D: UAC

Question 114

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

  • A: Escalate the ticket to Tier 2.
  • B: Run a virus scan.
  • C: Utilize a Windows restore point.
  • D: Reimage the computer.

Question 115

Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?

  • A: TACACS+
  • B: Kerberos
  • C: Preshared key
  • D: WPA2/AES

Question 116

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

  • A: Security groups
  • B: Access control list
  • C: Group Policy
  • D: Login script

Question 117

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

  • A: MFA
  • B: WPA2
  • C: AES
  • D: RADIUS

Question 118

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

  • A: System
  • B: Power Options
  • C: Devices and Printers
  • D: Device Manager

Question 119

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

  • A: ipconfig
  • B: ifconfig
  • C: arpa
  • D: ping

Question 120

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

  • A: Phishing
  • B: Smishing
  • C: Whaling
  • D: Vishing

Question 121

A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

  • A: nslookup
  • B: net use
  • C: netstat
  • D: net user

Question 122

Which of the following operating systems is considered closed source?

  • A: Ubuntu
  • B: Android
  • C: CentOS
  • D: OSX

Question 123

Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

  • A: Network and Sharing Center
  • B: Programs and Features
  • C: Default Apps
  • D: Add or Remove Programs

Question 124

An internet café has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

  • A: Spyware is redirecting browser searches.
  • B: A cryptominer is verifying transactions.
  • C: Files were damaged from a cleaned virus infection.
  • D: A keylogger is capturing user passwords.

Question 125

Which of the following should be used to secure a device from known exploits?

  • A: Encryption
  • B: Remote wipe
  • C: Operating system updates
  • D: Cross-site scripting
Page 5 of 28 • Questions 101-125 of 686

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!