Go Back on 220-1102 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

220-1102 Practice Test


Page 1 out of 148 Pages

Topic 5: Exam Pool E

A user's company phone was stolen. Which of the following should a technician do next?


A. Perform a low-level format.


B. Remotely wipe the device.


C. Degauss the device.


D. Provide the GPS location of the device.





B.
  Remotely wipe the device.

Explanation: Remotely wiping the device is the best option to prevent unauthorized access to the company data stored on the phone. A low-level format, degaussing, or providing the GPS location of the device are not feasible or effective actions to take in this scenario. References: The Official CompTIA A+ Core 2 Study Guide1, page 315.

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two). Install the latest GPU drivers.


A. Reinstall the OS.


B. Increase the RAM.


C. Increase the hard drive space.


D. Uninstall unnecessary software.


E. Disable scheduled tasks.





C.
  Increase the hard drive space.

E.
  Disable scheduled tasks.

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?


A. Run one scan and schedule future scans.


B. Back up the uninfected files and reimage the computer.


C. Restore the clean backup copies of the infected files.


D. Run repeated remediation scans until the malware is removed.





D.
  Run repeated remediation scans until the malware is removed.

Explanation: Malware is malicious software that can cause damage or harm to a computer system or network4. A technician has verified a computer is infected with malware by observing unusual behavior, such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the anti-malware software to prevent further infection or spread of the malware. The next step is to run repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and removes malware from the system. Running one scan may not be enough to remove all traces of malware, as some malware may hide or regenerate itself.

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?


A. To determine which party had the machine and when.


B. To remotely wipe sensitive data from the machine.


C. To gather the information needed to replace the machine.


D. To alert the owner that the password needs to be changed.





A.
  To determine which party had the machine and when.

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?


A. Network share


B. Group Policy


C. BitLocker


D. Static IP





C.
  BitLocker

Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1. BitLocker helps mitigate unauthorized data access by enhancing file and system protections, rendering data inaccessible when BitLocker- protected devices are decommissioned or recycled1. Network share, Group Policy, and Static IP are not features that can prevent unauthorized data access if a computer is lost or stolen. References: BitLocker overview - Windows Security | Microsoft Learn1 The Official CompTIA A+ Core 2 Study Guide2, page 315.


Page 1 out of 148 Pages