220-1101 Dumps

220-1101 Free Practice Test

CompTIA 220-1101: CompTIA A+ Certification Exam: Core 1

QUESTION 81

- (Topic 4)
Which of the following ports allows for secure communications?

Correct Answer: B
The correct answer is B. 22.
Port 22 is the default port for SSH (Secure Shell), a protocol that allows secure and encrypted remote login and command execution over a network. SSH uses public key cryptography to authenticate the client and the server, and to encrypt the data exchanged between them. SSH can be accessed through different ports, depending on the configuration of the server and the client. The default port for SSH is 22, but it can be changed to any other port for security reasons1.
Port 20 is the default port for FTP (File Transfer Protocol) data transfer, a protocol that allows file transfer between a client and a server over a network. FTP uses two ports: one for data transfer (port 20) and one for control commands (port 21). FTP does not provide encryption or authentication, and it is vulnerable to various attacks, such as packet sniffing, spoofing, or brute force. To secure FTP connections, protocols such as FTPS (FTP over SSL) or SFTP (SSH File Transfer Protocol) can be used2.
Port 23 is the default port for Telnet, a protocol that allows remote login and command execution over a network. Telnet does not provide encryption or authentication, and it sends data in plain text, which can be easily intercepted or modified by attackers. Telnet is considered obsolete and insecure, and it should be replaced by SSH or other secure protocols3.
Port 25 is the default port for SMTP (Simple Mail Transfer Protocol), a protocol that allows sending and receiving email messages over a network. SMTP does not provide encryption or authentication, and it can be exploited by spammers or hackers to send malicious or unwanted emails. To secure SMTP connections, protocols such as SMTPS (SMTP over SSL) or STARTTLS (Transport Layer Security) can be used.
Therefore, port 22 is the only port that allows for secure communications by default, as it uses SSH protocol. For more information about ports and their security, you can refer to the following web search results: How to secure your TCP/IP ports, What is an SSL port? A technical guide for HTTPS, HTTPS Port: What It Is, How to Use It, and More (2023).

QUESTION 82

- (Topic 1)
A user visits the desk to report that a smartphone takes more than a day to fully charge. The user has already tested multiple wall outlets and swapped the charging cable, but the results are the same. Which of the following should the technician do FIRST?

Correct Answer: A
A smartphone that takes more than a day to fully charge may be due to a charger that is not powerful enough. The technician should verify that the charger is rated for the smartphone’s battery capacity and that it is providing the correct voltage and amperage123.

QUESTION 83

- (Topic 2)
The owner of a restaurant reports that wireless network connections are lost intermittently throughout the day. Which of the following steps should a technician take to troubleshoot the issue? (Select TWO).

Correct Answer: AD
The correct answers are A. Identify the location of devices that utilize 2.4GHz and D. Map all of the wireless signals in the restaurant. In order to troubleshoot the issue, the technician should first identify the location of devices that utilize the 2.4GHz frequency, as this can cause interference with the wireless signal. Additionally, the technician should map all of the wireless signals in the restaurant in order to identify any potential sources of interference. Checking to see if the phones are IJTP or STP lines, testing to see if the copper electrical wires are causing interference, verifying T568B is being used in the wiring closet patch panel, and scheduling timed router reboots throughout the day are not necessary steps for troubleshooting this issue.

QUESTION 84

- (Topic 4)
A systems administrator needs to set up a multifunction printer for the legal department. The legal department deals with sensitive documents and requires a secure method of releasing print jobs. Which of the following should the systems administrator configure to meet the department's security requirements?

Correct Answer: B
This option requires the user to enter a PIN code or swipe a smart card before the printer releases their print job. This way, the user can verify their identity and ensure that no one else can access their sensitive documents.
The other options are not as secure or effective as user authentication. SMB settings are used to share files and printers over a network, but they do not provide a secure method of releasing print jobs. Audit logging records the details of each print job, but it does not prevent unauthorized access to the printed documents. Wired connection reduces the risk of wireless interference or hacking, but it does not guarantee that the print jobs are only retrieved by the intended recipient.

QUESTION 85

- (Topic 2)
A university student was able to boot from a live Linux CD on a computer in a shared space on campus. Which of the following will BEST prevent this type of action from occurring in the future?

Correct Answer: D
Enabling secure boot will verify the digital signature of the bootloader and operating system, ensuring that the system only boots from trusted and authorised sources. This can prevent booting from an unauthorised live CD or other external media. The best way to prevent booting from a live Linux CD on a computer in a shared space on campus is to enable secure boot. Secure boot is a feature that ensures that the system only runs software that is signed by an authorized party. This means that the system will not boot from any unauthorized media, including live Linux CDs.
Secure Boot is a feature that ensures that the system only runs software that is signed by an authorized party. This means that the system will not boot from any unauthorized media, including live Linux CDs. Secure Boot is an important security feature designed to prevent malicious software from loading when your PC starts up (boots)1.
Booting from a live Linux CD is a process that allows you to run a Linux operating system from a CD or DVD without installing it on your hard drive. This can be useful for testing or troubleshooting purposes. To boot from a live Linux CD, you need to insert the CD or DVD into your computer’s CD/DVD drive and restart your computer. Most systems are set up to automatically boot from the CD/DVD drive, but if your system is not set up this way, you may need to change a system setting to boot from a Linux CD/DVD23.