CompTIA A+ Certification (220-1102)

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of software licensing agreement usually provides free trial software, with the expectation that you will pay for it if you decide to keep it? A.) Freeware B.) Shareware C.) Open Source D.) Single User

B.) Shareware

Which term defines the precompiled instructions that are programmed and allows an operating system and its applications to operate? A.) Shell B.) Source C.) GUI (graphical user interface) D.) Multithreading

B.) Source

A user wants to ensure that all contacts from their mobile device are copied onto their computer before migrating to a new device. Which of the following processes can accomplish this? A.) Mirroring B.) Synchronization C.) Calling each contact D.) Attaching the contacts to an email

B.) Synchronization

You are trying to troubleshoot a problem with AirDrop. You have verified that both participants are within range and both Bluetooth and Wi-Fi are turned on. What could the problem be? A.) AirDrop is configured for direct connection. B.) The sender is not in the recipient's contact list. C.) The sender is in the blocked AirDrop list on the recipient's phone. D.) The phones are connected to the same SSID.

B.) The sender is not in the recipient's contact list.

How do antistatic mats and wrist straps drain the potential ESD (electro-static discharge)? A.) The use of magnets B.) Through the resistor C.) High-voltage probe D.) Direct ground

B.) Through the resistor

Which of the following are good measures to take to help prevent ESD? (choose two) A.) Decrease the humidity. B.) Tie Long hair back. C.) Take your shoes off. D.) Perform self-grounding.

B.) Tie long hair back D.) Perform self-grounding

Your mobile device is suffering from an intermittent wireless connection. What is recommended to alleviate signal drops? A.) Shortening the SSID B.) Using the 5 GHz band C.) Reducing power on the WAP D.) Using the 2.4 GHz band

B.) Using the 5 GHz band

Zoom and Teams are classic examples of which of the following? A.) Screen-sharing software B.) Video-conferencing software C.) File transfer software D.) Desktop management software

B.) Video-conferencing software

With which mobile filesystem are files with .ipa file extensions typically associated? A.) Android B.) iOS C.) Windows 10 D.) Blackberry OS

B.) iOS

Which command will launch the Remote Desktop Connection utility? A.) msra.exe B.) mstsc.exe C.) quickassist.exe D.) ssh.exe

B.) mstsc.exe

When cleaning dust out of computer equipment, what should you always use? A.) Multimeter B.) Flashlight C.) Air filter mask D.) Mirror

C.) Air filter mask

Which tool can be used to restart a failed service? A.) msconfig.exe B.) WinRE C.) Computer Management MMC (Microsoft Management Console) D.) Resource Monitor

C.) Computer Management MMC (Microsoft Management Console)

What is the last step that should be performed when removing malware? A.) Investigate and verify symptoms B.) Enable System Protection C.) Educate the end user D.) Schedule scans and run updates

C.) Educate the end user

Which is a safety risk from overheating a lithium-ion battery? A.) Reduced voltage B.) Shock C.) Explosion D.) Shutdown

C.) Explosion

Which critical system generally requires third-party tools to troubleshoot performance problems? A.) RAM B.) CPU C.) Graphics D.) Network

C.) Graphics

Which regulation is enforced by the Health & Human Services (HHS) that regulates the privacy of patient information related to health services? A.) SOX B.) FERPA C.) HIPAA (Health Insurance Portability and Accountability Act) D.) GLBA

C.) HIPAA (Health Insurance Portability and Accountability Act)

While installing a new network card, you accidentally broke a component off the card. What should you do? A.) Explain that the card was broken out of the box. B.) Install the card anyway. C.) Inform the customer of the situation. D.) Leave everything as is until you can locate a new card.

C.) Inform the customer of the situation

Which term best describes the Android operating system? A.) Server B.) Workstation C.) Mobile D.) Cloud-based

C.) Mobile

Which line would be used to comment Windows batch script code? A.) //comment B.) ' comment C.) REM comment D.) # comment

C.) REM Comment

What type of malware is able to conceal itself from many parts of the operating system and will obtain/retain elevated privleges? A.) Worm B.) Trojan C.) Rootkit D.) Botnet

C.) Rootkit

Which method is used to test a change in an isolated environment? A.) Primary plan B.) Backout plan C.) Sandbox testing D.) Technical evaluation

C.) Sandbox testing

You need to change a computers name and join it to a domain. Which tool will allow you to perform these actions.? A.) Device Manager B.) User Accounts C.) System Properties D.) Credential Manager

C.) System Properties (SYSDM.CPL)

Which element of the boot process holds the information that instructs the operating system to load from a specific partition? A.) winload.exe B.) BOOTMGR C.) winresume.exe D.) BCD (Boot Configuration Data)

D.) BCD (Boot Configuration Data)

Which operating system is a cloud-based operating system? A.) Linux B.) Android C.) Windows 10 D.) Chrome OS

D.) Chrome OS

Why is time drift a big problem on virtual machines? A.) Lack of configuration for the NTP server B.) Availability of the NTP server C.) Shared physical RTC D.) Emulated RTC (Real-Time Communications)

D.) Emulated RTC (Real-Time Communications)

Which macOS feature is similar to Windows File Explorer? A.) Keychain B.) iCloud C.) Spotlight D.) Finder

D.) Finder

A client computer connects to the main office and is configured with an IP address from the main office, on the client computer. What is being described? A.) Site-to-site VPN B.) Remote Desktop Connection C.) SSH Connection D.) Host-to-site VPN

D.) Host-to-site VPN

Which Windows Update branch allows you to install preview releases of updates for Windows 10? A.) Semi-Annual Channel B.) Semi-Annual Channel (Targeted) C.) Long-Term Servicing Channel D.) Insider Program

D.) Insider Program

Which is the most likely source of interference to wireless communications? A.) Magnets B.) ESD C.) Surges D.) Microwave ovens

D.) Microwave ovens

What is typically used for protecting data center equipment during a power outage? A.) Line interactive UPS (uninterruptible power supply) B.) Surge protector C.) Standby UPS (uninterruptible power supply) D.) Online UPS (uninterruptible power supply)

D.) Online UPS (uninterruptible power supply)

Which remote access technology is used for encrypted console based access? A.) MSRA B.) RDP C.) Telenet D.) SSH

D.) SSH (Secure Shell Utility)

Which RAID system requires three or more disks to provide fault tolerance? A.) Mirroring B.) Striping C.) RAID-1 D.) Striping with parity

D.) Striping with parity (RAID-5)

Which of the following screwdrivers has a splined head? A.) Flat-tipped B.) Phillips C.) Axial D.) Torx

D.) Torx

Which tab in Task Manager allows you to see processes separated by each user on the system? A.) Processes B.) Performance C.) App History D.) Users

D.) Users

Which ticket entry method is the easiest for end users to submit their own tickets? A.) Email entry B.) Portal entry C.) Manual entry D.) Application entry

A.) Email Entry

You are receiving USB controller resource warning messages. What should you try to resolve the issue? A.) Move USB devices around on the USB ports. B.) Manually allot more endpoints C.) Upgrade drivers for the USB devices. D.) Manually increase the output amperage.

A.) Move USB devices around on the USB ports

Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing? A.) Password-guessing attack B.) Rootkit attack C.) Worm attack D.) TCP/IP hijacking

A.) Password-guessing attack

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? A.) Rename default accounts B.) Configure single sign-on C.) Disable Windows Update D.) Disable Action Center pop-ups.

A.) Rename default accounts

Which backup method can create a new current full backup from the files already contained on the backup media? A.) Synthetic B.) Copy C.) Incremental D.) Differential

A.) Synthetic

Which network protocol and port does RDP operate on? A.) TCP port 3389 B.) TCP port 22 C.) TCP port 23 D.) TCP port 443

A.) TCP port 3389

Which place can you find updates for Apple operating systems? A.) iTunes B.) App Store C.) Keychain D.) Mission Control

B.) App Store

Which will accomplish a specific task for a user? A.) Driver B.) Application C.) Operating System D.) Filesystem

B.) Application

Which is a benefit of setup of a device with a Microsoft account? A.) Access to the online store B.) Automatic synchronization of OneDrive C.) Active Directory Authentication D.) Offline Authentication

B.) Automatic synchronization of OneDrive

One of the Vice Presidents of the company calls a meeting with the information technology department after a recent trip to competitors' sites. They report that many of the companies they visited granted access to their buildings only after fingerprint scans, and the VP wants similar technology employed at this company. Of the following, which technology relies on a physical attribute of the user for authentication? A.) Smartcard B.) Biometrics C.) Geofencing D.) Tokens

B.) Biometrics

You need to protect files on the desktop operating system with encryption but find out you do not have a TPM. What can you use to protect the files? A.) A BitLocker B.) Encrypted File System C.) BitLocker to Go D.) Full-drive encryption

B.) Encrypted File System

While working on a user's system, you discover a sticky note attached to the bottom of the keyboard that has their username and password written on it. The user is not around, and you need to verify that the network connection is working. What should you do? A.) Log in, verify access, and log out. B.) Log in and stay logged in when you are finished. C.) Text the user. D.) Log in and change the user's password.

C.) Text the user

You need to configure a static IP address for Windows 10. Which of the following allows you to perform this task? A.) The Network & Sharing Center B.) Windows Defender Firewall C.) The Network & Internet settings screen D.) The VPN settings screen

C.) The Network & Internet Settings Screen

Which of these are not generally attributed to an intermittent wireless issue? A.) Bluetooth Devices B.) Microwave ovens C.) WAPS (Wireless Access Points) D.) Radar

C.) WAPS (Wireless Access Points)

Which filesystem performs on-the-fly defragmentation? A.) FAT B.) NTFS C.) ext4 D.) FAT32

C.) ext4

Which tool allows you to ready the operating system for imaging? A.) Microsoft Deployment Toolkit B.) Windows Assessment & Deployment Kit C.) sysprep.exe D.) Windows Imaging

C.) sysprep.exe


Conjuntos de estudio relacionados

Intro To Macro Cerego (Week 7) Questions

View Set

International Business Law Midterm - Chapter 1

View Set

Unit 6: Vehicle Components and Systems

View Set

PF - 1 Persona Financial Goals, & Decision-Making Process- (Sec. 1,2 of 2)- 9/9/17(Sat.)

View Set

Human behavior in organization chapter 4

View Set

Chapters 7-9 study guide Spanish

View Set