CompTIA A+ Certification (220-1102)
What type of software licensing agreement usually provides free trial software, with the expectation that you will pay for it if you decide to keep it? A.) Freeware B.) Shareware C.) Open Source D.) Single User
B.) Shareware
Which term defines the precompiled instructions that are programmed and allows an operating system and its applications to operate? A.) Shell B.) Source C.) GUI (graphical user interface) D.) Multithreading
B.) Source
A user wants to ensure that all contacts from their mobile device are copied onto their computer before migrating to a new device. Which of the following processes can accomplish this? A.) Mirroring B.) Synchronization C.) Calling each contact D.) Attaching the contacts to an email
B.) Synchronization
You are trying to troubleshoot a problem with AirDrop. You have verified that both participants are within range and both Bluetooth and Wi-Fi are turned on. What could the problem be? A.) AirDrop is configured for direct connection. B.) The sender is not in the recipient's contact list. C.) The sender is in the blocked AirDrop list on the recipient's phone. D.) The phones are connected to the same SSID.
B.) The sender is not in the recipient's contact list.
How do antistatic mats and wrist straps drain the potential ESD (electro-static discharge)? A.) The use of magnets B.) Through the resistor C.) High-voltage probe D.) Direct ground
B.) Through the resistor
Which of the following are good measures to take to help prevent ESD? (choose two) A.) Decrease the humidity. B.) Tie Long hair back. C.) Take your shoes off. D.) Perform self-grounding.
B.) Tie long hair back D.) Perform self-grounding
Your mobile device is suffering from an intermittent wireless connection. What is recommended to alleviate signal drops? A.) Shortening the SSID B.) Using the 5 GHz band C.) Reducing power on the WAP D.) Using the 2.4 GHz band
B.) Using the 5 GHz band
Zoom and Teams are classic examples of which of the following? A.) Screen-sharing software B.) Video-conferencing software C.) File transfer software D.) Desktop management software
B.) Video-conferencing software
With which mobile filesystem are files with .ipa file extensions typically associated? A.) Android B.) iOS C.) Windows 10 D.) Blackberry OS
B.) iOS
Which command will launch the Remote Desktop Connection utility? A.) msra.exe B.) mstsc.exe C.) quickassist.exe D.) ssh.exe
B.) mstsc.exe
When cleaning dust out of computer equipment, what should you always use? A.) Multimeter B.) Flashlight C.) Air filter mask D.) Mirror
C.) Air filter mask
Which tool can be used to restart a failed service? A.) msconfig.exe B.) WinRE C.) Computer Management MMC (Microsoft Management Console) D.) Resource Monitor
C.) Computer Management MMC (Microsoft Management Console)
What is the last step that should be performed when removing malware? A.) Investigate and verify symptoms B.) Enable System Protection C.) Educate the end user D.) Schedule scans and run updates
C.) Educate the end user
Which is a safety risk from overheating a lithium-ion battery? A.) Reduced voltage B.) Shock C.) Explosion D.) Shutdown
C.) Explosion
Which critical system generally requires third-party tools to troubleshoot performance problems? A.) RAM B.) CPU C.) Graphics D.) Network
C.) Graphics
Which regulation is enforced by the Health & Human Services (HHS) that regulates the privacy of patient information related to health services? A.) SOX B.) FERPA C.) HIPAA (Health Insurance Portability and Accountability Act) D.) GLBA
C.) HIPAA (Health Insurance Portability and Accountability Act)
While installing a new network card, you accidentally broke a component off the card. What should you do? A.) Explain that the card was broken out of the box. B.) Install the card anyway. C.) Inform the customer of the situation. D.) Leave everything as is until you can locate a new card.
C.) Inform the customer of the situation
Which term best describes the Android operating system? A.) Server B.) Workstation C.) Mobile D.) Cloud-based
C.) Mobile
Which line would be used to comment Windows batch script code? A.) //comment B.) ' comment C.) REM comment D.) # comment
C.) REM Comment
What type of malware is able to conceal itself from many parts of the operating system and will obtain/retain elevated privleges? A.) Worm B.) Trojan C.) Rootkit D.) Botnet
C.) Rootkit
Which method is used to test a change in an isolated environment? A.) Primary plan B.) Backout plan C.) Sandbox testing D.) Technical evaluation
C.) Sandbox testing
You need to change a computers name and join it to a domain. Which tool will allow you to perform these actions.? A.) Device Manager B.) User Accounts C.) System Properties D.) Credential Manager
C.) System Properties (SYSDM.CPL)
Which element of the boot process holds the information that instructs the operating system to load from a specific partition? A.) winload.exe B.) BOOTMGR C.) winresume.exe D.) BCD (Boot Configuration Data)
D.) BCD (Boot Configuration Data)
Which operating system is a cloud-based operating system? A.) Linux B.) Android C.) Windows 10 D.) Chrome OS
D.) Chrome OS
Why is time drift a big problem on virtual machines? A.) Lack of configuration for the NTP server B.) Availability of the NTP server C.) Shared physical RTC D.) Emulated RTC (Real-Time Communications)
D.) Emulated RTC (Real-Time Communications)
Which macOS feature is similar to Windows File Explorer? A.) Keychain B.) iCloud C.) Spotlight D.) Finder
D.) Finder
A client computer connects to the main office and is configured with an IP address from the main office, on the client computer. What is being described? A.) Site-to-site VPN B.) Remote Desktop Connection C.) SSH Connection D.) Host-to-site VPN
D.) Host-to-site VPN
Which Windows Update branch allows you to install preview releases of updates for Windows 10? A.) Semi-Annual Channel B.) Semi-Annual Channel (Targeted) C.) Long-Term Servicing Channel D.) Insider Program
D.) Insider Program
Which is the most likely source of interference to wireless communications? A.) Magnets B.) ESD C.) Surges D.) Microwave ovens
D.) Microwave ovens
What is typically used for protecting data center equipment during a power outage? A.) Line interactive UPS (uninterruptible power supply) B.) Surge protector C.) Standby UPS (uninterruptible power supply) D.) Online UPS (uninterruptible power supply)
D.) Online UPS (uninterruptible power supply)
Which remote access technology is used for encrypted console based access? A.) MSRA B.) RDP C.) Telenet D.) SSH
D.) SSH (Secure Shell Utility)
Which RAID system requires three or more disks to provide fault tolerance? A.) Mirroring B.) Striping C.) RAID-1 D.) Striping with parity
D.) Striping with parity (RAID-5)
Which of the following screwdrivers has a splined head? A.) Flat-tipped B.) Phillips C.) Axial D.) Torx
D.) Torx
Which tab in Task Manager allows you to see processes separated by each user on the system? A.) Processes B.) Performance C.) App History D.) Users
D.) Users
Which ticket entry method is the easiest for end users to submit their own tickets? A.) Email entry B.) Portal entry C.) Manual entry D.) Application entry
A.) Email Entry
You are receiving USB controller resource warning messages. What should you try to resolve the issue? A.) Move USB devices around on the USB ports. B.) Manually allot more endpoints C.) Upgrade drivers for the USB devices. D.) Manually increase the output amperage.
A.) Move USB devices around on the USB ports
Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing? A.) Password-guessing attack B.) Rootkit attack C.) Worm attack D.) TCP/IP hijacking
A.) Password-guessing attack
A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? A.) Rename default accounts B.) Configure single sign-on C.) Disable Windows Update D.) Disable Action Center pop-ups.
A.) Rename default accounts
Which backup method can create a new current full backup from the files already contained on the backup media? A.) Synthetic B.) Copy C.) Incremental D.) Differential
A.) Synthetic
Which network protocol and port does RDP operate on? A.) TCP port 3389 B.) TCP port 22 C.) TCP port 23 D.) TCP port 443
A.) TCP port 3389
Which place can you find updates for Apple operating systems? A.) iTunes B.) App Store C.) Keychain D.) Mission Control
B.) App Store
Which will accomplish a specific task for a user? A.) Driver B.) Application C.) Operating System D.) Filesystem
B.) Application
Which is a benefit of setup of a device with a Microsoft account? A.) Access to the online store B.) Automatic synchronization of OneDrive C.) Active Directory Authentication D.) Offline Authentication
B.) Automatic synchronization of OneDrive
One of the Vice Presidents of the company calls a meeting with the information technology department after a recent trip to competitors' sites. They report that many of the companies they visited granted access to their buildings only after fingerprint scans, and the VP wants similar technology employed at this company. Of the following, which technology relies on a physical attribute of the user for authentication? A.) Smartcard B.) Biometrics C.) Geofencing D.) Tokens
B.) Biometrics
You need to protect files on the desktop operating system with encryption but find out you do not have a TPM. What can you use to protect the files? A.) A BitLocker B.) Encrypted File System C.) BitLocker to Go D.) Full-drive encryption
B.) Encrypted File System
While working on a user's system, you discover a sticky note attached to the bottom of the keyboard that has their username and password written on it. The user is not around, and you need to verify that the network connection is working. What should you do? A.) Log in, verify access, and log out. B.) Log in and stay logged in when you are finished. C.) Text the user. D.) Log in and change the user's password.
C.) Text the user
You need to configure a static IP address for Windows 10. Which of the following allows you to perform this task? A.) The Network & Sharing Center B.) Windows Defender Firewall C.) The Network & Internet settings screen D.) The VPN settings screen
C.) The Network & Internet Settings Screen
Which of these are not generally attributed to an intermittent wireless issue? A.) Bluetooth Devices B.) Microwave ovens C.) WAPS (Wireless Access Points) D.) Radar
C.) WAPS (Wireless Access Points)
Which filesystem performs on-the-fly defragmentation? A.) FAT B.) NTFS C.) ext4 D.) FAT32
C.) ext4
Which tool allows you to ready the operating system for imaging? A.) Microsoft Deployment Toolkit B.) Windows Assessment & Deployment Kit C.) sysprep.exe D.) Windows Imaging
C.) sysprep.exe