00:15:00

Free CompTIA A+ 220-1102 Practice Test

Prepare for the CompTIA A+ 220-1102 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures
Question 1 of 15

When setting up a workstation in a company that handles sensitive customer data, which of the following is the BEST action to ensure compliance with government regulations?

  • Implementing a strong password policy for workstation access.

  • Ensuring only services necessary for workstation operation are running.

  • Encrypting all sensitive data stored on the workstation.

  • Applying an air filtration mask when servicing the workstation.

Question 2 of 15

A technician needs to display all active connections and listening ports on a Windows computer, including the associated executable. Which command should they use to obtain this information?

  • netstat -o

  • netstat -b

  • netstat -r

  • netstat -a

Question 3 of 15

What security protocol provides the best security for a WiFi network?

  • MAC3

  • SHA256

  • WPA2

  • WEP

Question 4 of 15

Your company has developed a new accounting application that they would like to deploy on their Windows-based desktops. During the planning stage, it has been noted the application requires a 64-bit operating system to function properly. A number of desktops in the organization are still running a 32-bit version of Windows. As an IT technician, what is the most appropriate course of action to ensure application compatibility?

  • Install the application anyway and use compatibility mode for 32-bit programs.

  • Apply the latest Windows updates to the 32-bit systems to enable support for 64-bit applications.

  • Increase the RAM in the 32-bit systems to meet the application's memory requirements.

  • Upgrade the 32-bit Windows systems to a 64-bit version that is compatible with the new application.

Question 5 of 15

An application is opening itself on multiple server and desktop PCs on your employer's network. The application is named Antispyware Remover 2020™ and offers to remove infected malware for a price of $99 per infected operating system. The application is very persistent and pop-ups frequently with flashing colors. What term best describes this scenario?

  • Hijacked Spyware Network Attack (HSNA)

  • Antivirus license escalation

  • Rogue antivirus

  • Antiviral Spoofing Attack

Question 6 of 15

A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?

  • The subnet mask is configured incorrectly on the device

  • The device is connected to the wrong SSID

  • Issues with the DHCP configuration or service

  • The WPA2 key entered for the Wi-Fi network is incorrect

Question 7 of 15

You work for a grocery store in the IT department. To ensure stores can operate during internet or network outages there are several servers running in each location. What device could be used to ensure the server are not physically accessible to store employees?

  • Entry control list

  • Server lock

  • Smart card

  • Lock screen

Question 8 of 15

An employee within a company wishes to use a software package for creating diagrams and flowcharts, which he has personally purchased for home use. The company's IT policy requires software to be properly licensed for corporate use. What is the BEST course of action to remain compliant with licensing regulations?

  • Install the software on multiple office computers until the company decides to purchase bulk licenses.

  • Ask the employee only to use the software after hours to avoid interference with corporate policy.

  • Use the employee's personal license at the office, since it is already paid for.

  • Obtain a corporate use license for the software to be used within the company.

Question 9 of 15

What is application spoofing in the context of mobile device security?

  • A type of malware that targets mobile devices.

  • A malicious app that disguises itself as a legitimate app.

  • A legitimate app that has been compromised by a hacker.

  • A type of encryption used to secure mobile apps.

Question 10 of 15

A user reports that their computer has been running slowly and they have noticed unfamiliar pop-ups appearing on their screen. Which of the following is the most likely cause of these issues?

  • A misconfigured firewall

  • A hardware failure

  • Malware infection

  • An outdated operating system

Question 11 of 15

During an emergency maintenance window, a network administrator must access the configuration interface on a core switch within an isolated VLAN that is inaccessible via the company's main network. The administrator is at a remote site. Which remote access method should be used to securely and directly manage the network device?

  • Microsoft Remote Assistance (MSRA)

  • VPN

  • Virtual network computer (VNC)

  • RDP

  • Secure Shell (SSH)

  • Remote monitoring and management (RMM) tools

Question 12 of 15

You are assisting a customer with troubleshooting a technical issue. The customer has a strong accent and a name that you find hard to pronounce. What is the BEST way to address the customer to ensure cultural sensitivity and professionalism?

  • Use a generic term like 'sir' or 'madam' to address the customer.

  • Ask the customer politely how to pronounce their name and use the correct pronunciation.

  • Avoid addressing the customer by their name to prevent mispronunciation.

  • Guess the pronunciation of the customer's name based on how it looks.

Question 13 of 15

What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?

  • MD5 hash

  • PKIP

  • SHA256 hash

  • A certificate

Question 14 of 15

In the context of business continuity, why is it important for IT professionals to perform regular backup testing?

  • To check that the network can handle the load during backup and recovery operations

  • To determine if backup files require defragmentation for improved performance

  • To evaluate the efficiency of data compression algorithms used during backup

  • To confirm that all files are being backed up without the need for incremental backups

  • To validate that the backup software is compatible with the latest OS updates

  • To guarantee that the data recovery processes are operational and the data is intact

Question 15 of 15

You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?

  • UAC

  • NTFS

  • Sudo

  • Windows Defender