Scroll down to see your responses and detailed results
Prepare for the CompTIA A+ 220-1102 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
Which acronym best describes patient data stores in a hospital's database?
PHI
PII
PPP
PCI
Hospital Patient data is generally going to fall into the PHI or Personal Health Information category. PCI or Payment Card Industry data refers to payment information (such as a credit card number) and PII refers to any personally identifiable information that doesn't fall into the PCI or PHI categories, like a user's name and address.
Protected health information (PHI) under U.S. law is any information about health status, provision of health care, or payment for health care that is created or collected by a Covered Entity (or a Business Associate of a Covered Entity), and can be linked to a specific individual. This is interpreted rather broadly and includes any part of a patient's medical record or payment history. Instead of being anonymized, PHI is often sought out in datasets for de-identification before researchers share the dataset publicly. Researchers remove individually identifiable PHI from a dataset to preserve privacy for research participants. There are many forms of PHI, with the most common being physical storage in the form of paper-based personal health records (PHR). Other types of PHI include electronic health records, wearable technology, and mobile applications. In recent years, there has been a growing number of concerns regarding the safety and privacy of PHI.
Protected_health_information - Wikipedia, the free encyclopediaA technician is troubleshooting a customer's smartphone that has no Internet connectivity. The technician has already confirmed the customer's cellular data plan is active and has sufficient data. What troubleshooting step should the technician take next?
Verify the cellular network is turned on and active
Check for service outages in the area
Restart the phone
Turn on Airplane mode, then turn it off
The technician should make sure that the cellular network is turned on and active. If the cellular network is disabled or inactive the phone will not be able to connect to the internet. It is important to ensure the cellular network is working correctly. Turning on Airplane mode will turn off all cellular and network connectivity, while restarting the phone will not impact network functionality. Checking for service outages will not address if the cellular data is turned on.
Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?
The file name becomes case insensitive
All file permissions must be reassigned
All of the file permissions are lost
The file owner is preserved
A department head complains that whenever they log onto their Windows 10 workstation, their user environment appears to reset to default settings, and recently modified documents are missing from their desktop. You identify the issue as a corrupt user profile. To resolve this without losing the user's data, what is the best next step?
Run disk error-checking utility to find and repair any file system errors that could be causing the profile corruption.
Perform disk cleanup and then instruct the user to log off and log back in to reset the profile settings.
Backup the user’s profile folder to another location, rename the original user’s profile folder and ask the user to log in to recreate the profile, and then restore necessary files from the backup.
Delete the user's profile folder and create a new user account to completely start over with a fresh profile.
Creating a backup of the user's profile before performing any profile rebuild process is essential to prevent data loss. After backing up, the technician should rename the corrupted profile directory and instruct the user to log in, prompting Windows to generate a new profile. Upon successful login, the technician can transfer necessary files from the backup to the new profile. While creating a new account is a possible solution, it does not address the issue with the least disruption. Disk cleanup might improve system performance but won't fix a corrupted profile. Disk error-checking doesn't address the profile issue at the OS level.
A VNC connection can be secured using encryption protocols to prevent unauthorized interception of data between the remote and host machines.
False
True
A correct understanding of remote access security is important for IT professionals. VNC can use encryption protocols to secure the connection, though it does not by default. The use of encryption prevents data from being easily intercepted by unauthorized third parties during transmission, which is especially important over unsecured or public networks.
A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?
Issues with the DHCP configuration or service
The WPA2 key entered for the Wi-Fi network is incorrect
The device is connected to the wrong SSID
The subnet mask is configured incorrectly on the device
The most common reason for a device to connect to Wi-Fi but not have Internet access is due to issues with DHCP. This could be because the device did not obtain an IP address correctly, or the DHCP server is not functioning properly. Checking the DHCP settings and ensuring the device is properly receiving an IP address is a critical step in diagnosing connectivity issues. SSID mismatch refers to the device trying to connect to the wrong network, which would prevent connection entirely. If the subnet mask is incorrect, the device might still get access to the local network but have issues reaching other networks, though it's a less likely scenario. Incorrect WPA2 key would prevent the device from connecting to the Wi-Fi network in the first place, not from accessing the Internet after connecting to the Wi-Fi.
As an administrator for Crucial Technologies you commonly have to run a set of commands using Windows Command Prompt (CMD). You don’t want to continue to have to type each command out individually so you would like to create a script to make the process more automated. What file extension would you use when creating the script?
vbs
sh
bat
ps1
A .bat file is the file extension when creating scripts for use with Windows Command Prompt. sh is a common extension for Bash/Linux scripts and ps1 is for PowerShell and not Command Prompt.
A batch file is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file. A batch file may contain any command the interpreter accepts interactively and use constructs that enable conditional branching and looping within the batch file, such as IF, FOR, and GOTO labels. The term "batch" is from batch processing, meaning "non-interactive execution", though a batch file might not process a batch of multiple data. Similar to Job Control Language (JCL), DCL and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a script to automate them. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Unix-like operating systems, such as Linux, have a similar, but more flexible, type of file called a shell script.The filename extension .bat is used in DOS and Windows. Windows NT and OS/2 also added .cmd. Batch files for other environments may have different extensions, e.g., .btm in 4DOS, 4OS2 and 4NT related shells. The detailed handling of batch files has changed significantly between versions. Some of the detail in this article applies to all batch files, while other details apply only to certain versions.
Batch_file - Wikipedia, the free encyclopediaYour company has recently decommissioned a large number of hard drives and intends to give the devices to a recycling company. Before doing so, the company wants to ensure that all sensitive data on the drives is irretrievably destroyed to comply with data protection regulations. What is the most appropriate method for securing the data before giving the disks to a 3rd party?
Degaussing the hard drives to disrupt the stored data
Performing a low-level formatting to prepare the hard drives for new data
Physically destroying the hard drives by drilling
Conducting a standard formatting of the hard drives
Degaussing is an appropriate method for securing data on hard drives before disposal or recycling. It uses a high-powered magnet to disrupt the magnetic domain where the data is stored, rendering the data unrecoverable. This is a common practice in situations where hard drives contain sensitive information that must be irretrievably destroyed.
What is the primary purpose of using the command-line utility 'robocopy' on a Windows system?
To utilize the Robotic Process Automation (RPA) features of Windows 11 Enterprise
Robocopy is a Linux/Unix command and not a Windows command
To rename a batch of files within a directory
To check the integrity and location of files on the system
To defragment the hard drive
To copy files and directories from one location to another with advanced options
The correct answer is 'To copy files and directories from one location to another with advanced options'. Robocopy, short for 'Robust File Copy', is designed to handle file replication with several options like copying file permissions, attributes, and mirroring directory structures, which makes it more capable than simple copy commands.
You work as an End User Support Technician for a large enterprise. An employee you are not familiar with has repeatedly complained their tablet is "too slow" and "freezes constantly". After several attempts to find an issue you have not determined a cause or been able to replicate the problem. What should you say next?
Please come back later with your manager
This laptop seems to be a sufficient speed to me
Can you tell me more about the issue and describe what you are doing when it occurs?
The device is working as expected
Customers can be difficult to deal with, whenever possible you should not dismiss them. Chances are this customer is having an issue under specific conditions you haven't been able to replicate. Getting more information from them will help you troubleshoot the issue.
Which option is a full drive encryption solution provided with Microsoft Windows?
VeraCrypt
TrueCrypt
FUSE
Bitlocker
BitLocker is a full drive encryption solution provided with Microsoft Windows operating systems. TrueCrypt and VeraCrypt are third party encryption solutions and do not come with Windows.
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard (AES) algorithm in cipher block chaining (CBC) or "xor–encrypt–xor (XEX)-based Tweaked codebook mode with ciphertext Stealing" (XTS) mode with a 128-bit or 256-bit key. CBC is not used over the whole disk; it is applied to each individual sector.
BitLocker - Wikipedia, the free encyclopediaYou have just purchased a new wireless router for your home. You first login to the admin console and start configuring the setting. From a security perspective, what is the first thing you should do?
Change default passwords
Disabling SSID broadcast
IP filtering
Content filtering
When you get any new piece of equipment, best practice should be to change default passwords. There is a possibility that these are standard passwords that are easily located online.
Where a device needs a username and/or password to log in, a default password is usually provided to access the device during its initial setup, or after resetting to factory defaults. Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, expecting users to change the password during configuration. The default username and password are usually found in the instruction manual (common for all devices) or on the device itself.Default passwords are one of the major contributing factors to large-scale compromises of home routers. Leaving such a password on devices available to the public is a major security risk.Some devices (such as wireless routers) will have unique default router usernames and passwords printed on a sticker, which is more secure than a common default password. Some vendors will however derive the password from the device's MAC address using a known algorithm, in which case the password can also be easily reproduced by attackers.
Default_password - Wikipedia, the free encyclopediaA school's IT department needs to manage a fleet of Chromebook devices used by students. Which feature should be utilized to centrally control user access, enforce security policies, and install applications?
Chrome Remote Desktop
Google Workspace
Chrome Enterprise Upgrade
CloudReady
Chrome Enterprise Upgrade, formerly known as Chromebook Management Console, allows IT administrators to manage Chromebook fleets centrally. It provides comprehensive control over user access, the ability to enforce security policies, and install or block apps. The incorrect options do not offer the same centralized management features for Chrome OS devices. While Google Workspace provides productivity tools and services, it doesn't offer the detailed device management capabilities required. CloudReady is a way to install a version of Chrome OS on non-Chromebook hardware, and it doesn't offer centralized management. Chrome Remote Desktop is a tool for remotely accessing computers, not for managing them.
Which of the following terms describes a folder's permissions defaulting to match the permissions of it's parent's folder?
Inheritance
Provisioning
Permission Propagation
SSO
Inheritance is when an computer object, like a file or folder inherits settings from it's parent. For example, if a user does not have read access to a folder, they also cannot read any files or sub folders of that directory.
A system exhibiting sluggish performance must always be diagnosed with failing hardware components as the primary cause.
True
False
Sluggish performance can be caused by multiple factors, not limited to failing hardware. It could be due to software issues, lack of resources, or even malware. Hence, assuming hardware failure is the primary cause without ruling out other possibilities would be incorrect. A thorough diagnostics routine should include checking for software conflicts, resource utilization, and malware infections before concluding that hardware is at fault.
Looks like that's it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features