Scroll down to see your responses and detailed results
Prepare for the CompTIA A+ 220-1102 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
When setting up a workstation in a company that handles sensitive customer data, which of the following is the BEST action to ensure compliance with government regulations?
Implementing a strong password policy for workstation access.
Ensuring only services necessary for workstation operation are running.
Encrypting all sensitive data stored on the workstation.
Applying an air filtration mask when servicing the workstation.
Applying an air filtration mask is essential for personal safety but does not relate to data handling regulations. Ensuring only necessary services are running on the system might improve security, but it is not a direct compliance requirement. Encrypting all sensitive data on the workstation is the best action to ensure compliance with government regulations for data protection, as most government regulations require encryption of sensitive data to prevent unauthorized access in the event of a data breach. Lastly, creating a strong password policy is important for security but does not directly relate to compliance with regulations specific to data handling practices.
AI Generated Content may display inaccurate information, always double-check anything important.
A technician needs to display all active connections and listening ports on a Windows computer, including the associated executable. Which command should they use to obtain this information?
netstat -o
netstat -b
netstat -r
netstat -a
The command netstat -b
is used to display all active connections and listening ports along with the executable involved in creating each connection. This option provides detailed information that can be used for monitoring and troubleshooting network issues. By contrast, -a
shows all active connections and listening ports without the executable information, -o
displays active connections with their process IDs but without the executable name, and -r
shows the routing table rather than specific connection details.
AI Generated Content may display inaccurate information, always double-check anything important.
What security protocol provides the best security for a WiFi network?
MAC3
SHA256
WPA2
WEP
WiFi Protected Access 2 is the best option in the list. MAC3 and SHA256 are not wireless security protocols. WEP is a wireless security protocol but can easily be broken using modern attacks and should not be used.
AI Generated Content may display inaccurate information, always double-check anything important.
Your company has developed a new accounting application that they would like to deploy on their Windows-based desktops. During the planning stage, it has been noted the application requires a 64-bit operating system to function properly. A number of desktops in the organization are still running a 32-bit version of Windows. As an IT technician, what is the most appropriate course of action to ensure application compatibility?
Install the application anyway and use compatibility mode for 32-bit programs.
Apply the latest Windows updates to the 32-bit systems to enable support for 64-bit applications.
Increase the RAM in the 32-bit systems to meet the application's memory requirements.
Upgrade the 32-bit Windows systems to a 64-bit version that is compatible with the new application.
The application requires a 64-bit operating system to function, meaning it cannot run on a 32-bit version of Windows due to architectural differences in the operating systems. Installing a 32-bit application on a 64-bit OS is commonly possible due to backward compatibility features, but the reverse is not viable. Thus, the systems running a 32-bit version of Windows would need to be upgraded to a 64-bit version of Windows to run the application.
AI Generated Content may display inaccurate information, always double-check anything important.
An application is opening itself on multiple server and desktop PCs on your employer's network. The application is named Antispyware Remover 2020™ and offers to remove infected malware for a price of $99 per infected operating system. The application is very persistent and pop-ups frequently with flashing colors. What term best describes this scenario?
Hijacked Spyware Network Attack (HSNA)
Antivirus license escalation
Rogue antivirus
Antiviral Spoofing Attack
Some malware, known as Rogue antivirus or Rogue security software, will pretend to be antivirus software in an attempt to trick users into paying a fee to remove malware. Most likely it will just install more malicious software or do nothing (after charging the user of course).
AI Generated Content may display inaccurate information, always double-check anything important.
A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?
The subnet mask is configured incorrectly on the device
The device is connected to the wrong SSID
Issues with the DHCP configuration or service
The WPA2 key entered for the Wi-Fi network is incorrect
The most common reason for a device to connect to Wi-Fi but not have Internet access is due to issues with DHCP. This could be because the device did not obtain an IP address correctly, or the DHCP server is not functioning properly. Checking the DHCP settings and ensuring the device is properly receiving an IP address is a critical step in diagnosing connectivity issues. SSID mismatch refers to the device trying to connect to the wrong network, which would prevent connection entirely. If the subnet mask is incorrect, the device might still get access to the local network but have issues reaching other networks, though it's a less likely scenario. Incorrect WPA2 key would prevent the device from connecting to the Wi-Fi network in the first place, not from accessing the Internet after connecting to the Wi-Fi.
AI Generated Content may display inaccurate information, always double-check anything important.
You work for a grocery store in the IT department. To ensure stores can operate during internet or network outages there are several servers running in each location. What device could be used to ensure the server are not physically accessible to store employees?
Entry control list
Server lock
Smart card
Lock screen
A server lock can be used to lock away sensitive servers and network devices. Typically this comes in the form of a server rack with a locking door. This is a common security measure to prevent unauthorized physical access to servers if they are in a shared datacenter or location where unauthorized users could have access.
AI Generated Content may display inaccurate information, always double-check anything important.
An employee within a company wishes to use a software package for creating diagrams and flowcharts, which he has personally purchased for home use. The company's IT policy requires software to be properly licensed for corporate use. What is the BEST course of action to remain compliant with licensing regulations?
Install the software on multiple office computers until the company decides to purchase bulk licenses.
Ask the employee only to use the software after hours to avoid interference with corporate policy.
Use the employee's personal license at the office, since it is already paid for.
Obtain a corporate use license for the software to be used within the company.
The correct answer involves understanding the difference between personal use licenses and corporate use licenses. Personal use licenses are typically meant for non-commercial, individual use and do not extend to business or enterprise environments. Therefore, even if an employee has a personal license for a software, it cannot be legally used for corporate purposes without obtaining the appropriate corporate license. The other options attempt to sidestep proper licensing protocols, which could lead to legal issues and non-compliance with software licensing agreements.
AI Generated Content may display inaccurate information, always double-check anything important.
What is application spoofing in the context of mobile device security?
A type of malware that targets mobile devices.
A malicious app that disguises itself as a legitimate app.
A legitimate app that has been compromised by a hacker.
A type of encryption used to secure mobile apps.
Application spoofing is a type of attack where a malicious app disguises itself as a legitimate app, often to gain access to sensitive information or to trick users into installing malware. This can be done by using a similar icon, name, or description to a legitimate app, making it difficult for users to distinguish between the two. Understanding what application spoofing is, is crucial in troubleshooting mobile OS and application security issues.
AI Generated Content may display inaccurate information, always double-check anything important.
A user reports that their computer has been running slowly and they have noticed unfamiliar pop-ups appearing on their screen. Which of the following is the most likely cause of these issues?
A misconfigured firewall
A hardware failure
Malware infection
An outdated operating system
Malware infections often manifest as performance issues and the appearance of unwanted pop-ups or advertisements. The pop-ups are often disguised as legitimate programs or warnings to trick users.
AI Generated Content may display inaccurate information, always double-check anything important.
During an emergency maintenance window, a network administrator must access the configuration interface on a core switch within an isolated VLAN that is inaccessible via the company's main network. The administrator is at a remote site. Which remote access method should be used to securely and directly manage the network device?
Microsoft Remote Assistance (MSRA)
VPN
Virtual network computer (VNC)
RDP
Secure Shell (SSH)
Remote monitoring and management (RMM) tools
Secure Shell (SSH) is the correct response as it provides a secure channel over an unsecured network, allowing a user to log into another computer over a network, execute commands in a remote machine, and move files from one machine to another. It ensures secure data communication and remote command-line, login, and remote command execution. VPN could potentially allow access to the isolated VLAN if it's configured correctly, but it's more about providing access to the network, not managing devices, and it wouldn’t be a direct access method. RMM is designed for managing systems but lacking direct, low-level access to a network device. The use of RDP and other remote desktop tools is not standard for network device management and would not be applicable for a core switch. VNC operates similarly to RDP and is also not intended for low-level network device management.
AI Generated Content may display inaccurate information, always double-check anything important.
You are assisting a customer with troubleshooting a technical issue. The customer has a strong accent and a name that you find hard to pronounce. What is the BEST way to address the customer to ensure cultural sensitivity and professionalism?
Use a generic term like 'sir' or 'madam' to address the customer.
Ask the customer politely how to pronounce their name and use the correct pronunciation.
Avoid addressing the customer by their name to prevent mispronunciation.
Guess the pronunciation of the customer's name based on how it looks.
Correctly addressing a customer by their preferred name or title is crucial for demonstrating respect and cultural sensitivity. Asking for the correct pronunciation and using it shows that you value their identity. This approach fosters a positive interaction and avoids the potential for misunderstandings or disrespect.
AI Generated Content may display inaccurate information, always double-check anything important.
What is used by HTTPS to verify the authenticity of the server as well as provide encryption for the HTTP protocol?
MD5 hash
PKIP
SHA256 hash
A certificate
Certificates are used in HTTPS and many other protocols to certify the authenticity of a server (or both the server and client in some cases) and when encrypting data.
AI Generated Content may display inaccurate information, always double-check anything important.
In the context of business continuity, why is it important for IT professionals to perform regular backup testing?
To check that the network can handle the load during backup and recovery operations
To determine if backup files require defragmentation for improved performance
To evaluate the efficiency of data compression algorithms used during backup
To confirm that all files are being backed up without the need for incremental backups
To validate that the backup software is compatible with the latest OS updates
To guarantee that the data recovery processes are operational and the data is intact
Performing regular backup testing is important to verify that the recovery procedure is functional and the data integrity is maintained. This ensures that in the event of data loss, corruption, or a disaster scenario, the organization is capable of performing a successful data recovery. Regular testing helps identify issues with the backup configuration or procedure that might prevent data restoration. It also familiarizes the IT staff with the restoration process, which effectively reduces the downtime during an actual recovery operation. The other options are misleading: backup testing is not directly related to license management, backup volume, or bandwidth optimization.
AI Generated Content may display inaccurate information, always double-check anything important.
You are concerned about users installing unauthorized software and making unauthorized changes to their Windows 8 workstations. Which tool is best for limiting this type of behavior?
UAC
NTFS
Sudo
Windows Defender
User Account Control (UAC) is a feature in Windows 7, 8 and 10 that prompts users to confirm changes initiated by software. Until the changes are confirmed by UAC the change will not be made. This helps users understand when they are making system level changes like installing a new application. Sudo is a similar feature in Linux operating systems. NTFS is a file system and Windows Defender is an anti-malware application.
AI Generated Content may display inaccurate information, always double-check anything important.
Looks like that's it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features