Prepare for the CompTIA A+ 220-1102 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
What backup strategy is being used if subsequent backups only contain data that has changed since the previous backup?
Differential
Synthetic
Incremental
Full
Incremental backups are a type of backup strategy that involves only backing up data that has changed since the last back. This strategy has the advantages of requiring less storage space and being quicker.
A small law firm with five employees is using Windows 10 Professional on all of their computers and desires to facilitate simple file sharing amongst them without setting up a dedicated server. Which type of network setup should they utilize to allow the sharing of resources such as files and printers directly between the computers?
Homegroup
Public network
Domain
Workgroup
In a workgroup, each computer operates independently and resources like files and printers can be shared without the need for a centralized management system or dedicated server. This setup is suitable for small networks, typically in a home or small office setting. A domain setup, on the other hand, requires a centralized domain controller and is more suitable for larger organizations where centralized management is necessary. The mention of 'without a dedicated server' in the question points to a workgroup as the correct choice because a domain requires a server.
True or false:
WEP is a strong security protocol that should be used to secure wireless networks
False
True
Wired Equivalent Privacy (WEP) is a deprecated wireless security standard. It has been superseded by WPA and WPA2 which are stronger more secure options (WPA2 should be used when possible). A number of successful attacks exist to gain access to WEP based wireless networks.
Wired Equivalent Privacy (WEP) was a severely flawed security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely used, and was often the first security choice presented to users by router configuration tools.Subsequent to a 2001 disclosure of a severe design flaw in the algorithm, WEP was never again secure in practice. In the vast majority of cases, Wi-Fi hardware devices relying on WEP security could not be upgraded to secure operation. Some of the design flaws were addressed in WEP2, but WEP2 also proved insecure, and another generation of hardware could not be upgraded to secure operation. In 2003, the Wi-Fi Alliance announced that WEP and WEP2 had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 have been deprecated. WPA retained some design characteristics of WEP that remained problematic. WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard, which was available for 802.11g devices. However, some 802.11b devices were later provided with firmware or software updates to enable WPA, and newer devices had it built in.
Wired_Equivalent_Privacy - Wikipedia, the free encyclopediaIn the context of multi-factor authentication, which option IS an example of inherence?
Smartphone
Facial recognition
One time pin code
Unique Account ID
Inherence, also known as "something a user is" or "something you are" refers to some sort of unique trait about a user. Examples are facial recognition, fingerprints, retina scans, etc.
Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password. A third-party authenticator (TPA) app enables two-factor authentication, usually by showing a randomly generated and frequently changing code to use for authentication.
Multi-factor_authentication - Wikipedia, the free encyclopediaA corporation is issuing tablets to its sales team for use at client sites and wants to ensure sensitive data is protected in case of device loss or theft. As part of the security profile for these devices, which feature should be configured to best prevent unauthorized access to data?
Implement strong device encryption
Configure remote backup applications
Enforce screen locks with a 4-digit PIN
Install locator applications to track lost devices
Configuring a strong device encryption policy is vital in protecting the sensitive data on the tablets in case they are lost or stolen. Encryption ensures that the data cannot be accessed without proper authentication, even if an unauthorized person performs a factory reset on the device. Screen locks, while necessary, can be bypassed and do not protect the data if the device storage is accessed by other means. Locator applications are useful in finding lost devices but do not protect the data if the device cannot be recovered. Remote backup applications are essential for data preservation but do not prevent data access on the lost or stolen device itself.
What is the primary role of the RTC in a computer system?
The RTC ensures accurate timekeeping even when the computer is powered off.
The RTC controls graphics rendering on the computer display.
The RTC manages network connectivity for real-time data transfer.
The RTC regulates the speed of the computer's central processing unit (CPU).
The Real-Time Clock (RTC) ensures the computer is able to keep time even when powered off, typically using a small battery like the CMOS battery.
A real-time clock (RTC) is an electronic device (most often in the form of an integrated circuit) that measures the passage of time. Although the term often refers to the devices in personal computers, servers and embedded systems, RTCs are present in almost any electronic device which needs to keep accurate time of day.
Real-time_clock - Wikipedia, the free encyclopediaWhat command should be used to print two files file1.txt
and file2.txt
to the console on a Linux server? The files should be written in order using a single command.
cat file1.txt file2.txt
On Linux the cat
command is used to output the contents of files and is a helpful utility when scripting or when trying to view files. You can pass in multiple files at a time by separated them with a space.
Employees at the company you work for are given Android phones to be used for company business. All the applications they need are pre-installed and no further applications are authorized. Which file extension needs to be blocked to restrict installing more applications?
IPA
APK
EXE
TXT
An Android Package (APK) is an application file format used for the installation of applications on Android based operating systems.
The Android Package with the file extension apk is the file format used by the Android operating system, and a number of other Android-based operating systems for distribution and installation of mobile apps, mobile games and middleware. A file using this format can be built from source code written in either Java or Kotlin. APK files can be generated and signed from Android App Bundles.
Apk_(file_format) - Wikipedia, the free encyclopediaWhen troubleshooting common Windows OS problems what simple step will fix a majority of issues without having to alter the system?
Reboot
Restore
Roll back updates
Reimage
Performing a reboot is a simple common troubleshooting step used to fix a myriad of Windows issues that doesn’t require modifying the system in any way.
In computing, rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Reboots can be either a cold reboot (alternatively known as a hard reboot) in which the power to the system is physically turned off and back on again (causing an initial boot of the machine); or a warm reboot (or soft reboot) in which the system restarts while still powered up. The term restart (as a system command) is used to refer to a reboot when the operating system closes all programs and finalizes all pending input and output operations before initiating a soft reboot.
Reboot - Wikipedia, the free encyclopediaDuring a busy day at the help desk, you receive a call from an agitated user who is unable to access critical company data. While they're describing their problem in a rushed and technical manner, what is the most effective way to ensure you are understanding their issue and providing quality support?
Assure the user that you understand and can handle the problem without needing to take notes.
Immediately offer a solution based on your initial assessment to quickly resolve the call.
Interrupt the user to quickly steer the conversation towards a standard troubleshooting procedure.
Take detailed notes and clarify by repeating back the main points of the problem to the customer.
The best approach when interacting with a customer is to actively listen and take notes, which allows for accurately capturing the details of the problem and provides a point of reference for future steps. This practice avoids interruptions that might further agitate the customer and ensures you have a clear understanding of the issue being reported.
A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?
DLP
Smart card
Certificate
Software token
A smart card is a small plastic card much like a credit card with an integrated circuit that can be used to authenticate a user.
A smart card (SC), chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. Many smart cards include a pattern of metal contacts to electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can provide personal identification, authentication, data storage, and application processing. Applications include identification, financial, public transit, computer security, schools, and healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within organizations. Numerous nations have deployed smart cards throughout their populations. The universal integrated circuit card (UICC) for mobile phones, installed as pluggable SIM card or embedded eSIM, is also a type of smart card. As of 2015, 10.5 billion smart card IC chips are manufactured annually, including 5.44 billion SIM card IC chips.
Smart_card - Wikipedia, the free encyclopediaWhich item commonly found in the workplace contains regulatory compliance requirements that must be adhered to in order to ensure proper handling and disposal of materials?
Incident Reports
Network Topology Diagram
End-user Termination Checklist
Material Safety Data Sheet (MSDS)
A Material Safety Data Sheet (MSDS), now more commonly referred to as a Safety Data Sheet (SDS) under the Globally Harmonized System (GHS), contains information on the properties of each chemical substance or mixture, including instructions for safe use and potential hazards associated with that chemical. This is essential for regulatory compliance in terms of handling, storage, and disposal of substances. Incorrect options such as 'Incident reports' and 'End-user termination checklists' do not typically contain regulatory compliance requirements for materials handling and disposal, as they serve different purposes within an organization.
The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:
Phishing
Shredding
Tailgating
Spamming
Tailgaiting is when an unauthorized person "tails" an authorized person through a secured entryway without the authorized person's knowledge.
In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.To describe the act of an unauthorized person who follows someone to a restricted area without the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car tailgating another vehicle on a road), while "piggybacking" usually implies consent of the authorized person.Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in airport security. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets, were successful. Piggybacking was revealed, as one of the methods that was used in order to enter off-limits areas.
Piggybacking_(security) - Wikipedia, the free encyclopediaA customer reports that their workstation has become extremely slow and they suspect it might be infected with malware. You have scheduled a maintenance session and are going to use a set of tools to diagnose and address the issue. Besides running an antivirus scan, which one of the following options is a recommended method in ensuring further protection against malware?
Restore the workstation from a known good backup before performing any scans.
Disable the antivirus software temporarily to eliminate potential conflicts.
Completely reinstall the operating system to guarantee the removal of any infections.
Ensure the antivirus definitions are up to date before proceeding with a full system scan.
Ensuring the antivirus definitions are up to date is critical because new malware variants are constantly being created, and up-to-date definitions are required to identify and remove them. Running a scan without updated definitions might not catch the latest threats. Restoring to a known good backup does not prevent future infections and might reintroduce the same malware if the backup is compromised. Disabling the antivirus might be performed during troubleshooting but is not a preventive measure. Completely reinstalling the operating system would eliminate current malware but does not prevent future infections and is an extreme measure that should only be taken if all other options fail.
A user calls the help desk with an issue that is above what the help desk can fix. The issue is then moved to a more advanced tech who can fix the problem. This is an example of what?
Description of problems
Categories
Escalation levels
Severity
Escalation levels are the different levels of support within an IT service department. The help desk is usually the first to place contacted about an issue. If the help desk is unable to resolve the issue, it is then “escalated” to the next level (also called a tier).
Looks like thats it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features