CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA A+ 220-1102 Practice Test

Prepare for the CompTIA A+ 220-1102 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)
  • Included Objectives:
    • Software Troubleshooting
    • Operating Systems
    • Security
    • Operational Procedures

What backup strategy is being used if subsequent backups only contain data that has changed since the previous backup?

  • Differential

  • Synthetic

  • Incremental

  • Full

A small law firm with five employees is using Windows 10 Professional on all of their computers and desires to facilitate simple file sharing amongst them without setting up a dedicated server. Which type of network setup should they utilize to allow the sharing of resources such as files and printers directly between the computers?

  • Homegroup

  • Public network

  • Domain

  • Workgroup

True or false:

WEP is a strong security protocol that should be used to secure wireless networks

  • False

  • True

In the context of multi-factor authentication, which option IS an example of inherence?

  • Smartphone

  • Facial recognition

  • One time pin code

  • Unique Account ID

A corporation is issuing tablets to its sales team for use at client sites and wants to ensure sensitive data is protected in case of device loss or theft. As part of the security profile for these devices, which feature should be configured to best prevent unauthorized access to data?

  • Implement strong device encryption

  • Configure remote backup applications

  • Enforce screen locks with a 4-digit PIN

  • Install locator applications to track lost devices

What is the primary role of the RTC in a computer system?

  • The RTC ensures accurate timekeeping even when the computer is powered off.

  • The RTC controls graphics rendering on the computer display.

  • The RTC manages network connectivity for real-time data transfer.

  • The RTC regulates the speed of the computer's central processing unit (CPU).

What command should be used to print two files file1.txt and file2.txt to the console on a Linux server? The files should be written in order using a single command.

Employees at the company you work for are given Android phones to be used for company business. All the applications they need are pre-installed and no further applications are authorized. Which file extension needs to be blocked to restrict installing more applications?

  • IPA

  • APK

  • EXE

  • TXT

When troubleshooting common Windows OS problems what simple step will fix a majority of issues without having to alter the system?

  • Reboot

  • Restore

  • Roll back updates

  • Reimage

During a busy day at the help desk, you receive a call from an agitated user who is unable to access critical company data. While they're describing their problem in a rushed and technical manner, what is the most effective way to ensure you are understanding their issue and providing quality support?

  • Assure the user that you understand and can handle the problem without needing to take notes.

  • Immediately offer a solution based on your initial assessment to quickly resolve the call.

  • Interrupt the user to quickly steer the conversation towards a standard troubleshooting procedure.

  • Take detailed notes and clarify by repeating back the main points of the problem to the customer.

A user has called the help desk you work at describing a broken keyboard. They state their keyboard has special slot they insert a credit card like device into which allows them to log into their PC. What type of device are they referring to?

  • DLP

  • Smart card

  • Certificate

  • Software token

Which item commonly found in the workplace contains regulatory compliance requirements that must be adhered to in order to ensure proper handling and disposal of materials?

  • Incident Reports

  • Network Topology Diagram

  • End-user Termination Checklist

  • Material Safety Data Sheet (MSDS)

The practice of following an authorized person through an entrance without using a badge or token to defeat security is called:

  • Phishing

  • Shredding

  • Tailgating

  • Spamming

A customer reports that their workstation has become extremely slow and they suspect it might be infected with malware. You have scheduled a maintenance session and are going to use a set of tools to diagnose and address the issue. Besides running an antivirus scan, which one of the following options is a recommended method in ensuring further protection against malware?

  • Restore the workstation from a known good backup before performing any scans.

  • Disable the antivirus software temporarily to eliminate potential conflicts.

  • Completely reinstall the operating system to guarantee the removal of any infections.

  • Ensure the antivirus definitions are up to date before proceeding with a full system scan.

A user calls the help desk with an issue that is above what the help desk can fix. The issue is then moved to a more advanced tech who can fix the problem. This is an example of what?

  • Description of problems

  • Categories

  • Escalation levels

  • Severity



Remaining Time 00:15:00