00:15:00

Free CompTIA A+ 220-1102 Practice Test

Prepare for the CompTIA A+ 220-1102 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures
Question 1 of 15

Which acronym best describes patient data stores in a hospital's database?

  • PHI

  • PII

  • PPP

  • PCI

Question 2 of 15

A technician is troubleshooting a customer's smartphone that has no Internet connectivity. The technician has already confirmed the customer's cellular data plan is active and has sufficient data. What troubleshooting step should the technician take next?

  • Verify the cellular network is turned on and active

  • Check for service outages in the area

  • Restart the phone

  • Turn on Airplane mode, then turn it off

Question 3 of 15

Which of the following is true about a file when it is copied from an NTFS to a FAT32 partitions?

  • The file name becomes case insensitive

  • All file permissions must be reassigned

  • All of the file permissions are lost

  • The file owner is preserved

Question 4 of 15

A department head complains that whenever they log onto their Windows 10 workstation, their user environment appears to reset to default settings, and recently modified documents are missing from their desktop. You identify the issue as a corrupt user profile. To resolve this without losing the user's data, what is the best next step?

  • Run disk error-checking utility to find and repair any file system errors that could be causing the profile corruption.

  • Perform disk cleanup and then instruct the user to log off and log back in to reset the profile settings.

  • Backup the user’s profile folder to another location, rename the original user’s profile folder and ask the user to log in to recreate the profile, and then restore necessary files from the backup.

  • Delete the user's profile folder and create a new user account to completely start over with a fresh profile.

Question 5 of 15

A VNC connection can be secured using encryption protocols to prevent unauthorized interception of data between the remote and host machines.

  • False

  • True

Question 6 of 15

A user's smartphone is experiencing an issue where it can connect to Wi-Fi networks but has no Internet access. What is MOST likely the cause of this problem?

  • Issues with the DHCP configuration or service

  • The WPA2 key entered for the Wi-Fi network is incorrect

  • The device is connected to the wrong SSID

  • The subnet mask is configured incorrectly on the device

Question 7 of 15

As an administrator for Crucial Technologies you commonly have to run a set of commands using Windows Command Prompt (CMD). You don’t want to continue to have to type each command out individually so you would like to create a script to make the process more automated. What file extension would you use when creating the script?

  • vbs

  • sh

  • bat

  • ps1

Question 8 of 15

Your company has recently decommissioned a large number of hard drives and intends to give the devices to a recycling company. Before doing so, the company wants to ensure that all sensitive data on the drives is irretrievably destroyed to comply with data protection regulations. What is the most appropriate method for securing the data before giving the disks to a 3rd party?

  • Degaussing the hard drives to disrupt the stored data

  • Performing a low-level formatting to prepare the hard drives for new data

  • Physically destroying the hard drives by drilling

  • Conducting a standard formatting of the hard drives

Question 9 of 15

What is the primary purpose of using the command-line utility 'robocopy' on a Windows system?

  • To utilize the Robotic Process Automation (RPA) features of Windows 11 Enterprise

  • Robocopy is a Linux/Unix command and not a Windows command

  • To rename a batch of files within a directory

  • To check the integrity and location of files on the system

  • To defragment the hard drive

  • To copy files and directories from one location to another with advanced options

Question 10 of 15

You work as an End User Support Technician for a large enterprise. An employee you are not familiar with has repeatedly complained their tablet is "too slow" and "freezes constantly". After several attempts to find an issue you have not determined a cause or been able to replicate the problem. What should you say next?

  • Please come back later with your manager

  • This laptop seems to be a sufficient speed to me

  • Can you tell me more about the issue and describe what you are doing when it occurs?

  • The device is working as expected

Question 11 of 15

Which option is a full drive encryption solution provided with Microsoft Windows?

  • VeraCrypt

  • TrueCrypt

  • FUSE

  • Bitlocker

Question 12 of 15

You have just purchased a new wireless router for your home. You first login to the admin console and start configuring the setting. From a security perspective, what is the first thing you should do?

  • Change default passwords

  • Disabling SSID broadcast

  • IP filtering

  • Content filtering

Question 13 of 15

A school's IT department needs to manage a fleet of Chromebook devices used by students. Which feature should be utilized to centrally control user access, enforce security policies, and install applications?

  • Chrome Remote Desktop

  • Google Workspace

  • Chrome Enterprise Upgrade

  • CloudReady

Question 14 of 15

Which of the following terms describes a folder's permissions defaulting to match the permissions of it's parent's folder?

  • Inheritance

  • Provisioning

  • Permission Propagation

  • SSO

Question 15 of 15

A system exhibiting sluggish performance must always be diagnosed with failing hardware components as the primary cause.

  • True

  • False