🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

1 day, 2 hours remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Free CompTIA A+ 220-1102 Practice Test

Prepare for the CompTIA A+ 220-1102 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Operational Procedures
    • Operating Systems
    • Security
    • Software Troubleshooting
Question 1 of 15

During a company orientation, the presenter is explaining the dos and don'ts regarding company equipment and network use. Which policy would most likely be enforced through the guidelines presented in the AUP?

  • Prohibiting the installation of any programs without clearance from the appropriate department

  • Adhering to confidentiality when accessing files on the network

  • Mandating punctuality for login times on the network

  • Requiring specific attire while using company-owned devices

Question 2 of 15

The Local Security Policy on a Windows 10 system can be used to define which applications are allowed or disallowed to run on that machine.

  • True

  • False

Question 3 of 15

A user has called the help desk where you work stating they cannot find a file on their PC. After asking a few basic questions you have determined they are using Mac OSX. Which standard OSX application can help them locate their file?

  • Searcher

  • Alfred

  • Spotlight

  • Find my Mac

Question 4 of 15

What Windows command would output the following text:

Reply from 172.67.158.193: bytes=32 time=19ms TTL=54
Reply from 172.67.158.193: bytes=32 time=21ms TTL=54
Reply from 172.67.158.193: bytes=32 time=25ms TTL=54
Reply from 172.67.158.193: bytes=32 time=19ms TTL=54
  • ping

  • pathping

  • echo

  • ipconfig

Question 5 of 15

What Windows command can you use display the version and build number of the operating system currently running on your computer?

Question 6 of 15

Which part of the change management process involves evaluating how the change will affect the company if the change is made?

  • Request forms

  • Purpose of the change

  • Scope of the change

  • Risk analysis

Question 7 of 15

A technician is setting up a new workstation in an area where high static electricity is a concern. Which of the following is the BEST way to protect the equipment from electrostatic discharge?

  • Store the equipment in antistatic bags when not in use.

  • Use non-conductive tools while working on the equipment.

  • Place the equipment on an ESD mat that is grounded.

  • Wear a wrist strap without attaching it to a grounded surface.

  • Keep the equipment in an area with a high humidity level to prevent static build-up.

Question 8 of 15

A corporation is issuing tablets to its sales team for use at client sites and wants to ensure sensitive data is protected in case of device loss or theft. As part of the security profile for these devices, which feature should be configured to best prevent unauthorized access to data?

  • Enforce screen locks with a 4-digit PIN

  • Configure remote backup applications

  • Install locator applications to track lost devices

  • Implement strong device encryption

Question 9 of 15

You are a desktop technician for a public school district. Your supervisor has asked you to write a script that will configure the wireless adapters on student's Linux based laptops to connect only to an authorized access point. Assuming the access point's MAC Address is 00:0D:9D:C6:38:2D, which command will help you achieve this?

  • iptables /netfilter auth-only 00:0D:9D:C6:38:2D

  • ifconfig eth0:0 00:0D:9D:C6:38:2D

  • ethtools -lock 00:0D:9D:C6:38:2D

  • iwconfig ap 00:0D:9D:C6:38:2D

Question 10 of 15

During an emergency maintenance window, a network administrator must access the configuration interface on a core switch within an isolated VLAN that is inaccessible via the company's main network. The administrator is at a remote site. Which remote access method should be used to securely and directly manage the network device?

  • Virtual network computer (VNC)

  • Secure Shell (SSH)

  • Remote monitoring and management (RMM) tools

  • Microsoft Remote Assistance (MSRA)

  • VPN

  • RDP

Question 11 of 15

When dealing with a customer who is upset about a recurring problem with their device, what is the best approach to take?

  • Clarify customer statements

  • Argue back to reassure the customer you are right

  • Immediately offer a refund without further discussion

  • Tell the customer that the problem is not a big issue

Question 12 of 15

Which statement is true regarding hardware and software tokens?

  • Hardware tokens are a cheaper alternative to software tokens

  • Software tokens should be used for testing purposes only. Real end-users should use hardware tokens.

  • Software tokens are a cheaper alternative to hardware tokens

  • Software tokens are less secure and have been superseded by hardware tokens

Question 13 of 15

As an IT security manager, you've been asked to improve measures to prevent 'tailgating' at your company's secure data center entrance. Which of the following would most effectively deter this type of security breach where an unauthorized person follows an authorized individual into a restricted area?

  • Implementing an access control vestibule with two-factor authentication on both sets of doors

  • Placing a turnstile at the entrance that allows entry after badge scanning

  • Installing a sign that warns against the practice of tailgating

  • Deploying additional video surveillance cameras at the entrance

Question 14 of 15

A technician is writing a script intended to automatically gather inventory data from workstations across the company network. The script will run monthly and compile information such as system specifications, installed software, and peripheral devices. Which of the following scripting capabilities is the MOST appropriate to use for this task?

  • Windows Command Script (.bat)

  • JavaScript (.js)

  • Visual Basic Script (.vbs)

  • Windows PowerShell (.ps1)

Question 15 of 15

In Microsoft Windows 10, which account type has the ability to fully control the system and access all files and settings without restrictions?

  • Guest

  • Power User

  • Administrator

  • Root

  • Standard User