CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
00:15:00

Free CompTIA A+ 220-1102 Practice Test

Prepare for the CompTIA A+ 220-1102 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Operating Systems
    • Security
    • Software Troubleshooting
    • Operational Procedures
Question 1 of 15

The security manager at Crucial Technologies wants to help mitigate the possibility of someone being able to access another user’s account by gaining access to the user’s password. What logical security technology should be implemented to satisfy this requirement?

  • Encryption

  • MFA

  • WPA2

  • Password complexity rules

Question 2 of 15

You are troubleshooting a service failing to start on a Windows 10 laptop. You have already confirmed the service is configured to start using msconfig. You suspect the application is crashing after being started, where could you look to find a log of errors or crashes?

  • logc.sys

  • This info is also in msconfig

  • eventvwr.msc

  • taskmgr.exe

Question 3 of 15

You are assisting a user in trying to find a file in their C:\Users folder. You see that some of the folders appear differently than the others, appearing to be faded in, rather than full color. What do these icons refer to?

  • Cached folders.

  • Hidden Folders.

  • Folders currently backing up.

  • Deleted items still utilizing resources.

Question 4 of 15

An employee reports that their PC is behaving erratically with frequent popup ads and programs starting automatically, which they suspect is due to malware. You decide to perform a malware scan. Before running your anti-malware software, which step is essential to improve the chances of detection and removal of the malware?

  • Boot the system into safe mode and then run a complete system scan.

  • Reboot the system normally and proceed to scan immediately on startup.

  • Create a new user account with administrative privileges and run the scan from there.

  • Run a disk cleanup utility before scanning to remove any temporary files created by the malware.

Question 5 of 15

In a small office/home office (SOHO) environment, the network administrator is configuring the office wireless router to secure the network against external threats. Which of the following actions would BEST increase the security of the network?

  • Disabling UPnP on the router

  • Changing the router's service set identifier (SSID)

  • Setting up port forwarding/mapping to unspecified services

  • Disabling SSID broadcast

Question 6 of 15

Windows 10 Professional allows users to connect to and manage file servers in a domain environment.

  • True

  • False

Question 7 of 15

Where can you find most applications installed on OSX and macOS?

  • C:\Program Files (x86)

  • /usr/bin

  • /Applications

  • C:\Program Files

Question 8 of 15

What is the command-line tool that will display a list of a directory's files and subdirectories on Microsoft Windows?

Question 9 of 15

What Windows command allows users to shutdown a local or remote computer?

Question 10 of 15

What is the 4th step of the seven-step malware removal process?

  • Enable System Restore and create a restore point (if Windows OS)

  • Quarantine the infected system

  • Remediate the infected systems

  • Update the Operating System and primary applications

Question 11 of 15

A technician needs to provide assistance to a remote client who is not very technologically savvy. The client requires a software installation and some configuration changes. Which remote access technology would BEST suit this scenario, ensuring ease of use for the client and allowing the technician to perform the necessary tasks?

  • Secure Shell (SSH)

  • Virtual Private Network (VPN)

  • Virtual Network Computer (VNC)

  • Microsoft Remote Assistance (MSRA)

Question 12 of 15

A company has multiple branches across different time zones. An upcoming critical system update requires simultaneous execution to maintain data integrity. What is the BEST approach to determine the date and time for this update to minimize business impact?

  • Identify a time window where all branches are in their off-peak hours, accommodating every location's low-activity period despite the time zone differences.

  • Schedule the update based on when individual branches report the least amount of user activity, even if this means updates occur at different local times.

  • Determine a time when the majority, but not necessarily all, branches experience low activity, accepting potential minor disruptions.

  • Schedule the update during the headquarter's non-business hours, which takes precedence over other locations.

Question 13 of 15

Which Windows command tool is used for copying files and directories with advanced options like preserving file attributes, copying subdirectories, and allowing for the copying of files only if they are newer than the destination files?

Question 14 of 15

A healthcare clinic uses IoT wearables to monitor patients' vital signs remotely. The IT department is tasked with ensuring the security of patient data collected by these devices. Which of the following actions is MOST effective in preventing unauthorized access to the stored health data on these IoT wearables?

  • Regularly change the Wi-Fi password of the network the wearables connect to.

  • Encrypt the data on the wearables.

  • Disable unnecessary services and features on the IoT devices.

  • Implement a firewall on the network to which the wearables connect.

Question 15 of 15

Which type of regulated data includes information such as diagnoses, treatments, and billing information related to an individual's health and medical records?

  • Credit card transactions

  • Personal government-issued information

  • PII

  • Healthcare data