Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 1 out of 17 pages
Viewing questions 1-15 out of questions
Questions # 1:

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

Options:

A.

Network share


B.

Group Policy


C.

BitLocker


D.

Static IP


Expert Solution
Questions # 2:

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.


B.

Update the smartphone's OS.


C.

Reset the smartphone to factory settings.


D.

Reboot the smartphone.


Expert Solution
Questions # 3:

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

Options:

A.

Windows


B.

Chrome OS


C.

Android


D.

iOS


Expert Solution
Questions # 4:

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

Options:

A.

Investigate the firewall logs.


B.

Isolate the machine from the network.


C.

Inspect the Windows Event Viewer.


D.

Take a physical inventory of the device.


Expert Solution
Questions # 5:

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy


B.

Security protocols


C.

Data flow diagram


Expert Solution
Questions # 6:

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

Options:

A.

DHCP


B.

Firewall


C.

SSD


Expert Solution
Questions # 7:

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

Options:

A.

Full


B.

Incremental


C.

Differential


D.

Synthetic


Expert Solution
Questions # 8:

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

Options:

A.

Disconnect the call to avoid a confrontation.


B.

Wait until the customer is done speaking and offer assistance.


C.

Escalate the issue to a supervisor.


Expert Solution
Questions # 9:

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?

Options:

A.

nslookup


B.

tracert


C.

hostname


D.

gpresult


Expert Solution
Questions # 10:

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

Options:

A.

Reimage the computer.


B.

Replace the system RAM.


C.

Reinstall and update the failing software.


D.

Decrease the page file size.


Expert Solution
Questions # 11:

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?

Options:

A.

Respond to calls and text messages while on site but not when working directly with personnel.


B.

Respond to calls and text messages only from family.


C.

Respond to calls and text messages only when an emergency situation requires a response.


D.

Respond to calls and text messages discreetly while on site.


Expert Solution
Questions # 12:

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

Options:

A.

SSH


B.

VNC


C.

VPN


D.

RDP


Expert Solution
Questions # 13:

Which of the following does MFA provide?

Options:

A.

Security enhancement


B.

Encryption


C.

Digital signature


D.

Public key infrastructure


Expert Solution
Questions # 14:

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change


B.

Purpose of the change


C.

Change rollback plan


D.

Change risk analysis


Expert Solution
Questions # 15:

A technician is moving a Windows workstation from the accounting department to the sales department and needs to update the IP and gateway settings. Which of the following Control Panel utilities should the technician use?

Options:

A.

Programs and Features


B.

Network and Sharing Center


C.

User Accounts


D.

Device Manager


Expert Solution
Viewing page 1 out of 17 pages
Viewing questions 1-15 out of questions