Back to Simulator
CompTIA A+ 220-1102
0% Complete
0/0 Steps
-
FREE EXAM SIMULATORFree Exam Simulator1 Simulator
Time limit: 0
Simulator Summary
0 of 17 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Simulator complete. Results are being recorded.
Results
0 of 17 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- comptia a+ 2 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 17
1. Question
Your friend Steve expresses concern that in the event of his smartphone being stolen or misplaced, the sensitive information stored on the device may fall into the wrong hands. He seeks to implement measures to secure the device in such instances. Which of the following options would be the most effective method of securing the phone?
CorrectIncorrect -
Question 2 of 17
2. Question
Your smartphone has displayed a notification indicating that a new pair of Bluetooth devices, such as headphones, have connected to your device without your authorization. Which of the following security threats do you believe is being depicted in this scenario?
CorrectIncorrect -
Question 3 of 17
3. Question
It has been brought to your attention that several colleagues have reported experiencing a decrease in network speed while in the company’s kitchen. Conversely, it has been reported that usage of the Wi-Fi in the lobby area does not elicit the same issue. Despite the access point (AP) being equidistant from both the kitchen and the lobby, data speed in the kitchen is slower. In order to improve data speed in the kitchen, which of the following actions would you recommend to be taken?
CorrectIncorrect -
Question 4 of 17
4. Question
You are currently engaged in utilizing VMware products on your Mac OS system. Despite multiple attempts, you are encountering error messages when attempting to install Ubuntu 20.04 Focal Fossa on a virtual machine. Upon reviewing the VM’s specifications, you have noted that the VM has been configured with a hard drive space of 10GB, a 2GHz dual-core processor, and 4GB of RAM (system memory). In order to successfully install Ubuntu on the virtual machine, which of the following actions would you recommend to be taken?
CorrectIncorrect -
Question 5 of 17
5. Question
In the construction of a new MySQL database for the IT department’s payrolls, it has been determined that the data type of the primary key in the table will be stored as an integer. Which data type would you recommend to be utilized to store the employee’s name within the table?
CorrectIncorrect -
Question 6 of 17
6. Question
As an IT support specialist, you are tasked with ensuring the daily incremental backups of the Windows server are successfully completed and properly managed. You have been asked to set up a system that begins the backups daily at 5:00 AM and to notify your manager upon successful completion of the backups. Which of the following tools would you recommend to meet these requirements?
CorrectIncorrect -
Question 7 of 17
7. Question
In order to effectively monitor network switch port status, you are developing a Python automation script that will notify the network administrator in the event of a port failure. In terms of file type, which of the following options would be most suitable for this script?
CorrectIncorrect -
Question 8 of 17
8. Question
A new policy has been implemented for employee user accounts. This policy stipulates that access to company resources and functions is granted only on a need-to-know and need-to-use basis. As such, user accounts associated with specific job functions and tasks will be granted access to only the necessary resources and functions, such as a database user account having access to only the necessary records, while a developer user account has access to only the necessary codebase.
CorrectIncorrect -
Question 9 of 17
9. Question
Upon attempting to start the workstation running Windows, an error message “Missing Operating System” appears on the black screen. This issue arose after installing a new hard drive on the workstation. Which of the following actions should you perform NEXT to fix the issue?
CorrectIncorrect -
Question 10 of 17
10. Question
You may receive a message popping up on certain websites when using Microsoft IE that says “The security certificate has expired or is not yet valid“. Which of the following settings needs to be changed on your workstation to fix the error?
CorrectIncorrect -
Question 11 of 17
11. Question
Suppose you are currently in the
/usr/local/share
directory, type the command to switch to the/usr/local
directory (one level up from the current directory) using the terminal on your Linux workstation.
-
[email protected]:usr/local/share$
CorrectIncorrect -
-
Question 12 of 17
12. Question
You are tasked with changing the file ownership of the file
examsdigest.txt
to a new owner named Marie. Type the command to complete the task. (Assuming you are working in the Linux environment.)
-
$
CorrectIncorrect -
-
Question 13 of 17
13. Question
The email server for your organization, with an IP address of 1.2.3.4, is currently operational but not accessible. Type the command to determine the location at which packets are being halted, thus preventing users from accessing the email server. (Assuming you are working on a Windows environment.)
-
C:\>
CorrectIncorrect -
-
Question 14 of 17
14. Question
Drag and drop the type of malware into their respective places.
Sort elements
- Ransomware
- Trojan
- Keylogger
- Rootkit
-
Malware that encrypts a victim’s files
-
Malicious code that looks legitimate but can take control of your computer
-
Record the information you type into a website and send to back to a third party
-
Infect a target PC and allow an attacker to install a set of tools that grant remote access to the computer
CorrectIncorrect -
Question 15 of 17
15. Question
What does the command “dir /s” do in the Windows command prompt?
CorrectIncorrect -
Question 16 of 17
16. Question
In order to implement the updates for the antivirus on a remote workstation that is currently being accessed via RDP, a system restart is required. Execute the command to initiate a restart on the remote workstation.
-
C:\WINDOWS\system32\
CorrectIncorrect -
-
Question 17 of 17
17. Question
You are working on a Linux server and need to find all the occurrences of the word “error” in a log file called system.log. Execute the correct command to complete the task.
-
[email protected]:usr/local/share$
CorrectIncorrect -