CompTIA A+ 902 (1)

30 Questions | Total Attempts: 139

SettingsSettingsSettings
A Plus Certification Quizzes & Trivia

Questions and Answers
  • 1. 
    A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network? 
    • A. 

      SSH

    • B. 

      VPN

    • C. 

      SFTP

    • D. 

      RDP

  • 2. 
    A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options? 
    • A. 

      Compatibility view

    • B. 

      Manage add-ons

    • C. 

      Clear browser cache

    • D. 

      Pop-up blocker

  • 3. 
    A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).
    • A. 

      View the CMD process in Task Manager

    • B. 

      Type EXIT at the command prompt and press Enter

    • C. 

      Minimize the CMD box to the taskbar

    • D. 

      Click the “x” in the top right of the CMD window

    • E. 

      Select Switch User on the PC

  • 4. 
    An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step? 
    • A. 

      Ensure the user’s account is not locked out

    • B. 

      Use the fully qualified domain name of the share

    • C. 

      Open the location with administrator privileges

    • D. 

      Try mapping with a different drive letter

  • 5. 
    Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open? 
    • A. 

      Backup

    • B. 

      Recovery Image

    • C. 

      Chkdsk

    • D. 

      System Restore

  • 6. 
    A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings? 
    • A. 

      Advanced

    • B. 

      Security

    • C. 

      Privacy

    • D. 

      Connections

  • 7. 
    Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?
    • A. 

      File server

    • B. 

      Web server

    • C. 

      WINS server

    • D. 

      Proxy server

  • 8. 
    Which of the following best practices is used to fix a zero-day vulnerability on Linux?
    • A. 

      Scheduled backup

    • B. 

      Scheduled disk maintenance

    • C. 

      Patch management

    • D. 

      Antivirus update

  • 9. 
    Which of the following tools is used to type or paste recovery commands directly into a Linux box? 
    • A. 

      Shell/terminal

    • B. 

      Backup/time machine

    • C. 

      Command/cmd

    • D. 

      Restore/snapshot

  • 10. 
    A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?
    • A. 

      10 feet (3 meters)

    • B. 

      15 feet (5 meters)

    • C. 

      30 feet (9 meters)

    • D. 

      45 feet (14 meters)

  • 11. 
    A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications? 
    • A. 

      Microsoft Store

    • B. 

      DVD

    • C. 

      Google Play

    • D. 

      ITunes

  • 12. 
    A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?
    • A. 

      Hybrid

    • B. 

      Community

    • C. 

      Private

    • D. 

      Public

  • 13. 
    An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? 
    • A. 

      The cable connected to the network

    • B. 

      Virtual host network adapter

    • C. 

      USB host adapter

    • D. 

      The domain of the virtual machine

  • 14. 
    A Google account on an Android device by default will synchronize to which of the following locations? 
    • A. 

      Cloud

    • B. 

      SSD

    • C. 

      PC desktop

    • D. 

      MicroSD

  • 15. 
    How would a technician install Windows OS on a MAC OS computer without using third-party software?
    • A. 

      Terminal

    • B. 

      Boot Disk

    • C. 

      Disk Utility

    • D. 

      Boot Camp

  • 16. 
    A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this? 
    • A. 

      Google Drive

    • B. 

      ICloud

    • C. 

      One Drive

    • D. 

      FTP

  • 17. 
    Virtual machines provide users with the ability to do which of the following?
    • A. 

      Extend 32-bit machines to 64-bits

    • B. 

      Share hardware resources

    • C. 

      Increase the network download speed

    • D. 

      Use less memory in the machine

  • 18. 
    Which of the following features of a mobile device operates the touch screen?
    • A. 

      Gyroscope

    • B. 

      Digitizer

    • C. 

      Accelerometer

    • D. 

      Geotracking

  • 19. 
    A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information? 
    • A. 

      DHCP server

    • B. 

      DNS server

    • C. 

      File server

    • D. 

      Proxy server

  • 20. 
    A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE). 
    • A. 

      Free/busy

    • B. 

      Programs

    • C. 

      Documents

    • D. 

      Calendar

    • E. 

      Favorites

    • F. 

      Social media

    • G. 

      Contacts

  • 21. 
    A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications? 
    • A. 

      The workstation is victim of a denial of service attack

    • B. 

      The username is not authenticating on the network

    • C. 

      The username is not part of the local administrator group

    • D. 

      The administrator has not applied appropriate security patches

  • 22. 
    A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal? 
    • A. 

      VPN

    • B. 

      ACL

    • C. 

      RDP

    • D. 

      DLP

  • 23. 
    An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?
    • A. 

      The HIPS device is blocking the messages

    • B. 

      The access control list is blocking the messages

    • C. 

      The email filter has quarantined the messages

    • D. 

      The firewall is blocking the sender’s email address

  • 24. 
    A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?
    • A. 

      Enter all passwords they have used in the past

    • B. 

      Verify a smart card has been issued

    • C. 

      Check the network cable

    • D. 

      Reboot the computer

  • 25. 
    A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy? 
    • A. 

      Require biometric identification to log into the laptop.

    • B. 

      Require multifactor authentication to log into laptop.

    • C. 

      Require laptop hard drives to be encrypted.

    • D. 

      Require users to change their password at frequent intervals. 

    • E. 

      Require users to have strong passwords.

Related Topics
Back to Top Back to top