CompTIA A+ CORE 2 220-1102 Practice Exams
7 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the technology with the description. Some descriptions will not have a match.

EULA = Software can be used on one computer and one copy can be stored for backup purposes PII = A database includes all client first names, last names, and home addresses GFS = A backup series consists of monthly, weekly, and daily backup data. AUP = The proper use of computers, tablets, and other devices is part of the employee handbook.

Match the commands to the description. Some descriptions will not have a match.

dir = List the contents of a Windows directory gpupdate = Process changes made in Group Policy diskpart = List the volume names on a storage drive hostname = Identify the name of a database server chkdsk = Repair logical file system errors cd = Change to a different working directory winver = View the "About Windows" dialog

A system administrator is installing a new server into the metal racks in a data center. During the installation process, the administrator can feel a faint tingling sensation when mounting the server. Which of the following safety systems should be tested and verified FIRST?

  • Equipment grounding (correct)
  • Air filtration
  • Cable management
  • Waste disposal regulations

A user has opened a help desk ticket regarding the battery life on their mobile phone. The battery in the phone held a charge for most of the day prior to connecting to the corporate network. The battery now only lasts about half a day and the back of the phone is warmer than usual. The phone is configured as follows: Storage: 216.2 GB of 512 GB used Display and Brightness: Automatic Wi-Fi: Enabled Auto-lock: Disabled VPN: Not connected Low Power Mode: Disabled Battery Maximum Capacity: 100% Which of the following changes would have the BEST impact on battery performance?

<p>Enable auto-lock (D)</p> Signup and view all the answers

A user in the accounting department has received this error message: “The print spooler service is not running.” The user contacts the help desk and opens a ticket for assistance. The help desk technician performs some testing and identifies the issue. Which of these would be the best NEXT step?

<p>Restart the spooler service (D)</p> Signup and view all the answers

A student would like to prevent the theft of their laptop while studying at the library. Which of the following security methods would be the BEST choice to protect this laptop?

<p>Cable lock (D)</p> Signup and view all the answers

Rodney, a desktop technician, is cleaning the outside of computers used on a manufacturing assembly line. The assembly line creates sawdust and wood chips, so most of the computers are protected with enclosed computer cases. Which of the following would be the MOST important item for Rodney to include during this cleaning process?

<p>Face mask (B)</p> Signup and view all the answers

Flashcards

Tingling sensation while mounting a server

A faint tingling sensation felt when mounting a new server in a data center, indicating a potential electrical safety issue.

Equipment Grounding

A procedure for ensuring electrical safety in a facility, including grounding and properly installed power systems.

Air filtration

A filter that removes dust and particles from the air, protecting users from inhaling them during cleaning or repairs.

Cable management

The process of organizing and securing cables to avoid tripping hazards or clutter.

Signup and view all the flashcards

Waste disposal regulations

Regulations regarding the proper disposal of materials and components used in computer systems.

Signup and view all the flashcards

Auto-lock

A mobile phone feature that automatically locks the screen after a set period of inactivity, conserving battery life.

Signup and view all the flashcards

VPN

A mechanism in a mobile phone that allows external connections.

Signup and view all the flashcards

Low Power Mode

A feature on a mobile phone that reduces power consumption by limiting certain functions.

Signup and view all the flashcards

Battery Maximum Capacity

The percentage of the phone's original battery capacity that is still functional.

Signup and view all the flashcards

Print spooler service

The service responsible for managing print jobs and sending them to printers.

Signup and view all the flashcards

Printer Driver

A software component that enables a computer to communicate with a specific printer.

Signup and view all the flashcards

Biometrics

A security method that uses biometric data like fingerprints or facial recognition to authenticate users.

Signup and view all the flashcards

USB token

A small, portable device that plugs into a computer's USB port and provides an additional layer of security.

Signup and view all the flashcards

Cable lock

A physical lock that attaches to a device and secures it to a stationary object.

Signup and view all the flashcards

Face mask

A type of face mask used to protect a technician from inhaling harmful dust or particles.

Signup and view all the flashcards

ESD mat

A tool that utilizes electric current for preventing buildup of static electricity, safeguarding sensitive electronics.

Signup and view all the flashcards

AirDrop

The process of enabling communication between devices on a local network, allowing file sharing or printing.

Signup and view all the flashcards

Carbon dioxide extinguisher

A fire suppression agent used to extinguish fires by absorbing heat and creating a barrier.

Signup and view all the flashcards

BitLocker

A security feature that encrypts all the data on a storage drive, protecting it from unauthorized access.

Signup and view all the flashcards

PII

Any data that could be used to identify an individual, like a person's name, address, phone number, or email.

Signup and view all the flashcards

GFS (Grandfather, Father, Son) backup

A backup strategy that uses multiple backup intervals to protect data, including daily, weekly, and monthly backups.

Signup and view all the flashcards

Multi-factor authentication

A security feature that ensures only authorized users can access a connected device.

Signup and view all the flashcards

Acceptable use policy (AUP)

A security policy outlining the proper and authorized use of devices and software within an organization.

Signup and view all the flashcards

UAC (User Account Control)

A Windows setting that controls the level of user interaction required before an application can make changes to the system.

Signup and view all the flashcards

Surge suppressor

A device that protects connected equipment from voltage spikes and surges, preventing damage caused by sudden power fluctuations.

Signup and view all the flashcards

Maximum RAM support for 32-bit OS

The maximum amount of RAM that a 32-bit operating system can address, limited by the addressing scheme.

Signup and view all the flashcards

Event Viewer

A Windows tool that records events and warnings about the operating system, providing insight into system issues and errors.

Signup and view all the flashcards

Spyware

A type of malware that attempts to acquire sensitive information without the user's knowledge or consent.

Signup and view all the flashcards

Rootkit

A type of malware that can hide deeply in a computer's operating system, making it extremely difficult to detect and remove.

Signup and view all the flashcards

Botnet

A network of infected computers controlled by a single attacker, often used for malicious purposes.

Signup and view all the flashcards

Trojan

A malicious program that takes control of a computer, potentially using its resources for tasks without user awareness.

Signup and view all the flashcards

Ransomware

A malicious program that encrypts a user's files and demands a ransom payment for decryption.

Signup and view all the flashcards

nano

A command line utility in Linux for creating or editing plain-text files.

Signup and view all the flashcards

sfc (System File Checker)

A Windows utility used to scan and potentially repair errors in the operating system's file system.

Signup and view all the flashcards

Boot sector virus

A type of malware infection that primarily targets the operating system's boot sector, potentially disrupting the system's startup process.

Signup and view all the flashcards

Keylogger

A type of malware that records user keystrokes, potentially capturing sensitive information.

Signup and view all the flashcards

MSDS (Material Safety Data Sheet)

A standard method for providing information about hazardous materials, including composition, risks, and safety precautions.

Signup and view all the flashcards

EULA (End User License Agreement)

A legal agreement that defines the terms and conditions for using software.

Signup and view all the flashcards

BAT (Batch) file

A file format commonly used for batch files, containing a series of commands executed in sequence.

Signup and view all the flashcards

System Restore

A Windows feature that allows users to easily undo changes to their computer's configuration, effectively restoring to a previous state.

Signup and view all the flashcards

Trojan

A type of malware designed to mimic legitimate software, often used to steal credentials or personal data.

Signup and view all the flashcards

Tailgating

The act of gaining unauthorized access to secured areas by closely following an authorized individual.

Signup and view all the flashcards

On-path attack

An attack that exploits a communication path between a user's computer and a server.

Signup and view all the flashcards

Adware

A software application that displays unwanted pop-up advertisements, often bundled with other free software

Signup and view all the flashcards

Topology diagram

A graphical representation of a network's layout, including devices and connections.

Signup and view all the flashcards

apt-get

A command line utility in Linux that helps manage updates and installations of software.

Signup and view all the flashcards

Factory reset

An action that removes all user data and settings from a system, effectively restoring it to a factory-fresh state.

Signup and view all the flashcards

In-place upgrade

A type of software installation that replaces a previous version of Windows with a new one, while retaining user files and settings.

Signup and view all the flashcards

Clean install

A method of installing a new operating system on a computer, typically using installation media or a bootable USB drive.

Signup and view all the flashcards

Configuration management system

A system or software used to manage and track the configuration of a network's devices

Signup and view all the flashcards

MAC filtering

A security measure that restricts access to a network or specific devices based on the source MAC address.

Signup and view all the flashcards

USB key Installation

A method of installing a new operating system on a computer by utilizing a bootable environment, typically from a USB drive.

Signup and view all the flashcards

Power Options

A feature that controls the computer's power management settings, determining its behavior when the lid is closed.

Signup and view all the flashcards

RADIUS (Remote Authentication Dial-In User Service)

A security measure that helps control access to a network based on the user's identity and privileges.

Signup and view all the flashcards

TACACS (Terminal Access Controller Access Control System)

A security protocol that provides authentication and authorization for network access using a centralized database.

Signup and view all the flashcards

UPnP (Universal Plug and Play)

A protocol designed to improve interoperatability between devices on a network.

Signup and view all the flashcards

WPA3

A security technology that uses encryption to protect wireless network traffic.

Signup and view all the flashcards

TKIP (Temporal Key Integrity Protocol)

A technology that uses encryption to protect wireless network traffic.

Signup and view all the flashcards

Kerberos

A security protocol used for authentication and authorization in Microsoft Active Directory.

Signup and view all the flashcards

Repair Installation

A process for creating a new operating system installation on a computer without losing user data.

Signup and view all the flashcards

Least privilege

A security practice that grants users only the minimum privileges necessary to perform their tasks.

Signup and view all the flashcards

Rollback plan

A process for planning how to restore a network or system to a previous working state after a failure.

Signup and view all the flashcards

Change control application

A tool that manages and controls changes to systems or networks, ensuring controlled and documented modifications.

Signup and view all the flashcards

End-user Acceptance

A step in a project deployment process where users confirm the implementation satisfies their requirements.

Signup and view all the flashcards

Performance Monitor

A software application that tracks and analyzes system performance, providing information about usage patterns and potential bottlenecks.

Signup and view all the flashcards

Study Notes

CompTIA A+ CORE 2 220-1102 Practice Exams

  • This book provides practice exams for the CompTIA A+ Core 2 220-1102 certification.
  • The exams are designed to mirror the format and complexity of the actual exam.
  • Three 90-question practice exams (Exam A, B, and C) are included.
  • Each exam features performance-based questions and multiple-choice questions.
  • Quick answer pages and detailed answer pages are provided.
  • Detailed answer pages include explanations for each answer.
  • Video links are available for further information on each topic.
  • A scoring chart is provided to assess performance.
  • The book details the 220-1102 exam domains and their percentage breakdown: Domain 1.0 - Operating Systems (31%), Domain 2.0 - Security (25%), Domain 3.0 - Software Troubleshooting (22%), Domain 4.0 - Operational Procedures (22%).

About the Author

  • James "Professor" Messer is the founder and CEO of Messer Studios, LLC.
  • He has extensive experience in IT, including supercomputer operations, system administration, network management, and cybersecurity.
  • He has published training materials for IT certification exams, with over 140 million videos viewed and 640,000 subscribers.

How to Use This Book

  • Take one practice exam at a time.
  • Use the timer for each practice exam (90 minutes).
  • Use the "Quick Answer" or "The Details" links to review answers.
  • Write the answers to each question on a separate sheet.
  • Grade your answers against the quick answer page to determine correct/incorrect answers.
  • Use the detailed answer pages for additional information on incorrect answers.
  • The video links provide additional context for each topic.
  • Use the scoring chart to determine areas where you may need additional help.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz features practice exams designed for the CompTIA A+ Core 2 220-1102 certification. It includes three 90-question exams that reflect the actual exam's format and complexity, complete with performance-based and multiple-choice questions. Detailed answer explanations and scoring charts assist in evaluating your performance.

More Like This

Use Quizgecko on...
Browser
Browser