CompTIA A+ Certification (220-1102) with complete accurate questions and answers ( 2025-2026 latest release )

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Which will accomplish a specific task for a user?

A.) Driver

B.) Application

C.) Operating System

D.) Filesystem

B.) Application

2
New cards

Which operating system is a cloud-based operating system?

A.) Linux

B.) Android

C.) Windows 10

D.) Chrome OS

D.) Chrome OS

3
New cards

Which term defines the precompiled instructions that are programmed and allows an operating system and its applications to operate?

A.) Shell

B.) Source

C.) GUI (graphical user interface)

D.) Multithreading

B.) Source

4
New cards

Which term best describes the Android operating system?

A.) Server

B.) Workstation

C.) Mobile

D.) Cloud-based

C.) Mobile

5
New cards

You need to change a computers name and join it to a domain. Which tool will allow you to perform these actions.?

A.) Device Manager

B.) User Accounts

C.) System Properties

D.) Credential Manager

C.) System Properties (SYSDM.CPL)

6
New cards

Which tab in Task Manager allows you to see processes separated by each user on the system?

A.) Processes

B.) Performance

C.) App History

D.) Users

D.) Users

7
New cards

Which RAID system requires three or more disks to provide fault tolerance?

A.) Mirroring

B.) Striping

C.) RAID-1

D.) Striping with parity

D.) Striping with parity (RAID-5)

8
New cards

Which Windows Update branch allows you to install preview releases of updates for Windows 10?

A.) Semi-Annual Channel

B.) Semi-Annual Channel (Targeted)

C.) Long-Term Servicing Channel

D.) Insider Program

D.) Insider Program

9
New cards

Which tool allows you to ready the operating system for imaging?

A.) Microsoft Deployment Toolkit

B.) Windows Assessment & Deployment Kit

C.) sysprep.exe

D.) Windows Imaging

C.) sysprep.exe

10
New cards

Which element of the boot process holds the information that instructs the operating system to load from a specific partition?

A.) winload.exe

B.) BOOTMGR

C.) winresume.exe

D.) BCD (Boot Configuration Data)

D.) BCD (Boot Configuration Data)

11
New cards

You need to configure a static IP address for Windows 10. Which of the following allows you to perform this task?

A.) The Network & Sharing Center

B.) Windows Defender Firewall

C.) The Network & Internet settings screen

D.) The VPN settings screen

C.) The Network & Internet Settings Screen

12
New cards

Which filesystem performs on-the-fly defragmentation?

A.) FAT

B.) NTFS

C.) ext4

D.) FAT32

C.) ext4

13
New cards

Which place can you find updates for Apple operating systems?

A.) iTunes

B.) App Store

C.) Keychain

D.) Mission Control

B.) App Store

14
New cards

Which macOS feature is similar to Windows File Explorer?

A.) Keychain

B.) iCloud

C.) Spotlight

D.) Finder

D.) Finder

15
New cards

Your system log files report an ongoing attempt to gain access to a single account. This attempt has been unsuccessful to this point. What type of attack are you most likely experiencing?

A.) Password-guessing attack

B.) Rootkit attack

C.) Worm attack

D.) TCP/IP hijacking

A.) Password-guessing attack

16
New cards

One of the Vice Presidents of the company calls a meeting with the information technology department after a recent trip to competitors' sites. They report that many of the companies they visited granted access to their buildings only after fingerprint scans, and the VP wants similar technology employed at this company. Of the following, which technology relies on a physical attribute of the user for authentication?

A.) Smartcard

B.) Biometrics

C.) Geofencing

D.) Tokens

B.) Biometrics

17
New cards

What type of malware is able to conceal itself from many parts of the operating system and will obtain/retain elevated privleges?

A.) Worm

B.) Trojan

C.) Rootkit

D.) Botnet

C.) Rootkit

18
New cards

A user wants to ensure that all contacts from their mobile device are copied onto their computer before migrating to a new device. Which of the following processes can accomplish this?

A.) Mirroring

B.) Synchronization

C.) Calling each contact

D.) Attaching the contacts to an email

B.) Synchronization

19
New cards

With which mobile filesystem are files with .ipa file extensions typically associated?

A.) Android

B.) iOS

C.) Windows 10

D.) Blackberry OS

B.) iOS

20
New cards

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation?

A.) Rename default accounts

B.) Configure single sign-on

C.) Disable Windows Update

D.) Disable Action Center pop-ups.

A.) Rename default accounts

21
New cards

You need to protect files on the desktop operating system with encryption but find out you do not have a TPM. What can you use to protect the files?

A.) A BitLocker

B.) Encrypted File System

C.) BitLocker to Go

D.) Full-drive encryption

B.) Encrypted File System

22
New cards

Which is a benefit of setup of a device with a Microsoft account?

A.) Access to the online store

B.) Automatic synchronization of OneDrive

C.) Active Directory Authentication

D.) Offline Authentication

B.) Automatic synchronization of OneDrive

23
New cards

Which critical system generally requires third-party tools to troubleshoot performance problems?

A.) RAM

B.) CPU

C.) Graphics

D.) Network

C.) Graphics

24
New cards

What is the last step that should be performed when removing malware?

A.) Investigate and verify symptoms

B.) Enable System Protection

C.) Educate the end user

D.) Schedule scans and run updates

C.) Educate the end user

25
New cards

Your mobile device is suffering from an intermittent wireless connection. What is recommended to alleviate signal drops?

A.) Shortening the SSID

B.) Using the 5 GHz band

C.) Reducing power on the WAP

D.) Using the 2.4 GHz band

B.) Using the 5 GHz band

26
New cards

You are receiving USB controller resource warning messages. What should you try to resolve the issue?

A.) Move USB devices around on the USB ports.

B.) Manually allot more endpoints

C.) Upgrade drivers for the USB devices.

D.) Manually increase the output amperage.

A.) Move USB devices around on the USB ports

27
New cards

Why is time drift a big problem on virtual machines?

A.) Lack of configuration for the NTP server

B.) Availability of the NTP server

C.) Shared physical RTC

D.) Emulated RTC (Real-Time Communications)

D.) Emulated RTC (Real-Time Communications)

28
New cards

Which tool can be used to restart a failed service?

A.) msconfig.exe

B.) WinRE

C.) Computer Management MMC (Microsoft Management Console)

D.) Resource Monitor

C.) Computer Management MMC (Microsoft Management Console)

29
New cards

Which is a safety risk from overheating a lithium-ion battery?

A.) Reduced voltage

B.) Shock

C.) Explosion

D.) Shutdown

C.) Explosion

30
New cards

Which of these are not generally attributed to an intermittent wireless issue?

A.) Bluetooth Devices

B.) Microwave ovens

C.) WAPS (Wireless Access Points)

D.) Radar

C.) WAPS (Wireless Access Points)

31
New cards

You are trying to troubleshoot a problem with AirDrop. You have verified that both participants are within range and both Bluetooth and Wi-Fi are turned on. What could the problem be?

A.) AirDrop is configured for direct connection.

B.) The sender is not in the recipient's contact list.

C.) The sender is in the blocked AirDrop list on the recipient's phone.

D.) The phones are connected to the same SSID.

B.) The sender is not in the recipient's contact list.

32
New cards

Which network protocol and port does RDP operate on?

A.) TCP port 3389

B.) TCP port 22

C.) TCP port 23

D.) TCP port 443

A.) TCP port 3389

33
New cards

Which line would be used to comment Windows batch script code?

A.) //comment

B.) ' comment

C.) REM comment

D.) # comment

C.) REM Comment

34
New cards

Which command will launch the Remote Desktop Connection utility?

A.) msra.exe

B.) mstsc.exe

C.) quickassist.exe

D.) ssh.exe

B.) mstsc.exe

35
New cards

A client computer connects to the main office and is configured with an IP address from the main office, on the client computer. What is being described?

A.) Site-to-site VPN

B.) Remote Desktop Connection

C.) SSH Connection

D.) Host-to-site VPN

D.) Host-to-site VPN

36
New cards

Zoom and Teams are classic examples of which of the following?

A.) Screen-sharing software

B.) Video-conferencing software

C.) File transfer software

D.) Desktop management software

B.) Video-conferencing software

37
New cards

Which remote access technology is used for encrypted console based access?

A.) MSRA

B.) RDP

C.) Telenet

D.) SSH

D.) SSH (Secure Shell Utility)

38
New cards

Which of the following are good measures to take to help prevent ESD? (choose two)

A.) Decrease the humidity.

B.) Tie Long hair back.

C.) Take your shoes off.

D.) Perform self-grounding.

B.) Tie long hair back

D.) Perform self-grounding

39
New cards

Which of the following screwdrivers has a splined head?

A.) Flat-tipped

B.) Phillips

C.) Axial

D.) Torx

D.) Torx

40
New cards

What type of software licensing agreement usually provides free trial software, with the expectation that you will pay for it if you decide to keep it?

A.) Freeware

B.) Shareware

C.) Open Source

D.) Single User

B.) Shareware

41
New cards

How do antistatic mats and wrist straps drain the potential ESD (electro-static discharge)?

A.) The use of magnets

B.) Through the resistor

C.) High-voltage probe

D.) Direct ground

B.) Through the resistor

42
New cards

When cleaning dust out of computer equipment, what should you always use?

A.) Multimeter

B.) Flashlight

C.) Air filter mask

D.) Mirror

C.) Air filter mask

43
New cards

Which is the most likely source of interference to wireless communications?

A.) Magnets

B.) ESD

C.) Surges

D.) Microwave ovens

D.) Microwave ovens

44
New cards

While working on a user's system, you discover a sticky note attached to the bottom of the keyboard that has their username and password written on it. The user is not around, and you need to verify that the network connection is working. What should you do?

A.) Log in, verify access, and log out.

B.) Log in and stay logged in when you are finished.

C.) Text the user.

D.) Log in and change the user's password.

C.) Text the user

45
New cards

While installing a new network card, you accidentally broke a component off the card. What should you do?

A.) Explain that the card was broken out of the box.

B.) Install the card anyway.

C.) Inform the customer of the situation.

D.) Leave everything as is until you can locate a new card.

C.) Inform the customer of the situation

46
New cards

Which regulation is enforced by the Health & Human Services (HHS) that regulates the privacy of patient information related to health services?

A.) SOX

B.) FERPA

C.) HIPAA (Health Insurance Portability and Accountability Act)

D.) GLBA

C.) HIPAA (Health Insurance Portability and Accountability Act)

47
New cards

Which ticket entry method is the easiest for end users to submit their own tickets?

A.) Email entry

B.) Portal entry

C.) Manual entry

D.) Application entry

A.) Email Entry

48
New cards

What is typically used for protecting data center equipment during a power outage?

A.) Line interactive UPS (uninterruptible power supply)

B.) Surge protector

C.) Standby UPS (uninterruptible power supply)

D.) Online UPS (uninterruptible power supply)

D.) Online UPS (uninterruptible power supply)

49
New cards

Which method is used to test a change in an isolated environment?

A.) Primary plan

B.) Backout plan

C.) Sandbox testing

D.) Technical evaluation

C.) Sandbox testing

50
New cards

Which backup method can create a new current full backup from the files already contained on the backup media?

A.) Synthetic

B.) Copy

C.) Incremental

D.) Differential

A.) Synthetic