CompTIA A+ 220-802 Certification Exam Question (21-30)

A user has not received any new emails on their smartphone in the last two days. The user is able to access the Internet without any problems. Which of the following should the user do FIRST?

A.    Restart the smartphone
B.    Reconfigure the smartphone email account
C.    Resynchronize the smart phone
D.    Update the operating system

Answer: A

A technician needs to format a file system to be compatible with the WIDEST range of operating systems. Which of the following file systems should be used?

A.    NTFS
B.    FAT16
C.    CDFS
D.    FAT32

Answer: D

For any given 802.11n wireless Internet signal, which of the following is needed to establish a connection?

A.    MAC address filtering
B.    Windows password
C.    Proper SSID
D.    SSL certificate

Answer: C

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?

A.    The parent folder has explicit Allow rights set for this user.
B.    The parent folder has explicit Deny rights set for this user.
C.    The user forgot to share the parent folder and only shared the specific file.
D.    The parent folder likely has the "archive" attribute enabled.

Answer: B

A company is experiencing issues with third parties tailgating authorized users during entry to secure server rooms. Which of the following would BEST alleviate this problem?

A.    Retinal scanners
B.    Mantraps
C.    Door locks
D.    Smart card badges

Answer: B

A consultant is looking to consolidate six company servers onto one physical system. Which of the following requirements is MOST important on the new setup to ensure stable functionality of the virtual environment?

A.    Client hardware requirements
B.    Server software security requirements
C.    Server hardware resources
D.    Network resources

Answer: C

Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job function?

A.    Deny all
B.    Allow all
C.    Most privilege
D.    Least privilege

Answer: D

A technician is trying to diagnose a laptop that is experiencing heavy artifact corruption and random loss of video during operation. Which of the following are MOST likely causes of this
problem? (Select TWO).

A.    Integrated system video chip is failing and/or near death.
B.    Video drivers were not installed directly from Microsoft update.
C.    Incompatible or untested video drivers have been installed.
D.    The BIOS is not set for the proper operation temperature of the video chipset.
E.    The BIOS is underclocking the video card’s operating speed.

Answer: AC

A user reports that every time they use a search engine and click on a link to go to a website, they instead are taken to a site blocked by their company’s content filter. The user is not trying to go to the blocked site and needs to be able to successfully use the search engine to complete their assignment. Which of the following tools would a technician use to BEST resolve this issue?

A.    Anti-malware software
B.    Factory pre-installation
C.    System restore
D.    Recovery console

Answer: A

After being infected with a virus, a user’s computer does not recognize the user as having local administrator rights to the computer. After troubleshooting the issue, a technician determines the computer needs to be rebuilt and data needs to be restored from the user’s backup. Which of the following tools would BEST reset the computer to how it worked when first purchased?

A.    Recovery Console
B.    Factory restore CD
C.    Anti-malware software
D.    System Restore

Answer: B


Comments are closed.