CompTIA 220-1101 - CompTIA A+ Certification Exam: Core 1
An organization has some computers running macOS and some computers running Windows. The computers running macOS also need to run a piece of software that is only available on Windows. Which of the following BEST describes the solution for running Windows software on a computer running macOS?
A technician is configuring a workstation to be used as a VM host. After installing the necessary software, the technician is unable to create any VMs. Which of the following actions should be performed?
An online retailer would like to add capacity to support increased sales. Additional servers have been installed. Which of the following should be used to ensure each new server is being properly utilized?
A colleague has a laptop that has been working as expected for several years wall outlet. The MOST likely component that needs to be replaced is the:
A user contacts the help desk in reference to a failing thumbprint scanner. The user states the scanner was functioning correctly yesterday. Which of the following troubleshooting steps should be performed FIRST after the ticket has been filed?
A user submitted a ticket to report an issue with a new printer that is no longer accepting new print jobs. The technician verifies the printer is on and notices the printer LCD screen has the following error message:
Paper Jam, Jam in fuser.
Which of the following is the MOST efficient next step the technician should complete?
A technician is setting up a device to use two-factor authentication. Which of the following meets this requirement?
A user reports that printed receipts have black smudges over the entire image. The text is still present but is very dark and sometimes illegible. Which of the following are the MOST likely cause and solution for the printer issue?
A user visits the desk to report that a smartphone takes more than a day to fully charge. The user has already tested multiple wall outlets and swapped the charging cable, but the results are the same. Which of the following should the technician do FIRST?
A technician identified an issue on a workstation, obtained details from the user, and made a backup of the system. Which of the following should the technician do NEXT?
A laptop has been returned for a screen repair. The owner insists the screen is broken, but occasionally a faded image is able to be seen in very bright settings on the desktop. Which of the following steps should the repair technician take FIRST?
A user on a SOHO network is unable to watch online videos, even at 240 pixels. The technician runs ipconfig from the user's computer and records the following:
The technician then connects a test laptop to the router via the user's Cat 5 cable and records the following information:
Which of the following is MOST likely causing the user's issue?
An organization maintains various record types, including health and criminal justice records. Which of the following cloud environments is the organization MOST likely to use to limit the attack surface?
A user's computer is not receiving a network connection. The technician confirms that the connection seems to be down and looks for the user's port on the patch panel. The port and patch panel are not labeled. Which of the following network tools should the technician use to identify the port?
A technician is monitoring all outbound traffic in a SOHO. Which of the following is the MOST cost-effective solution to monitor the traffic?
A customer reports that a computer is never able to reach more than a 100Mbps transfer data rate, even when using a Gigabit LAN card. While troubleshooting, the technician notices the network cable needs to be replaced. Which of the following cable categories is limiting the transfer speed?
Which of the following describes metered utilization of cloud resources?
Which of the following would be BEST reason to use a virtual machine as a sandbox?
A user brings an older laptop to the help desk and reports issues with the keyboard. Upon inspection, the technician does not see any external damage but notices that many keystrokes da not register in a word processor. The laptop works fine when the technician tests it with an external keyboard. Which of the following actions would MOST likely resolve the issue?
Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?