Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1101 - CompTIA A+ Certification Exam: Core 1

Page: 2 / 13
Total 854 questions

An organization has some computers running macOS and some computers running Windows. The computers running macOS also need to run a piece of software that is only available on Windows. Which of the following BEST describes the solution for running Windows software on a computer running macOS?

A.

Operating system spoofing

B.

Remote software provisioning

C.

Indirect software implementation

D.

Cross-platform virtualization

A technician is configuring a workstation to be used as a VM host. After installing the necessary software, the technician is unable to create any VMs. Which of the following actions should be performed?

A.

Disable the BIOS password.

B.

Enable TPM.

C.

Enable multithreading.

D.

Enable Fast Startup.

An online retailer would like to add capacity to support increased sales. Additional servers have been installed. Which of the following should be used to ensure each new server is being properly utilized?

A.

Virtualization

B.

Clustering

C.

Load balancer

D.

Round-robin DNS

A colleague has a laptop that has been working as expected for several years wall outlet. The MOST likely component that needs to be replaced is the:

A.

power adapter.

B.

battery.

C.

system fan.

D.

hard drive.

A user contacts the help desk in reference to a failing thumbprint scanner. The user states the scanner was functioning correctly yesterday. Which of the following troubleshooting steps should be performed FIRST after the ticket has been filed?

A.

Inquire about possible changes.

B.

File a damage report.

C.

Requisition a new scanner.

D.

Attempt to clean the scanner.

A user submitted a ticket to report an issue with a new printer that is no longer accepting new print jobs. The technician verifies the printer is on and notices the printer LCD screen has the following error message:

Paper Jam, Jam in fuser.

Which of the following is the MOST efficient next step the technician should complete?

A.

Apply a maintenance kit to the printer

B.

Check the printer paper path to locate any obstructions.

C.

Turn the printer on and off to see if the error clears.

D.

Replace the fuser.

A technician is setting up a device to use two-factor authentication. Which of the following meets this requirement?

A.

Thumbprint/retinal scan

B.

Password/password

C.

Password/thumbprint

D.

Password/PIN

A user reports that printed receipts have black smudges over the entire image. The text is still present but is very dark and sometimes illegible. Which of the following are the MOST likely cause and solution for the printer issue?

A.

The ribbon is jammed and is rubbing on the paper. Clear the bad ribbon and feed it through properly.

B.

The printhead is too hot. Adjust the temperature down and retry printing.

C.

The printer is loaded with the wrong type of paper. Replace the receipt paper with carbon paper.

D.

The blue ink cartridge was loaded with black ink. Put in the correct ink and clean the printhead.

A user visits the desk to report that a smartphone takes more than a day to fully charge. The user has already tested multiple wall outlets and swapped the charging cable, but the results are the same. Which of the following should the technician do FIRST?

A.

Verify the power rating of the charger.

B.

Ensure all unnecessary connectivity features are disabled.

C.

Check that all missing smartphone OS updates are applied.

D.

Complete a factory reset of the phone

A technician identified an issue on a workstation, obtained details from the user, and made a backup of the system. Which of the following should the technician do NEXT?

A.

Determine the next steps to resolve the issue and document it.

B.

Design a plan of action to resolve the issue and implement the solution.

C.

Document the findings, actions, and outcomes.

D.

Establish a theory of probable cause, researching internally or externally as needed.

A laptop has been returned for a screen repair. The owner insists the screen is broken, but occasionally a faded image is able to be seen in very bright settings on the desktop. Which of the following steps should the repair technician take FIRST?

A.

Replace the graphics card.

B.

Replace the screen, as the customer insists.

C.

Recommend the usage of an external display instead.

D.

Ensure the backlight is functioning as expected.

A user on a SOHO network is unable to watch online videos, even at 240 pixels. The technician runs ipconfig from the user's computer and records the following:

The technician then connects a test laptop to the router via the user's Cat 5 cable and records the following information:

Which of the following is MOST likely causing the user's issue?

A.

Incorrect IP address

B.

Faulty NIC

C.

Misconfigured default gateway

D.

Bad network cable

An organization maintains various record types, including health and criminal justice records. Which of the following cloud environments is the organization MOST likely to use to limit the attack surface?

A.

Public

B.

Hybrid

C.

Community

D.

Private

A user's computer is not receiving a network connection. The technician confirms that the connection seems to be down and looks for the user's port on the patch panel. The port and patch panel are not labeled. Which of the following network tools should the technician use to identify the port?

A.

Network tap

B.

Punchdown tool

C.

Toner probe

D.

Crimper

A technician is monitoring all outbound traffic in a SOHO. Which of the following is the MOST cost-effective solution to monitor the traffic?

A.

Spectrum analyzer

B.

Network tap

C.

Lookback plug

D.

Toner probe

A customer reports that a computer is never able to reach more than a 100Mbps transfer data rate, even when using a Gigabit LAN card. While troubleshooting, the technician notices the network cable needs to be replaced. Which of the following cable categories is limiting the transfer speed?

A.

Cat 5

B.

Cat 5e

C.

Cat 6

D.

Cat 6a

Which of the following describes metered utilization of cloud resources?

A.

Resources provisioned instantly

B.

Payments made only for resources that are used

C.

Resources pooled to increase computing power

D.

Implementation of rapid elasticity

Which of the following would be BEST reason to use a virtual machine as a sandbox?

A.

To test new software in a safe environment

B.

To increase the efficient use of computing resources

C.

To run multiple machines on the same hardware

D.

To have dedicated hardware for a single system

A user brings an older laptop to the help desk and reports issues with the keyboard. Upon inspection, the technician does not see any external damage but notices that many keystrokes da not register in a word processor. The laptop works fine when the technician tests it with an external keyboard. Which of the following actions would MOST likely resolve the issue?

A.

Disable the sticky keys feature.

B.

Clean the keyboard.

C.

Reset the BIOS settings to default.

D.

Charge the laptop.

Client-side virtualization guest machines have security requirements similar to physical machines, but they also need to ensure separation from other guest machines. Which of the following BEST describes this client-side guest security requirement?

A.

Isolation

B.

Authentication

C.

Hardening

D.

Authorization