CompTIA A+ 902 (1)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Erica Corcoran
Erica Corcoran, Communication
Erica Corcoran is a versatile professional working as an All-Rounder at Kilkenny Cheese, contributing her skills across various aspects of the business.
Quizzes Created: 3 | Total Attempts: 815
Questions: 30 | Attempts: 226

SettingsSettingsSettings
CompTIA A+ 902 (1) - Quiz


Questions and Answers
  • 1. 

    A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network? 

    • A.

      SSH

    • B.

      VPN

    • C.

      SFTP

    • D.

      RDP

    Correct Answer
    B. VPN
    Explanation
    A network administrator should use a VPN (Virtual Private Network) to gain access to the secure network from an offsite location while ensuring the traffic is protected. VPN creates a secure and encrypted connection over a public network, such as the internet, allowing the administrator to access resources securely and privately. It provides authentication, confidentiality, and integrity of the data transmitted between the administrator's device and the secure network. SSH (Secure Shell) is a network protocol used for secure remote access, SFTP (Secure File Transfer Protocol) is used for secure file transfer, and RDP (Remote Desktop Protocol) is used for remote desktop access, but they do not provide the same level of security and protection as a VPN.

    Rate this question:

  • 2. 

    A user states that when typing in directions on a navigation website, the map is not viewable in a newer web browser. The technician runs updates to Java, but is still unable to view the map. The technician should change which of the following Internet Options? 

    • A.

      Compatibility view

    • B.

      Manage add-ons

    • C.

      Clear browser cache

    • D.

      Pop-up blocker

    Correct Answer
    A. Compatibility view
    Explanation
    The technician should change the "Compatibility view" Internet Option. Compatibility view is a feature in newer web browsers that allows the browser to display websites as if it were an older version of the browser. This is useful for viewing websites that were designed for older browsers and may not display properly in newer ones. By enabling compatibility view, the technician may be able to view the map on the navigation website correctly.

    Rate this question:

  • 3. 

    A technician has successfully completed a gpupdate from a CMD box of a user’s PC and is ready to move to the next user. Which of the following is the appropriate NEXT step? (Select TWO).

    • A.

      View the CMD process in Task Manager

    • B.

      Type EXIT at the command prompt and press Enter

    • C.

      Minimize the CMD box to the taskbar

    • D.

      Click the “x” in the top right of the CMD window

    • E.

      Select Switch User on the PC

    Correct Answer(s)
    B. Type EXIT at the command prompt and press Enter
    D. Click the “x” in the top right of the CMD window
    Explanation
    The technician should type EXIT at the command prompt and press Enter to exit the CMD box and close the command prompt window. Additionally, the technician should click the "x" in the top right of the CMD window to close it. This ensures that the technician properly ends the session and moves on to the next user without leaving any open processes or windows.

    Rate this question:

  • 4. 

    An administrator is in a Remote Assistance session, sharing a user’s desktop. While trying to map a shared network drive for the user, an “access denied” error is encountered while using the user’s credentials. Which of the following should be the administrator’s NEXT step? 

    • A.

      Ensure the user’s account is not locked out

    • B.

      Use the fully qualified domain name of the share

    • C.

      Open the location with administrator privileges

    • D.

      Try mapping with a different drive letter

    Correct Answer
    C. Open the location with administrator privileges
    Explanation
    The administrator should open the location with administrator privileges because the "access denied" error suggests that the user's credentials do not have sufficient permissions to map the shared network drive. By opening the location with administrator privileges, the administrator can ensure that they have the necessary permissions to access and map the drive successfully.

    Rate this question:

  • 5. 

    Ann, a user, discovers that all of her documents will not open. The documents open properly on another computer. Which of the following tools will be the FASTEST for a technician to use to allow the documents to open? 

    • A.

      Backup

    • B.

      Recovery Image

    • C.

      Chkdsk

    • D.

      System Restore

    Correct Answer
    D. System Restore
    Explanation
    System Restore is the fastest tool for a technician to use in this situation because it allows the computer to revert back to a previous state where the documents were opening properly. This tool does not require any additional steps or processes like backing up or recovering files, or running disk checks. It simply restores the system settings and configurations to a previous working state, which should resolve the issue and allow the documents to open again.

    Rate this question:

  • 6. 

    A technician is tasked with enabling TLS version 1.0, 1.1, and 1.2 on a client Internet Explorer browser. Which of the following Internet Options Tabs should the technician look to enable the aforementioned TLS settings? 

    • A.

      Advanced

    • B.

      Security

    • C.

      Privacy

    • D.

      Connections

    Correct Answer
    A. Advanced
    Explanation
    The technician should look to enable the aforementioned TLS settings in the Advanced tab of the Internet Options. This tab usually contains advanced settings and options for the browser, including security settings such as TLS versions.

    Rate this question:

  • 7. 

    Which of the following network hosts would MOST likely provide the services needed to allow client access to Internet web pages?

    • A.

      File server

    • B.

      Web server

    • C.

      WINS server

    • D.

      Proxy server

    Correct Answer
    D. Proxy server
    Explanation
    A proxy server is designed to act as an intermediary between clients and web servers. It can cache web pages and other content, making it faster for clients to access frequently visited websites. Additionally, a proxy server can provide security by filtering and blocking certain websites or content. Therefore, a proxy server is the most likely network host to provide the services needed for client access to Internet web pages.

    Rate this question:

  • 8. 

    Which of the following best practices is used to fix a zero-day vulnerability on Linux?

    • A.

      Scheduled backup

    • B.

      Scheduled disk maintenance

    • C.

      Patch management

    • D.

      Antivirus update

    Correct Answer
    C. Patch management
    Explanation
    Patch management is the best practice used to fix a zero-day vulnerability on Linux. A zero-day vulnerability refers to a security flaw that is unknown to the software vendor and has not been patched yet. Patch management involves regularly checking for and applying software updates, including security patches, to fix vulnerabilities and ensure the system is up to date. By implementing effective patch management, organizations can address zero-day vulnerabilities promptly and minimize the risk of exploitation by hackers or malicious actors.

    Rate this question:

  • 9. 

    Which of the following tools is used to type or paste recovery commands directly into a Linux box? 

    • A.

      Shell/terminal

    • B.

      Backup/time machine

    • C.

      Command/cmd

    • D.

      Restore/snapshot

    Correct Answer
    A. Shell/terminal
    Explanation
    The shell/terminal is used to type or paste recovery commands directly into a Linux box. It provides a command-line interface for interacting with the operating system and executing various commands. This allows users to directly input recovery commands to troubleshoot and fix issues on the Linux system.

    Rate this question:

  • 10. 

    A technician is installing Bluetooth speakers in a conference room. Which of the following will be the average operating range of the speakers?

    • A.

      10 feet (3 meters)

    • B.

      15 feet (5 meters)

    • C.

      30 feet (9 meters)

    • D.

      45 feet (14 meters)

    Correct Answer
    C. 30 feet (9 meters)
    Explanation
    Bluetooth technology typically has an operating range of around 30 feet (9 meters). This means that the technician can expect the Bluetooth speakers to function properly within this range, allowing users to connect and play audio from their devices without any issues. It is important to note that the actual range may vary depending on factors such as interference, obstructions, and the specific Bluetooth device being used.

    Rate this question:

  • 11. 

    A user has a Windows 8.1 RT operating system and wants to add additional programs to the computer. Which of the following is available for installing more applications? 

    • A.

      Microsoft Store

    • B.

      DVD

    • C.

      Google Play

    • D.

      ITunes

    Correct Answer
    A. Microsoft Store
    Explanation
    The Microsoft Store is available for installing more applications on a Windows 8.1 RT operating system. The Microsoft Store is an online marketplace where users can download and install various applications, including both free and paid ones. It offers a wide range of software options and allows users to easily browse, search, and install applications directly onto their device.

    Rate this question:

  • 12. 

    A company that manages its own cloud, while utilizing a third-party vendor to help manage storage, is implementing which of the following infrastructure types?

    • A.

      Hybrid

    • B.

      Community

    • C.

      Private

    • D.

      Public

    Correct Answer
    A. Hybrid
    Explanation
    A company that manages its own cloud infrastructure but also utilizes a third-party vendor to help manage storage is implementing a hybrid infrastructure. A hybrid infrastructure combines elements of both private and public cloud environments. In this case, the company has its own private cloud for managing most of its computing resources, but it leverages a third-party vendor's public cloud storage services to offload and manage storage needs. This allows the company to have more control over its sensitive data and applications while also taking advantage of the scalability and cost-effectiveness of public cloud storage.

    Rate this question:

  • 13. 

    An administrator has a virtual client running but cannot receive network connectivity. The host workstation is able to access the network. Which of the following would the administrator check on the host to repair the problem? 

    • A.

      The cable connected to the network

    • B.

      Virtual host network adapter

    • C.

      USB host adapter

    • D.

      The domain of the virtual machine

    Correct Answer
    B. Virtual host network adapter
    Explanation
    To repair the problem of the virtual client not receiving network connectivity, the administrator would check the virtual host network adapter on the host workstation. This is because the virtual host network adapter is responsible for providing network connectivity to the virtual client. By checking the virtual host network adapter, the administrator can troubleshoot and resolve any issues that may be causing the lack of network connectivity for the virtual client.

    Rate this question:

  • 14. 

    A Google account on an Android device by default will synchronize to which of the following locations? 

    • A.

      Cloud

    • B.

      SSD

    • C.

      PC desktop

    • D.

      MicroSD

    Correct Answer
    A. Cloud
    Explanation
    A Google account on an Android device by default will synchronize to the cloud. This means that the data and settings associated with the account, such as contacts, emails, app data, and preferences, will be stored and backed up in Google's cloud-based servers. This allows users to access their information from multiple devices and ensures that their data is safe and easily recoverable in case of device loss or damage.

    Rate this question:

  • 15. 

    How would a technician install Windows OS on a MAC OS computer without using third-party software?

    • A.

      Terminal

    • B.

      Boot Disk

    • C.

      Disk Utility

    • D.

      Boot Camp

    Correct Answer
    D. Boot Camp
    Explanation
    Boot Camp is a built-in utility provided by Apple that allows users to install Windows OS on a Mac computer without the need for third-party software. It creates a separate partition on the Mac's hard drive, allowing the user to dual boot between macOS and Windows. This enables the technician to install Windows OS on the Mac computer directly from the Boot Camp utility, without the need for any additional software or tools.

    Rate this question:

  • 16. 

    A user wants to configure a smartphone to save all attachments from an Outlook.com email to a cloud-based service. Which of the following would be BEST to use to accomplish this? 

    • A.

      Google Drive

    • B.

      ICloud

    • C.

      One Drive

    • D.

      FTP

    Correct Answer
    C. One Drive
    Explanation
    One Drive would be the best option to use in order to save all attachments from an Outlook.com email to a cloud-based service. One Drive is a cloud storage service provided by Microsoft, which integrates seamlessly with Outlook.com. It allows users to easily save and access files from their email attachments in the cloud, ensuring that they are securely stored and can be accessed from any device with an internet connection.

    Rate this question:

  • 17. 

    Virtual machines provide users with the ability to do which of the following?

    • A.

      Extend 32-bit machines to 64-bits

    • B.

      Share hardware resources

    • C.

      Increase the network download speed

    • D.

      Use less memory in the machine

    Correct Answer
    B. Share hardware resources
    Explanation
    Virtual machines provide users with the ability to share hardware resources. This means that multiple virtual machines can run on a single physical machine, allowing for efficient utilization of resources such as CPU, memory, and storage. By sharing resources, virtualization enables better scalability, flexibility, and cost-effectiveness in managing and deploying applications and services.

    Rate this question:

  • 18. 

    Which of the following features of a mobile device operates the touch screen?

    • A.

      Gyroscope

    • B.

      Digitizer

    • C.

      Accelerometer

    • D.

      Geotracking

    Correct Answer
    B. Digitizer
    Explanation
    The correct answer is Digitizer. A digitizer is a hardware component that operates the touch screen of a mobile device. It is responsible for converting the user's touch into digital signals that the device can understand and respond to. The digitizer detects the position and movement of the user's finger or stylus on the screen, allowing for touch-based interactions and input. The gyroscope, accelerometer, and geotracking are other features of a mobile device that serve different purposes and are not directly involved in operating the touch screen.

    Rate this question:

  • 19. 

    A technician contacts the network administrator to request a list of all static IP addresses in the building. Which of the following server roles would the technician MOST likely review to find that information? 

    • A.

      DHCP server

    • B.

      DNS server

    • C.

      File server

    • D.

      Proxy server

    Correct Answer
    A. DHCP server
    Explanation
    The technician would most likely review the DHCP server to find a list of all static IP addresses in the building. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. While it primarily assigns dynamic IP addresses, it can also be configured to assign static IP addresses. Therefore, the DHCP server would have a record of all the static IP addresses in the building.

    Rate this question:

  • 20. 

    A technician is tasked with setting up a user’s webmail on a tablet, phone, and laptop. The user would like the data synced to all three devices. Which of the following items can be synced to the devices via webmail? (Select THREE). 

    • A.

      Free/busy

    • B.

      Programs

    • C.

      Documents

    • D.

      Calendar

    • E.

      Favorites

    • F.

      Social media

    • G.

      Contacts

    Correct Answer(s)
    A. Free/busy
    D. Calendar
    G. Contacts
    Explanation
    The correct answer is Free/busy, Calendar, and Contacts. These three items can be synced to the devices via webmail. Free/busy refers to the availability status of the user, which can be synced across devices. Calendar allows the user to sync their appointments and events, ensuring they are consistent across all devices. Contacts can also be synced, ensuring that the user's contact list is the same on all devices.

    Rate this question:

  • 21. 

    A network administrator is unable to install programs on a workstation. Which of the following is MOST likely the reason the administrator is not able to install applications? 

    • A.

      The workstation is victim of a denial of service attack

    • B.

      The username is not authenticating on the network

    • C.

      The username is not part of the local administrator group

    • D.

      The administrator has not applied appropriate security patches

    Correct Answer
    C. The username is not part of the local administrator group
    Explanation
    The most likely reason the network administrator is unable to install programs on a workstation is that the username being used is not part of the local administrator group. This means that the user does not have the necessary permissions to install applications on the workstation.

    Rate this question:

  • 22. 

    A technician has been tasked with limiting the users who can connect to a network printer located centrally within an office environment. Which of the following tools would be the BEST to utilize to achieve this goal? 

    • A.

      VPN

    • B.

      ACL

    • C.

      RDP

    • D.

      DLP

    Correct Answer
    B. ACL
    Explanation
    ACL stands for Access Control List, which is a tool used to control access to network resources. In this scenario, the technician wants to limit the users who can connect to a network printer. By implementing an ACL, the technician can specify which users or groups are allowed or denied access to the printer. This ensures that only authorized users can connect to the printer, increasing security and preventing unauthorized access. VPN (Virtual Private Network) is used to establish a secure connection over a public network, RDP (Remote Desktop Protocol) is used to remotely access and control a computer, and DLP (Data Loss Prevention) is a system used to prevent the unauthorized transmission of sensitive data.

    Rate this question:

  • 23. 

    An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of this issue?

    • A.

      The HIPS device is blocking the messages

    • B.

      The access control list is blocking the messages

    • C.

      The email filter has quarantined the messages

    • D.

      The firewall is blocking the sender’s email address

    Correct Answer
    C. The email filter has quarantined the messages
    Explanation
    The most likely cause of the end user not receiving emails from a specific customer is that the email filter has quarantined the messages. This means that the email filter has flagged the messages as potentially harmful or spam, and has therefore held them back from being delivered to the end user's inbox. This is a common practice to protect users from malicious or unwanted emails.

    Rate this question:

  • 24. 

    A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?

    • A.

      Enter all passwords they have used in the past

    • B.

      Verify a smart card has been issued

    • C.

      Check the network cable

    • D.

      Reboot the computer

    Correct Answer
    B. Verify a smart card has been issued
  • 25. 

    A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy? 

    • A.

      Require biometric identification to log into the laptop.

    • B.

      Require multifactor authentication to log into laptop.

    • C.

      Require laptop hard drives to be encrypted.

    • D.

      Require users to change their password at frequent intervals. 

    • E.

      Require users to have strong passwords.

    Correct Answer
    C. Require laptop hard drives to be encrypted.
    Explanation
    The first step in implementing a best practice security policy after a lost laptop with sensitive corporate information has been published on the Internet is to require laptop hard drives to be encrypted. Encrypting the hard drives ensures that even if the laptop falls into the wrong hands, the data cannot be accessed without the encryption key. This helps to protect the sensitive information and prevent unauthorized access.

    Rate this question:

  • 26. 

    The type of security threat that uses computers or other networks to accept and pass on viruses is called: 

    • A.

      Phishing

    • B.

      Botnets

    • C.

      Logic bomb

    • D.

      Man-in-the-middle

    Correct Answer
    B. Botnets
    Explanation
    Botnets are a type of security threat that uses computers or other networks to accept and pass on viruses. Botnets are networks of infected computers that are controlled by a central server or botmaster. These infected computers, also known as bots, can be used to distribute malware, launch DDoS attacks, or send out spam emails. By utilizing a network of infected computers, botnets can spread viruses and other malicious software more effectively and quickly.

    Rate this question:

  • 27. 

    Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following? 

    • A.

      Trojan horse

    • B.

      Spyware

    • C.

      Social engineering

    • D.

      Worms

    Correct Answer
    A. Trojan horse
    Explanation
    Joe is the victim of a Trojan horse. A Trojan horse is a type of malicious software that disguises itself as a legitimate program or file, tricking the user into downloading and installing it. Once installed, it can perform various malicious activities, such as dialing unrecognized numbers and downloading new content without the user's knowledge or consent.

    Rate this question:

  • 28. 

    A technician is attempting to manually migrate a user’s profile from one Windows PC to another. Files in the user’s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur? 

    • A.

      ExFAT

    • B.

      COMPRESSED

    • C.

      EFS

    • D.

      NTFS

    Correct Answer
    C. EFS
    Explanation
    The correct answer is EFS. EFS (Encrypting File System) is a feature in NTFS (New Technology File System) that allows users to encrypt files and folders to protect sensitive data. When files are encrypted using EFS, the filenames appear in green color. Therefore, if the technician is unable to copy files with green letters in the filenames, it indicates that those files are encrypted using EFS.

    Rate this question:

  • 29. 

    When securing a mobile device, which of the following types of screen locks is the MOST secure?

    • A.

      Fingerprint lock

    • B.

      Swipe lock

    • C.

      Passcode lock

    • D.

      Face lock

    Correct Answer
    A. Fingerprint lock
    Explanation
    The most secure type of screen lock for a mobile device is the fingerprint lock. This is because fingerprints are unique to each individual, making it difficult for someone else to unlock the device without the owner's fingerprint. Additionally, fingerprints are not easily replicated or guessed, providing an extra layer of security compared to other types of screen locks such as swipe, passcode, or face lock.

    Rate this question:

  • 30. 

    A technician has upgraded four computers and would like to securely repurpose the hard drives for later use. Which of the following should the technician do to the drives to prepare them for later use?

    • A.

      Chkdsk

    • B.

      Degauss

    • C.

      Quick format

    • D.

      Drive wipe

    Correct Answer
    D. Drive wipe
    Explanation
    To securely repurpose the hard drives for later use, the technician should perform a drive wipe. This process involves completely erasing all data on the hard drives, ensuring that no sensitive information remains. Unlike a quick format or chkdsk, which only perform surface-level checks or delete file system information, a drive wipe ensures that the data cannot be recovered. Degaussing, on the other hand, is a method used for erasing data from magnetic media such as tapes or floppy disks, and is not applicable to hard drives.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 07, 2017
    Quiz Created by
    Erica Corcoran
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.