220-1101 Practice Test Questions

849 Questions


Topic 5: Exam Pool E (NEW)

A user arrives at the office and is unable to access the company's network on a smartphone. The user enables Wi-Fi on the smartphone, but it only shows the 5G symbol. Which of the following device settings should the user configure to fix this issue?


A. Autoconnect


B. VPN


C. VPN


D. Encryption


E. WPS





A.
  Autoconnect

A user is trying to play a DVD on a projector. The user can hear the audio; however, the projector is showing an error message that states:
HDMI Blocked due to Copy Protection
Which of the following is the MOST likely cause of the error?


A. The HDMI cannot carry the signal from the DVD to the projector


B. The user needs to switch from HDMI to a cable standard such as DisplayPort


C. The projector does not support the necessary HDCP protocol


D. The user needs to enable cony-protected sources in the projector's settings.





C.
  The projector does not support the necessary HDCP protocol

Explanation: The Official CompTIA® A+® Core 1 and Core 2 Student Guide (Exams 220- 1001 and 220-1002) | 193 Protected content. If you encounter an error that indicates unauthorized content or an HDCP error: • DVI, HDMI, DisplayPort, and Thunderbolt all provide support for the Digital Rights Management (DRM) mechanism High-bandwidth Digital Content Protection (HDCP). HDCP allows a content source (such as a Blu-ray disc) to disable itself if the display adapter and monitor and/or speaker system do not support HDCP and fail to authenticate themselves with the playback source. There have been various iterations of HDCP (at time of writing the current version is 2.2) and backwardcompatibility can be problematic as authentication may fail between devices that support different versions of the standard.

A user reports that a software application functioned as expected the previous day, but this morning, the user is unable to launch the application. Which of the following describe what the technician should do next?


A. Research the symptoms


B. Identify any changes the user has made


C. Determine which steps need to be performed.


D. Check the vendor's website for guidance.





B.
  Identify any changes the user has made

Explanation: Identifying changes made to the system is the next step to troubleshoot why an application no longer launches, as recent changes often cause such issues.
✑ Why Not A (Research the symptoms): Research is broader and should come after identifying changes.
✑ Why Not C (Determine which steps need to be performed): This comes after identifying the issue.
✑ Why Not D (Check the vendor's website): This is a later step if further guidance is needed.

A user connected a laptop to a projector. The image on the screen is very fuzzy, but the image's brightness is satisfactory. Which of the following projector settings should the user adjust first to correct the issue?


A. Focus


B. Aspect ratio


C. Keystone


D. Resolution





A.
  Focus

Explanation: When a user connects a laptop to a projector and the image displayed is very fuzzy (blurred) but the brightness level is satisfactory, the first setting to adjust on the projector is the focus. The focus control adjusts the clarity and sharpness of the projected image. Incorrect focus settings can lead to a fuzzy or blurred image even when the brightness is adequate. Adjusting the focus should help in making the image clear and sharp.

Which of the following is a method that can be used to securely connect a remote user's laptop to a corporate server?


A. WAN


B. VPN


C. SSL


D. DHCP





B.
  VPN

Explanation: A Virtual Private Network (VPN) is a secure method for connecting a remote user's laptop to a corporate server. VPNs use encryption to protect data transmitted over the internet.

A technician is replacing a failed power supply in a ten-year-old computer When installing the customer-provided power supply, the technician discovers the ATX connector would not plug into the motherboard. The customer wants a cost-effective solution. Which of the following should the technician do next?


A. Adjust the input voltage.


B. Install a modular power supply.


C. Rebuild the failed power supply.


D. Use a 20-pin to 24-pin adapter.





D.
  Use a 20-pin to 24-pin adapter.

Explanation: Older motherboards use 20-pin connectors, while newer power supplies use 24-pin connectors. An adapter resolves the compatibility issue cost-effectively.
✑ Why Not A (Adjust the input voltage): Input voltage adjustment is unrelated to connector compatibility.
✑ Why Not B (Install a modular power supply): While modular supplies are versatile, this doesn’t address the connector issue directly.
✑ Why Not C (Rebuild the failed power supply): Rebuilding is costly and complex compared to using an adapter.

A technician is selling up a projector (or a videoconferencing system. When the user all empts to connect a laptop to the system, the system displays the following error message. No source found The user tries multiple cables and inputs on the projector. Which of the following should the user try NEXT?


A. Check the bulb on the projector and replace it with a new one


B. Check the display settings on the computer and set them to extend/duplicate.


C. Replace the projector with another known-good one and try again


D. Replace the video card on the machine that is plugged in to the projector, as it has gone bad.





B.
  Check the display settings on the computer and set them to extend/duplicate.

Explanation: If a user is unable to connect a laptop to a projector or videoconferencing system and sees the error message "No source found," the next step should be to check the display settings on the computer and set them to extend/duplicate. This will ensure that the laptop's display is being output to the external device. References: CompTIA A+ Certification Exam Guide, pg. 514

A technician needs to configure a multifunction printer that will be used to scan highly confidential data, which must be securely distributed to a select group of executives. Which of the following options is the most secure way to accomplish this task?


A. Set up the device to email the documentsto a group address.


B. Make copies of the documents and have an office administrator manually distribute them.


C. Implement badge access on the printer.


D. Configure scanning to an SMB share withexecutive access.





D.
  Configure scanning to an SMB share withexecutive access.

Explanation: Configuring scanning to a Secure Message Block (SMB) share specifically designated for executive access ensures that the scanned confidential documents are stored securely on a network drive with restricted access. SMB is a network file sharing protocol that allows applications on a computer to read and write to files and request services from server programs in a computer network. By setting up an SMB share with executive access, the data is centralized, making it easier to manage permissions and security settings. This method also utilizes the existing network infrastructure, allowing for scalability and integration with other security measures like encryption and authentication protocols.

A technician is installing new power supplies for the application engineering team's workstations. The management team has not yet made a decision about installing dual graphics cards, but they want to proceed with the project anyway. Which of the following power supplies would provide the BEST solution?


A. 1000W 24-pin modular power supply


B. 220VAC 9000J surge protector


C. 500W redundant power supply


D. 2000VA uninterruptible power supply





A.
  1000W 24-pin modular power supply

Explanation: A 1000W 24-pin modular power supply provides enough power to support a dual graphics card configuration, which requires a significant amount of power. A modular power supply allows the technician to connect only the cables that are necessary for the current configuration, reducing cable clutter and improving airflow inside the case. This makes it easier to install and maintain the power supply.

A technician needs to verify that a newly installed RJ45 was correctly terminated. Which of the following should the technician use?


A. Wi-Fi analyzer


B. Network tap


C. Loopback plug


D. Toner probe


E. Punchdown tool





C.
  Loopback plug

Explanation: A loopback plug allows a technician to verify that the cable functions as expected by looping the signal back for testing. While a punchdown tool installs cables in a panel, it does not test functionality, and Wi-Fi analyzers and toner probes serve other network diagnostics. This is in line with CompTIA A+ Core 1 objectives for validating cable installation and connectivity.

A user's smartphone repeatedly loses the connection to a home Wi-Fi network. The user has already tried restarting the smartphone, rebooting the router, and resetting the smartphone's Wi-Fi network settings. Which of the following should the user do next to resolve the issue?


A. Replace the router.


B. Update the smartphone's OS.


C. Switch the router to 5GHz.


D. Check the range of the router.





B.
  Update the smartphone's OS.

Explanation: If a smartphone repeatedly loses connection to a home Wi-Fi network and the common troubleshooting steps like restarting the device, rebooting the router, and resetting the Wi-Fi settings have not resolved the issue, updating the smartphone's operating system (OS) could be the next logical step. OS updates often include fixes for known bugs and improvements in connectivity and compatibility with network hardware, which could resolve persistent connection issues.

A startup company is outgrowing its current office space and is requiring employees to work remotely. The company must comply with government-enforced requirements to safeguard all aspects of data, so the IT department plans to maintain complete control over users' operating systems. Which of the following should the IT department implement?


A. VDI


B. laaS


C. VPN


D. SaaS





A.
  VDI

Explanation: The IT department should implement VDI. Virtual Desktop Infrastructure (VDI) is a technology that allows users to access a desktop operating system from a remote location. VDI provides complete control over users’ operating systems, which is important for safeguarding data. VDI also provides a secure way to access data from remote locations, which is important for compliance with government-enforced requirements1.


Page 22 out of 71 Pages
Previous