CompTIA A+ 220-1102 Practice Test 2
Exam Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Need More Help?
PocketPrep is our recommended provider for CompTIA A+ prep courses. Make sure you pass your exam the first time around.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
You have flown all the way to a customer site for support work. The customer is asking you for the personal cell phone number of a fellow technician.
He says that he knows the other technician and would like to get in touch with him. How should you handle this request? (Select all that apply.)
CorrectIncorrect -
Question 2 of 10
2. Question
You are at a customer site for specific support related work. The customer is asking you to go beyond the scope of work in the agreement.
How should you handle this?
CorrectIncorrect -
Question 3 of 10
3. Question
In major organizations, IT staff complain of the impact and threat of Shadow IT in the organization. Which of the following is NOT a major concern?
CorrectIncorrect -
Question 4 of 10
4. Question
The cost of replacing lost or damaged corporate-owned mobile devices has skyrocketed in your organization. The management has tasked you to consider how to fully transition to a strictly BYOD environment.
Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company data?
Choose TWO.
CorrectIncorrect -
Question 5 of 10
5. Question
A data controller determines who shall be responsible for compliance with data protection rules and how data subjects can exercise their rights while a data processor simply processes the data that the data controller gives them.
The roles and responsibilities of data controllers and data processors are most likely captured in:
CorrectIncorrect -
Question 6 of 10
6. Question
You are required to build a solution that will allow guests at your company’s headquarters to access the Internet via WiFi. Access to internal corporate network is prohibited.
However, the guest are required to sign off on the acceptable use policy before accessing the Internet. Which of the following can meet the stated requirements?
CorrectIncorrect -
Question 7 of 10
7. Question
Spraying refers to what type of brute-force attack?
CorrectIncorrect -
Question 8 of 10
8. Question
One of the popular cloud models focuses on mainly the provision of networks, storage and servers. Which one is it?
CorrectIncorrect -
Question 9 of 10
9. Question
There are several biometric systems in use today. Some have extremely secure authentication methods while other are simply popular as they are in use worldwide.
Which one is the most commonly and widely used biometric device?
CorrectIncorrect -
Question 10 of 10
10. Question
Malware is a collective term for a number of malicious software variants. A Malware that secretly records your online activity, harvesting your data and collecting personal information such as passwords, usernames, and surfing habits is known as?
CorrectIncorrect