أرشيف أسئلة الاختبار

اختبار شهادة صيانة الحاسب A+ Core 2 (220-1202)

هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.

الأسئلة

57 سؤال
  1. A user created an incident report and marked it as "urgent" in the IT help desk portal. The user approaches the help desk manager because the user did not recei ...
  2. A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this traini ...
  3. A technician is mapping an SMB share using the command line. Which of the following commands should the technician use?
  4. An employee accidentally installs software on a company PC. The software sends data to a remote server. Which of the following best describes the software?
  5. When logging in to a workstation, a technician notices that the roaming profile takes a long time to fully load. Which of the following should the technician ch ...
  6. Which of the following script types requires that the system mode is set to Unrestricted to run unsigned scripts?
  7. A user receives a push notification to approve or deny a log-in request when using MFA. Which of the following describes this security measure?
  8. A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or ...
  9. A customer asks a help desk technician for help in selecting new computers. The customer would like to avoid expensive licensing fees but would like all files t ...
  10. Performance on a user's smartphone is degrading. Applications take a long time to start, and switching between windows also takes a long time. Which of the foll ...
  11. An organization's network engineering team provides the support team with web proxy information that all workstations need in order to access external web pages ...
  12. An end user's laptop is having network drive connectivity issues in the office. The end user submits a help desk ticket, and a support technician is able to est ...
  13. Which of the following controls access to certain services to ensure that administrators are not automatically given elevated permissions?
  14. A Microsoft OS laptop user requests an alternative log-in authentication method because they have forgotten their password multiple times. Which of the followin ...
  15. A department manager asks a technician to set up a group in a company collaboration tool that will allow users in the New York office to communicate sensitive i ...
  16. A malicious actor uses multiple endpoints to target a single endpoint. Which of the following describes this threat?
  17. A technician is installing a cloud-based productivity suite and keeps getting an error message stating that the installation is unavailable. Which of the follow ...
  18. An administrator requires information about a server to identify the product owner and whether it has any business-critical services. Which of the following can ...
  19. A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?
  20. A customer is upgrading their workstation from Windows 10 to Windows 11. They perform a clean installation from a USB drive. After the system restarts, the inst ...
  21. Which of the following tools should a technician use in macOS to restore an older version of a file?
  22. A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?
  23. Which of the following commands is used to determine how a packet reaches a server?
  24. A technician notices that the weekly backup is taking too long to complete. The daily backups are incremental. Which of the following would most likely resolve ...
  25. A company wants to perform an in-place upgrade of operating systems on all workstations. All types of removable storage are disabled for security reasons. Which ...
  26. A customer wants to be able to work from home but does not want to be responsible for bringing company equipment back and forth. Which of the following would al ...
  27. Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
  28. An international traveler is concerned about others accessing the contents of their smartphone if it is lost or stolen. The traveler has enabled biometrics. Whi ...
  29. A support specialist must allocate a shared folder. Which of the following commands should the specialist use?
  30. A developer who is using a personal laptop that is running Windows wants to leverage virtual technologies. The developer does not see an option to enable the Hy ...
  31. A user needs to download some files from a vendor website. Downloading the specific file type is blocked when using the Microsoft Edge web browser. A technician ...
  32. A technician must install a legacy business application on a new computer. The new computer does not meet the application's requirements. Which of the following ...
  33. A desktop technician is hardening a newly installed company workstation. Which of the following actions should the technician take? (Select two.)
  34. Which of the following provides information to employees, such as permitted activities when using the organization's resources?
  35. A technician is reviewing an organization’s current incident management policy. The organization uses a third-party vendor to protect the organization’s assets ...
  36. A network engineer is dealing with an emergency situation in which a wired network connection needs to be replaced. A facility manager tells the network enginee ...
  37. Which of the following is a reason to keep the air temperature and humidity level within proper limits in environments with multiple active computers and periph ...
  38. A user downloads an application with a plug-in that is designed to automatically prompt for an OTP when the user browses to a specific website. The plug-in inst ...
  39. Which of the following types of social engineering attacks sends an unsolicited text message to a user's mobile device?
  40. A user hears an unexpected noise coming from their desktop computer. To troubleshoot the issue, a technician needs to open the case. Which of the following acti ...
  41. A user reports issues when traveling between meetings with a laptop. The laptop becomes very hot in its bag due to the lack of ventilation. Which of the followi ...
  42. Whenever a user clicks on a .jpg, Notepad opens and displays illegible characters. Otherwise, the workstation functions normally. Which of the following is the ...
  43. A user must perform a series of commands each day on a Linux server. The user wants to use a script to automate the process. Which of the following is the most ...
  44. A user is renaming a .txt file to a .xml file. After renaming the file, Windows Explorer shows the filename as Document.xml. However, the document properties sh ...
  45. A user is trying to install a preferred word processor on their work laptop, but the installation fails each time. Which of the following is most likely the cau ...
  46. An administrator must rename the administrator account on a Windows desktop. Which of the following tools is best for this task?
  47. A junior technician is working on a customer request. The junior technician cannot complete the work and escalates the issue to a senior technician. The senior ...
  48. A vendor normally releases security patches for its operating system on a monthly basis. An administrator receives an email from the vendor that says the vendor ...
  49. A technician is working on a complex, large-scale software deployment. In which of the following places would the technician most likely reference deployment in ...
  50. An administrator is investigating a zero-day vulnerability on a core system. If the vulnerability is not patched, the negative impact to business could be signi ...
  51. An employee contacted the help desk because multiple unwanted pop-ups are appearing on-screen while the employee is visiting a website. Which of the following w ...
  52. A small town's clerk wants to work from home on a town-issued laptop. The clerk needs to be able to access documents on the town hall server. Which of the follo ...
  53. Which of the following is a protocol that provides AAA for network services?
  54. Which of the following is the best term to describe the concept in which AI makes incorrect assumptions because of limited training?
  55. A help desk team was alerted that a company-owned cell phone has an unrecognized password-cracking application. Which of the following should the help desk team ...
  56. A user submits a support ticket after receiving the following error: Your connection is not private NET::ERR_CERT_DATE_INVALID The technician confirms th ...
  57. A technician recently installed a program that uses several anti-piracy technologies. When the program is launched, it briefly opens and then closes. Which of t ...