CompTIA A+ Certification Exam 試験
Question No : 1
While navigating a Windows machine through command prompt, which of the following commands will a technician use to display the contents of the current folder?
Question No : 2
A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device.
Which of the following should the technician perform to address the issue?
Question No : 3
A technician has just upgraded RAM on a user’s workstation from 4GB to 8GB. The technician now wants to adjust the page file size on the system to the recommended Microsoft settings.
Which of the following should be entered for the “Min” portion of the page file setting if using these best practices?
Question No : 4
A technician is tasked with analyzing computer settings managed by Microsoft Group Policy configuration. The technician wants to print a report to an HTML file for offline review.
Which of the following Windows command line tools would allow the technician to accomplish this task?
Question No : 5
A user needs to connect securely to the company network while working from a hotel room.
Which of the following would the user need available to accomplish this?
Question No : 6
A user needs their email set up on their iOS device. The email needs to synchronize all changes made with the server and the PC.
Which of the following would the technician use to accomplish this?
Question No : 7
A technician is in need of a device that would give the BEST network protection within a single device.
Which of the following devices would the technician use?
Question No : 8
A support technician is using virtualization software on a Windows 7 Enterprise PC to test Windows 8.1 Enterprise for a future deployment. When operating the Windows 8.1 VM, performing tasks in the host operating system becomes considerably slower.
Which of the following options may improve performance in the host operating system? (Select TWO).
Question No : 9
Which of the following commands are used from a Linux command line interface to elevate a user’s access level to administrative privilege? (Select TWO).
Question No : 10
An office manager mistakenly uninstalled a valuable application.
Which of the following utilities may allow the manager to correct this issue?
Question No : 11
An end user calls the company’s IT service desk to report an inability to open encrypted emails on a mobile device.
Which of the following BEST represents a possible cause?
Question No : 12
A user recently purchased a video card for gaming purposes. The user installed the appropriate drivers and validated they work using vendor-supplied test tools.
However, while gaming, the speed of the case fans increases, the entire system locks up, and the user must hard boot to restart the computer.
Which of the following is the MOST likely cause of this issue?
Question No : 13
Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?
Question No : 14
Which of the following would a technician use to search for a specific string within a file name?
Question No : 15
An administrator must upgrade multiple workstations with a new image being deployed using Windows Deployment Services.
Which of the following client-side boot methods initiates the deployment of the new image?