Exam 220-802: CompTIA A+ Certification Questions & Answers

Which of the following commands should a technician use, from the user’s workstation, to ensure that the workstation has a valid IP address?
Which of the following operating systems supports full BitLocker functionality?
Which of the following protocols could a technician use to connect a smartphone to an email server?
Which of the following should a technician do FIRST to secure a mobile device?
Which of the following would give a list of switches for the CHKDSK command?
Which of the following commands would a technician use to move one directory above or below the one the technician is currently in?
Which of the following situations?
Which of the following tools should be used to help remediate the problem?
Which of the following security threats involve shoulder surfing and phone phishing?
Which of the following operating systems supports full usage of 8GB DDR3 RAM?
Which of the following procedures would accomplish this?
Which of the following commands, in Windows 7, could a technician use to schedule a disk integrity scan upon next boot?
Which of the following tabs under MSCONFIG would allow a technician to configure all of the applications that launch at boot?
Which of the following commands could be used to both check and replace damaged files?
Which of the following versions of Windows would need to be used?
Which of the following security threats does NOT use software to extract sensitive information or credentials?
Which of the following Control Panel paths should a technician use in order to remedy this issue?
Which of the following Control Panel paths should the technician use in order to prevent this from occurring?
Which of the following data transfers will retain the current NTFS permissions of a file?
Which of the following Control Panel locations can provide information to review and correct this issue?
Back to the top