CompTIA A+ 220-1001/1002 Practice Test - Question List

Select how would you like to study

36. Some employees in an organization are unknowingly downloading malicious code on their computers. Which of the following should the IT department do to resolve the problem?
  1. Implement a VPN.
  2. Install a firewall.
  3. Re-install the OS.
  4. Disable unauthorized ActiveX controls.
37. What is the generic term for a hacker going through your trash to find critical information?
  1. Dumpster diving.
  2. Refuse searching.
  3. Refuse diving.
  4. Dumpster searching.
38. Which of the following is the major difference between a worm and a Trojan horse?
  1. Worms are self-replicating, while Trojan horses are not.
  2. Worms spread via email, while Trojan horses are not.
  3. Worms are a form of malicious code, while Trojan horses are not.
  4. There is no difference.
39. Jack walks back to his desk and tries to log on to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?
  1. An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
  2. The entire network is down.
  3. He has left some application open on his computer, which has locked the system.
  4. He needs to continue to try logging on. Eventually the system will allow him to log in.
40. You need access to a specific server, but no one in your IT Department knows the administrator password for the BIOS. As a result, you cannot boot the server or access the BIOS settings. Of the following, which options do you have? Choose two.
  1. Use the default BIOS password set by the motherboard maker.
  2. Reset or remove the BIOS password by clearing the CMOS memory.
  3. Reboot after removing all network connections and shutting down the server.
  4. Hire a hacker.

Select how would you like to study