Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

220-1101 Exam Dumps - CompTIA A+ Certification Exam: Core 1

Go to page:
Question # 97

A technician recently discovered me root cause of an application error that several users have been experiencing. The technician updated the configurations on the affected machines and verified full functionality was restored for all users, which of the following actions should the technician perform NEXT?

A.

Write a knowledge base article in the ticketing software to expedite future Incidents.

B.

Submit a bug report to the developer of the application, along with the steps taken to resolve the Issue.

C.

Work with the developer to proactively collect the application logs to identify future errors of this type.

D.

Send an email communication to the company about the issue and the steps taken to resolve it.

Full Access
Question # 98

Which of the following is the PRIMARY security concern with virtual machine escape?

A.

Cross-site scripting

B.

Compromising the hypervisor

C.

Overutilization of resources

D.

Rogue virtual machines installed on the hypervisor

Full Access
Question # 99

A department sends in a ticket to report a printer is not working. The responding technician sees paper stuck to the fuser, which is much hotter than normal. The (user was just installed a few weeks ago. as indicated by the service history. Which of the following should the technician do NEXT?

A.

Disconnect the printer power for troubleshooting.

B.

Install a printer roller kit.

C.

Replace the overheating fuser.

D.

Replace the paper with thicker paper stock.

Full Access
Question # 100

Which of the following commonly uses NFC?

A.

Contactless payments

B.

loT devices

C.

Inventory tracking

D.

Tethering

Full Access
Question # 101

A startup is looking to immediately expand its data center but does not have the personnel or space to manage everything internally. The organization has multiple small offices and remote users with large computational and storage-solution requirements. Funding is not an issue for the company. Which of the following can BEST accomplish the company's goals?

A.

SaaS

B.

laaS

C.

ISP

D.

SON

Full Access
Question # 102

Which of the following is used to implement network security polices for an environment?

A.

Managed switch

B.

Repeater

C.

Firewall

D.

Gateway

Full Access
Question # 103

Which of the following allows a switch to be divided into separate logical networks?

A.

VLAN

B.

SSL VPN

C.

NAT

D.

RADIUS

Full Access
Question # 104

The IT department issued a corporate smartphone to a user, but the user returned the device stating it had connectivity Issues. The user claimed the device functioned on WI-FI but all connectivity to cloud services was lost as soon as the device was taken off site. Which of the following issues was MOST likely affecting the device?

A.

MDM was never properly set up on the device.

B.

S/MIME certificates were corrupted and needed to be reloaded.

C.

Bluetooth on the device was disabled by mistake.

D.

The device never had a proper SIM card installed.

Full Access
Go to page: