Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

220-1101 Exam Dumps - CompTIA A+ Certification Exam: Core 1

Go to page:
Question # 113

Which of the following is the SAFEST way to replace RAM on a server that has a redundant power supply?

A.

Unplug one power cable.

B.

Verify the RAM temperature.

C.

Utilize a grounding strap.

D.

Replace the RAM while the server is running.

Full Access
Question # 114

A technician is working on a help desk ticket for a user who wants the filament replaced in a 3-D printer. Which of the following should the technician do to remove the old filament and load the new one?

A.

Preheat the nozzle to melting temperature.

B.

Cut a sharp angle on the end of the strand.

C.

Push the filament along until resistance is felt.

D.

Withdraw the filament and remove the spool.

Full Access
Question # 115

A technician is replacing the RAM on an entry-level server with hot-swappabte components. Which of the following should the technician do NEXT?

A.

Replace the RAM while the server is at a cool temperature

B.

Replace the RAM while the server is running

C.

Power down the server completely and then replace the RAM

D.

Verify that the OS supports hot swapping the RAM

Full Access
Question # 116

A technician wants to deploy a .msl package lo a corporate network. The technician needs to verily the application deployment will not affect other legacy applications on the end users' computers. Which of the following would the technician consider the MOST appropriate for this situation?

A.

Virtual network

B.

Application virtualization

C.

Cross-platform virtualization

D.

Virtual sandbox

E.

Virtual desktop

Full Access
Question # 117

A user reports that their desktop PC does not turn on. Which of the following components would most likely cause the issue?

A.

PSU

B.

GPU

C.

RAM

D.

CPU

Full Access
Question # 118

The IT department at an insurance brokerage needs to acquire laptops that have built-in fingerprint readers in order to create a more secure environment. Which of the following would be the MOST secure way to implement the fingerprint readers?

A.

Grant all registered employees access to each machine.

B.

Restrict device access to only the user to whom the laptop is assigned.

C.

Limit device access to departments and guest users.

D.

Give each team member a USB drive that bypasses the reader to allow guest users lo log in.

Full Access
Question # 119

A technician just finished assembling a new PC for a client. Upon POST, the device presents an unspecified beep code and turns off automatically after five seconds. The technician double-checks the bill of materials for the new build and confirms all items have been installed. Which of the following should the technician do NEXT?

A.

Ensure thermal paste is being used on the CPU.

B.

Check to make sure that any video cards have auxiliary power cabling connected.

C.

Verify the header panel connector is properly connected.

D.

Spot-check that the I/O shield for the motherboard is properly installed.

Full Access
Question # 120

A user attempted to install an application on a desktop, and the installation attempt failed. A technician compares these installation files to those on another user's machine and finds the files are different. Which of the following should the technician do NEXT?

A.

Attempt to reinstall the application.

B.

Verify the system functionality.

C.

Test the functionality of the antivirus.

D.

Complete the final report.

E.

Determine the source of the installation file.

Full Access
Go to page: