Book Image

CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)

By : Ian Neil, Mark Birch
Book Image

CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102)

By: Ian Neil, Mark Birch

Overview of this book

The CompTIA A+ exam is not only a valuable foundational certification, but also the key to unlocking a world of exciting career possibilities in the ever-dynamic IT landscape. This book combines the best-in-class practice tests for the exam, offering a substantial volume of exam-oriented practice material and mirroring the A+ exam's level of difficulty to ensure that you are not just prepared, but brimming with confidence when you sit for the A+ exam. The book begins with Core 1, delving into mobile devices, networking, hardware, virtualization, cloud computing, and troubleshooting. The chapters help you consolidate foundational knowledge essential for supporting computer software and hardware. As you progress to Core 2, you’ll review the knowledge you need to support common operating systems and software installations. This book grants you lifelong access to valuable supplementary resources available on an online platform, which include A+ flashcards and invaluable exam insights. With unlimited website access, you’ll have the freedom to practice as often as you wish, optimizing your readiness for the exam. By the end of this book, you’ll be fully prepared to confidently take both the CompTIA A+ Core 1 and Core 2 exams.
Table of Contents (16 chapters)
2
Chapter 1: Mobile Devices
3
Chapter 2: Networking
4
Chapter 3: Hardware
5
Chapter 4: Virtualization and Cloud Computing
6
Chapter 5: Hardware and Network Troubleshooting
7
Chapter 6: Mock Exam: Core 1 (220-1101)
8
Chapter 7: Operating Systems
9
Chapter 8: Security
10
Chapter 9: Software Troubleshooting
12
Chapter 11: Mock Exam: Core 2 (220-1102)
14
Other Books You May Enjoy
15
Coupon Code for CompTIA A+ Exam Vouchers and Labs

Chapter 8: Security

8.1 Summarize various security measures and their purposes

  1. The correct answer is A. Motion sensors are primarily designed to detect any movement within their range. They are commonly used in security systems to identify the presence of unauthorized individuals or objects, trigger an alarm, or activate other security measures. Option B describes HVAC systems. Option C describes audio detection. Option D describes a photosensor.
  2. The correct answer is B. Soft tokens are software-based security tokens that generate one-time passwords (OTPs) to authenticate the user’s identity during the login process. They are commonly used in logical security systems to provide an additional layer of security. Soft tokens generate unique passwords that are valid for a short period of time, ensuring that only authorized users can access sensitive information or perform specific actions. Option A, generating secure passwords, is incorrect because soft tokens are not...