CompTIA A+ Certification Exam: Core 1 온라인 연습
최종 업데이트 시간: 2025년12월09일
당신은 온라인 연습 문제를 통해 CompTIA 220-1201 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 220-1201 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 142개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
Tethering refers to sharing a mobile phone’s internet connection with another device, such as a laptop, either through USB, Bluetooth, or Wi-Fi. Tethering effectively turns the mobile phone into a personal hotspot for internet access.
Option A (IR): Incorrect. Infrared (IR) is used for short-range communication, such as remote controls, but it does not support internet sharing.
Option B (NFC): Incorrect. Near-field communication (NFC) is used for close-proximity data transfer, not for internet sharing.
Option C (Wi-Fi Direct): Incorrect. Wi-Fi Direct enables device-to-device communication but does not inherently provide internet sharing.
Reference: CompTIA A+ Core 1 Objectives: 1.4 (Configure basic mobile-device network connectivity)
정답:
Explanation:
A firewall monitors and filters incoming and outgoing network traffic based on security rules, protecting the network from unauthorized access and threats.
Why Not A (Switch): A switch connects devices within a network but does not monitor or filter traffic.
Why Not B (Access point): An access point provides Wi-Fi connectivity but does not filter traffic.
Why Not D (Hub): A hub simply broadcasts data to all connected devices without filtering traffic.
CompTIA A+ Exam
Reference: Core 1 (220-1201), Section 2.2, network security concepts.
정답:
Explanation:
A docking station connects to a laptop’s proprietary port or USB-C/Thunderbolt, providing access to multiple additional ports (USB, Ethernet, video, audio, etc.). It allows users to transform a laptop into a full desktop workstation.
Option A (NFC adapter): Used for short-range communication, not port expansion.
Option C (Port replicator): Similar to a dock but usually less powerful and often lacks charging or video output.
Option D (USB dongle): Adds a single function (like Wi-Fi or storage), not full port expansion.
CompTIA A+ Core 1 Exam Objective
Reference: Objective 1.4: Given a scenario, configure settings and use cases for laptops and mobile
devices.
정답:
정답:
Explanation:
DHCP (Dynamic Host Configuration Protocol) is the service used to automatically assign IP addresses to network hosts. It dynamically manages the distribution of IP addresses and configuration details (like subnet mask, gateway, and DNS servers), ensuring no two devices are assigned the same address on the network.
Option B (DNS): Incorrect. DNS translates domain names into IP addresses but does not assign them.
Option C (LDAP): Incorrect. LDAP is a protocol used for accessing and maintaining directory services, such as user information and permissions.
Option D (SMTP): Incorrect. SMTP is used for sending and receiving email, not for IP
address assignment.
Reference: CompTIA A+ Core 1 Objectives: 2.5 (Network configuration)
정답:
Explanation:
BitLocker Drive Encryption in Windows requires a Trusted Platform Module (TPM) to encrypt the boot drive securely. The TPM is a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. It validates system integrity during boot and securely stores the encryption keys. If BitLocker cannot find a TPM or it is disabled in BIOS/UEFI, drive encryption cannot proceed.
BitLocker can function without TPM using a USB startup key, but this compromises some security and is not recommended for managed enterprise environments.
Reference: "CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition" by Travis Everett and Andrew Hutz C Chapter 13, page 536C537.
"CompTIA A+ Guide to Managing and Troubleshooting PCs" by Mark Soper C Chapter 13, page 446C447.
"CompTIA A+ Complete Study Guide" by Quentin Docter C Chapter 1, page 36C38.
정답:
Explanation:
A Community Cloud is designed for use by several organizations with shared concerns (e.g., security, compliance, jurisdiction). It’s common in industries like healthcare or finance where multiple entities benefit from a common infrastructure with shared policies.
Option A (Public): Open to general public or large industry group less secure.
Option B (Hybrid): Mix of public and private does not imply industry collaboration.
Option D (Private): Dedicated to a single organization.
CompTIA A+ Core 1 Exam Objective
Reference: Objective 2.1: Compare and contrast cloud computing concepts.
정답:
Explanation:
A spam gateway filters unsolicited emails at the server level, significantly reducing spam before it reaches user inboxes.
Why Not A (Load balancer): Load balancers distribute traffic but don’t filter spam.
Why Not C (Mail forwarding): Forwarding doesn’t filter spam.
Why Not D (Proxy servers): Proxies control web traffic, not email filtering.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.10, email security controls.
정답:
Explanation:
A degraded RAID 1array usually means one of the drives has failed or is failing. The correct next step is to run diagnostics on each drive to identify the faulty one. RAID 1 uses mirroring, so one good drive should still contain all the data.
Option B: chkdsk checks file system integrity, not hardware drive health.
Option C: Rebuilding should only occurafteridentifying and replacing a faulty drive.
Option D: RAID 0 offers no redundancy and would destroy data in this context.
CompTIA A+ Core 1 Exam Objective
Reference: Objective 3.5: Given a scenario, troubleshoot problems related to storage devices.
정답:
Explanation:
Bluetooth is a wireless technology designed for short-range communication between devices. It is a classic example of a Personal Area Network (PAN), which supports communication between devices like smartphones, headsets, keyboards, and mice within a few meters. PANs are smaller in scope compared to LANs or WANs.
Reference: "CompTIA A+ Complete Study Guide" by Quentin Docter C Chapter 5, "Networking Fundamentals", page 275.
정답:
Explanation:
Client virtualization involves installing an application on a server and enabling multiple users to run the application simultaneously via virtualized sessions. This eliminates the need for individual installations on local machines.
Why Not B (Software as a Service): SaaS delivers software over the internet and does not require local installations but is managed by a third party, not the organization itself.
Why Not C (Sandboxing): Sandboxing is for isolating applications for security testing, not for concurrent user access.
Why Not D (Embedded software): Embedded software is installed on hardware devices, not shared across multiple users.
CompTIA A+ Exam
Reference: Core 1 (220-1201), Section 4.2, virtualization concepts.
정답:
Explanation:
High resource usage along with frequentpop-upsare strong signs of a malware infection. The next logical step is to update anti-malware definition sand run a full scan to detect and remove threats.
Option A: Network performance is likely not the root cause local system behavior points to malware.
Option B: Drivers affect hardware functionality; they don’t resolve malware-related slowness.
Option D: DHCP issues usually cause IP conflicts or no network access, not CPU spikes or pop-ups.
CompTIA A+ Core 1 Exam Objective
Reference: Objective 4.2: Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
정답:
Explanation:
If two devices have the same static IP address, an IP conflict occurs. This results in both devices being intermittently disconnected or unable to communicate on the network. It’s a common mistake when copying configurations manually.
Option B: DNS conflicts wouldn’t cause total disconnection and wouldn't occur just from copying IP settings.
Option C: A cable issue would only affect one workstation.
Option D: Switchport security issues wouldn't affect both machines simultaneously unless port security was configured very specifically. CompTIA A+ Core 1 Exam Objective
Reference: Objective 2.6: Given a scenario, configure and troubleshoot network connectivity.
정답:
Explanation:
Mobile Device Management (MDM) allows IT departments to enforce compliance controls, such as restricting the installation of unapproved software, on laptops and mobile devices.
Why Not A (EDR): Endpoint Detection and Response focuses on detecting and mitigating security threats, not compliance controls.
Why Not B (VPN): Virtual Private Networks provide secure connections but do not enforce software installation policies.
Why Not D (SaaS): Software as a Service refers to software delivery models and does not enforce compliance controls.
CompTIA A+ Exam
Reference: Core 2 (220-1102), Section 2.7, device management and security.
정답:
Explanation:
B. Correct the keystone:
A keystone correction adjusts the image shape when a projector is angled either up or down.
When a projector is not positioned directly perpendicular to the screen, the image becomes distorted or offset. Correcting the keystone will resolve alignment issues, ensuring that the presentation matches the display.
Incorrect Options:
A. Adjust the color settings: This is used for improving color balance and has no impact on ghosting or mismatched images.
C. Increase the brightness levels: Brightness changes the visibility of the image but does not address ghosting or alignment.
D. Replace the monitor: Replacing the monitor is unnecessary unless there is hardware failure, which is not indicated here.
Key Takeaway: Keystone correction is essential to resolve alignment and distortion issues in projected images.
Reference: CompTIA A+ Core 1 Exam Objectives (220-1201), Domain 3.4 C Display troubleshooting.