220-1102: CompTIA A+ Certification Exam: Core 2 Topic 2
Question #: 51
Topic #: 1
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?
A. Device Manager
B. Indexing Options
C. File Explorer
D. Administrative Tools
Selected Answer: C
Question #: 52
Topic #: 1
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?
A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier
Selected Answer: C
Question #: 53
Topic #: 1
A technician has spent hours trying to resolve a computer issue for the company’s Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?
A. Continue researching the issue.
B. Repeat the iterative processes.
C. Inform the CEO the repair will take a couple of weeks.
D. Escalate the ticket.
Selected Answer: D
Question #: 54
Topic #: 1
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
Selected Answer: B
Question #: 55
Topic #: 1
A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same
IP address at all times. Which of the following should the technician use?
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT
Selected Answer: A
Question #: 56
Topic #: 1
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact.
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.
Selected Answer: A
Question #: 57
Topic #: 1
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment.
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS.
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive. Swap the drives as needed.
D. Set up a dual boot system by selecting the option to install Linux alongside Windows.
Selected Answer: B
Question #: 58
Topic #: 1
A user connects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?
A. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never.
B. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never.
C. Within the Power Options of the Control Panel utility, select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never.
D. Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged In category to Do Nothing.
Selected Answer: D
Question #: 59
Topic #: 1
A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message, and no changes have been made within the company. Which of the following has infected the computer?
A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger
Selected Answer: C
Question #: 60
Topic #: 1
A technician is replacing the processor in a desktop computer. Prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Choose two.)
A. Utilizing an ESD strap
B. Disconnecting the computer from the power source
C. Placing the PSU in an antistatic bag
D. Ensuring proper ventilation
E. Removing dust from the ventilation fans
F. Ensuring equipment is grounded
Selected Answer: AB
Question #: 61
Topic #: 1
A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can the user enable this option?
A. Language
B. System
C. Personalization
D. Ease of Access
Selected Answer: D
Question #: 62
Topic #: 1
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened while browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take?
A. Shut down the infected computer and swap it with another computer.
B. Investigate what the interface is and what triggered it to pop up.
C. Proceed with initiating a full scan and removal of the viruses using the presented interface.
D. Call the phone number displayed in the interface of the antivirus removal tool.
Selected Answer: B
Question #: 63
Topic #: 1
A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?
A. MDM
B. EULA
C. IRP
D. AUP
Selected Answer: D
Question #: 64
Topic #: 1
An organization is centralizing support functions and requires the ability to support a remote user’s desktop. Which of the following technologies will allow a technician to see the issue along with the user?
A. RDP
B. VNC
C. SSH
D. VPN
Selected Answer: B
Question #: 65
Topic #: 1
Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.)
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule
Selected Answer: AB
Question #: 66
Topic #: 1
Which of the following Wi-Fi protocols is the MOST secure?
A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP
Selected Answer: A
Question #: 67
Topic #: 1
A department has the following technical requirements for a new application:
Quad Core processor –
250GB of hard drive space
6GB of RAM
Touch screens –
The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?
A. CPU
B. Hard drive
C. RAM
D. Touch screen
Selected Answer: C
Question #: 68
Topic #: 1
A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?
A. Time drift
B. Dual in-line memory module failure
C. Application crash
D. Filesystem errors
Selected Answer: A
Question #: 69
Topic #: 1
A user reports that a workstation is operating sluggishly. Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?
A. Increase the paging file size.
B. Run the chkdsk command.
C. Rebuild the user’s profile.
D. Add more system memory.
E. Defragment the hard drive.
Selected Answer: D
Question #: 70
Topic #: 1
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?
A. Configure the network as private.
B. Enable a proxy server.
C. Grant the network administrator role to the user.
D. Create a shortcut to public documents.
Selected Answer: A
Question #: 71
Topic #: 1
Which of the following is a proprietary Cisco AAA protocol?
A. TKIP
B. AES
C. RADIUS.
D. TACACS+
Selected Answer: D
Question #: 72
Topic #: 1
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?
A. Console
B. Disk Utility
C. Time Machine
D. FileVault
Selected Answer: B
Question #: 73
Topic #: 1
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?
A. Internet-based upgrade
B. Repair installation
C. Clean install
D. USB repair
E. In-place upgrade
Selected Answer: C
Question #: 74
Topic #: 1
A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.
The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?
A. Spyware
B. Cryptominer
C. Ransomware
D. Boot sector virus
Selected Answer: B
Question #: 75
Topic #: 1
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists.
Which of the following would MOST likely resolve the issue?
A. Quarantining system files
B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1.0 support
Selected Answer: B
Question #: 76
Topic #: 1
A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again?
A. Scope of change
B. Risk level
C. Rollback plan
D. End user acceptance
Selected Answer: C
Question #: 77
Topic #: 1
A technician is setting up a new laptop. The company’s security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?
A. UEFI password
B. Secure boot
C. Account lockout
D. Restricted user permissions
Selected Answer: A
Question #: 78
Topic #: 1
During a recent flight, an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:
A. set AirDrop so that transfers are only accepted from known contacts.
B. completely disable all wireless systems during the flight.
C. discontinue using iMessage and only use secure communication applications.
D. only allow messages and calls from saved contacts.
Selected Answer: A
Question #: 79
Topic #: 1
A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?
A. Spam filter installation
B. Invalid registry settings
C. Malware infection
D. Operating system update
Selected Answer: D
Question #: 80
Topic #: 1
A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?
A. Guards
B. Bollards
C. Motion sensors
D. Access control vestibule
Selected Answer: B
Question #: 81
Topic #: 1
After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?
A. Port forwarding
B. Firmware updates
C. IP filtering
D. Content filtering
Selected Answer: C
Question #: 82
Topic #: 1
Which of the following is the proper way for a technician to dispose of used printer consumables?
A. Proceed with the custom manufacturer’s procedure.
B. Proceed with the disposal of consumables in standard trash receptacles.
C. Empty any residual Ink or toner from consumables before disposing of them in a standard recycling bin.
D. Proceed with the disposal of consumables in standard recycling bins.
Selected Answer: A
Question #: 83
Topic #: 1
An Android user reports that when attempting to open the company’s proprietary mobile application, it immediately closes. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST?
A. Uninstall and reinstall the application.
B. Reset the phone to factory settings.
C. Install an alternative application with similar functionality.
D. Clear the application cache.
Selected Answer: A
Question #: 84
Topic #: 1
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?
A. Changing channels
B. Modifying the wireless security
C. Disabling the SSID broadcast
D. Changing the access point name
Selected Answer: A
Question #: 85
Topic #: 1
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. Which of the following will MOST likely resolve the issue?
A. Recalibrating the magnetometer
B. Recalibrating the compass
C. Recalibrating the digitizer
D. Recalibrating the accelerometer
Selected Answer: D
Question #: 86
Topic #: 1
A Microsoft Windows PC needs to be set up for a user at a large corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?
A. Windows Enterprise Edition
B. Windows Professional Edition
C. Windows Server Standard Edition
D. Windows Home Edition
Selected Answer: A
Question #: 87
Topic #: 1
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. A technician determines there are no error messages on the device. Which of the following should the technician do NEXT?
A. Verify all third-party applications are disabled.
B. Determine if the device has adequate storage available.
C. Check if the battery is sufficiently charged.
D. Confirm a strong internet connection is available using Wi-Fi or cellular data.
Selected Answer: C
Question #: 88
Topic #: 1
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 4GB of RAM?
A. The UEFI settings need to be changed.
B. The RAM has compatibility issues with Windows 10.
C. Some of the RAM is defective.
D. The newly installed OS is x86.
Selected Answer: D
Question #: 89
Topic #: 1
A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?
A. Encrypt the workstation hard drives.
B. Lock the workstations after five minutes of inactivity.
C. Install privacy screens.
D. Log off the users when their workstations are not in use.
Selected Answer: C
Question #: 90
Topic #: 1
An organization’s Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy, unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements?
A. A daily, incremental backup that is saved to the corporate file server
B. An additional, secondary hard drive in a mirrored RAID configuration
C. A full backup of the data that is stored off site in cold storage
D. Weekly, differential backups that are stored in a cloud-hosting provider
Selected Answer: C
Question #: 91
Topic #: 1
A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?
A. Use a key combination to lock the computer when leaving.
B. Ensure no unauthorized personnel are in the area.
C. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
D. Turn off the monitor to prevent unauthorized visibility of information.
Selected Answer: A
Question #: 92
Topic #: 1
A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?
A. Convert the PC from a DHCP assignment to a static IP address.
B. Run a speed test to ensure the advertised speeds are met
C. Test all network sharing and printing functionality the customer uses.
D. Change the default passwords on new network devices.
Selected Answer: D
Question #: 93
Topic #: 1
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is
MOST likely the cause of this issue?
A. A bad antivirus signature update was installed.
B. A router was misconfigured and was blocking traffic.
C. An upstream internet service provider was flapping.
D. The time or date was not in sync with the website.
Selected Answer: D
Question #: 94
Topic #: 1
Which of the following data is MOST likely to be regulated?
A. Name in a phone book
B. Name on a medical diagnosis
C. Name on a job application
D. Name on an employer’s website
Selected Answer: B
Question #: 95
Topic #: 1
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?
A. Signed system images
B. Antivirus
C. SSO
D. MDM
Selected Answer: D
Question #: 96
Topic #: 1
A technician is setting up a conference room computer with a script that boots the application on log-in. Which of the following would the technician use to accomplish this task? (Choose two.)
A. File Explorer
B. Startup Folder
C. System Information
D. Programs and Features
E. Task Scheduler
F. Device Manager
Selected Answer: BE
Question #: 97
Topic #: 1
A systems administrator needs to reset a user’s password because the user forgot it. The systems administrator creates the new password and wants to further protect the user’s account. Which of the following should the systems administrator do?
A. Require the user to change the password at the next log-in
B. Disallow the user from changing the password.
C. Disable the account.
D. Choose a password that never expires.
Selected Answer: A
Question #: 98
Topic #: 1
A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled
Accept. Which of the following agreements is MOST likely in use?
A. DRM
B. NDA
C. EULA
D. MOU
Selected Answer: C
Question #: 99
Topic #: 1
Which of the following command-line tools will delete a directory?
A. md
B. del
C. dir
D. rd
E. cd
Selected Answer: D
Question #: 100
Topic #: 1
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?
A. Put on an ESD strap.
B. Disconnect the power before servicing the PC.
C. Place the PC on a grounded work bench.
D. Place components on an ESD mat.
Selected Answer: B