220-1102: CompTIA A+ Certification Exam: Core 2 Topic 3
Question #: 101
Topic #: 1
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal?
A. Security and Maintenance
B. Network and Sharing Center
C. Windows Defender Firewall
D. Internet Options
Selected Answer: D
Question #: 102
Topic #: 1
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
A. RDP through RD Gateway
B. Apple Remote Desktop
C. SSH access with SSH keys
D. VNC with username and password
Selected Answer: D
Question #: 103
Topic #: 1
Which of the following is an example of MFA?
A. Fingerprint scan and retina scan
B. Password and PIN
C. Username and password
D. Smart card and password
Selected Answer: D
Question #: 104
Topic #: 1
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A. Bridge the LAN connection between the laptop and the desktop.
B. Set the laptop configuration to DHCP to prevent conflicts.
C. Remove the static IP configuration from the desktop.
D. Replace the network card in the laptop, as it may be defective.
Selected Answer: B
Question #: 105
Topic #: 1
A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.
Which of the following should a technician do to remediate the issue?
A. Roll back the updates.
B. Increase the page file.
C. Update the drivers.
D. Rebuild the profile.
Selected Answer: D
Question #: 106
Topic #: 1
Which of the following is the MOST basic version of Windows that includes BitLocker?
A. Home
B. Pro
C. Enterprise
D. Pro for Workstations
Selected Answer: B
Question #: 107
Topic #: 1
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user’s files?
A. Run the virus scanner in an administrative mode.
B. Reinstall the operating system.
C. Reboot the system in safe mode and rescan.
D. Manually delete the infected files.
Selected Answer: C
Question #: 108
Topic #: 1
A technician is installing a new business application on a user’s desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?
A. Installer_x64.exe
B. Installer_Files.zip
C. Installer_32.msi
D. Installer_x86.exe
E. Installer_Win10Enterprise.dmg
Selected Answer: D
Question #: 109
Topic #: 1
A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email.
The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?
A. Advise the user to run a complete system scan using the OS anti-malware application.
B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present.
C. Have the user check for recently installed applications and outline those installed since the link in the email was clicked.
D. Instruct the user to disconnect the Ethernet connection to the corporate network.
Selected Answer: D
Question #: 110
Topic #: 1
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?
A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock
Selected Answer: C
Question #: 111
Topic #: 1
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
C. Delete the microphone from Device Manager and scan for new hardware.
D. Replace the USB microphone with one that uses a traditional 3.5mm plug.
Selected Answer: B
Question #: 112
Topic #: 1
A user who is unable to connect to the network submits a help desk ticket. The assigned help desk technician inquires about whether any recent changes have been made. The user reports there is construction activity in the surrounding offices. The help desk technician proceeds to ping the user’s desktop, which does not respond. Which of the following is the MOST likely cause of this issue?
A. A duplicate IP address has been issued to the user’s desktop.
B. The HDD of the OS is failing.
C. The network cable has become disconnected.
D. Malware has infected the system.
Selected Answer: C
Question #: 113
Topic #: 1
A user has been unable to access a website and has submitted a help desk ticket. The website has been verified to be online. Which of the following troubleshooting steps will MOST likely resolve the issue?
A. Deleting the browser history
B. Clearing the cache
C. Enabling private mode browsing
D. Enabling ad blocking
Selected Answer: B
Question #: 114
Topic #: 1
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro. The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?
A. Golden image
B. Remote network install
C. In-place upgrade
D. Clean install
Selected Answer: C
Question #: 115
Topic #: 1
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?
A. Requiring strong passwords
B. Disabling cached credentials
C. Requiring MFA to sign on
D. Enabling BitLocker on all hard drives
Selected Answer: D
Question #: 116
Topic #: 1
A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?
A. WPS
B. TKIP
C. WPA3
D. WEP
Selected Answer: C
Question #: 117
Topic #: 1
After returning from vacation, a user is unable to connect to the network at the corporate office. Windows allows the user to log in; however, no internal or external websites are accessible when running a browser. The user’s expected network shares are unreachable, and all websites attempted return the message, `Hmm, we can’t reach this page.` Which of the following is the MOST likely cause of this issue?
A. The user’s password expired while on vacation.
B. The user clicked on a malicious email.
C. The user connected to a captive portal while traveling.
D. The user enabled airplane mode.
Selected Answer: D
Question #: 118
Topic #: 1
Which of the following file extensions are commonly used to install applications on a macOS machine? (Choose three.)
A. .mac
B. .pkg
C. .deb
D. .dmg
E. .msi
F. .appx
G. .app
H. .apk
Selected Answer: BDG
Question #: 119
Topic #: 1
A suite of security applications was installed a few days ago on a user’s home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST?
A. Services in Control Panel to check for overutilization
B. Performance Monitor to check for resource utilization
C. System File Checker to check for modified Windows files
D. Event Viewer to identify errors
Selected Answer: B
Question #: 120
Topic #: 1
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline.
B. A user changed the time zone on a local machine.
C. The Group Policy setting has disrupted domain authentication on the system.
D. The workstations and the authentication server have a system clock difference.
Selected Answer: D
Question #: 121
Topic #: 1
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?
A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup
Selected Answer: A
Question #: 122
Topic #: 1
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user’s account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
A. acceptable use policy.
B. regulatory compliance requirements.
C. non-disclosure agreement.
D. incident response procedures.
Selected Answer: A
Question #: 123
Topic #: 1
A technician received a call stating that all files in a user’s documents folder appear to be changed, and each of the files now has a .lock file extension. Which of the following actions is the FIRST step the technician should take?
A. Run a live disk clone.
B. Run a full antivirus scan.
C. Use a batch file to rename the files.
D. Disconnect the machine from the network.
Selected Answer: D
Question #: 124
Topic #: 1
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?
A. Updating the operating system
B. Changing proxy settings
C. Reinstalling the browser
D. Enabling port forwarding
Selected Answer: B
Question #: 125
Topic #: 1
An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?
A. Risk analysis
B. Sandbox testing
C. End user acceptance
D. Lessons learned
Selected Answer: A
Question #: 126
Topic #: 1
Which of the following is a consequence of end-of life operating systems?
A. Operating systems void the hardware warranty.
B. Operating systems cease to function.
C. Operating systems no longer receive updates.
D. Operating systems are unable to migrate data to the new operating system.
Selected Answer: C
Question #: 127
Topic #: 1
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?
A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit.
B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit.
C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.
D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit.
Selected Answer: D
Question #: 128
Topic #: 1
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
A. Device Manager
B. System
C. Ease of Access Center
D. Programs and Features
Selected Answer: C
Question #: 129
Topic #: 1
A user received the following error upon visiting a banking website:
The security certificate presented by this website was issued for a different website’s address.
A technician should instruct the user to:
A. clear the browser cache and contact the bank.
B. close out of the site and contact the bank.
C. continue to the site and contact the bank
D. update the browser and contact the bank.
Selected Answer: B
Question #: 130
Topic #: 1
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor?
A. Rearranging the monitor’s position in display settings
B. Swapping the cables for the monitors
C. Using the Ctrl+Alt+=> to correct the display orientation
D. Updating the display drivers for the video card
Selected Answer: A
Question #: 131
Topic #: 1
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi. When the smartphone is connected to Wi-Fi, the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?
A. The smartphone’s line was not provisioned with a data plan
B. The smartphone’s SIM card has failed.
C. The smartphone’s Bluetooth radio is disabled
D. The smartphone has too many applications open
Selected Answer: A
Question #: 132
Topic #: 1
A help desk technician runs the following script: Inventory.py. The technician receives the following error message:
How do you want to open this file?
Which of the following is the MOST likely reason this script is unable to run?
A. Scripts are not permitted to run.
B. The script was not built for Windows.
C. The script requires administrator privileges.
D. The runtime environment is not installed.
Selected Answer: D
Question #: 133
Topic #: 1
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?
A. Zero day
B. SQL injection
C. Cross-site scripting
D. Distributed denial of service
Selected Answer: D
Question #: 134
Topic #: 1
A technician suspects the boot disk of a user’s computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?
A. Run sfc / scannow on the drive as the administrator
B. Run cleanmgr on the drive as the administrator
C. Run chkdsk on the drive as the administrator
D. Run dfrgui on the drive as the administrator
Selected Answer: C
Question #: 135
Topic #: 1
A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?
A. Stop code
B. Event Viewer
C. Services
D. System Configuration
Selected Answer: A
Question #: 136
Topic #: 1
Which of the following is the STRONGEST wireless configuration?
A. WPS
B. WPA3
C. WEP
D. WMN
Selected Answer: B
Question #: 137
Topic #: 1
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?
A. Lock all devices in a closet.
B. Ensure all devices are from the same manufacturer.
C. Change the default administrative password.
D. Install the latest operating system and patches.
Selected Answer: C
Question #: 138
Topic #: 1
While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?
A. Send a quick message regarding the delay to the next customer.
B. Cut the current customer’s time short and rush to the next customer.
C. Apologize to the next customer when arriving late.
D. Arrive late to the next meeting without acknowledging the time.
Selected Answer: A
Question #: 139
Topic #: 1
A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website. Which of the following threats was used to carry out the attack?
A. Zero day
B. Vishing
C. DDoS
D. Evil twin
Selected Answer: D
Question #: 140
Topic #: 1
A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?
A. Implementing a support portal
B. Creating a ticketing system
C. Commissioning an automated callback system
D. Submitting tickets through email
Selected Answer: B
Question #: 141
Topic #: 1
Which of the following Linux commands would be used to install an application?
A. yum
B. grep
C. ls
D. sudo
Selected Answer: A
Question #: 142
Topic #: 1
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user’s existing username and password. Which of the following BEST describes the security benefits realized after this deployment?
A. Multifactor authentication will be forced for Wi-Fi.
B. All Wi-Fi traffic will be encrypted in transit.
C. Eavesdropping attempts will be prevented.
D. Rogue access points will not connect.
Selected Answer: A
Question #: 143
Topic #: 1
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?
A. The user is not connected to the VPN.
B. The file server is offline.
C. A low battery is preventing the connection.
D. The log-in script failed.
Selected Answer: D
Question #: 144
Topic #: 1
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?
A. resmon.exe
B. msconfig.exe
C. dfrgui.exe
D. msinfo32.exe
Selected Answer: A
Question #: 145
Topic #: 1
A user enabled a mobile device’s screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user’s concern?
A. Remote wipe
B. Anti-malware
C. Device encryption
D. Failed login restrictions
Selected Answer: D
Question #: 146
Topic #: 1
Which of the following is MOST likely contained in an EULA?
A. Chain of custody
B. Backup of software code
C. Personally identifiable information
D. Restrictions of use
Selected Answer: D
Question #: 147
Topic #: 1
A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?
A. The instructions from the software company are not being followed.
B. Security controls will treat automated deployments as malware.
C. The deployment script is performing unknown actions.
D. Copying scripts off the internet is considered plagiarism.
Selected Answer: C
Question #: 148
Topic #: 1
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS is several versions out of date. The user is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the issue?
A. The device does not have enough free space to download the OS updates.
B. The device needs user confirmation to update to a major release.
C. The device is not compatible with the newest version of the OS.
D. The device is restricted from updating due to a corporate security policy.
Selected Answer: A
Question #: 149
Topic #: 1
A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
A. Default gateway
B. Host address
C. Name server
D. Subnet mask
Selected Answer: C
Question #: 150
Topic #: 1
An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?
A. Perform a risk analysis.
B. Implement the deployment.
C. Verify end user acceptance.
D. Document the lessons learned.
Selected Answer: C