220-1102: CompTIA A+ Certification Exam: Core 2 Topic 4
Question #: 151
Topic #: 1
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?
A. eventvwr.msc
B. perfmon.msc
C. gpedit.msc
D. devmgmt.msc
Selected Answer: D
Question #: 152
Topic #: 1
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?
A. Power off the machine.
B. Run a full antivirus scan.
C. Remove the LAN card.
D. Install a different endpoint solution.
Selected Answer: A
Question #: 153
Topic #: 1
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:
The Audio Driver is not running.
Which of the following will MOST likely resolve the issue?
A. compmgmt.msc
B. regedit.exe
C. explorer.exe
D. taskmgr.exe
E. gpmc.msc
F. services.msc
Selected Answer: F
Question #: 154
Topic #: 1
A technician installed a new application on a workstation. For the program to function properly, it needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities should the technician use?
A. System
B. Indexing Options
C. Device Manager
D. Programs and Features
Selected Answer: A
Question #: 155
Topic #: 1
A systems administrator is setting up a Windows computer for a new user. Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?
A. Power user account
B. Standard account
C. Guest account
D. Administrator account
Selected Answer: A
Question #: 156
Topic #: 1
A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue?
A. Private-browsing mode
B. Invalid certificate
C. Modified file
D. Browser cache
Selected Answer: C
Question #: 157
Topic #: 1
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?
A. Degaussing
B. Low-level formatting
C. Recycling
D. Shredding
Selected Answer: D
Question #: 158
Topic #: 1
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?
A. If airplane mode is enabled
B. If Bluetooth is disabled
C. If NFC is enabled
D. If Wi-Fi is enabled
E. If location services are disabled
Selected Answer: C
Question #: 159
Topic #: 1
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?
A. Brute force
B. Zero day
C. Denial of service
D. On-path
Selected Answer: B
Question #: 160
Topic #: 1
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?
A. Use the application only on the home laptop because it contains the initial license.
B. Use the application at home and contact the vendor regarding a corporate license.
C. Use the application on any computer since the user has a license.
D. Use the application only on corporate computers.
Selected Answer: B
Question #: 161
Topic #: 1
A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?
A. MSRA
B. VNC
C. VPN
D. SSH
Selected Answer: C
Question #: 162
Topic #: 1
A user receives a notification indicating the data plan on the user’s corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
A. The GPS application is installing software updates.
B. The GPS application contains malware.
C. The GPS application is updating its geospatial map data.
D. The GPS application is conflicting with the built-in GPS.
Selected Answer: B
Question #: 163
Topic #: 1
A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?
A. Rights management
B. Audit trail
C. Chain of custody
D. Data integrity
Selected Answer: C
Question #: 164
Topic #: 1
A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?
A. Disabling UAC
B. Restricting local administrators
C. Enabling UPnP
D. Turning off AutoPlay
Selected Answer: D
Question #: 165
Topic #: 1
Which of the following is used to identify potential issues with a proposed change prior to implementation?
A. Request form
B. Rollback plan
C. End-user acceptance
D. Sandbox testing
Selected Answer: D
Question #: 166
Topic #: 1
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A. Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.
B. Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.
C. Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.
D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.
Selected Answer: B
Question #: 167
Topic #: 1
A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?
A. Dock
B. Spotlight
C. Mission Control
D. Launchpad
Selected Answer: C
Question #: 168
Topic #: 1
A user lost a company tablet that was used for customer intake at a doctor’s office. Which of the following actions would BEST protect against unauthorized access of the data?
A. Changing the office’s Wi-Fi SSID and password
B. Performing a remote wipe on the device
C. Changing the user’s password
D. Enabling remote drive encryption
Selected Answer: B
Question #: 169
Topic #: 1
A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.)
A. Device drivers
B. Keyboard backlight settings
C. Installed application license keys
D. Display orientation
E. Target device power supply
F. Disabling express charging
Selected Answer: AC
Question #: 170
Topic #: 1
A technician installed an application on a user’s desktop and received an error message. Which of the following tools can the technician use to research the error?
A. Resource Monitor > CPU > Services
B. Task Manager > Processes > Apps
C. Event Viewer > Windows Logs > Application
D. Device Manager > Computer
Selected Answer: C
Question #: 171
Topic #: 1
A technician is configuring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose?
A. Encrypting File System
B. File Vault
C. BitLocker
D. Encrypted LVM
Selected Answer: C
Question #: 172
Topic #: 1
A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST efficient way for the owner to install the application?
A. Use a network share to share the installation files.
B. Save software to an external hard drive to install.
C. Create an imaging USB for each PC.
D. Install the software from the vendor’s website.
Selected Answer: A
Question #: 173
Topic #: 1
A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?
A. Open Settings, select Devices, select Display, and change the display resolution to a lower resolution option.
B. Open Settings, select System, select Display, and change the display resolution to a lower resolution option.
C. Open Settings, select System, select Display, and change the Scale and layout setting to a higher percentage.
D. Open Settings, select Personalization, select Display, and change the Scale and layout setting to a higher percentage.
Selected Answer: C
Question #: 174
Topic #: 1
A user is being directed by the help desk to look up a Windows PC’s network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.)
A. ipconfig /all
B. hostname
C. netstat /?
D. nslookup localhost
E. arp -a
F. ping ::1
Selected Answer: AB
Question #: 175
Topic #: 1
Which of the following is a data security standard for protecting credit cards?
A. PHI
B. NIST
C. PCI
D. GDPR
Selected Answer: C
Question #: 176
Topic #: 1
A technician has verified that a user’s computer has a virus, and the antivirus software is out of date. Which of the following steps should the technician take NEXT?
A. Quarantine the computer.
B. Use a previous restore point.
C. Educate the end user about viruses.
D. Download the latest virus definitions.
Selected Answer: A
Question #: 177
Topic #: 1
A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to MOST likely resolve the issue?
A. Grant permissions to the installation directory.
B. Attach the external hardware token.
C. Install OS updates.
D. Restart the workstation after installation
Selected Answer: B
Question #: 178
Topic #: 1
A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Choose two.)
A. Encryption
B. Antivirus
C. AutoRun
D. Guest accounts
E. Default passwords
F. Backups
Selected Answer: AB
Question #: 179
Topic #: 1
Which of the following editions of Windows 10 requires reactivation every 180 days?
A. Enterprise
B. Pro for Workstation
C. Home
D. Pro
Selected Answer: A
Question #: 180
Topic #: 1
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
A. NTFS
B. APFS
C. ext4
D. exFAT
Selected Answer: D
Question #: 181
Topic #: 1
A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Choose two.)
A. Standard formatting
B. Drilling
C. Erasing
D. Recycling
E. Incinerating
F. Low-level formatting
Selected Answer: BF
Question #: 182
Topic #: 1
A technician is working to resolve a Wi-Fi network issue at a doctor’s office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?
A. Disable unused ports.
B. Remove the guest network.
C. Add a password to the guest network.
D. Change the network channel
Selected Answer: C
Question #: 183
Topic #: 1
A user’s system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?
A. Enabling System Restore
B. Educating the user
C. Booting into safe mode
D. Scheduling a scan
Selected Answer: B
Question #: 184
Topic #: 1
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?
A. Full
B. Mirror
C. Incremental
D. Differential
Selected Answer: C
Question #: 185
Topic #: 1
A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?
A. VPN
B. MSRA
C. SSH
D. RDP
Selected Answer: B
Question #: 186
Topic #: 1
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user’s laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user’s laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?
A. Ransomware
B. Failed OS updates
C. Adware
D. Missing system files
Selected Answer: C
Question #: 187
Topic #: 1
SIMULATION
–
Welcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.
INSTRUCTIONS
–
Click on individual tickets to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the ‘Issue’ drop-down menu. Then, select the MOST efficient resolution from the ‘Resolution’ drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the ‘Verify/Resolve’ drop-down menu.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question #: 188
Topic #: 1
HOTSPOT
–
An executive has contacted you through the help-desk chat support about an issue with a mobile device.
Assist the executive to help resolve the issue.
INSTRUCTIONS
–
Select the MOST appropriate statement for each response.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question #: 189
Topic #: 1
DRAG DROP
–
A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer.
Once the UPS stopped beeping, all functioning devices also turned off.
In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.
INSTRUCTIONS
–
Based on the customer’s requirements, connect the customer’s devices to the proper outlets. Select the power source for the Surge Protector and UPS. This may require reselecting dropdowns or removing tokens.
Each token may only be used once.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question #: 190
Topic #: 1
A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt – In active folder, .txt file titled urgent please read”. Which of the following should a support technician do FIRST?
A. Quarantine the host in the antivirus system.
B. Run antivirus scan for malicious software.
C. Investigate how malicious software was installed.
D. Reimage the computer.
Selected Answer: B
Question #: 191
Topic #: 1
A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?
A. Copy the c:\Windows\windows.1ic file over to the machine and restart.
B. Redeem the included activation key card for a product key.
C. Insert a Windows USB hardware dongle and initiate activation.
D. Activate with the digital license included with the device hardware.
Selected Answer: B
Question #: 192
Topic #: 1
Which of the following is a package management utility for PCs that are running the Linux operating system?
A. chmod
B. yum
C. man
D. grep
Selected Answer: B
Question #: 193
Topic #: 1
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?
A. Tum off airplane mode while at the register.
B. Verify that NFC is enabled.
C. Connect to the store’s Wi-Fi network.
D. Enable Bluetooth on the phone.
Selected Answer: B
Question #: 194
Topic #: 1
A technician is investigating unauthorized Wi-Fi access on a customer’s home network. Individuals are able to access the customer’s Wi-Fi network without a password. Which of the following is the MOST likely reason this situation is occurring?
A. Channel utilization is oversubscribed.
B. WPA2 exploits are being leveraged.
C. The Wi-Fi password is posted on the router.
D. The customer has a guest network enabled.
Selected Answer: D
Question #: 195
Topic #: 1
A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue?
A. Run the antivirus scan.
B. Add the required snap-in.
C. Restore the system backup.
D. Use the administrator console.
Selected Answer: B
Question #: 196
Topic #: 1
A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?
A. High availability
B. Regionally diverse backups
C. On-site backups
D. Incremental backups
Selected Answer: B
Question #: 197
Topic #: 1
A user updates a mobile device’s OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?
A. Delete the application’s cache.
B. Check for application updates.
C. Roll back the OS update.
D. Uninstall and reinstall the application.
Selected Answer: B
Question #: 198
Topic #: 1
Which of the following physical security controls can prevent laptops from being stolen?
A. Encryption
B. LoJack
C. Multifactor authentication
D. Equipment lock
E. Bollards
Selected Answer: D
Question #: 199
Topic #: 1
Which of the following should be done NEXT?
A. Educate the user on the solution that was performed.
B. Tell the user to take time to fix it themselves next time.
C. Close the ticket out.
D. Send an email to Telecom to inform them of the issue and prevent reoccurrence.
Selected Answer: A
Question #: 200
Topic #: 1
An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?
A. AUP
B. EULA
C. EOL
D. UAC
Selected Answer: C