220-1102: CompTIA A+ Certification Exam: Core 2 Topic 5
Question #: 201
Topic #: 1
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?
A. Escalate the ticket to Tier 2.
B. Run a virus scan.
C. Utilize a Windows restore point.
D. Reimage the computer.
Selected Answer: B
Question #: 202
Topic #: 1
Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?
A. TACACS+
B. Kerberos
C. Preshared key
D. WPA2/AES
Selected Answer: D
Question #: 203
Topic #: 1
Which of the following would MOST likely be used to change the security settings on a user’s device in a domain environment?
A. Security groups
B. Access control list
C. Group Policy
D. Login script
Selected Answer: C
Question #: 204
Topic #: 1
Which of the following often uses an SMS or third-party application as a secondary method to access a system?
A. MFA
B. WPA2
C. AES
D. RADIUS
Selected Answer: A
Question #: 205
Topic #: 1
A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?
A. System
B. Power Options
C. Devices and Printers
D. Device Manager
Selected Answer: B
Question #: 206
Topic #: 1
A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?
A. ipconfig
B. ifconfig
C. arpa
D. ping
Selected Answer: B
Question #: 207
Topic #: 1
A user receives a call from someone who claims to be from the user’s bank and requests information to ensure the user’s account is safe. Which of the following social-engineering attacks is the user experiencing?
A. Phishing
B. Smishing
C. Whaling
D. Vishing
Selected Answer: D
Question #: 208
Topic #: 1
A user called the help desk to report an issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?
A. nslookup
B. net use
C. netstat
D. net user
Selected Answer: C
Question #: 209
Topic #: 1
Which of the following operating systems is considered closed source?
A. Ubuntu
B. Android
C. CentOS
D. OSX
Selected Answer: D
Question #: 210
Topic #: 1
An internet café has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?
A. Spyware is redirecting browser searches.
B. A cryptominer is verifying transactions.
C. Files were damaged from a cleaned virus infection.
D. A keylogger is capturing user passwords.
Selected Answer: B
Question #: 211
Topic #: 1
Which of the following should be used to secure a device from known exploits?
A. Encryption
B. Remote wipe
C. Operating system updates
D. Cross-site scripting
Selected Answer: C
Question #: 212
Topic #: 1
A technician is securing a new Windows 10 workstation and wants to enable a screensaver lock. Which of the following options in the Windows settings should the technician use?
A. Ease of Access
B. Privacy
C. Personalization
D. Update and Security
Selected Answer: C
Question #: 213
Topic #: 1
Sensitive data was leaked from a user’s smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device’s command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
A. Restore the device to factory settings.
B. Uninstall the unapproved application.
C. Disable the ability to install applications from unknown sources.
D. Ensure the device is connected to the corporate WiFi network.
Selected Answer: B
Question #: 214
Topic #: 1
A technician is creating a full inventory of the company’s IT hardware. Which of the following should the technician use for documentation management?
A. Checklist for new user setup
B. User information
C. Asset tags and IDs
D. Procurement life cycle
Selected Answer: C
Question #: 215
Topic #: 1
A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to mirror the source data for the backup?
A. copy
B. xcopy
C. robocopy
D. Copy-Item
Selected Answer: C
Question #: 216
Topic #: 1
Each time a user tries to go to the selected web search provider, a different website opens. Which of the following should the technician check FIRST?
A. System time
B. IP address
C. DNS servers
D. Windows updates
Selected Answer: C
Question #: 217
Topic #: 1
A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen fails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?
A. LCD
B. Battery
C. Accelerometer
D. Digitizer
Selected Answer: C
Question #: 218
Topic #: 1
A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?
A. Remove the HDD and then send the computer for repair.
B. Check corporate polices for guidance.
C. Delete the sensitive information before the computer leaves the building.
D. Get authorization from the manager.
Selected Answer: B
Question #: 219
Topic #: 1
Which of the following macOS features provides the user with a high-level view of all open windows?
A. Mission Control
B. Finder
C. Multiple Desktops
D. Spotlight
Selected Answer: A
Question #: 220
Topic #: 1
A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?
A. DNS
B. IPS
C. VPN
D. SSH
Selected Answer: C
Question #: 221
Topic #: 1
A technician receives a call from a user who is having issues with an application. To best understand the issue, the technician simultaneously views the user’s screen with the user. Which of the following would BEST accomplish this task?
A. SSH
B. VPN
C. VNC
D. RDP
Selected Answer: D
Question #: 222
Topic #: 1
After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?
A. Device Manager
B. Administrator Tools
C. Programs and Features
D. Recovery
Selected Answer: C
Question #: 223
Topic #: 1
A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following is MOST likely preventing the connection?
A. The Windows 10 desktop has Windows 10 Home installed.
B. The Windows 10 desktop does not have DHCP configured.
C. The Windows 10 desktop is connected via Wi-Fi.
D. The Windows 10 desktop is hibernating.
Selected Answer: A
Question #: 224
Topic #: 1
A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?
A. MSDS
B. EULA
C. UAC
D. AUP
Selected Answer: D
Question #: 225
Topic #: 1
An organization implemented a method of wireless security that requires both a user and the user’s computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?
A. TKIP
B. RADIUS
C. WPA2
D. AES
Selected Answer: B
Question #: 226
Topic #: 1
Which of the following is used to integrate Linux servers and desktops into Windows Active Directory environments?
A. apt-get
B. CIFS
C. Samba
D. grep
Selected Answer: C
Question #: 227
Topic #: 1
A technician is setting up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?
A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation
Selected Answer: D
Question #: 228
Topic #: 1
A network technician installed a SOHO router for a home office user. The user has read reports about home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can the technician MOST likely do to defend against this threat?
A. Add network content filtering.
B. Disable the SSID broadcast.
C. Configure port forwarding.
D. Change the default credentials.
Selected Answer: D
Question #: 229
Topic #: 1
A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?
A. Requiring employees to enter their usernames and passwords
B. Setting up facial recognition for each employee
C. Using a PIN and providing it to employees
D. Requiring employees to use their fingerprints
Selected Answer: C
Question #: 230
Topic #: 1
A data center is required to destroy SSDs that contain sensitive information. Which of the following is the BEST method to use for the physical destruction of SSDs?
A. Wiping
B. Low-level formatting
C. Shredding
D. Erasing
Selected Answer: C
Question #: 231
Topic #: 1
A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?
A. Examine the antivirus logs.
B. Verify the address bar URL.
C. Test the internet connection speed.
D. Check the web service status.
Selected Answer: C
Question #: 232
Topic #: 1
Which of the following script types is used with the Python language by default?
A. .ps1
B. .vbs
C. .bat
D. .py
Selected Answer: D
Question #: 233
Topic #: 1
Which of the following only has a web browser interface?
A. Linux
B. Microsoft Windows
C. iOS
D. Chromium
Selected Answer: D
Question #: 234
Topic #: 1
A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?
A. User account status
B. Mobile OS version
C. Data plan coverage
D. Network traffic outages
Selected Answer: C
Question #: 235
Topic #: 1
The web browsing speed on a customer’s mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?
A. Data usage limits
B. Wi-Fi connection speed
C. Status of airplane mode
D. System uptime
Selected Answer: D
Question #: 236
Topic #: 1
A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies that clicking on any of the drives on the user’s machine results in an error message. Other users in the office are not having any issues. As a first step, the technician would like to remove and attempt to reconnect the drives. Which of the following command-line tools should the technician use?
A. net use
B. set
C. mkdir
D. rename
Selected Answer: A
Question #: 237
Topic #: 1
A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?
A. Enable promiscuous mode.
B. Clear the browser cache.
C. Add a new network adapter.
D. Reset the network adapter.
Selected Answer: B
Question #: 238
Topic #: 1
A technician is finalizing a new workstation for a user. The user’s PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?
A. DHCP
B. SMTP
C. DNS
D. RDP
Selected Answer: A
Question #: 239
Topic #: 1
A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?
A. Windows Professional
B. Windows Education
C. Windows Enterprise
D. Windows Home
Selected Answer: D
Question #: 240
Topic #: 1
A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?
A. Cryptominers
B. Rootkit
C. Spear phishing
D. Keylogger
Selected Answer: D
Question #: 241
Topic #: 1
A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?
A. taskschd.msc
B. eventvwr.msc
C. devmgmt.msc
D. diskmgmt.msc
Selected Answer: C
Question #: 242
Topic #: 1
Which of the following defines the extent of a change?
A. Scope
B. Purpose
C. Analysis
D. Impact
Selected Answer: A
Question #: 243
Topic #: 1
All the desktop icons on a user’s newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?
A. Rolling back video card drivers
B. Restoring the PC to factory settings
C. Repairing the Windows profile
D. Reinstalling the Windows OS
Selected Answer: A
Question #: 244
Topic #: 1
A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?
A. Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service
B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS
C. Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
D. Reinstalling the OS, flashing the BIOS, and then scanning with on-premises antivirus
Selected Answer: B
Question #: 245
Topic #: 1
A technician is installing a program from an ISO file. Which of the following steps should the technician take?
A. Mount the ISO and run the installation file.
B. Copy the ISO and execute on the server.
C. Copy the ISO file to a backup location and run the ISO file.
D. Unzip the ISO and execute the setup.exe file.
Selected Answer: A
Question #: 246
Topic #: 1
A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?
A. The system is missing updates.
B. The system is utilizing a 32-bit OS.
C. The system’s memory is failing.
D. The system requires BIOS updates.
Selected Answer: B
Question #: 247
Topic #: 1
While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?
A. Evil twin
B. Impersonation
C. Insider threat
D. Whaling
Selected Answer: A
Question #: 248
Topic #: 1
A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user’s system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?
A. Boot order
B. Malware
C. Drive failure
D. Windows updates
Selected Answer: C
Question #: 249
Topic #: 1
The battery life on an employee’s new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check FIRST to troubleshoot this issue? (Choose two.)
A. Screen resolution
B. Screen zoom
C. Screen timeout
D. Screen brightness
E. Screen damage
F. Screen motion smoothness
Selected Answer: CD
Question #: 250
Topic #: 1
Which of the following is used to explain issues that may occur during a change implementation?
A. Scope change
B. End-user acceptance
C. Risk analysis
D. Rollback plan
Selected Answer: C