220-1102: CompTIA A+ Certification Exam: Core 2 Topic 6
Question #: 251
Topic #: 1
Which of the following is an advantage of using WPA2 instead of WPA3?
A. Connection security
B. Encryption key length
C. Device compatibility
D. Offline decryption resistance
Selected Answer: C
Question #: 252
Topic #: 1
A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?
A. VNC
B. MFA
C. MSRA
D. RDP
Selected Answer: A
Question #: 253
Topic #: 1
A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?
A. Disable System Restore.
B. Schedule a malware scan.
C. Educate the end user.
D. Run Windows Update.
Selected Answer: D
Question #: 254
Topic #: 1
Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Choose two.)
A. Licensing agreements
B. Chain of custody
C. Incident management documentation
D. Data integrity
E. Material safety data sheet
F. Retention requirements
Selected Answer: BD
Question #: 255
Topic #: 1
Which of the following would MOST likely be deployed to enhance physical security for a building? (Choose two.)
A. Multifactor authentication
B. Badge reader
C. Personal identification number
D. Firewall
E. Motion sensor
F. Soft token
Selected Answer: BE
Question #: 256
Topic #: 1
A technician, who is working at a local office, has found multiple copies of home edition software installed on computers. Which of the following does this MOST likely violate?
A. EULA
B. PII
C. DRM
D. Open-source agreement
Selected Answer: A
Question #: 257
Topic #: 1
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?
A. Enable firewall ACLs.
B. Examine the localhost file entries.
C. Verify the routing tables.
D. Update the antivirus definitions.
Selected Answer: B
Question #: 258
Topic #: 1
Which of the following features must be configured on a Windows OS desktop in order to encrypt files in a laptop?
A. HDD drivers
B. BitLocker
C. Boot settings
D. RAID
Selected Answer: B
Question #: 259
Topic #: 1
A manager called the help desk to ask for assistance with creating a more secure environment for the finance department, which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?
A. Implementing password expiration
B. Restricting user permissions
C. Using screen locks
D. Disabling unnecessary services
Selected Answer: B
Question #: 260
Topic #: 1
A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?
A. A system patch disabled the antivirus protection and host firewall.
B. The system updates did not include the latest anti-malware definitions.
C. The system restore process was compromised by the malware.
D. The malware was installed before the system restore point was created.
Selected Answer: D
Question #: 261
Topic #: 1
Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?
A. APFS
B. ext4
C. CDFS
D. FAT32
Selected Answer: D
Question #: 262
Topic #: 1
Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?
A. A forgotten keychain password
B. An employee’s Apple ID used on the device
C. An operating system that has been jailbroken
D. An expired screen unlock code
Selected Answer: B
Question #: 263
Topic #: 1
Which of the following is the default GUI and file manager in macOS?
A. Disk Utility
B. Finder
C. Dock
D. FileVault
Selected Answer: B
Question #: 264
Topic #: 1
A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?
A. Surge suppressor
B. Battery backup
C. CMOS battery
D. Generator backup
Selected Answer: B
Question #: 265
Topic #: 1
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user’s issue?
A. Keylogger
B. Cryptominers
C. Virus
D. Malware
Selected Answer: D
Question #: 266
Topic #: 1
Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?
A. WPA3
B. MAC filtering
C. RADIUS
D. TACACS+
Selected Answer: A
Question #: 267
Topic #: 1
Which of the following threats will the use of a privacy screen on a computer help prevent?
A. Impersonation
B. Shoulder surfing
C. Whaling
D. Tailgating
Selected Answer: B
Question #: 268
Topic #: 1
A technician needs to override DNS and redirect IP addresses and URLs to different locations. Which of the following should the technician do?
A. Install signal repeaters.
B. Edit the hosts file.
C. Configure the firewall.
D. Enable port forwarding.
Selected Answer: B
Question #: 269
Topic #: 1
A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?
A. Password-protected Wi-Fi
B. Port forwarding
C. Virtual private network
D. Perimeter network
Selected Answer: C
Question #: 270
Topic #: 1
Which of the following operating systems can allow users to have access to the source code, can host various server applications, and can be command line only?
A. Windows
B. macOS
C. Linux
D. Chrome OS
Selected Answer: D
Question #: 271
Topic #: 1
A technician is investigating options to secure a small office wireless network. One requirement is to allow automatic logins to the network using certificates instead of passwords. Which of the following should the wireless solution have in order to support this feature?
A. RADIUS
B. AES
C. EAP-EKE
D. MFA
Selected Answer: A
Question #: 272
Topic #: 1
A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?
A. Adjust the content filtering.
B. Unmap port forwarding.
C. Disable unused ports.
D. Reduce the encryption strength.
Selected Answer: A
Question #: 273
Topic #: 1
A technician needs a way to test software without placing company systems at risk. Which of the following features should the technician use to completely achieve this objective?
A. Cryptography
B. Sandbox
C. Perimeter network
D. Firewall
Selected Answer: B
Question #: 274
Topic #: 1
A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server is consistently communicating with an IP address that is traced back to a company that awards digital currency for salving hash algorithms. Which of the following was MOST likely used to compromise the server?
A. Keylogger
B. Ransomware
C. Boot sector virus
D. Cryptomining malware
Selected Answer: D
Question #: 275
Topic #: 1
A system dives nearly full, and a technician needs to free up some space. Which of the following tools should the technician use?
A. Disk Cleanup
B. Resource Monitor
C. Disk Defragment
D. Disk Management
Selected Answer: A
Question #: 276
Topic #: 1
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?
A. EFS
B. GPT
C. MBR
D. FAT32
Selected Answer: B
Question #: 277
Topic #: 1
A developer receives the following error while trying to install virtualization software on a workstation:
VTx not supported by system –
Which of the following upgrades will MOST likely fix the issue?
A. Processor
B. Hard drive
C. Memory
D. Video card
Selected Answer: A
Question #: 278
Topic #: 1
The screen on a user’s mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do NEXT to troubleshoot the issue?
A. Calibrate the phone sensors.
B. Enable the touchscreen.
C. Reinstall the operating system.
D. Replace the screen.
Selected Answer: A
Question #: 279
Topic #: 1
A technician received a call from a user who clicked on a web advertisement. Now, every time the user moves the mouse, a pop-up displays across the monitor. Which of the following procedures should the technician perform?
A. Boot into safe mode.
B. Perform a malware scan.
C. Restart the machine.
D. Reinstall the browser.
Selected Answer: B
Question #: 280
Topic #: 1
A user’s permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?
A. SMS
B. MFA
C. ACL
D. MDM
Selected Answer: C
Question #: 281
Topic #: 1
A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?
A. Add a user account to the local administrator’s group.
B. Configure Windows Defender Firewall to allow access to all networks.
C. Create a Microsoft account.
D. Disable the guest account.
Selected Answer: A
Question #: 282
Topic #: 1
A user is unable to access a web-based application. A technician verifies the computer cannot access any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies the user can ping localhost, the gateway, and known IP addresses on the internet and receive a response. Which of the following is the MOST likely reason for the issue?
A. A firewall is blocking the application.
B. The wrong VLAN was assigned.
C. The incorrect DNS address was assigned.
D. The browser cache needs to be cleared.
Selected Answer: C
Question #: 283
Topic #: 1
A user is unable to access a website, which is widely used across the organization, and receives the following error message:
The security certificate presented by this website has expired or is not yet valid.
The technician confirms the website works when accessing it from another computer but not from the user’s computer. Which of the following should the technician perform NEXT to troubleshoot the issue?
A. Reboot the computer.
B. Reinstall the OS.
C. Configure a static IP.
D. Check the computer’s date and time.
Selected Answer: A
Question #: 284
Topic #: 1
Every time a user tries to open the organization’s proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the issue? (Choose two.)
A. Uninstalling the application
B. Gaining root access to the tablet
C. Resetting he web browser cache
D. Deleting the application cache
E. Clearing the application storage
F. Disabling mobile device management
Selected Answer: AE
Question #: 285
Topic #: 1
A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?
A. Settings > Personalization
B. Control Panel > Credential Manager
C. Settings > Accounts > Family and Other Users
D. Control Panel > Network and Sharing Center
Selected Answer: C
Question #: 286
Topic #: 1
A Windows administrator is creating user profiles that will include home directories and network printers for several new users. Which of the following is the MOST efficient way for the technician to complete this task?
A. Access control
B. Authentication application
C. Group Policy
D. Folder redirection
Selected Answer: C
Question #: 287
Topic #: 1
A user’s corporate laptop with proprietary work information was stolen from a coffee shop. The user logged in to the laptop with a simple password, and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?
A. Biometrics
B. Full disk encryption
C. Enforced strong system password
D. Two-factor authentication
Selected Answer: B
Question #: 288
Topic #: 1
A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?
A. msinfo32
B. perfmon
C. regedit
D. taskmgr
Selected Answer: D
Question #: 289
Topic #: 1
A systems administrator is experiencing issues connecting from a laptop to the corporate network using PKI. Which of the following tools can the systems administrator use to help remediate the issue?
A. certmgr.msc
B. mscontig.exe
C. lusrmgr.msc
D. perfmon.msc
Selected Answer: A
Question #: 290
Topic #: 1
A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?
A. Home
B. Pro
C. Pro for Workstations
D. Enterprise
Selected Answer: D
Question #: 291
Topic #: 1
A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?
A. The computer’s CMOS battery failed.
B. The computer’s NIC is faulty.
C. The PXE boot option has not been enabled.
D. The Ethernet cable the technician is using to connect the desktop to the network is faulty.
Selected Answer: C
Question #: 292
Topic #: 1
Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?
A. gpedit
B. gpmc
C. gpresult
D. gpupdate
Selected Answer: A
Question #: 293
Topic #: 1
A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?
A. FAT32
B. exFAT
C. BitLocker
D. EFS
Selected Answer: D
Question #: 294
Topic #: 1
A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer’s BEST choice for this environment?
A. Workgroup network
B. Public network
C. Wide area network
D. Domain network
Selected Answer: A
Question #: 295
Topic #: 1
Which of the following common security vulnerabilities can be mitigated by using put validation?
A. Brute-force attack
B. Cross-site scripting
C. SQL injection
D. Cross-site request forgery
Selected Answer: C
Question #: 296
Topic #: 1
A company is looking for a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?
A. Off-site
B. Synthetic
C. Full
D. Differential
Selected Answer: B
Question #: 297
Topic #: 1
A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?
A. RDP
B. VPN
C. SSH
D. MSRA
Selected Answer: D
Question #: 298
Topic #: 1
A user’s iPhone was permanently locked alter several failed login attempts. Which of the following will restore access to the device?
A. Fingerprint and pattern
B. Facial recognition and PIN code
C. Primary account and password
D. Secondary account and recovery code
Selected Answer: D
Question #: 299
Topic #: 1
Which of the following macOS utilities uses AES-128 to encrypt the startup disk?
A. fdisk
B. Diskpart
C. Disk Utility
D. FileVault
Selected Answer: D
Question #: 300
Topic #: 1
A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the issue?
A. Screen-sharing software
B. Secure shell
C. Virtual private network
D. File transfer software
Selected Answer: A