220-1102: CompTIA A+ Certification Exam: Core 2 Topic 7
Question #: 301
Topic #: 1
A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer’s satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?
A. Inform the customer that the issue is not within the scope of this department.
B. Apologize to the customer and escalate the issue to a manager.
C. Ask the customer to explain the issue and then try to fix it independently.
D. Respond that the issue is something the customer should be able to fix.
Selected Answer: B
Question #: 302
Topic #: 1
A user reported that a laptop’s screen turns off very quickly after sitting for a few moments and is also very dim when not plugged in to an outlet. Everything else seems to be functioning normally. Which of the following Windows settings should be configured?
A. Power Plans
B. Hibernate
C. Sleep/Suspend
D. Screensaver
Selected Answer: A
Question #: 303
Topic #: 1
A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan is unable to locate the source of an infection. Which of the following should the technician check NEXT?
A. Windows updates
B. DNS settings
C. Certificate store
D. Browser plug-ins
Selected Answer: B
Question #: 304
Topic #: 1
The courts determined that a cybercrimes case could no longer be prosecuted due to the agency’s handling of evidence. Which of the following was MOST likely violated during the investigation?
A. Open-source software
B. EULA
C. Chain of custody
D. AUP
Selected Answer: C
Question #: 305
Topic #: 1
A user reports a virus is on a PC. The user installs additional real-time protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?
A. Uninstall one antivirus software program and install a different one.
B. Launch Windows Update, and then download and install OS updates.
C. Activate real-time protection on both antivirus software programs.
D. Enable the quarantine feature on both antivirus software programs.
E. Remove the user-installed antivirus software program.
Selected Answer: E
Question #: 306
Topic #: 1
A technician removed a virus from a user’s device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?
A. Disable System Restore.
B. Educate the end user.
C. Install the latest OS patches.
D. Clean the environment preinstallation.
Selected Answer: B
Question #: 307
Topic #: 1
A technician is concerned about a large increase in the number of whaling attacks happening in the industry. The technician wants to limit the company’s risk to avoid any issues. Which of the following items should the technician implement?
A. Screened subnet
B. Firewall
C. Anti-phishing training
D. Antivirus
Selected Answer: C
Question #: 308
Topic #: 1
A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?
A. Personalization
B. Apps
C. Updates
D. Display
Selected Answer: A
Question #: 309
Topic #: 1
A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Choose two.)
A. Local Network Connection
B. User Account Control
C. Windows Backup and Restore
D. Windows Firewall
E. Windows Defender
F. Network Packet Analyzer
Selected Answer: CE
Question #: 310
Topic #: 1
A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?
A. Resource Monitor
B. Performance Monitor
C. Command Prompt
D. System Information
Selected Answer: C
Question #: 311
Topic #: 1
Which of the following protects a mobile device against unwanted access when it is left unattended?
A. PIN code
B. OS updates
C. Antivirus software
D. BYOD policy
Selected Answer: A
Question #: 312
Topic #: 1
A systems administrator installed the latest Windows security patch and received numerous tickets reporting slow performance the next day. Which of the following should the administrator do to resolve this issue?
A. Rebuild user profiles.
B. Roll back the updates.
C. Restart the services.
D. Perform a system file check.
Selected Answer: B
Question #: 313
Topic #: 1
A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use for wide-scale deployment?
A. USB drive
B. DVD installation media
C. PXE boot
D. Recovery partition
Selected Answer: C
Question #: 314
Topic #: 1
A Windows user recently replaced a computer. The user can access the public internet on the computer; however, an internal site at https://companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?
A. Default gateway settings
B. DHCP settings
C. IP address settings
D. Firewall settings
E. Antivirus settings
Selected Answer: A
Question #: 315
Topic #: 1
Which of the following refers to the steps to be taken if an issue occurs during a change implementation?
A. Testing
B. Rollback
C. Risk
D. Acceptance
Selected Answer: B
Question #: 316
Topic #: 1
A company would like to implement multifactor authentication for all employees at a minimal cost. Which of the following best meets the company’s requirements?
A. Biometrics
B. Soft token
C. Access control lists
D. Smart card
Selected Answer: B
Question #: 317
Topic #: 1
A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?
A. Escalating the issue to Tier 2
B. Verifying warranty status with the vendor
C. Replacing the motherboard
D. Purchasing another PC
Selected Answer: B
Question #: 318
Topic #: 1
A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user most likely be able to make this change?
A. System
B. Devices
C. Personalization
D. Accessibility
Selected Answer: A
Question #: 319
Topic #: 1
A systems administrator is configuring centralized desktop management for computers on a domain. The management team has decided that all users’ workstations should have the same network drives, printers, and configurations. Which of the following should the administrator use to accomplish this task?
A. Network and Sharing Center
B. net use
C. User Accounts
D. regedit
E. Group Policy
Selected Answer: E
Question #: 320
Topic #: 1
A user connected an external hard drive but is unable to see it as a destination to save files. Which of the following tools will allow the drive to be formatted?
A. Disk Management
B. Device Manager
C. Disk Cleanup
D. Disk Defragmenter
Selected Answer: A
Question #: 321
Topic #: 1
Which of the following best describes when to use the YUM command in Linux?
A. To add functionality
B. To change folder permissions
C. To show documentation
D. To list file contents
Selected Answer: A
Question #: 322
Topic #: 1
Which of the following would MOST likely be used to extend the life of a device?
A. Battery backup
B. Electrostatic discharge mat
C. Proper ventilation
D. Green disposal
Selected Answer: C
Question #: 323
Topic #: 1
While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician tries the administrator password, but it is rejected. Which of the following does the technician need in order to continue the OS repair?
A. SSL key
B. Preshared key
C. WPA2 key
D. Recovery key
Selected Answer: D
Question #: 324
Topic #: 1
Which of the following allows access to the command line in macOS?
A. PsExec
B. command.com
C. Terminal
D. CMD
Selected Answer: C
Question #: 325
Topic #: 1
A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?
A. Quarantine the computer.
B. Disable System Restore.
C. Update the antivirus software definitions.
D. Boot to safe mode.
Selected Answer: A
Question #: 326
Topic #: 1
A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?
A. AAA
B. SSH
C. RDP
D. VPN
Selected Answer: C
Question #: 327
Topic #: 1
An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?
A. Image deployment
B. Recovery partition Installation
C. Remote network installation
D. Repair installation
Selected Answer: C
Question #: 328
Topic #: 1
A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)
A. Zombies
B. Keylogger
C. Adware
D. Botnet
E. Ransomware
F. Spyware
Selected Answer: AD
Question #: 329
Topic #: 1
A desktop technician has received reports that a user’s PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?
A. Disk Management
B. Disk Defragment
C. Disk Cleanup
D. Device Manager
Selected Answer: B
Question #: 330
Topic #: 1
An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the technician perform to fix the issue?
A. Disable the Windows Update service.
B. Check for updates.
C. Restore hidden updates.
D. Roll back updates.
Selected Answer: D
Question #: 331
Topic #: 1
A technician needs to transfer a file to a user’s workstation. Which of the following would best accomplish this task utilizing the workstation’s built-in protocols?
A. VPN
B. SMB
C. RMM
D. MSRA
Selected Answer: B
Question #: 332
Topic #: 1
Which of the following is most likely used to run .vbs files on Windows devices?
A. winmgmt.exe
B. powershell.exe
C. cscript.exe
D. explorer.exe
Selected Answer: C
Question #: 333
Topic #: 1
A technician wants to install Developer Mode on a Windows laptop but is receiving a “failed to install package” message. Which of the following should the technician do first?
A. Ensure internet connectivity.
B. Check for Windows updates.
C. Enable SSH.
D. Reboot computer.
Selected Answer: B
Question #: 334
Topic #: 1
A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Choose two.)
A. Installing additional RAM
B. Removing the applications from startup
C. Installing a faster SSD
D. Running the Disk Cleanup utility
E. Defragmenting the hard drive
F. Ending the processes in the Task Manager
Selected Answer: BE
Question #: 335
Topic #: 1
A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?
A. Install the software in safe mode.
B. Attach the external hardware token.
C. Install OS updates.
D. Restart the workstation after installation
Selected Answer: B
Question #: 336
Topic #: 1
Which of the following would most likely be used in a small office environment?
A. Print server
B. Virtualization
C. Domain access
D. Workgroup
Selected Answer: D
Question #: 337
Topic #: 1
When trying to access a secure internal network, the user receives an error messaging stating, “There is a problem with this website’s security certificate.” The user reboots the desktop and tries to access the website again, but the issue persists. Which of the following should the user do to prevent this error from reoccurring?
A. Reimage the system and install SSL.
B. Install Trusted Root Certificate
C. Select View Certificates and then Install Certificate.
D. Continue to access the website.
Selected Answer: B
Question #: 338
Topic #: 1
A department manager submits a help desk ticket to request the migration of a printer’s port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?
A. Document the date and time of the change.
B. Submit a change request form.
C. Determine the risk level of this change.
D. Request an unused IP address.
Selected Answer: C
Question #: 339
Topic #: 1
An IT security team is implementing a new Group Policy that will return a computer to the log-in after three minutes. Which of the following best describes the change in policy?
A. Log-in times
B. Screen lock
C. User permission
D. Log-in lockout attempts
Selected Answer: B
Question #: 340
Topic #: 1
A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Choose two.)
A. Install a host-based IDS.
B. Restrict log-ln times.
C. Enable a BIOS password.
D. Update the password complexity.
E. Disable AutoRun.
F. Update the antivirus definitions.
G. Restrict user permissions.
Selected Answer: EG
Question #: 341
Topic #: 1
A hard drive that previously contained PII needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?
A. Shredding
B. Degaussing
C. Low-level formatting
D. Recycling
Selected Answer: C
Question #: 342
Topic #: 1
A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space. While analyzing the phone, the technician does not discover any third-party applications or photos. Which of the following is the best way to resolve the issue?
A. Exchange the device for a newer one.
B. Upgrade the onboard storage.
C. Allocate more space by removing factory applications.
D. Move factory applications to external memory.
Selected Answer: C
Question #: 343
Topic #: 1
During an enterprise rollout of a new application, a technician needs to validate compliance with an application’s EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?
A. Personal use license
B. Corporate use license
C. Open-source license
D. Non-expiring license
Selected Answer: B
Question #: 344
Topic #: 1
An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the best backup approach to use in conjunction with synthetic full backups?
A. Differential
B. Open file
C. Archive
D. Incremental
Selected Answer: D
Question #: 345
Topic #: 1
A developer’s Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?
A. Amount of system RAM
B. NIC performance
C. Storage IOPS
D. Dedicated GPU
Selected Answer: A
Question #: 346
Topic #: 1
A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done next?
A. Document the date and time of change.
B. Document the purpose of the change.
C. Document the risk level.
D. Document the findings of the sandbox test.
Selected Answer: A
Question #: 347
Topic #: 1
A user’s corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Choose two.)
A. Remote wipe
B. Firewall
C. Device encryption
D. Remote backup
E. Antivirus
F. Global Positioning System
Selected Answer: AC
Question #: 348
Topic #: 1
A user visits a game vendor’s website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?
A. Synchronize the browser data.
B. Enable private browsing mode.
C. Mark the site as trusted.
D. Clear the cached file.
Selected Answer: D
Question #: 349
Topic #: 1
A user receives the following error while attempting to boot a computer:
BOOTMGR is missing –
Press Ctrl+Alt+Del to restart –
Which of the following should a desktop engineer attempt first to address this issue?
A. Repair Windows.
B. Partition the hard disk.
C. Reimage the workstation.
D. Roll back the updates.
Selected Answer: A
Question #: 350
Topic #: 1
A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?
A. Database system
B. Software management
C. Active Directory description
D. Infrastructure as a Service
Selected Answer: A