CompTIA A+ Certification Exam: Core 2 V13.55

SharpestPoisson avatar
SharpestPoisson
·
·
Download

Start Quiz

Study Flashcards

8 Questions

What is the FIRST step in troubleshooting for a home PC running Windows 10 that is having issues loading applications after a reboot?

Check for any installed patches and roll them back one at a time until the issue is resolved

Which feature BEST addresses the concern of someone being able to access a mobile device by repeatedly attempting random patterns to unlock it?

Remote wipe

What tool should a technician use to address a PC running slowly suspected to have a badly fragmented hard drive?

dfrgui.exe

Which encryption technology should be used to secure a workstation used for point-of-sale transactions, to protect data in case of theft?

Disk encryption

What should be checked FIRST when a user reports a computer running slowly after installing security applications and the hard drive activity light is solid?

System File Checker to check for modified Windows files

What is the BEST solution to ensure data security on smartphones issued to employees in case of loss or theft?

Remote wipe

Which backup method would BEST meet the requirements of retaining sensitive data on a workstation for many years in case of a ransomware outbreak?

A full backup of the data stored off-site in cold storage

What should be the NEXT action when an executive contacts the help desk chat support about an issue with a mobile device?

Educate the user on the solution that was performed

Study Notes

CompTIA A+ Certification: Exam Core 2

Security

  • WPA3 is the latest version of Wi-Fi security and offers the highest level of protection available.
  • WPA3 protects against brute force password attempts and eavesdropping and man-in-the-middle attacks.
  • WPA3 supports the use of stronger encryption algorithms, such as the Advanced Encryption Standard (AES).

Wireless Network

  • To ensure the best possible security for a new wireless router, implement WPA3.
  • A third-party GPS application can use up a data plan on a corporate phone, leading to slow performance and data limit issues.

Malware and Viruses

  • If a user's computer has a virus, and the antivirus software is out of date, download the latest virus definitions to ensure the antivirus software is up-to-date.
  • Rebooting a system in safe mode can help remove malware while preserving user files.
  • Cryptominer is a type of malware that can cause a PC to run slowly and increase GPU temperature.

System Administration

  • To configure a Windows device to require a password when resuming from a period of sleep or inactivity, use the Screensaver settings.
  • To exclude an application folder from being cataloged by a Windows 10 search, use the Indexing Options utility.
  • To transfer sensitive personal information between offices, use a USB drive with encryption, such as BitLocker To Go.

Network and Internet

  • A user's smartphone data usage is likely above average if an installed application is transmitting data in the background.
  • To control security settings on an Android phone in a domain environment, use a Mobile Device Management (MDM) solution.
  • A user may not be able to use internet-related functions on a smartphone when it is not connected to Wi-Fi if the smartphone's line was not provisioned with a data plan.

Operating Systems

  • To provide a lightweight option for workstations that need an easy-to-use browser-based interface, use Chrome OS.
  • To reset a user's password, create a new password and require the user to change it at the next log-in.
  • To remove information from past users' hard drives in order to reuse the hard drives, use disk-wiping software.

Troubleshooting

  • To troubleshoot a computer issue, use the Resource Monitor tool to identify the issue.
  • If a user reports a computer is running slow, use the Resource Monitor tool to help identify the issue.
  • If a user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi, the most likely reason is that the smartphone's line was not provisioned with a data plan.

Shell Scripting

  • In Linux, the default file type supported by default is .sh.

Hardware and Peripherals

  • To connect an additional monitor to a PC, use a USB port.
  • To allow a mouse to correctly move to a new monitor, swap the cables for the monitors.

Certificates and Encryption

  • To realize multifactor authentication benefits for Wi-Fi access, deploy a client certificate to be used in conjunction with the user's existing username and password.

Group Policy

  • If a Group Policy setting is applied to all workstations in the network, and users are unable to log in, the most likely cause is a difference in system clocks between the workstations and the authentication server.

macOS

  • To resize a partition on the internal storage drive of a computer running macOS, use the Disk Utility tool.

Laptop and Docking Station

  • To prevent a laptop from going to sleep when it is closed and on a docking station, select the option "Do Nothing" when I close the lid under the Plugged in category.### IT Certification Guaranteed, The Easy Way!

Changing Desktop Wallpaper

  • To change the wallpaper on a Windows 10 computer using the Windows 10 Settings tool, go to Settings > Personalization > Background.

Disposing of Non-Compliant Ethernet Cards

  • The most environmentally friendly method of disposing of non-compliant Ethernet cards is to use a dumpster for recycling plastics.

Default Apps

  • To ensure that PDF files open in Adobe Reader, use the Default Apps utility in Windows 10.

Hiding Files

  • To hide a file, use the File Explorer application.

Securing Workstations

  • The best way to secure a workstation quickly is to use a key combination to lock the computer.
  • When a user reports potential malware, the first step is to disconnect the affected system from the network.

Text Size

  • To increase the size of text, applications, and other items on a Windows 10 computer, go to Settings > System > Display and change the Scale and layout setting to a higher percentage.

Malware Removal

  • After using an anti-malware removal tool, educate the user on how to access recovery mode.

Cryptocurrency Mining

  • If an employee is mining cryptocurrency on a work desktop, the Acceptable Use Policy (AUP) should be updated to reflect this new requirement.

Change Process

  • The most likely next step in the change process after a change request is approved is sandbox testing.

Proxy Issues

  • If a proxy is blocking traffic to a software update site, the technician should perform a full system scan using the OS anti-malware application.

Backup Methods

  • A full backup involves creating a copy of all data on a workstation and storing it on a set of tapes.
  • A full backup is the best way to ensure that all data is backed up and can be restored in the event of a system failure or data loss.

Physical Access

  • A badge reader can be used to implement secure physical access to a data center.

End-of-Life Operating Systems

  • End-of-life operating systems are no longer supported by the software developer and will no longer receive updates or security patches.

Security Risks

  • BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop and protect data in the event of loss or theft.

Force Quitting Programs

  • On a macOS computer, the Apple icon menu can be used to force quit a program.

Remote Access

  • The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is Windows 10 Pro.

Migration

  • An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it retains all user files and preferences.

Website Trust Issues

  • If multiple users are experiencing issues with a website, it is likely that the issue is related to the network or internet connection.

Forensic Evidence

  • Chain of custody must be maintained throughout the forensic evidence life cycle.

Linux Commands

  • The sudo command is used to install an application in Linux.

Hash Verification

  • A hash is used to verify the integrity of a downloaded file.

OS Updates

  • If a device is unable to complete a tethered OS update, the technician should check if the device has adequate storage available.

Wireless Network Interference

  • Changing channels can resolve interference on a wireless network.

Malware Infection

  • If a user's files have been changed and now have a .lok file extension, the first step is to disconnect the machine from the network.

Antivirus Protection

  • If a user receives a notification that the antivirus protection on a company laptop is out of date, the technician should check the antivirus engine and definitions.

Backup Methods

  • A full backup is the best way to ensure that all data is backed up and can be restored in the event of a system failure or data loss.

EULA

  • A EULA (End User License Agreement) is a legally binding agreement between the user and the software developer that outlines the terms and conditions of using the software.

Chain of Custody

  • Chain of custody is the process of documenting who had possession of evidence at every step of the process.

Task Manager

  • The Services tab in Task Manager contains information about which service is causing the issue.

macOS File Extensions

  • .pkg, .dmg, and .app are commonly used file extensions for installing applications on a macOS machine.

RAM Issues

  • If a Windows 10 OS has only 4GB of RAM available for use, it is likely that the OS is x86.

Backup Methods

  • A full backup should be completed first when installing a new backup and recovery system.

Security Threats

  • Account lockout policies can help mitigate the threat of dictionary attacks.

Physical Access

  • Biometric locks and badge readers can be used to secure physical access to a data center server room.### Server Room Security
  • Video surveillance and access control vestibules can be used to further secure the server room.
  • A locking rack can be used to physically secure the servers, so that they cannot be accessed without the appropriate key.

PXE Boot Option

  • The PXE (Preboot Execution Environment) boot option must be enabled in the computer's BIOS settings to boot up over the network.
  • PXE allows computers to boot up over the network, instead of from a local disk.

Filesystems

  • NTFS (New Technology File System) is a Microsoft proprietary file system that is supported by both Windows and Linux operating systems.
  • NTFS is capable of storing large amounts of data, up to 16TB, and also offers built-in security features such as encryption.

Network Security

  • Changing the network channel can help to minimize unauthorized access to a network.
  • A support portal can help to manage the volume of requests and allow customers to access customer service tools, submit requests, and view status updates.

Backup Methods

  • A full backup involves creating a copy of all data on a workstation, including system files and user-created data, and storing it on a set of tapes.
  • A full backup ensures that all data is backed up and can be restored in the event of a system failure or data loss.

Malware

  • Ransomware is malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid.
  • A user should clear the browser cache and contact the bank if they receive an error message stating that the website's security certificate was issued by a different website.

Proxy Server Configuration

  • The Internet Options utility in the Control Panel is used to configure the proxy settings for a network connection.
  • The Internet Options utility allows you to configure the proxy server address and port number.

Log-in Options

  • A PIN is the fastest and most secure method of logging in to laptops.
  • A PIN is a more secure option than a username and password, as it is more difficult to crack or guess.

Wireless Network Configuration

  • To configure a wireless network, you need to select the correct SSID, frequency, and security mode.
  • The WPA2 with AES encryption method is the most secure option for wireless networks.

Data Theft Prevention

  • Locking workstations after a period of inactivity can help to prevent data theft.
  • Encrypting workstation hard drives and logging off users when their workstations are not in use can also help to prevent data theft.

Virus Detection

  • Manually checking each machine is the most effective way to check for unknown threats.
  • Providing a sample to the antivirus vendor can help to detect and remove unknown threats.

Web Server Exploits

  • A zero-day attack is a type of attack that occurs when a vulnerability is exploited before a patch is available.
  • A zero-day attack is a type of attack that is most likely to occur on a web server.

Antivirus Software

  • Running a startup script that removes files by name is not an effective way to check for unknown threats.
  • Manually checking each machine and providing a sample to the antivirus vendor are more effective ways to check for unknown threats.

Laptop Refresh

  • A clean install is the most effective way to refresh a laptop.
  • A clean install involves reinstalling the operating system and all applications, and is the most effective way to remove all viruses and malware.

Network Addressing

  • A static IP address is required to connect to specialized software.
  • Removing the static IP configuration from the desktop is the most likely solution to resolve the issue.

Remote Desktop

  • Apple Remote Desktop is a remote access solution that allows a user to access and control another macOS computer from their Windows workstation.
  • Apple Remote Desktop provides a graphical user interface and supports file transfers, encryption, and more.

User Profile Issues

  • Rebuilding the user's profile is the most likely solution to resolve the issue.
  • Rebuilding the user's profile involves creating a new profile and transferring the user's data and settings.

Linux Server Troubleshooting

  • SSH (Secure Shell) is a method that can be used to troubleshoot a Linux server effectively.
  • SSH allows a user to access and control a remote Linux server from their Windows workstation.

Data Center Environmental Concerns

  • Humidity levels are the most important environmental concern inside a data center.
  • High levels of humidity can cause condensation, corrosion, and equipment failure, while low levels of humidity can cause static electricity to build up and lead to damage.

Laptop Security

  • Hard drive encryption is the best security practice for laptops used by employees who travel.
  • Hard drive encryption ensures that data is protected and cannot be accessed even if the laptop is stolen or lost.

Prepare for the CompTIA A+ Certification Exam: Core 2 with this practice quiz. Topics include wireless router security, protocols, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

CompTIA A+ Zertifizierungsquiz
7 questions
CompTIA A+ Core 1
10 questions

CompTIA A+ Core 1

MesmerizedNobility3086 avatar
MesmerizedNobility3086
CompTIA A+ Core 1 Hardware Quiz
5 questions
Use Quizgecko on...
Browser
Browser