Full Transcript

IT Certification Guaranteed, The Easy Way! Exam : 220-1102 Title : CompTIA A+ Certification Exam: Core 2 Vendor : CompTIA Version : V13.55 1 IT...

IT Certification Guaranteed, The Easy Way! Exam : 220-1102 Title : CompTIA A+ Certification Exam: Core 2 Vendor : CompTIA Version : V13.55 1 IT Certification Guaranteed, The Easy Way! NO.1 A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement? (A). WPS (B). TKIP (C). WPA3 (D). WEP Answer: C Explanation WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the highest level of protection available. It is designed to protect against brute force password attempts and protect against eavesdropping and man-in-the-middle attacks. WPA3 also supports the use of stronger encryption algorithms, such as the Advanced Encryption Standard (AES), which provides additional protection for wireless networks. WPA3 should be implemented in order to ensure the best possible security for the new wireless router. NO.2 An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager? (A). All updated software must be tested with alt system types and accessories (B). Extra technician hours must be budgeted during installation of updates (C). Network utilization will be significantly increased due to the size of CAD files (D). Large update and installation files will overload the local hard drives. Answer: C NO.3 A help desk technician runs the following script: Inventory.py. The technician receives the following error message: How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run? (A). Scripts are not permitted to run. (B). The script was not built for Windows. (C). The script requires administrator privileges, (D). The runtime environment is not installed. Answer: D Explanation The error message is indicating that the script is not associated with any program on the computer that can open and run it. This means that the script requires a runtime environment, such as Python, to be installed in order for it to execute properly. Without the appropriate runtime environment, the script will not be able to run. NO.4 A technician needs lo formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? (A). FAT32 (B). ext4 (C). NTFS (D). exFAT 2 IT Certification Guaranteed, The Easy Way! Answer: C Explanation Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a whole range of them including FAT32 and NTFS, it is highly recommended to format the partition or disk you want to share in either FAT32 or NTFS, but since FAT32 has a file size limit of 4.2 GB, if you happen to work with huge files, then it is better you use NTFS NO.5 A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage? (A). Removed all jewelry (B). Completed an inventory of tools before use (C). Practiced electrical fire safety (D). Connected a proper ESD strap Answer: A NO.6 As part of a CYOD policy a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings? (A). Use Settings to access Screensaver settings (B). Use Settings to access Screen Timeout settings (C). Use Settings to access General (D). Use Settings to access Display. Answer: A NO.7 A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which of the following steps should the technician take NEXT? (A). Quarantine the computer. (B). use a previous restore point, (C). Educate the end user about viruses (D). Download the latest virus definitions Answer: D Explanation This will ensure that the antivirus software is up-to-date, and can detect any new viruses that may have been released since the last virus definition update. The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.3 Explain the importance of security awareness and 2.2 Given a scenario, use secure data management and disaster recovery principles. NO.8 A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause? (A). The GPS application is installing software updates. (B). The GPS application contains malware. (C). The GPS application is updating its geospatial map data. 3 IT Certification Guaranteed, The Easy Way! (D). The GPS application is conflicting with the built-in GPS. Answer: C Explanation The most likely cause of the notification and the slow performance of the phone is that the third- party GPS application is using up the data plan on the user's corporate phone. GPS applications require data in order to update their geospatial map data, and the data usage can quickly add up. This can lead to the user's data plan reaching its limit, and can cause the phone to slow down due to the large amount of data being used. NO.9 A user purchased a netbook that has a web-based, proprietary operating system. Which of the following operating systems is MOST likely installed on the netbook? (A). macOS (B). Linux (C). Chrome OS (D). Windows Answer: A NO.10 A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files? Answer: C Explanation Rebooting the system in safe mode will limit the number of programs and processes running, allowing the antivirus system to more effectively identify and remove the malware. Rescanning the system will allow the antivirus system to identify and remove the malware while preserving the user's files. NO.11 Which of the following is an example of MFA? (A). Fingerprint scan and retina scan (B). Password and PIN (C). Username and password (D). Smart card and password Answer: D NO.12 A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used? (A). Privacy (B). Indexing Options (C). System (D). Device Manager Answer: B 4 IT Certification Guaranteed, The Easy Way! NO.13 A change advisory board did not approve a requested change due to the lack of alternative actions if implementation failed. Which of the following should be updated before requesting approval again? (A). Scope of change (B). Risk level (C). Rollback plan (D). End user acceptance Answer: C NO.14 A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame? (A). Spyware (B). Cryptominer (C). Ransormvare (D). Boot sector virus Answer: B NO.15 A user reports a computer is running slow. Which of the following tools will help a technician identity the issued (A). Disk Cleanup (B). Group Policy Editor (C). Disk Management (D). Resource Monitor Answer: D NO.16 When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user? (A). Have the user provide a callback phone number to be added to the ticket (B). Assign the ticket to the department's power user (C). Register the ticket with a unique user identifier (D). Provide the user with a unique ticket number that can be referenced on subsequent calls. Answer: D NO.17 A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern? (A). Operating system updates (B). Remote wipe (C). Antivirus (D). Firewall Answer: C 5 IT Certification Guaranteed, The Easy Way! NO.18 A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely reason? (A). The domain's processor compatibility is not met (B). The laptop has Windows 10 Home installed (C). The laptop does not have an onboard Ethernet adapter (D). The Laptop does not have all current Windows updates installed Answer: B NO.19 A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the same IP address at all times. Which of the following should the technician use? (A). DHCP reservation (B). Port forwarding (C). DNS A record (D). NAT Answer: A NO.20 Which of the following data is MOST likely to be regulated? Answer: B NO.21 Which of the following is a proprietary Cisco AAA protocol? (A). TKIP (B). AES (C). RADIUS (D). TACACS+ Answer: D NO.22 Which of the following should be used to control security settings on an Android phone in a domain environment? (A). MDM (B). MFA (C). ACL (D). SMS Answer: A NO.23 Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use browser-based interface? (A). FreeBSD (B). Chrome OS (C). macOS (D). Windows 6 IT Certification Guaranteed, The Easy Way! Answer: B NO.24 A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow? (A). Deploy a secondary hard drive with encryption on the appropriate workstation (B). Configure a hardened SFTP portal for file transfers between file servers (C). Require files to be individually password protected with unique passwords (D). Enable BitLocker To Go with a password that meets corporate requirements Answer: D NO.25 A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need? (A). Power user account (B). Standard account (C). Guest account (D). Administrator account Answer: B NO.26 A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue? (A). Application updates (B). Anti-malware software (C). OS reinstallation (D). File restore Answer: C NO.27 A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the technician take NEXT? (A). Continue researching the issue (B). Repeat the iterative processes (C). Inform the CEO the repair will take a couple of weeks (D). Escalate the ticket Answer: D NO.28 A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi? 7 IT Certification Guaranteed, The Easy Way! (A). The smartphone's line was not provisioned with a data plan (B). The smartphone's SIM card has failed (C). The smartphone's Bluetooth radio is disabled. (D). The smartphone has too many applications open Answer: A NO.29 A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO). (A). ping :: 1 (B). ipconfig /all (C). arp -a (D). netstat /? (E). hostname (F). nslookup localhost Answer: B,E NO.30 A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use? Answer: D NO.31 A systems administrator needs to reset a users password because the user forgot it. The systems administrator creates the new password and wants to further protect the user's account Which of the following should the systems administrator do? (A). Require the user to change the password at the next log-in. (B). Disallow tie user from changing the password. (C). Disable the account (D). Choose a password that never expires. Answer: A Explanation This will ensure that the user is the only one who knows their password, and that the new password is secure. The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use appropriate data destruction and disposal methods. NO.32 A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which of the following will allow the mouse to correctly move to the new monitor? (A). Rearranging the monitor's position in display settings (B). Swapping the cables for the monitors (C). Using the Ctrl+AIt+> to correct the display orientation 8 IT Certification Guaranteed, The Easy Way! (D). Updating the display drivers for the video card Answer: B Explanation The correct answer is B. Swapping the cables for the monitors. When the second monitor is connected with the HDMI port, it is necessary to swap the cables for the monitors so that the mouse can move from the original monitor to the new monitor. This is because the HDMI port is designed to only support one monitor, and the mouse will not be able to move from one to the other without the cables being swapped. According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the cables used to connect the displays must be swapped between the displays. For example, if a monitor is connected to a system using a VGA cable, the VGA cable must be moved to the next display to allow the mouse to move between the two displays." NO.33 A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default? (A)..py (B)..js (C)..vbs (D)..sh Answer: D Explanation https://www.educba.com/shell-scripting-in-linux/ NO.34 A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method (A). Reinstalling Windows (B). Deleting all files from command-line interface (C). Performing a quick format (D). Using disk-wiping software Answer: D NO.35 A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes? (A). Run sfc / scannow on the drive as the administrator. (B). Run clearnmgr on the drive as the administrator (C). Run chkdsk on the drive as the administrator. (D). Run dffrgui on Answer: C NO.36 A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment? (A). Multifactor authentication will be forced for Wi-Fi (B). All Wi-Fi traffic will be encrypted in transit 9 IT Certification Guaranteed, The Easy Way! (C). Eavesdropping attempts will be prevented (D). Rogue access points will not connect Answer: A NO.37 A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue? (A). The SNTP server is offline. (B). A user changed the time zone on a local machine. (C). The Group Policy setting has disrupted domain authentication on the system, (D). The workstations and the authentication server have a system clock difference. Answer: D Explanation The workstations and the authentication server have a system clock difference. If a Group Policy setting is applied that forces the workstations to use a specific SNTP server, but the system clock on the workstations and the authentication server are out of sync, then this can cause authentication issues and users will be unable to log in. In this case, the most likely cause of the issue is a difference in system clocks and the technician should ensure that the clocks on the workstations and the authentication server are in sync. NO.38 A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task? (A). Consoltf (B). Disk Utility (C). Time Machine (D). FileVault Answer: B NO.39 A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station? (A). Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never (B). Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never (C). Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never (D). Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing Answer: D Explanation The laptop has an additional option under power and sleep settings that desktops do not have. Switching to do nothing prevents the screen from turning off when closed. 10 IT Certification Guaranteed, The Easy Way! NO.40 A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool? Answer: B NO.41 An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly? (A). incineration (B). Resale (C). Physical destruction (D). Dumpster for recycling plastics Answer: D Explanation When disposing of non-compliant Ethernet cards, the most environmentally friendly option is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials. Additionally, recycling plastics helps to reduce the amount of toxic chemicals that can be released into the environment. According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new materials." NO.42 Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader? (A). Network and Sharing Center (B). Programs and Features (C). Default Apps (D). Add or Remove Programs Answer: C NO.43 A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file? (A). Device Manager 11 IT Certification Guaranteed, The Easy Way! (B). Indexing Options (C). File Explorer (D). Administrative Tools Answer: C NO.44 A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away? (A). Use a key combination to lock the computer when leaving. (B). Ensure no unauthorized personnel are in the area. (C). Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity. (D). Turn off the monitor to prevent unauthorized visibility of information. Answer: A NO.45 A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT? (A). Advise the user to run a complete system scan using the OS anti-malware application (B). Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present (C). Have the user check for recently installed applications and outline those installed since the link in the email was clicked (D). Instruct the user to disconnect the Ethernet connection to the corporate network. Answer: D Explanation First thing you want to do is quarantine/disconnect the affected system from the network so whatever malicious software doesn't spread. NO.46 A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool? (A). Open Settings select Devices, select Display, and change the display resolution to a lower resolution option (B). Open Settings, select System, select Display, and change the display resolution to a lower resolution option. (C). Open Settings Select System, select Display, and change the Scale and layout setting to a higher percentage. (D). Open Settings select Personalization, select Display and change the Scale and layout setting to a higher percentage Answer: C NO.47 A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user? 12 IT Certification Guaranteed, The Easy Way! (A). Educate the user on malware removal. (B). Educate the user on how to reinstall the laptop OS. (C). Educate the user on how to access recovery mode. (D). Educate the user on common threats and how to avoid them. Answer: C NO.48 A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement? (A). MDM (B). EULA (C). IRP (D). AUP Answer: D NO.49 A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process? (A). End user acceptance (B). Perform risk analysis (C). Communicate to stakeholders (D). Sandbox testing Answer: D Explanation The risk analysis should be performed before it's taken to the board. The step after the board approves the change is End User Agreenment Reference: https://www.youtube.com/watch?v=Ru77iZxuElA&list=PLG49S3nxzAnna96gzhJrzkii4hH_mgW4b&in dex=59 NO.50 A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform? Answer: A NO.51 A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? (A). Differential backup (B). Off-site backup (C). Incremental backup (D). Full backup Answer: D Explanation 13 IT Certification Guaranteed, The Easy Way! A full backup involves creating a copy of all data on the workstation, including system files and user- created data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that the data can be restored in the event of a system failure or data loss. NO.52 Which of the following could be used to implement secure physical access to a data center? (A). Geofence (B). Alarm system (C). Badge reader (D). Motion sensor Answer: A NO.53 Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue. Click on individual tickers to see the ticket details. View attachments to determine the problem. Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu. 14 IT Certification Guaranteed, The Easy Way! 15 IT Certification Guaranteed, The Easy Way! Answer: 16 IT Certification Guaranteed, The Easy Way! Explanation Graphical user interface, text, application Description automatically generated 17 IT Certification Guaranteed, The Easy Way! NO.54 Which of the following is a consequence of end-of-lite operating systems? (A). Operating systems void the hardware warranty. (B). Operating systems cease to function. (C). Operating systems no longer receive updates. (D). Operating systems are unable to migrate data to the new operating system. Answer: C Explanation End-of-life operating systems are those which have reached the end of their life cycle and are no longer supported by the software developer. This means that the operating system will no longer receive updates, security patches, or other new features. This can leave users vulnerable to security threats, as the system will no longer be protected against the latest threats. Additionally, this can make it difficult to migrate data to a newer operating system, as the old system is no longer supported. NO.55 The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users? (A). Requiring strong passwords (B). Disabling cached credentials (C). Requiring MFA to sign on (D). Enabling BitLocker on all hard drives 18 IT Certification Guaranteed, The Easy Way! Answer: D Explanation BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop. This will protect the data stored on the drive in the event that the laptop is lost or stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be configured to require a PIN or other authentication in order to unlock the drive, providing an additional layer of security. NO.56 A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS? (A). The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit. (B). The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit. (C). The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option. (D). The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. Answer: D Explanation The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit. This is the most common method of force quitting a program in macOS. This can be done by clicking on the Apple icon in the top left of the screen, selecting Force Quit, selecting the frozen application in the list, and then clicking Force Quit. This will force the application to quit and the spinning round cursor will disappear. NO.57 Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop? (A). Home (B). Pro for Workstations (C). Enterprise (D). Pro Answer: D NO.58 A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro, The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient? (A). Golden image (B). Remote network install (C). In-place upgrade (D). Clean install Answer: C Explanation An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it will retain all user files and preferences, can be done locally, and can be done one station at a time. An in-place upgrade involves installing the new version of Windows over the existing version, 19 IT Certification Guaranteed, The Easy Way! and can be done quickly and easily. NO.59 While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue? (A). A bad antivirus signature update was installed. (B). A router was misconfigured and was blocking traffic. (C). An upstream internet service provider was flapping. (D). The time or date was not in sync with the website. Answer: B NO.60 Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence? (A). Acceptable use (B). Chain of custody (C). Security policy (D). Information management Answer: B NO.61 Which of the following Linux commands would be used to install an application? (A). yum (B). grep (C). Is (D). sudo Answer: D NO.62 Upon downloading a new ISO, an administrator is presented with the following string: 59d15a16ce90cBcc97fa7c211b767aB Which of the following BEST describes the purpose of this string? (A). XSS verification (B). AES-256 verification (C). Hash verification (D). Digital signature verification Answer: C NO.63 An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update A technician determines there are no error messages on the device Which of the following should the technician do NEXT? (A). Verify all third-party applications are disabled (B). Determine if the device has adequate storage available. (C). Check if the battery is sufficiently charged (D). Confirm a strong internet connection is available using Wi-Fi or cellular data Answer: B NO.64 A wireless network is set up, but it is experiencing some interference from other nearby 20 IT Certification Guaranteed, The Easy Way! SSIDs. Which of the following can BEST resolve the interference? (A). Changing channels (B). Modifying the wireless security (C). Disabling the SSIO broadcast (D). Changing the access point name Answer: A NO.65 A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file extension Which pf the following actions is the FIRST step the technician should take? (A). Runa live disk clone. (B). Run a full antivirus scan. (C). Use a batch file to rename the files- (D). Disconnect the machine from the network Answer: D Explanation The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario, use appropriate resources to support users and 1.3 Explain the importance of security awareness. NO.66 A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred? (A). Ransomware (B). Failed OS updates (C). Adware (D). Missing system files Answer: C NO.67 A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement? (A). Full (B). Mirror (C). Incremental (D). Differential Answer: A NO.68 After clicking on a link in an email a Chief Financial Officer (CFO) received the following error: 21 IT Certification Guaranteed, The Easy Way! The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST? (A). Update the browser's CRLs (B). File a trouble ticket with the bank. (C). Contact the ISP to report the CFCs concern (D). Instruct the CFO to exit the browser Answer: A NO.69 A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST likely in use? (A). DRM (B). NDA (C). EULA (D). MOU Answer: C Explanation The most likely agreement in use here is a EULA (End User License Agreement). This is a legally binding agreement between the user and the software developer, outlining the terms and conditions that the user must agree to in order to use the software. It is important that the user understands and agrees to the EULA before they can proceed with downloading and installing the software. As stated in the CompTIA A+ Core 2 exam objectives, users should be aware of the EULA before downloading any software. NO.70 A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe? (A). Rights management (B). Audit trail (C). Chain of custody (D). Data integrity 22 IT Certification Guaranteed, The Easy Way! Answer: C NO.71 A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue? (A). Services (B). Processes (C). Performance (D). Startup Answer: A NO.72 Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE). (A)..mac (B)..Pkg (C)..deb (D)..dmg (E)..msi (F)..appx (G)..app (H)..apk Answer: B,D,G NO.73 A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM? (A). The UEFI settings need to be changed. (B). The RAM has compatibility issues with Windows 10. (C). Some of the RAM is defective. (D). The newly installed OS is x86. Answer: D NO.74 A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST? (A). Full (B). Non-parity (C). Differential (D). Incremental Answer: A NO.75 The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat? (A). Encryption at rest 23 IT Certification Guaranteed, The Easy Way! (B). Account lockout (C). Automatic screen lock (D). Antivirus Answer: B NO.76 Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO). (A). Biometric lock (B). Badge reader (C). USB token (D). Video surveillance (E). Locking rack (F). Access control vestibule Answer: A,B Explanation A biometric lock requires an authorized user to provide a unique biometric identifier, such as a fingerprint, in order to gain access to the server room. A badge reader requires an authorized user to swipe an access card in order to gain access. Both of these methods ensure that only authorized personnel are able to access the server room. Additionally, video surveillance and access control vestibules can be used to further secure the server room. Finally, a locking rack can be used to physically secure the servers, so that they cannot be accessed without the appropriate key. NO.77 A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network? (A). The computer's CMOS battery failed. (B). The computer's NIC is faulty. (C). The PXE boot option has not been enabled (D). The Ethernet cable the technician is using to connect the desktop to the network is faulty. Answer: C Explanation The most likely reason the computer is unable to boot into the imaging system via the network is that the PXE boot option has not been enabled. PXE (Preboot Execution Environment) is an environment that allows computers to boot up over the network, instead of from a local disk. In order for this to work, the PXE boot option must be enabled in the computer's BIOS settings. As stated in the CompTIA A+ Core 2 exam objectives, technicians should know how to enable PXE in BIOS to enable network booting on a computer. NO.78 A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use? (A). FAT32 (B). ext4 (C). NTFS (D). exFAT 24 IT Certification Guaranteed, The Easy Way! Answer: C Explanation NTFS (New Technology File System) is a Microsoft proprietary file system that is supported by both Windows and Linux operating systems. NTFS is capable of storing large amounts of data, up to 16TB, and also offers built-in security features such as encryption, which makes it a great option for transferring large amounts of data between different computers. NO.79 A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue? (A). Disable unused ports. (B). Remove the guest network (C). Add a password to the guest network (D). Change the network channel. Answer: D NO.80 A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal? Answer: A NO.81 A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch of the following is the MOST secure method (A). Reinstalling Windows (B). Performing a quick format (C). Using disk-wiping software (D). Deleting all files from command-line interface Answer: C NO.82 Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue. Click on individual tickers to see the ticket details. View attachments to determine the problem. Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu. 25 IT Certification Guaranteed, The Easy Way! 26 IT Certification Guaranteed, The Easy Way! Answer: 27 IT Certification Guaranteed, The Easy Way! Explanation Graphical user interface, text, application Description automatically generated 28 IT Certification Guaranteed, The Easy Way! NO.83 Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45 p.m.? (A). taskschd.msc (B). perfmon.msc (C). lusrmgr.msc (D). Eventvwr.msc Answer: A NO.84 A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department? (A). Implementing a support portal (B). Creating a ticketing system (C). Commissioning an automated callback system (D). Submitting tickets through email Answer: A Explanation A support portal is an online system that allows customers to access customer service tools, submit requests and view status updates, as well as access information such as how-to guides, FAQs, and other self-service resources. This would be the best solution for the service desk, as it would allow them to easily manage the volume of requests by allowing customers to submit their own requests and view the status of their requests. 29 IT Certification Guaranteed, The Easy Way! Additionally, the portal would provide customers with self-service resources that can help them resolve their own issues, reducing the amount of tickets that need to be handled by the service desk. NO.85 A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task? (A). Full backup (B). Incremental backup (C). Off-site backup (D). Differential backup Answer: A Explanation A full backup involves creating a copy of all data on the workstation, including system files and user- created data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that the data can be restored in the event of a system failure or data loss. NO.86 A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer? (A). Cryptominer (B). Phishing (C). Ransomware (D). Keylogger Answer: C Explanation Ransomware is malicious software that encrypts files on a computer, making them inaccessible until a ransom is paid. In this case, the user was able to access the files before without issue, and no changes have been made within the company, so it is likely that the computer was infected with ransomware. NO.87 A user received the following error upon visiting a banking website: The security presented by website was issued a different website' s address. A technician should instruct the user to: (A). clear the browser cache and contact the bank. (B). close out of the site and contact the bank. (C). continue to the site and contact the bank. (D). update the browser and contact the bank. Answer: A Explanation The technician should instruct the user to clear the browser cache and contact the bank (option A). This error indicates that the website the user is visiting is not the correct website and is likely due to a cached version of the website being stored in the user's browser. Clearing the browser cache should remove any stored versions of the website and allow the user to access the correct website. The user should also contact the bank to confirm that they are visiting the correct website and to report the error. 30 IT Certification Guaranteed, The Easy Way! NO.88 A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities IS the BEST choice for accessing the necessary configuration to complete this goal? (A). Security and Maintenance (B). Network and Sharing Center (C). Windows Defender Firewall (D). Internet Options Answer: D Explanation The best choice for accessing the necessary configuration to configure the desktop systems to use a new proxy server is the Internet Options utility. This utility can be found in the Control Panel and allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+ Core 2 exam objectives, technicians should be familiar with the Internet Options utility and how to configure proxy settings. NO.89 A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements? (A). PIN (B). Username and password (C). SSO (D). Fingerprint Answer: A NO.90 Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company's wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online. INSTRUCTIONS Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. 31 IT Certification Guaranteed, The Easy Way! 32 IT Certification Guaranteed, The Easy Way! 33 IT Certification Guaranteed, The Easy Way! 34 IT Certification Guaranteed, The Easy Way! 35 IT Certification Guaranteed, The Easy Way! Answer: See the Explanation below: Explanation Graphical user interface, application Description automatically generated 36 IT Certification Guaranteed, The Easy Way! Click on 802.11 and Select ac Graphical user interface, application Description automatically generated Click on SSID and select CORP Graphical user interface, text, application, Teams Description automatically generated 37 IT Certification Guaranteed, The Easy Way! Click on Frequency and select 5GHz A picture containing background pattern Description automatically generated At Wireless Security Mode, Click on Security Mode Graphical user interface, text, application Description automatically generated Select the WPA2 Graphical user interface, application, Teams Description automatically generated with medium confidence Ann needs to connect to the BYOD SSID, using 2.4GHZ. The selected security method chose should be WPA PSK, and the password should be set to TotallySecret. Graphical user interface, application Description automatically generated 38 IT Certification Guaranteed, The Easy Way! NO.91 During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should: (A). set AirDrop so that transfers are only accepted from known contacts (B). completely disable all wireless systems during the flight (C). discontinue using iMessage and only use secure communication applications (D). only allow messages and calls from saved contacts Answer: A Explanation To best resolve this issue, the executive should set AirDrop so that transfers are only accepted from known contacts (option A). AirDrop is a feature on iOS devices that allows users to share files, photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers from known contacts, the executive can ensure that unwanted files and photos are not sent to their device. Additionally, the executive should ensure that the AirDrop setting is only enabled when it is necessary, as this will protect their device from any unwanted files and photos. NO.92 A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure? (A). WPA2 with TKIP (B). WPA2 with AES (C). WPA3withAES-256 (D). WPA3 with AES-128 Answer: B 39 IT Certification Guaranteed, The Easy Way! NO.93 A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center? (A). Encrypt the workstation hard drives. (B). Lock the workstations after five minutes of inactivity. (C). Install privacy screens. (D). Log off the users when their workstations are not in use. Answer: B NO.94 A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat? (A). Run a startup script that removes files by name. (B). Provide a sample to the antivirus vendor. (C). Manually check each machine. (D). Monitor outbound network traffic. Answer: C NO.95 A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred? (A). Brute force (B). Zero day (C). Denial of service (D). On-path Answer: B NO.96 A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO) (A). Scan the computer with the company-provided antivirus software (B). Install a new hard drive and clone the user's drive to it (C). Deploy an ad-blocking extension to the browser. (D). Uninstall the company-provided antivirus software (E). Click the link in the messages to pay for virus removal (F). Perform a reset on the user's web browser Answer: C,F Explanation "The user thought the company-provided antivirus software would prevent this issue." 40 IT Certification Guaranteed, The Easy Way! NO.97 A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop? (A). Internet-based upgrade (B). Repair installation (C). Clean install (D). USB repair (E). In place upgrade Answer: C NO.98 A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue? (A). Time drift (B). Dual in-line memory module failure (C). Application crash (D). Filesystem errors Answer: A NO.99 A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue? (A). Bridge the LAN connection between the laptop and the desktop. (B). Set the laptop configuration to DHCP to prevent conflicts. (C). Remove the static IP configuration from the desktop. (D). Replace the network card in the laptop, as it may be defective. Answer: C Explanation The new laptop was set up with the static IP it needs to connect to the software. The old desktop is still configured with that IP, hence the conflict. NO.100 An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation? (A). RDP through RD Gateway (B). Apple Remote Desktop (C). SSH access with SSH keys (D). VNC with username and password Answer: B Explanation Apple Remote Desktop is a remote access solution that allows a user to access and control another macOS computer from their Windows workstation. It provides a graphical user interface so that the analyst can easily access the server software running on the macOS server. Apple Remote Desktop 41 IT Certification Guaranteed, The Easy Way! also supports file transfers, so the analyst can easily transfer files between the two computers. Additionally, Apple Remote Desktop supports encryption, so data is secure during transmission. NO.101 A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT? (A). Increase the paging file size (B). Run the chkdsk command (C). Rebuild the user's profile (D). Add more system memory. (E). Defragment the hard drive. Answer: C NO.102 A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively? (A). SFTP (B). SSH (C). VNC (D). MSRA Answer: D NO.103 Which of the following is the MOST important environmental concern inside a data center? (A). Battery disposal (B). Electrostatic discharge mats (C). Toner disposal (D). Humidity levels Answer: D Explanation One of the most important environmental concerns inside a data center is the level of humidity. High levels of humidity can cause condensation, which can result in corrosion of components and other equipment. Low levels of humidity can cause static electricity to build up, potentially leading to electrostatic discharge (ESD) and damage to components. Therefore, it is crucial to maintain a relative humidity range of 40-60% in a data center to protect the equipment and ensure proper operation. NO.104 A technician is setting up a new laptop for an employee who travels, Which of the following is the BEST security practice for this scenario? (A). PIN-based login (B). Quarterly password changes (C). Hard drive encryption (D). A physical laptop lock Answer: C Explanation 42 IT Certification Guaranteed, The Easy Way! Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone without the correct encryption key. This is an important security measure for any laptop used by an employee who travels, as it helps to protect the data stored on the laptop from unauthorized access. NO.105 A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this happened white browsing the internet. The technician does not recognize the interface with which the antivirus message is presented. Which of the following is the NEXT step the technician should take? (A). Shut down the infected computer and swap it with another computer (B). Investigate what the interface is and what triggered it to pop up (C). Proceed with initiating a full scan and removal of the viruses using the presented interface (D). Call the phone number displayed in the interface of the antivirus removal tool Answer: C NO.106 Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident? (A). Pretexting (B). Spoofing (C). Vishing (D). Scareware Answer: C Explanation Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The caller will typically use a variety of techniques, such as trying to scare the target or providing false information, in order to get the target to provide the information they are after. Vishing is often used to gain access to usernames, passwords, bank account information, and other sensitive data. NO.107 A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue? (A). The user is not connected to the VPN. (B). The file server is offline. (C). A low battery is preventing the connection. (D). The log-in script failed. Answer: A NO.108 A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose? (A). Encrypting File System (B). FileVault (C). BitLocker (D). Encrypted LVM Answer: A 43 IT Certification Guaranteed, The Easy Way! NO.109 A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions? (A). Avoid distractions (B). Deal appropriately with customer's confidential material (C). Adhere to user privacy policy (D). Set and meet timelines Answer: A Explanation The technician has taken the appropriate action by not taking the call and setting the phone to silent in order to avoid any distractions and remain focused on the task at hand. This is a good example of how to maintain focus and productivity when working on a customer's PC, and will help to ensure that the job is completed in a timely and efficient manner. NO.110 A technician is investigating an employee's smartphone that has the following symptoms * The device is hot even when it is not in use. *Applications crash, especially when others are launched * Certain applications, such as GPS, are in portrait mode when they should be in landscape mode Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO). Answer: A,C NO.111 Which of the following Wi-Fi protocols is the MOST secure? (A). WPA3 (B). WPA-AES (C). WEP (D). WPA-TKIP Answer: A NO.112 A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO). (A). File Explorer (B). User Account Control (C). Windows Backup and Restore (D). Windows Firewall (E). Windows Defender (F). Network Packet Analyzer 44 IT Certification Guaranteed, The Easy Way! Answer: D,E NO.113 A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue? (A). Remove the microphone from the USB hub and plug it directly into a USB port on the PC. (B). Enable the microphone under Windows Privacy settings to allow desktop applications to access it. (C). Delete the microphone from Device Manager and scan for new hardware, (D). Replace the USB microphone with one that uses a traditional 3.5mm plug. Answer: B Explanation In Windows 10, there are privacy settings that control access to certain devices, such as microphones, cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio. The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP application to allow it to access the microphone. Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5mm plug is not recommended, as it would require purchasing a new microphone and may not solve the issue. NO.114 An Android user reports that when attempting to open the company's proprietary mobile application it immediately doses. The user states that the issue persists, even after rebooting the phone. The application contains critical information that cannot be lost. Which of the following steps should a systems administrator attempt FIRST? (A). Uninstall and reinstall the application (B). Reset the phone to factory settings (C). Install an alternative application with similar functionality (D). Clear the application cache. Answer: A NO.115 A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue? (A). Reset the phone to factory settings (B). Uninstall the fraudulent application (C). Increase the data plan limits (D). Disable the mobile hotspot. Answer: B Explanation 45 IT Certification Guaranteed, The Easy Way! Installing applications directly from a vendor's website can be risky, as the application may be malicious or fraudulent. Uninstalling the application can help mitigate the issue by removing the source of the problem. NO.116 A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need? (A). Guards (B). Bollards (C). Motion sensors (D). Access control vestibule Answer: B NO.117 A department has the following technical requirements for a new application: The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade? (A). CPU (B). Hard drive (C). RAM (D). Touch screen Answer: A NO.118 A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO). (A). Prevent a device root (B). Disable biometric authentication (C). Require a PIN on the unlock screen (D). Enable developer mode (E). Block a third-party application installation (F). Prevent GPS spoofing Answer: C,E Explanation [email protected] NO.119 A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item? (A). The hardware does not meet BitLocker's minimum system requirements. (B). BitLocker was renamed for Windows 10. (C). BitLocker is not included on Windows 10 Home. (D). BitLocker was disabled in the registry of the laptop 46 IT Certification Guaranteed, The Easy Way! Answer: C NO.120 Which of the following is the MOST basic version of Windows that includes BitLocker? (A). Home (B). pro (C). Enterprise (D). Pro for Workstations Answer: D Explanation The most basic version of Windows that includes BitLocker is Windows Pro. BitLocker is a feature of Windows Pro that provides full disk encryption for all data on a storage drive. It helps protect data from unauthorized access or theft and can help secure data from malicious attacks. Pro for Workstations includes this feature, as well as other features such as support for up to 6 TB of RAM and ReFS. NO.121 Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario? (A). Owners can be notified a change is being made and can monitor it for performance impact. Most Voted (B). A risk assessment can be performed to determine if the software is needed. (C). End users can be aware of the scope of the change. (D). A rollback plan can be implemented in case the software breaks an application. Answer: A NO.122 Which of the following command-line tools will delete a directory? (A). md (B). del (C). dir (D). rd (E). cd Answer: D Explanation To delete an empty directory, enter rd Directory or rmdir Directory. If the directory is not empty, you can remove files and subdirectories from it using the /s switch. You can also use the /q switch to suppress confirmation messages (quiet mode). NO.123 A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST? (A). Encryption (B). Wi-Fi channel (C). Default passwords (D). Service set identifier Answer: C 47 IT Certification Guaranteed, The Easy Way! NO.124 An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence? (A). Encrypt the files (B). Clone any impacted hard drives (C). Contact the cyber insurance company (D). Inform law enforcement Answer: B NO.125 A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue? (Choose Correct Answer and provide Explanation from Comptia A+ Core2 Study guide or manual from Comptia.org) (A). Updating the operating system (B). Changing proxy settings (C). Reinstalling the browser (D). Enabling port forwarding Answer: C NO.126 The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO) (A). Enable multifactor authentication for each support account (B). Limit remote access to destinations inside the corporate network (C). Block all support accounts from logging in from foreign countries (D). Configure a replacement remote-access tool for support cases. (E). Purchase a password manager for remote-access tool users (F). Enforce account lockouts after five bad password attempts Answer: A,F NO.127 A user reports a computer is running slow. Which of the following tools will help a technician identify the issue? (A). Disk Cleanup (B). Group Policy Editor (C). Disk Management (D). Resource Monitor Answer: D Explanation Resource Monitor is a Windows utility that can be used to monitor and analyze the system resources and processes running on a computer. It can be used to identify and troubleshoot any issues that might be causing the computer to run slowly, such as CPU usage, memory usage, disk I/O, and network usage. NO.128 The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected? (A). The contents of the text comptia.txt will be replaced with a new blank document 48 IT Certification Guaranteed, The Easy Way! (B). The contents of the text comptia. txt would be displayed. (C). The contents of the text comptia.txt would be categorized in alphabetical order. (D). The contents of the text comptia. txt would be copied to another comptia. txt file Answer: B NO.129 A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company's web server to become unavailable to the general public. Which of the following attacks is occurring? (A). Zero day (B). SOL injection (C). Cross-site scripting (D). Distributed denial of service Answer: A NO.130 A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST? Answer: C NO.131 A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used? (A). afc (B). ehkdsk (C). git clone (D). zobocopy Answer: A NO.132 A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do? (A). Have the user consider using an iPad if the user is unable to complete updates (B). Have the user text the user's password to the technician. (C). Ask the user to click in the Search field, type Check for Updates, and then press the Enter key (D). Advise the user to wait for an upcoming, automatic patch Answer: C Explanation The technician should guide the user to update Windows through the built-in "Check for Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates", and then press the Enter key. This will bring up the Windows Update function, which will search for any available updates and give the user the option to install them. 49 IT Certification Guaranteed, The Easy Way! NO.133 A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation? (A). Installer_x64.exe (B). Installer_Files.zip (C). Installer_32.msi (D). Installer_x86.exe (E). Installer_Win10Enterprise.dmg Answer: D NO.134 Which of the following should be done NEXT? (A). Send an email to Telecom to inform them of the issue and prevent reoccurrence. (B). Close the ticket out. (C). Tell the user to take time to fix it themselves next time. (D). Educate the user on the solution that was performed. Answer: D NO.135 A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task? (A). Degaussing (B). Low-level formatting (C). Recycling (D). Shredding Answer: D NO.136 A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use? (A). Device Manager (B). System (C). Ease of Access Center (D). Programs and Features Answer: C The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of Access Center, the technician can turn on options like high contrast display, screen magnification, and screen reader software to help the user better interact with the computer. NO.137 Which of the following is a data security standard for protecting credit cards? (A). PHI (B). NIST (C). PCI (D). GDPR Answer: C Explanation The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a 50 IT Certification Guaranteed, The Easy Way! secure environment. NO.138 A user wants to set up speech recognition on a PC In which of the following Windows Settings tools can the user enable this option? (A). Language (B). System (C). Personalization (D). Ease of Access Answer: D Explanation Open up ease of access, click on speech, then there is an on and off button for speech recognition. NO.139 Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications? (A). Install and run Linux and the required application in a PaaS cloud environment (B). Install and run Linux and the required application as a virtual machine installed under the Windows OS (C). Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed (D). Set up a dual boot system by selecting the option to install Linux alongside Windows Answer: B NO.140 A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue? Answer: A NO.141 A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST? (A). Scan and remove the malware (B). Schedule automated malware scans (C). Quarantine the system (D). Disable System Restore Answer: C NO.142 A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up 51 IT Certification Guaranteed, The Easy Way! Windows Hello Fingerprint for the user? (A). Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete (B). Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. (C). Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete (D). Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. Answer: B Explanation Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete. Windows Hello Fingerprint can be set up by navigating to the Windows 10 Settings menu, selecting the Accounts submenu, selecting Sign in options, and then selecting Windows Hello Fingerprint. The user will then be asked to place a fingerprint on the fingerprint reader repeatedly until Windows indicates that setup is complete. Windows Hello Fingerprint allows the user to log into the laptop using just their fingerprint, providing an additional layer of security. NO.143 A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns? (A). Full (B). Differential (C). Off-site (D). Grandfather-father-son Answer: B NO.144 A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement? (A). MSRA (B). VNC (C). VPN (D). SSH Answer: C NO.145 A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state but the malware persists. Which of the following would MOST likely resolve the issue? (A). Quarantining system files (B). Reimaging the workstation 52 IT Certification Guaranteed, The Easy Way! (C). Encrypting the hard drive (D). Disabling TLS 1.0 support Answer: C NO.146 An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user? (A). RDP (B). VNC (C). SSH (D). VPN Answer: B NO.147 A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue. Which of the following should a technician do to remediate the issue? (A). Roll back the updates. (B). Increase the page file. (C). Update the drivers. (D). Rebuild the profile. Answer: D NO.148 A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting? (A). Install alternate open-source software in place of the applications with issues (B). Run both CPU and memory tests to ensure that all hardware functionality is normal (C). Check for any installed patches and roll them back one at a time until the issue is resolved (D). Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications. Answer: C NO.149 A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern? (A). Remote wipe (B). Anti-maIware (C). Device encryption (D). Failed login restrictions Answer: A NO.150 A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the: 53 IT Certification Guaranteed, The Easy Way! Answer: A Explanation Logging into a user's account without their explicit permission is a violation of the acceptable use policy, which outlines the rules and regulations by which a user must abide while using a computer system. By logging into the user's account without their permission, the technician would be violating this policy. Additionally, this action could be seen as a breach of confidentiality, as the technician would have access to information that should remain confidential. NO.151 A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use? (A). resmon exe (B). msconfig.extf (C). dfrgui exe (D). msmfo32.exe Answer: C NO.152 A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading? (A). Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin (B). Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run (C). Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup (D). Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup. Answer: D Explanation This is the most effective way to selectively prevent programs from loading on a Windows 10 machine. The Startup tab can be accessed by opening Task Manager and then selecting the Startup tab. From there, the technician can methodically disable items that are currently listed as enabled, reboot the machine, and check for issue resolution at each startup. If the issue persists, the technician can then move on to disabling the next item on the list. NO.153 While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT? (A). Send a quick message regarding the delay to the next customer. (B). Cut the current customer's lime short and rush to the next customer. (C). Apologize to the next customer when arriving late. 54 IT Certification Guaranteed, The Easy Way! (D). Arrive late to the next meeting without acknowledging the lime. Answer: A NO.154 A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft? (A). Data-in-transit encryption (B). File encryption (C). USB drive encryption (D). Disk encryption Answer: D NO.155 A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO). (A). ipconfig /all (B). hostname (C). netstat /? (D). nslookup localhost (E). arp -a (F). ping :: 1 Answer: A,B NO.156 A suite of security applications was installed a few days ago on a user's home computer. The user reports that the computer has been running slowly since the installation. The user notices the hard drive activity light is constantly solid. Which of the following should be checked FIRST? (A). Services in Control Panel to check for overutilization (B). Performance Monitor to check for resource utilization (C). System File Checker to check for modified Windows files (D). Event Viewer to identify errors Answer: C Explanation System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows utility that can be used to scan for and restore corrupt Windows system files. SFC can be used to detect and fix any modified or corrupted system files on a computer, and thus should be checked first when a user reports that their computer has been running slowly since the installation of security applications. By checking SFC, any modified or corrupted system files can be identified and fixed, potentially improving the overall performance of the computer. NO.157 A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution? (A). Anti-malware (B). Remote wipe (C). Locator applications (D). Screen lock Answer: B 55 IT Certification Guaranteed, The Easy Way! NO.158 An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods would BEST meet the requirements? (A). A daily, incremental backup that is saved to the corporate file server (B). An additional, secondary hard drive in a mirrored RAID configuration (C). A full backup of the data that is stored of site in cold storage (D). Weekly, differential backups that are stored in a cloud-hosting provider Answer: C Explanation According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a separate physical location, it is less likely to be affected by the same event that could cause data loss on the original system. Cold storage is a term used for data archiving, which typically refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for regulatory or compliance reasons. NO.159 An executive has contacted you through the help-desk chat support about an issue with a mobile device. Assist the executive to help resolve the issue. 56 IT Certification Guaranteed, The Easy Way! Which of the following should be done NEXT? (A). Educate the user on the solution that was performed. (B). Tell the user to take time to fix it themselves next time. (C). Close the ticket out. (D). Send an email to Telecom to inform them of the Issue and prevent reoccurrence. Answer: A NO.160 A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO). (A). Utilizing an ESD strap (B). Disconnecting the computer from the power source (C). Placing the PSU in an antistatic bag (D). Ensuring proper ventilation (E). Removing dust from the ventilation fans (F). Ensuring equipment is grounded Answer: A,B 57

Use Quizgecko on...
Browser
Browser