CompTIA A+ Core 2 Practice Test 220-1102

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

84 Terms

1
New cards

A curious IT administrator notices issues with certain applications invoking the kernel. Which operating system would allow the administrator to change the underlying operating system?

Android

2
New cards

A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?

Hibernate

3
New cards

A manager for a large corporation is in charge of client machines and is currently undergoing a lifecycle hardware refresh. They want to optimize the machines to be powerful enough to run applications. The manager also wants to be sure that they are not underpowered either. What can the manager use to determine CPU optimization?

Privileged Time

4
New cards

A technician uses filesystem-level encryption on some files that need to be encrypted on their device. What is this called?

EFS

5
New cards

A technician needs this skill to give full attention to the customer, so there is no disagreement or misinterpretation of what was said. What is this skill?

Active Listening

6
New cards

A helpdesk operator looks at build numbers for Windows as they plan upgrade timelines. The operator investigates the significance of the build numbers. Which of the following are the build numbers based on? (Select all that apply.)

Time of Year, Year

7
New cards

A software developer is looking at installing a new 64-bit program that will help to streamline coding and optimize workflow. What types of systems can the developer install it on?

64-bit only

8
New cards

What technique is often used to exhibit fake antivirus and security warnings or other malicious advertising?

Pop-ups

9
New cards

A user is only able to read data on the file. What account management policy is this?

Restrict user permission

10
New cards

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

MSRA

11
New cards

A company has backup storage located at a different location, which lowers the risk of losing both productions and backup copies of data. Which of the following is this backup storage?

Off-site backup storage

12
New cards

A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?

chkdsk

13
New cards

A 3D animations expert is searching for a new computer. What should they ensure it has to handle their demanding software?

Dedicated graphics card

14
New cards

A technician is tasked to figure out why a user's Gmail app will not update on their mobile phone. The technician knows several reasons that would cause this to occur. Which of the following would be one of the reasons for this problem?

Storage

15
New cards

A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?

The share was created on a Windows desktop

16
New cards

An administrator is backup chaining a database with the type of backup that utilizes a moderate time and storage requirement. What type of backup is this?

Full with differential

17
New cards

An IT professional helps to fix their friend's computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?

RDP is not a workable feature when using Windows Home edition and enables the user to connect to the machine and operate it over the network

18
New cards

A new employee calls the help desk because their phone will not connect to the office Wi-Fi. When the technician asks about the phone model, the employee says it is an iPhone 5. The technician immediately knows the problem. Which of the following could be the problem?

Configuration

19
New cards

A technician suspects a computer system is infected with malware. Which of the following activities is the correct next step?

Sandboxing

20
New cards

What is referred to as data on persistent storage like HDDs, SSDs, and thumb drives?

Data-at-rest encryption

21
New cards

A user just installed a new application on their workstation, but the application has issues even starting up. The user has been working on the machine regularly up to this point without any prior issues. Which of the following is most likely the issue?

Firewall

22
New cards

When making major adjustments to a project, a security technician will have to assess the business and technical merits as well as the risks of the adjustment plan. What documentation will need to be submitted?

Change board approval

23
New cards

An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?

Security group

24
New cards

A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?

WWAN

25
New cards

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

Force Stop

26
New cards

Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)

They provide information about the type, symptoms, purpose, and removal of malware. + They are documentation of known malware.

27
New cards

A company has employees sign a document that enforces the importance of protecting the organization from the security and legal implications of employees misusing its equipment. What is this document?

Acceptable use policy

28
New cards

An IT specialist found a damaging package on a client’s computer disguised as something else. What did the specialist find?

Trojan

29
New cards

A server administrator sets up jobs that will copy over files on various servers. They want it to detect if the file was transferred successfully and, if not, resend the file. Which command is optimal for server administrators to perform this task?

robocopy

30
New cards

A server administrator experiences performance issues on a server and needs to narrow down the source of the problem. The server is an externally facing website with high visibility for the company. The longer the site is having issues, the more customers might notice and possibly damage the company's reputation. What can the administrator use to view and log performance statistics? (Select all that apply.)

resmon.exe + perfmon.msc

31
New cards

A Windows client administrator plans to upgrade their OS in the current environment. What is one of the most important considerations for the upgrade?

User training

32
New cards

A user requests a site’s certificate, but an evil twin intercepts the request and presents a spoofed certificate, which the user’s browser accepts. What has just happened? (Select all that apply.)

An on-path attack + Malware is in the middle of the session + The user thinks they have a secure connection

33
New cards

A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware’s automatic garbage collectors then perform the actual erase of each block over time. What is this tool?

Low-level formatting

34
New cards

A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?

The user disabled a dependent service

35
New cards

A security analyst notices an unauthorized disclosure of customers' data at the company. What type of data is breached?

PII

36
New cards

An accountant has an unlimited data plan and has set data usage limit triggers for their mobile phone. What concern does the accountant have with high data usage with an unlimited data plan? (Select all that apply.)

Cryptomining, DDoS

37
New cards

A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?

GPT

38
New cards

Most vendors have recycling systems for what types of products? (Select all that apply.)

Toner, Device, Battery

39
New cards

A telltale sign of a malware infection is when changes occur to system files. Which of the following is likely the result of malware-induced changes to system files? (Select all that apply.)

Files with date stamps and file sizes that are different from known-good versions + Files that are missing or renamed

40
New cards

A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?

Dig

41
New cards

A company uses an element that reminds users when logging in to the company’s device of the current software version. What is this called?

Splash screen

42
New cards

A technician runs an isolated test that allows them to run the program without impacting the system. What is this called?

Sandbox

43
New cards

A server administrator has not used the command line in quite some time and is trying to remember what will help them with commands and how to use them. Which of the following should the administrator use?

/?

44
New cards

Which of the following malware tries to extort money from the victim?

Spyware (actually should be Ransomware IDK what CompTIA is thinking…)

45
New cards

A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software's full version. What type of antivirus does the user have in this scenario?

Rogue

46
New cards

A user uses a scripting language based on Microsoft’s Visual Basic programming language. Which of the following extensions is used?

.vbs

47
New cards

A threat actor uses a technique that allows devices to connect to an open authentication and then redirect the user’s browser to a fake captive portal that encourages the user to enter their network password. What is this technique?

Evil twin

48
New cards

A use wants to maximize resource dedication to 3D performance and frame rate. Where should the user go to do this?

Gaming

49
New cards

An IT manager, who is in charge of the client image, considers enabling a data at rest solution. Where can the manager go to enable the built-in Microsoft solution?

System Settings

50
New cards

An intern for a Windows server team is watching a server administrator verify the authenticity and integrity of an installer. Where did the administrator most likely get it from?

Internet download

51
New cards

A spouse plans a surprise birthday party for their significant other. The spouse wants to turn off activity history on their browser to make sure their significant other does not find out the surprise. Where can the spouse do this?

Privacy

52
New cards

A software company hires a new app developer. The corporate network denies access when the developer tries to connect their phone. Why would the network deny access from the developer's mobile phone?

Developer mode

53
New cards

A user performs a technique that allows them to connect their PlayStation to their network. What is this technique?

UPnP

54
New cards

The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)

Updating an application + Installing a program

55
New cards

Which of the following scenarios would result in a website having an untrusted or invalid certificate? (Select all that apply.)

The certificate has expired + The certificate is self-signed + The certificate is revoked

56
New cards

An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?

Badge reader

57
New cards

Rooting is typically an action related to Android, while jailbreaking is associated with iOS. They are both trying to do the same thing. What is that?

Gain unrestricted access

58
New cards

A user is using AirDrop to send information to another device. What type of software is this?

File transfer

59
New cards

A user has a Mac computer but likes Windows better for functionality and compatibility purposes. The user wants to sell their computer on an online marketplace and wipe their presence from the computer. Which of the following will help them accomplish this?

Disk Utility

60
New cards

Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?

Anti-malware

61
New cards

A manager received a document identifying underlying causes and recommended remediation steps to mitigate the risk of repeating an issue. What is this document called?

Incident report

62
New cards

A security administrator moves their proxy from on-premise to the cloud and wants to establish a client tunnel to the cloud proxy tunnel for web traffic. This way, the users are protected even while out in public and not connected to the domain. What should the administrator set up?

VPN

63
New cards

Users perform a technique that tends to select C, M, N, O, and S shapes. Which of the following is this?

Pattern

64
New cards

A helpdesk manager assesses older Windows 7 computers their company owns and tries to determine available upgrade paths. Which of the following can NOT be upgraded?

Windows 7 Home to Windows 10 Enterprise

65
New cards

A company’s IT support specialist is ready to start recommissioning a system a part of the malware removal process. What is the last step before removing the computer from quarantine?

Antivirus scan

66
New cards

A teenager hears from friends about a legitimate website to download games to their Samsung Galaxy phone that is not in the Google Play store. The teenager goes to the site and downloads some games. What best describes the teenager's behavior?

APK sideloading

67
New cards

What uses domain names of components loading on the web page against a vast blacklist?

Ad blocker

68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards