Comptia A+ 220-1102 Core 2 Exam Test with complete accurate questions and answers ( 2025-2026 latest release )

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

Date and time

a technician receives an invalid certificate error when visiting a website with port 443 enabled. other. computers on the same LAN dont exhibit this symptom. which of the following needs to be adjusted on the workstation to fix the issue?

2
New cards

an emulator converts commands to and from a host machine to an entirely different platform, whereas a VM creates an environment based on the host machine and does no converting

what is the difference between a VM and an emulator?

3
New cards

ISO

you are using a VM to simulate a production environment for testing purposes. you need to install a specific program on the VM to replicate the functionality of a critical app. which of the following installation methods would you use to install the program on the VM?

4
New cards

port forwarding

which hardware firewall feature enables incoming traffic on a specific port to reach an IP address on the LAN?

5
New cards

Copy and move files and change file attributes

you are organizing your files on your Windows computer and need to perform various tasks using the Windows file explorer program. Choose all actions you an accomplish using file explorer program

6
New cards

Windows 10 Enterprise, Windows 10 Pro, Windows 10 Pro for Workstations

These has BitLocker Drive Encryption feature

7
New cards

Social engineering

take advantage of human shortcomings to gain access that should otherwise be denied.

8
New cards

Guest

the kisok is secure and users have access to only the app needed for customer interaction. When the computer is rebooted, it logs in automatically without password.

9
New cards

denied write/delete permissions and mapped drives

A SOHO technician recently moved data from 1 server to another to increase storage capacity. Several users are now reporting they can't access certain shares on the network. When the users attempt to access shares, they get the error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which are the reasons for these issues?

10
New cards

Full

a company installed a new backup and recovery system. which of the following types of backups should be completed first?

11
New cards

remote wipe

a company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. which is the best solution?

12
New cards

net view //fileserver

which is the correct net syntax for discovering which network shares on a particular server are mapped on your computer?

13
New cards

expired certificate

a user is unable to log in to network. the network uses 802.1X with EAP-TLS to authenticate on the wired network. the user has been on an extended leave and has not logged in to the computer in several months. which of the following is causing the log-in issue?

14
New cards

spoofing

attacker is attempting to use a legit IP address to disrupt access elsewhere on the network

15
New cards

password enabled screensaver should automatically start

after a set period of inactivity on a Windows workstation, what should happen?

16
New cards

using disk-wiping softeare

a company wants to remove info from past users' hard drives in order to reuse the hard drives

17
New cards

displaying active TCP/IP connections and displauing network protocol stats

netstat is a command line utility used for:

18
New cards

hibernate

which power mode will write the contents of the RAM to the disk?

19
New cards

quarantine the system

none of the files on a PC will open. the program on the desktop is requesting payment in exchange for file access. this is ransomware. what should a technician do first?

20
New cards

anti-malware software

rootkit has been installed and needs to be removed

21
New cards

network utilization will be significantly increased due to the size of CAD files

an architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server.

22
New cards

permission to modify and redistribute the app and free access to app code

which describes the characteristic features of open-source apps and OSs?

23
New cards

he wont be able to change wallpaper

james installed a new copy of windows on his computer. however, he hasnt yet activated the OS with a valid license key. until james activates the OS. which restriction will be imposed on him as a Windows user?

24
New cards

Internet options > Connections

configures the setting of windows PC to use new proxy server.

25
New cards

EFI system partition

where is the boot configuration data stored on a windows installation utilizing EFI?

26
New cards

escalate the ticket

a technician has spent hours trying to resolve a computer issue for the company's CEO. which step should the technician take next?

27
New cards

the permissions will be the same as they were before the move

Jack moved a folder on the same partition. what happens with the permissions for the folder?

28
New cards

RDP

which microsoft remote protocol allows for local drives to be presented to remote system?

29
New cards

WPA3

most secure wifi protocol

30
New cards

PowerShell

scripting language used with Microsoft Azure and Microsoft 365

31
New cards

account lockout

network was breached. system logs indicate that a single user's account was breach after 400 attempts with dictionary attacks. which mitigates the threat?

32
New cards

enable safe boot

which startup setting option allows you to boot with basic drivers?

33
New cards

proceed with custom manufacturer's procedure

proper way for a technician to dispose of used printer consumables

34
New cards

disk utility

technician is asked to resize a partition on the internal storage drive of a computer running macOS. which of the tools should be used?

35
New cards

set the laptop config to DHCP to prevent conflicts

a user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. the user logs on to the old desktop and receives the same message. a technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. what should be done to fix the issue?

36
New cards

uninstall the fraudulent app

what action should be taken first to address phone issues caused by a newly installed app that claims to optimize performance but has resulted in high network utilization and repeated security warnings?

37
New cards

4 GB

What is the minimum RAM memory required for a 64-bit installation of windows 11?

38
New cards

system event log

what event log should be reviewed if an unexpected computer reboot is suspected?

39
New cards

SSH

what options can an IT firm utilize to securely access the network switches and routers while being geographically separated from the company?

40
New cards

System

which control panel applet would you use to join the OS to a domain?

41
New cards

accessibility

user requires a different cursor color. which OS utilities is used to change the color of cursor in windows 11?

42
New cards

biometric lock and card reader

which of the following provide best way to secure a server room?

43
New cards

implement single sign-on

to reduce number of help desk tickets submitted for forgotten passwords

44
New cards

WPA2-AES

strongest encryption and authentication for wireless networks and is the most secure form of WPA2 security.

45
New cards

BitLocker

encrypts an entire hard drive on a windows desktop

46
New cards

register the ticket with a unique user identifier

to correctly associate a ticket submitted for a user reporting an issue with the right user

47
New cards

netstat

determines the ports occupied by both apps and OS.

48
New cards

Visit the manufacturer's website.

to find the MSDS for an inkjet printer cartridge intended for home use

49
New cards

default apps

you have just updated windows computer and now whenever you try to open a PDF file, it opens in microsoft edge instead in adobe reader. you want to make sure that all PDF files open in adobe reader.

50
New cards

working copies

type of backup that is kept on site at the computer centre for immediate recovery purpose?

51
New cards

use settings to access general

in context of CYOD policy, to ensure each user's windows device requires a password upon resuming from sleep or inactivity.

52
New cards

opening system properties

to rename computer

53
New cards

the sharing options for the network profile need to be reconfigured

reason for being unable to print to a network printer while they can browse the web.

54
New cards

avoid distraction

describe the action taken by the technician who received a phone call while troubleshooting a customer's pc and set the phone to silent

55
New cards

robocopy

used to transfer a large number of files from one computer to another, considering the connection is unreliable and there's a risk of interruptions and the transfer process needs to be resumable if the connection is disrupted

56
New cards

mapped network drive

john has created a shared folder on a network server for the members of the research department. the shared folder now appears as a drive letter on each user's computer. what type of folder is created?

57
New cards

disk encryption

to secure a workstation for point of sale transactions that involves processing credit cards and loyalty cards in case of theft.

58
New cards

C:\Windows\System32\Config

Where is the Windows system registry hive data stored?

59
New cards

.app

file type for new software on a macOS computer

60
New cards

right click the printer, select properties, and click Ports tab

to determine the type of connection used by a network printer.

61
New cards

resource monitor

A Windows tool that monitors the performance of the processor, memory, hard drive, and network.

62
New cards

PII

government regulated data

63
New cards

msconfig

to modify startup environment of computer and troubleshoot system problems.

64
New cards

hash verification

unique string of characters from a larger string of data such as a file or message. takes input data and converts into fixed length, alphanumeric string. the hash of original data must match with the hash of the received data

65
New cards

web browser

configures SOHO router

66
New cards

laptop has windows home edition

can't join a windows 10 laptop to a domain

67
New cards

Chrome OS

provides a lightweight option and an easy to use browser-based interface.

68
New cards

folder options

a user's local windows profile is not working properly and you need to check the ntuser.dat file. which tool can view the file? options to show or hide hidden files and system files

69
New cards

vishing

attacker uses voice calls or VoIP to try and trick the victim into revealing sensitive info. they pretend to be a representative of a trusted organization.

70
New cards

the status of the spooler service

unable to print a document and receiving the error message print sub-system not available. what should i check first?

71
New cards

dfrgui.exe

to resolve PC running slow and has a bad fragmented hard drive

72
New cards

export the user's certificate

you're exporting the private key that was used to encrypt the files. this is necessary so that the recipient of the files can decrypt the files with their own private key and access data. it can ensure that the recipient will access the encrypted files on the second laptop rather than copying the encrypted files to the second laptop and being unable to access data.

73
New cards

/scannow

sfc switch that enables a file check that scans integrity of all protected system files and attempts to repair corrupted files

74
New cards

multithreading

OS feature that offers the ability for a single app to have multiple requests into the processor at one time

75
New cards

run a full antivirus scan on computer

a user reports seeing random, seemingly non-malicious ad notifications in the Windows 10 Action Center. the notifications indicate the ads are coming from a web browser. which is the best solution to implement?