CompTIA A+ Core 2 Exam questions and answers with expert rationales (GUARANTEED SUCCESS )questions and answers with expert rationales (GUARANTEED SUCCESS )

0.0(0)
studied byStudied by 5 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/203

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

204 Terms

1
New cards

A customer has an issue launching a line of business (LOB) application that is essential to daily operations. The customer's office is over one hour away. To save time, you decide to try a remote session to remedy the problem before making the trip. Which method would NOT be used to initiate a remote session?

RDP

Telnet

SSH

ICMP

ICMP

2
New cards

What is the greatest danger of rootkit malware?

They are difficult to detect.

3
New cards

A disaster prevention and recovery process needs to be put in place for a critical Windows server. Which of the following does NOT address this process?

file-level backup

surge protector

backout plan

account recovery

Backout plan

A backout plan is created and used in the change management process. It addresses a means of rolling back any changes in the event the changes (to a computer system for example) produce undesired results.

4
New cards

Which security feature does Windows BitLocker provide for computer systems and for users?

Full disk encryption

5
New cards

You are consulting a client on building a small computer room to house their Windows servers. Which of the following items would you recommend for the computer room?

Proper ventilation

6
New cards

Which of the following is NOT a 'red flag' for malware infection?

The file system or individual files are updated.

7
New cards

Which type of malware tracks and reports on the usage of a target system in order to steal personal information, including passwords and account data?

Spyware

8
New cards

The current directory is "C:\Users\David\Documents\Tech_files." Which of the following commands could you enter to move into the parent directory?

cd ..

9
New cards

In terms of network access, what is the purpose of a whitelist?

To define the specific clients that should be allowed on the network

10
New cards

What is the reason for using Wi-Fi Protected Access version 2 (WPA2) instead of Wired Equivalent Privacy (WEP) on a router?

Improved data security

11
New cards

What is the common solution to disable application startup?

System Configuration Utility

12
New cards

Which of the following corporate features is NOT included with Windows 7 Professional?

BIOS

Bitlocker

Networking and management features

EFS

BitLocker

13
New cards

You will be virtualizing a Linux workstation on a Linux host system. The hypervisor you will be using is available freely on the Internet for any type of use. What type of license does the hypervisor likely use?

Open source

14
New cards

Which file system type is the default for Windows operating systems?

New Technology File System (NTFS)

15
New cards

You install a second hard drive into your computer to store data on and, after a bit of preliminary setup, you have to perform which of the following actions to prepare the drive for file storage?

FORMAT

16
New cards

You are writing a script to automate the deployment of a small piece of software to all workstations. As you are scripting, you are implementing best practices in the script. Which of the following is considered a best practice?

Using comments

17
New cards

Identify the best physical security method for network access points from the following choices.

sit on top of a filing cabinet

add a cable lock

position on a high ceiling

place in a remote wiring closet

Add a cable lock.

18
New cards

Which of the following Microsoft Management Console (MMC) snap-ins manages connections between a client application and a server application?

Print managemnet

ODBC data source administrator

Services

Component Services

ODBC data source administrator

19
New cards

Which of the following can allow or restrict the use of apps, corporate data, and built-in functions on a mobile device?

Mobile Device Management

20
New cards

Which explanation best describes the maximum password age policy?

When the password reaches its time limit; the user is forced to change the password

21
New cards

Why are dictionary attacks successful on cracking passwords?

A user creates a password with simple dictionary words

22
New cards

Which of the following can cause a weak signal in a mobile device?

Low battery charge

23
New cards

A small company has hired you to manage their technology. This includes five PCs (Personal Computers), two Multi-function printers, and a Network Area Storage Device (NAS). The business owner has stated that users often save non-business files to the NAS which causes routine low space issues. What first step should be taken to address the use of technology within the company?

Acceptable use policy

24
New cards

Which of these is NOT associated with troubleshooting wireless configuration issues?

Bluetooth pairing information

The device stuck in airplane mode

Wi-Fi adapter and AP compatibility standards

A low battery

A low battery

25
New cards

Which method enables a storage device to be repurposed without fear of old data being accessed?

Overwriting

26
New cards

You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not reset the archive bit after a backup. Which method have you chosen?

Differential

27
New cards

You are headed to a customer site to meet with a sales manager. You have met in the past to discuss repetitive technical issues the department has been experiencing. In order to best present the sales manager a clear understating of the suggested remedies, what customer service communication technique should you practice?

Avoid jargon and acronyms

28
New cards

What is the name of the malware that can lock you out of your computer and prevent access to your data until you pay a fee to the software developer?

Ransomware

29
New cards

Why is iOS better at applying updates than an Android?

iOS has a consistent hardware and software base that notify by an alert on wake to install an update.

30
New cards

Which scripting language uses the characters // for comment text?

JavaScript

Python

PowerShell

Bash

JavaScript

31
New cards

You attempt to access a file that you created but instead receive an access denied message. What does this indicate?

The file permissions changed on the user account or the content.

32
New cards

Which of the following is NOT a reason for Windows to display an invalid certificate warning?

Bypassing the certificate requirement

33
New cards

A user has been spending most of the day watching Netflix rather than doing work. What policy would address this type of behavior?

Acceptable use policy

34
New cards

You have been working on installing a new line of business (LOB) application for the finance department. You need to document the specifics of the setup and management of the application. Which of the below would be the best method to accomplish this?

Use a Configuration Management Database (CMDB).

35
New cards

You need to implement a backup storage security plan for the company backups. Which of the following is NOT considered a security best practice?

Role-based access

Redundant connectivity

Backup and restore logging

Data encryption

Redundant connectivity

36
New cards

You experience difficulty while installing Windows on a new laptop. Which of the following logs should you examine in Event Viewer to troubleshoot the problem?

Setup

37
New cards

What is the best course of action when a user experiences black screen issues?

Give the system time to complete the update.

38
New cards

To increase security for your users, you need to deny websites from requesting a user's location through Internet Explorer. On which Internet Options tab do you change this setting?

Privacy

39
New cards

Which of the following is NOT a type of anti-malware software?

Anti-firewall

40
New cards

Put the steps for CompTIA's malware removal procedure in order.

Identify and research malware symptoms; quarantine infected system; disable System Restore; remediate infected systems; schedule scans; enable System Restore and create restore point; educate end user

41
New cards

Identify which virus becomes active when the application is executed?

Program virus

42
New cards

Network diagrams can show logical and physical relationships between different elements. What is this relationship called?

Topology

43
New cards

You need to write a script to help with systems automation. You need to use comparison operators to accomplish a task within the script. What syntax would be used for less than?

<

44
New cards

Mobile devices are similar to other computing devices in that they require regular patch maintenance and update management to remain secure. If an organization does NOT centrally manage device patches and updates, what should administrators ensure that users have enabled on their devices?

Automatic updates

45
New cards

What type of social engineering attack is whaling?

Spear phishing

46
New cards

Why is it important to force users to use strong passwords?

So that their passwords are not easily guessed

47
New cards

Which of these is NOT associated with troubleshooting signal issues?

Device Intererence

Airplane mode

Distance

A low battery

Airplane mode

48
New cards

Which option is an example of a multifactor authentication?

Smart card with a PIN

49
New cards

How would you protect a browsing session when using a public hotspot?

Virtual Private Network (VPN)

50
New cards

A department has a legacy DOS program that they need to use daily. What is the best way to configure the program to run after the department upgrades workstations to Windows 10?

Use compatibility mode

51
New cards

You notice that your computer is running slowly and you think it is due to an errant process. Using the command line and command line tools, how do you view the list of running applications?

TASKLIST

52
New cards

A touchscreen device is not registering touches at the correct coordinates. The administrator checks for obvious hardware issues. Which of the following is not an obvious hardware issue?

Badly written apps

53
New cards

Which of the following is NOT a reasonable bring your own device (BYOD) security requirement from a company to its employees?

Set up a password-protected screen lock

Be sure that all apps and networks are from trusted sources

Install no personal apps on the device

Configure a local firewall on the device

Install no personal apps on the device

54
New cards

The current directory is "C:\Users\David\Documents" and you want to move into a sub-directory called "Tech_files." It is the only sub-directory. Which of the following commands could you enter to move into that directory?

cd T*

55
New cards

Which of these is NOT an intent for adware and spyware?

Commercial pop-ups

To vandalize the computer system

New toolbars, the home page changing suddenly, and faults

Web page redirection

To vandalize the computer system

56
New cards

What is the most likely cause of Windows booting but not displaying the login dialog or failing to load the desktop?

A malware infection or corrupt drivers

57
New cards

Which of the following falls directly under customer service skills and dealing with difficult customers?

Avoid dismissing customer problem

58
New cards

What is a capability of the modern botnet computer?

Multitasking

59
New cards

You are trying to deal with a customer issue that has been lingering for some time. Tempers are beginning to flare due to the frustration over the issue. How can you best approach the issue from a customer service standpoint of dealing with a difficult situation?

Do not argue, avoid being judgmental, have a positive attitude

60
New cards

Identify the two ways of working with the Windows Firewall.

The Windows Firewall Control Panel utility and Windows Security Policy Settings

61
New cards

Select the family of operating systems (OS) widely used in the education sector. This operating system is minimalistic and runs applications hosted on a server via web browser.

Chrome OS

62
New cards

There has been an incident at work. A Windows PC that holds sensitive data has been breached. Upon arrival to work, you discover that the PC has been moved from its original location since the breach. You need to investigate the situation. Your first concern is the relocation of the PC. What should you investigate first?

Chain of custody

63
New cards

What is the purpose of Material Safety Data Sheet (MSDS) documentation?

Proper disposal of equipment

64
New cards

Setting a Basic Input/Output System (BIOS) password is an excellent security practice, but what is the downside of setting such a password?

The user might forget the password.

65
New cards

You have a small office of six employees and you want to have a network to enable file and printer sharing and to add a bit of security. Which type of Windows network should you select for this scenario?

Workgroup

66
New cards

What is the main reason given by companies for setting up a bring your own device (BYOD) program?

To reduce costs

67
New cards

What are the three properties of the CIA triad?

Confidentiality, Integrity, Availability

68
New cards

Which option is one of the best practice procedures for malware removal?

Quarantine infected systems.

69
New cards

Which form of wireless encryption introduced the Temporal Key Integrity Protocol (TKIP) security protocol?

Wi-Fi Protected Access (WPA)

70
New cards

A company hesitates to upgrade to the latest version of an operating system (OS). Which of the following is NOT a concern for the company?

Web application compatibility

Software compatibility

Network compatibility

Cost

Web application compatibility

71
New cards

Which of the following network card transmissions settings only allows 1-way data communication?

Half duplex

72
New cards

You recently recovered a user's laptop using a recovery image. You want to apply the policy changes to the system from the command line with all policies, including those that are not new or have not changed. Which command should you use?

gpupdate /force

73
New cards

You need to provide remote network connectivity to a customer who has an extremely tight budget. What is the lowest-cost option for establishing a network connection assuming the customer has access to all connection types?

Dial-up

74
New cards

Which Linux command do you enter to change your system password?

passwd

75
New cards

What is one of the most notable differences between iOS and Android?

Android is open source.

76
New cards

Which family of operating systems (OSs) is more widely used as a server operating system than a desktop operating system?

Linux

77
New cards

You have a removable drive that needs to hold large files and be read/write capable in both Windows and macOS environments. Which of the following file systems should you use to format the drive?

exFAT (extended File Allocation Table)

78
New cards

Which backup type takes less time to perform a backup than it does to restore?

Incremental

79
New cards

What is the most common modern cause of a "Invalid boot disk" error?

Using USB (Universal Serial Bus) for boot.(The most common modern cause of boot disk errors is for the system firmware to be set to use USB for boot. Check for any removable disks and change the boot device priority/boot order if necessary.)

80
New cards

Identify which virus becomes active when the application is executed?

Program virus(A program virus is sequences of code that insert themselves into another executable program. When the application is executed, the virus code becomes active.)

81
New cards

What is the symptom of malware affecting a web browser?

Redirection(Redirection is where the user tries to open one page in the web browser but gets sent to another web page.)

82
New cards

Your organization uses images to deploy Windows to laptops on the network. You are responsible for creating a new image. You run Microsoft's System Preparation Tool (sysprep) before imaging the disk. Which of the following is NOT a reason to use sysprep before creating an image?

Sysprep updates all drivers.

(Sysprep does not update drivers. Administrators need to take into consideration the needs of the users. If there are several models of computer receiving the image, drivers for each model should be on the image.)

83
New cards

Which command line command do you use to reboot a Windows computer?

SHUTDOWN /r

(To reboot the computer, you use SHUTDOWN /r. This command is used to shut down, restart, log off, or hibernate a computer. Specify which state you would like to put the computer in by using options and parameters with the command. You can also use options to specify whether (and how long) to wait until the command does what you specified.)

84
New cards

What user interface (UI) element is used in Windows 7 and Windows 10, but was removed in Windows 8 in favor of a tile-based app interface known as the Start Screen?

The Start Menu

(The Start Screen in Windows 8 and Windows 8.1 replaced the Windows 7 Start Menu and is a tile-based interface showcasing apps and programs, some of which display information about the app and update in real time. Windows 10 reintroduces the Start Menu, but with changes to include elements of the Windows 8 tile-based app design.)

85
New cards

Your email account was compromised when you clicked a phishing email. As a consequence, you begin to receive bounced back emails from failed attempts to reach bad email addresses. What does this issue indicate?

Hijacked email

The hijacked email appears as legitimate traffic until it is detected by either the administrator or the user. The cause of the hijacking could be a malware infection, or a spammer has spoofed the user's email address.

86
New cards

You are working on an Apple computer and an application freezes. How do you forcibly quit the application?

Command-Option-Escape

(Command-Option-Escape opens the Force Quit Applications dialog window. You can forcibly quit any running application from here. It is similar to pressing Control-Alt-Delete on a Windows system and clicking the End Task button in the Task Manager.)

87
New cards

You experience difficulty while attempting to access a newly installed drive. Which of the following logs should you examine in Event Viewer to troubleshoot the problem?

System

(The system event log will log any events that are considered as operating system issues. Failure to access a hardware device such as a drive would be logged in the system log.)

88
New cards

What should you do first when troubleshooting an "OS missing" type of error message?

Run disk diagnostics.

(An "OS missing" type message can appear when a hard disk is identified as the boot device but does not report the location of the OS loader. This could indicate a faulty disk so try running disk diagnostics.)

89
New cards

A technician is installing the most recent operating system on an Apple computer. The technician is using the App Store to do this. What kind of installation is the technician performing?

In-place upgrade

(The technician is performing an in-place upgrade. This means installing on top of an old operating system, retaining applications, user settings, and data files. Since the technician is performing the upgrade via the App Store, the previous operating system will remain underneath the new operating system.)

90
New cards

You are rolling out an inventory plan to account for all systems within your workplace. You have decided to use a system that will digitally record an asset's location. Which technology will you use?

RFID (Radio Frequency ID)

RFID (Radio Frequency ID) is a method of tagging and tracking objects. A tag can be programmed with a variety of information. When the tag is scanned, the information can be recorded and updated. RFID (Radio Frequency ID) tags can be placed in stickers and labels.

91
New cards

Which is the worst-case scenario for unauthorized location tracking?

Domestic burglary

(Domestic burglary is the worst-case scenario for unauthorized location tracking. If an attacker uses your location data to facilitate a crime such as a burglary the outcome could result in a loss of life.)

92
New cards

A workstation at work is found to be unsecured. The account used on the computer does not have a password, the data is not encrypted, and the computer itself is located in an area with easy access. This particular workstation contains personal information about its customers. In regards to the regulation of data, which is being compromised?

PII

(Personally Identifiable Information (PII) is data that can be used to identify a person and can also be used for malicious purposes such as identity theft. Personally Identifiable Information (PII) data can include personally assigned information including a social security number or even a website challenge response answer such as a favorite movie.)

93
New cards

You are implementing a disaster recovery plan for the company's server farm. You have decided that the shared volumes on each server should have no less than a RAID 5 configuration. What is the minimum number of disks a server would need for this configuration on the shared volume?

Three

(Three disk drives are required at minimum to implement a RAID 5 (Redundant Array of Independent Disks) configuration. There is no maximum to the number of disks that can be used. RAID 5 uses striping with parity. Only one drive may fail without data loss. Therefore, the failed disk should be replaced immediately. Replacing the disk will result in a rebuild of the RAID 5 array by using the parity information.)

94
New cards

A production server has crashed. The drive array has completely failed, necessitating the need to rebuild the system. Fortunately, backups of the system are available. Which backup type is used to restore the operating system?

Image level

(An image level backup is a backup type that images the entire disk partition. This would include all user data files, the operation system, and more. An image level backup can be used to restore an entire system and is commonly used with a bare metal restore.)

95
New cards

You are troubleshooting an Application on a Windows 10 PC. You need to check if a service is running. How can you accomplish this?

Services tab in msconfig

(The Services tab in the msconfig utility lets you manage services and their startup configurations.)

96
New cards

A touchscreen device is not registering touches at the correct coordinates. The administrator checks for obvious hardware issues. Which of the following is not an obvious hardware issue?

Badly written apps

(Badly written apps on the touchscreen device can hog memory, therefore, causing the device to become unresponsive. This is not an obvious hardware issue and should be checked after ruling out the simpler issues first.)

97
New cards

What loads only basic drivers and services required to start the system?

Safe Mode

(Safe Mode loads only basic drivers and services required to start the system. This is a useful troubleshooting mode as it isolates reliability or performance problems.)

98
New cards

Put the steps for CompTIA's malware removal procedure in order.

Identify and research malware symptoms; quarantine infected system; disable System Restore; remediate infected systems; schedule scans; enable System Restore and create restore point; educate end user

(CompTIA has identified a 7-step best practice procedure for malware removal. First, identify and research malware symptoms. Then, quarantine the infected system. Then, for Windows, disable System Restore. Next, remediate infected systems. Then, schedule scans and run updates. Then, enable System Restore and create restore point. Finally, you should educate the end user about malware infections.)

99
New cards

Which is false about troubleshooting wireless configuration issues?

Verify the device is turned on then click on random apps.

(Troubleshooting a wireless configuration issue requires verifying access point standards, researching known issues and continual troubleshooting to rule out any other configuration errors. By verifying the device is turned on then clicking on random apps will not troubleshoot the wireless configuration issue.)

100
New cards

Which of these is a Windows event type?

Failure Audit

(Failure Audit is a Windows event type that shows unsuccessful security access attempts. These event types may indicate a possible security breach or simply a user mistyping a password.)