Comptia A+ 1202 Practice Questions

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

150 Terms

1
New cards

Which of the following are system folders on macOS? (Select two)

Applications and FileVault

2
New cards

A technician needs to install an operating system on a large number of workstations. Which

of the following is the fastest method?

Image deployment

3
New cards

An organization sees unauthorized apps installed and licensing prompts. What should the

security team do?

Remove users from the local admin group.

4
New cards

An administrator received an email stating that the OS they are currently supporting will no

longer be issued security updates and patches. Which of the following is most likely the

reason the administrator received this message?

The OS will be considered end of life

5
New cards

A user is unable to use the latest version of an app on a legacy tablet. What is the most likely

reason?

The OS is end-of-life

6
New cards

A company would like to deploy baseline images to new computers as they are started up on

the network.

Which of the following boot processes should the company use for this task?

PXE

7
New cards

A technician completes the installation of an OS that appears to be successful. However,

when the technician removes the USB drive that was used for the installation and restarts the

system, the error "No boot device found" appears. Which of the following should the

technician do next to resolve the issue?

Enable UEFI devices in the BIOS

8
New cards

Which of the following concepts should a technician consider when discussing confidential

work projects with individuals outside the company?

NDA

9
New cards

A secretary receives an email from the company's chief executive officer with a request to

pay a vendor immediately. After the payment is made, the CEO informs the secretary that

they never sent that email. Which of the following social engineering tactics best describes

this type of attack?

Whaling

10
New cards

A technician needs to download and install a new web browser on a desktop. Which attribute

should be used to verify the installer's authenticity?

Hash

11
New cards

An administrator received an email stating that the OS they are currently supporting will no

longer be issued security updates and patches. Which of the following is most likely the

reason the administrator received this message?

The OS will be considered end of life

12
New cards

Which of the following types of social engineering attacks sends an unsolicited text message

to a user's mobile device?

Smishing

13
New cards

An administrator is investigating a technical outage. The management team wants

information that includes the summary of the outage and actions taken. Which of the

following documentation should the administrator provide?

Incident report

14
New cards

A help desk technician is setting up speech recognition on a Windows system. Which of the

following settings should the technician use?

Ease of Access

15
New cards

Which of the following file types would a desktop support technician most likely use to

automate tasks for a Windows user log-in?

.bat

16
New cards

Which of the following is the best reason for a network engineering team to provide a help

desk technician with IP addressing information to use on workstations being deployed in a

secure network segment?

DHCP services are not enabled for this subnet.

17
New cards

A user takes an iOS-based smartphone that is performing slowly to a repair shop. A shop

technician finds the following information:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Mobile reception: |||

Roaming: Off

Used space: 63.76GB/64GB

Which of the following is the cause of the issue?

The device is running out of free space

18
New cards

After using a third-party disk optimization software package, a technician restarts a laptop

and receives the message "No operating system found." The technician verifies that the

BIOS properly recognizes the SSD.

Which of the following should the technician do next?

Boot from installation media and repair the MBR

19
New cards

A user takes an iOS-based smartphone to a repair shop due to performance issues. The

technician observes:

Battery charge: 25%

Battery health: 90%

Hotspot: On

Used space: 63.76GB / 64GB

Which of the following is the most likely cause of the performance issue?

The device is running out of free space

20
New cards

A technician needs to provide remote support for a legacy Linux-based operating system

from their Windows laptop. The solution needs to allow the technician to see what the user is

doing and provide the ability to interact with the user's session. Which of the following remote

access technologies would support the use case?

VNC

21
New cards

A technician is using a credential manager to safeguard a large number of credentials. Which

of the following is important for using this application?

Secure master password

22
New cards

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a

new computer.

Which of the following specifications will help the specialist determine which OS architecture

to use?

16GB RAM

23
New cards

A security administrator teaches all of an organization's staff members to use BitLocker To

Go. Which of the following best describes the reason for this training?

To ensure that all removable media is password protected in case of loss or theft

24
New cards

A technician needs to change hibernation settings on a Windows computer via a batch file.

Domain policies are unavailable. Which is the best method?

Use the powercfg command in PowerShell

25
New cards

A user's application only works with a legacy version of the OS. The OS is reaching its endof-life date. For security reasons, the company is migrating to the current version of the OS.

Which of the following is the most efficient way to complete the migration while maintaining

accessibility to the application?

Virtualization

26
New cards

Which of the following describes a vulnerability that has been exploited before a patch or

remediation is available?

Zero-day

27
New cards

A user decides to switch to Windows from Linux and is trying to migrate data using an

external USB hard disk. However, when the user connects the cable to the Windows

machine, an error message appears stating the device must be formatted before it can be

used. The hard disk works as expected when connected to the Linux machine. Which of the

following should the user do to resolve this issue?

Update the file allocation system to exFAT

28
New cards

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of

the following should the technician use?

Group Policy

29
New cards

An organization is experiencing an increased number of issues. A technician notices

applications that are not installed by default. Users are reporting an increased number of

system prompts for software licensing. Which of the following would the security team most

likely do to remediate the root cause?

Enable stricter UAC settings on Windows.

30
New cards

Which of the following methods involves requesting a user's approval via a push notification

to verify the user's identity?

SMS

31
New cards

A technician uses AI to draft a document about new software benefits. Upon reading, the

technician sees factually incorrect info. What term best describes this?

Hallucinations and Potentially unwanted program

32
New cards

A user is working from home and is unable to access work files on a company laptop. Which

of the following should a technician configure to fix the network access issue?

Virtual private network

33
New cards

After completing malware removal steps, what is the next step the technician should take?

Educate the end user

34
New cards

A user's new smartphone is not staying charged throughout the day. The smartphone

charges fully every night. Which of the following should a technician review first to

troubleshoot the issue?

Background applications

35
New cards

An end user wants to have a sales printer added to their computer. The printer is on the

domain. Which of the following is the best method for the technician to add the printer?

Go to Local Users and Groups to add the printer

36
New cards

A help desk team was alerted that a company-owned cell phone has an unrecognized

password-cracking application. Which of the following should the help desk team do to

prevent further unauthorized installations from occurring?

Deploy MDM

37
New cards

A network technician notices that most of the company's network switches are now end-oflife and need to be upgraded. Which of the following should the technician do first?

Propose the change

38
New cards

A technician verifies that a malware incident occurred on some computers in a small office.

Which of the following should the technician do next?

Quarantine the infected systems

39
New cards

A technician needs to configure laptops so that only administrators can enable virtualization

technology if needed. Which of the following should the technician configure?

BIOS password

40
New cards

A town clerk wants to work from home and access documents on a town hall server. What

should a technician set up?

VPN

41
New cards

A technician is setting up a surveillance system for a customer. The customer wants access

to the system's web interface on the LAN via the system's IP address. Which of the following

should the technician use to prevent external log-in attempts from the internet?

Static IP

42
New cards

What is found in an MSDS (Material Safety Data Sheet) for a battery backup?

Emergency procedures

43
New cards

Which of the following methods involves requesting a user's approval via a push notification

to verify the user's identity?

Authenticator

44
New cards

A help desk technician needs to remove RAM from retired workstations and upgrade other

workstations that have applications that use more memory with this RAM. Which of the

following actions would the technician most likely take?

Use antistatic bags for storage and transport.

45
New cards

A customer's computer does not have an active connection to the network. A technician goes

through a few troubleshooting steps but is unable to resolve the issue. The technician has

exhausted their knowledge. The customer expresses frustration at the time taken to resolve

this issue. Which of the following should the technician do?

Escalate the issue to a senior team member and provide next steps to the customer.

46
New cards

Technicians are failing to document user contact information, device asset tags, and a clear

description of each issue in the ticketing system. Which of the following should a help desk

management team implement for technicians to use on every call?

Standard operating procedures

47
New cards

A company recently transitioned to a cloud-based productivity suite and wants to secure the

environment from external threat actors. Which of the following is the most effective method?

Multifactor authentication

48
New cards

A technician is setting up a Windows server to allow remote desktop connections for multiple

users. Which of the following should the technician configure on the workstation?

Firewall

49
New cards

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Close unnecessary programs

50
New cards

A user is attempting to open on a mobile phone a HD video that is hosted on a popular media

streaming website. The user is receiving connection timeout errors. The mobile reception

icon area is showing two bars next to 3G. Which of the following is the most likely cause of

the issue?

The bandwidth is not fast enough.

51
New cards

A technician is deploying mobile devices and needs to prevent access to sensitive data if the

devices are lost.

Which of the following is the best way to prevent unauthorized access if the user is unaware

that the phone is lost?

Remote wipe

52
New cards

Which of the following is the quickest way to move from Windows 10 to Windows 11 without

losing data?

In-place upgrade

53
New cards

A user is experiencing issues with outdated images while browsing websites. Which of the

following settings should a technician use to correct this issue?

Internet Options

54
New cards

A company wants to use a single operating system for its workstations and servers and avoid

licensing fees.

Which of the following operating systems would the company most likely select?

Linux

55
New cards

When a corporate laptop is connected to the company network, it can reach external

websites. However, it cannot reach any internal websites, displaying the error message

"Cannot reach this page." Which of the following should a technician configure?

DNS settings

56
New cards

Which of the following authentication methods is the best way to prevent users from

frequently entering their credentials?

Single sign-on

57
New cards

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update

antivirus software to remove a detected threat. The user has been clicking the "X" button in

the window frame but it always reappears. The pop-up includes an "OK" button to install the

update and remove the threat. Which of the following should the user do next?

Verify the current status and settings of protection measures

58
New cards

A technician reviews an organization's incident management policy. The organization uses a

third-party vendor with multiple tools to protect its assets. What service type is this?

MDR

59
New cards

An employee is using a photo editing program. Certain features are disabled and require a

log-in, which the employee does not have. Which of the following is a way to resolve this

issue?

License assignment

60
New cards

A user has been adding data to the same spreadsheet for several years. After adding a

significant amount of data, they are now unable to open the file. Which of the following should

a technician do to resolve the issue?

Increase the amount of RAM.

61
New cards

An international traveler is concerned about others accessing the contents of their

smartphone if it is lost or stolen. The traveler has enabled biometrics. Which of the following

additional security measures further reduces the risk of unauthorized data access?

Device encryption

62
New cards

A technician notices that the weekly backup is taking too long to complete. The daily backups

are incremental. Which of the following would most likely resolve the issue?

Running synthetic full weekly backups

63
New cards

Users are reporting that an unsecured network is broadcasting with the same name as the

normal wireless network. They are able to access the internet but cannot connect to the file

share servers. Which of the following best describes this issue?

Rogue wireless access point

64
New cards

Which of the following provides information to employees, such as permitted activities when

using the organization's resources?

AUP

65
New cards

A technician is securing a newly deployed workstation. Only authorized users should access

it. Which actions should the technician take? (Select two)

Apply the BIOS password and Enable screensaver locks

66
New cards

A technician follows proper malware removal procedures but cannot remove all malware.

They decide to reload the OS. What should they select?

Clean install

67
New cards

An administrator is investigating a zero-day vulnerability. If left unpatched, it could severely

impact business.

The patch requires downtime. What should the administrator do?

Implement an emergency change.

68
New cards

Various alerts on a user's Windows 11 laptop are continually interrupting the user during

videoconference calls. Which of the following should a support technician recommend to best

solve the issue?

Set Windows Notifications settings to Do Not Disturb

69
New cards

Which of the following prevents forced entry into a building?

Bollard

70
New cards

A technician is installing a cloud-based productivity suite and gets an error saying the

installation is unavailable. What should be tried first?

Check the license device limit

71
New cards

A client reports that their browser's home page changed. Every time they run an internet

search, the results are returned from unfamiliar websites. Which of the following actions

should a technician take first to resolve the issue? (Select two)

Select all that apply!

Uninstall malicious extensions and Reset browser startup page

72
New cards

Which of the following is used to detect and record access to restricted areas?

Badge readers

73
New cards

A company executive is currently attending a major music festival with a large number of

attendees and is having trouble accessing a work email account. The email application is not

downloading emails and also appears to become stuck during connection attempts. Which of

the following is most likely causing the disruption?

Too many devices in the same area are trying to connect to the mobile network.

74
New cards

Which of the following methods would make data unrecoverable but allow the drive to be

repurposed?

Performing a low-level format

75
New cards

A user recently installed an application that accesses a database from a local server. When

launching the application, it does not populate any information. Which of the following

command-line tools is the best to troubleshoot the issue?

curl

76
New cards

A Microsoft OS laptop user frequently forgets their password. Which alternative login method

should a technician enable?

Windows Hello

77
New cards

Which of the following filesystem types does the Linux OS use?

ext4

78
New cards

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive.

The user also notices that the title bar indicates the application is not responding. Which of

the following would a technician most likely inspect?

File size and related memory utilization

79
New cards

A help desk technician recently installed an SSH client on a workstation in order to access

remote servers.

What does this enable?

To securely establish a console session

80
New cards

After a user installs a mobile application from an advertisement, the phone's battery dies a

few hours later and becomes hot to touch, even when not in use. Which of the following

should a technician do first?

Run a mobile malware scan on the phone

81
New cards

A user reports some single sign-on errors to a help desk technician. Currently, the user is

able to sign in to the company's application portal but cannot access a specific SaaS-based

tool. Which of the following would the technician most likely suggest as a next step?

Use a private browsing window to avoid local session conflicts

82
New cards

A user has rooted their corporate phone to load unapproved software. Which of the following

tools should the company use to prevent access to the corporate network?

Mobile device management

83
New cards

Why would a network engineering team provide a help desk technician with IP addresses for

a wired network segment?

DHCP is not enabled for this subnet.

84
New cards

Which of the following is used to store passwords in macOS?

Keychain

85
New cards

The battery on a user's smartphone discharges quickly when the user travels. The

smartphone was replaced two weeks ago. Which of the following should a technician do first

?

Look for applications that are reporting the highest utilization

86
New cards

An employee is trying to connect their company laptop to airport Wi-Fi. A pop-up with the

airport logo appeared and was closed quickly. The internet does not work. What should a

help desk technician suggest?

Reconnect to the network and read the pop-up carefully

87
New cards

A user reports getting a BSOD (Blue Screen of Death) error on their computer at least twice a

day. Which of the following should the technician use to determine the cause?

Event Viewer

88
New cards

Which of the following malware types typically has very high computing resource usage?

Cryptominer

89
New cards

Multiple users clicked a phishing link from a compromised email account. The security team

isolates and removes the threat. Then, the management team provides security awareness

training to the company. What step is this?

Provide user education.

90
New cards

A technician thinks that an application a user downloaded from the internet may not be the

legitimate one, even though the name is the same. The technician needs to confirm whether

the application is legitimate.

Which of the following should the technician do?

Compare the hash value from the vendor.

91
New cards

A Windows 11 Home device is receiving constant pop-ups about an urgent need to update

antivirus software in order to remove a detected threat. The user has been clicking the "X"

button but the window keeps reappearing. The pop-up includes an "OK" button to install the

update. What should the user do next?

Verify the current status and settings of protection measures

92
New cards

A customer is unable to open some files on their system. Each time the customer attempts to

open a file, the customer receives a message that the file is encrypted. Which of the following

best describes this issue?

Ransomware

93
New cards

Performance on a user's smartphone is degrading. Applications take a long time to start, and

switching between apps is slow. Which of the following diagnostic steps should a mobile

technician take first?

Uninstall unneeded applications

94
New cards

Technicians are failing to document user contact information, device asset tags, and a clear

description of each issue in the ticketing system. What should the help desk management

implement?

Standard operating procedures

95
New cards

A technician installs VPN client software that has a software bug from the vendor. After the

vendor releases an update to the software, the technician attempts to reinstall the software

but keeps getting an error message that the network adapter for the VPN already exists.

Which of the following should the technician do next to mitigate this issue?

Delete hidden network adapters.

96
New cards

MFA for a custom web application on a user's smartphone is no longer working. The last time

the user remembered it working was before taking a vacation to another country. Which of

the following should the technician do first?

Verify the date and time settings

97
New cards

A user's computer is running slowly. Task Manager shows:

Disk: 2%

Network: 12%

GPU: 15%

CPU: 70%

Memory: 97%

Which of the following would a technician most likely do to resolve the issue?

Close unnecessary programs

98
New cards

After a user installs a mobile application from an advertisement, the phone's battery dies a

few hours later, and it is hot to the touch, even when not in use. Which of the following should

a technician do first?

Run a mobile malware scan on the phone

99
New cards

A technician needs to map a shared drive from a command-line interface. Which of the

following commands should the technician use?

net use

100
New cards

A technician is troubleshooting an issue in which a service runs momentarily and stops at

certain points in the process. The technician needs to determine the root cause of this issue.

Which of the following tools should the technician use?

Event Viewer