0% found this document useful (0 votes)
399 views270 pages

Test Dump 220-1102_

The document contains a series of questions and answers related to the CompTIA A+ 220-1102 exam, covering various technical scenarios and best practices for IT professionals. Key topics include hardware installation, network troubleshooting, backup methods, change management, and security measures. Each question is followed by an explanation of the correct answer, providing insights into the rationale behind the solutions.

Uploaded by

santuchi2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
399 views270 pages

Test Dump 220-1102_

The document contains a series of questions and answers related to the CompTIA A+ 220-1102 exam, covering various technical scenarios and best practices for IT professionals. Key topics include hardware installation, network troubleshooting, backup methods, change management, and security measures. Each question is followed by an explanation of the correct answer, providing insights into the rationale behind the solutions.

Uploaded by

santuchi2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 270

2024

CompTIA
220-1102 Exam
CompTIA A+

Questions & Answers


(Full Version)

Thank you for Purchasing 220-1102 Exam


Exam Dumps 1/269

➢ TOTAL QUESTIONS:473

Question: 1
A technician installed a known-good, compatible motherboard on a new laptop. However, the
motherboard is not working on the laptop. Which of the following should the technician MOST likely
have done to prevent damage?

A. Removed all jewelry


B. Completed an inventory of tools before use
C. Practiced electrical fire safety
D. Connected a proper ESD strap

Answer: D
Explanation:

The technician should have connected a proper ESD strap to prevent damage to the motherboard.
ESD (electrostatic discharge) can cause damage to electronic components, and an ESD strap helps to
prevent this by grounding the technician and preventing the buildup of static electricity. Removing all
jewelry is also a good practice, but it is not the most likely solution to this problem.

Question: 2

A technician receives a ticket indicating the user cannot resolve external web pages However,
specific IP addresses are working. Which of the following does the technician MOST likely need to
change on the workstation to resolve the issue?

A. Default gateway
B. Host address
C. Name server
D. Subnet mask

Answer: A
Explanation:

The technician most likely needs to change the default gateway on the workstation to resolve the
issue. The default gateway is the IP address of the router that connects the workstation to the
internet, and it is responsible for routing traffic between the workstation and the internet. If the
Exam Dumps 2/269

default gateway is incorrect, the workstation will not be able to access external web pages.

Question: 3

A technician needs to recommend the best backup method that will mitigate ransomware attacks.
Only a few files are regularly modified, however, storage space is a concern. Which of the following
backup methods would BEST address these concerns?

A. Full
B. Differential
C. Off-site
D. Grandfather-father-son

Answer: B
Explanation:

The differential backup method would best address these concerns. Differential backups only back up
files that have changed since the last full backup, which means that only a few files would be backed
up each time. This would help to mitigate the risk of ransomware attacks, as only a few files would
be affected if an attack occurred. Additionally, differential backups require less storage space than
full backups.

Question: 4

A change advisory board did not approve a requested change due to the lack of alternative actions if
implementation failed. Which of the following should be updated before requesting approval again?

A. Scope of change
B. Risk level
C. Rollback plan
D. End user acceptance

Answer: C
Explanation:

The rollback plan should be updated before requesting approval again. A rollback plan is a plan for
undoing a change if it causes problems, and it is an important part of any change management
process. If the change advisory board did not approve the requested change due to the lack of
alternative actions if implementation failed, then updating the rollback plan would be the best way
to address this concern.

Question: 5

A user is having phone issues after installing a new application that claims to optimize performance.
Exam Dumps 3/269

The user downloaded the application directly from the vendor's website and is now experiencing
high network utilization and is receiving repeated security warnings. Which of the following should
the technician perform FIRST to mitigate the issue?

A. Reset the phone to factory settings


B. Uninstall the fraudulent application
C. Increase the data plan limits
D. Disable the mobile hotspot.

Answer: B
Explanation:

Installing applications directly from a vendor's website can be risky, as the application may be
malicious or fraudulent. Uninstalling the application can help mitigate the issue by removing the
source of the problem.

Question: 6

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned
someone could access the mobile device by repeatedly attempting random patterns to unlock the
device. Which of the following features BEST addresses the user's concern?

A. Remote wipe
B. Anti-maIware
C. Device encryption
D. Failed login restrictions

Answer: A
Explanation:

The feature that BEST addresses the user’s concern is remote wipe. This is because remote wipe
allows the user to erase all data on the mobile device if it is lost or stolen, which will prevent
unauthorized access to the device1.

Question: 7
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of
the following practices should the technician use to make sure the ticket is associated with the
correct user?

A. Have the user provide a callback phone number to be added to the ticket
B. Assign the ticket to the department's power user
C. Register the ticket with a unique user identifier
D. Provide the user with a unique ticket number that can be referenced on subsequent calls.

Answer: D
Explanation:
Exam Dumps 4/269

The technician should provide the user with a unique ticket number that can be referenced on
subsequent calls to make sure the ticket is associated with the correct user. This is because
registering the ticket with a unique user identifier, having the user provide a callback phone number
to be added to the ticket, or assigning the ticket to the department’s power user will not ensure that
the ticket is associated with the correct user2.

Question: 8
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access
through Remote Desktop?

A. Home
B. Pro for Workstations
C. Enterprise
D. Pro

Answer: D
Explanation:

The most cost-effective version of Windows 10 that allows remote access through Remote Desktop is
Windows 10 Pro. Windows 10 Pro includes Remote Desktop, which allows users to connect to a
remote computer and access its desktop, files, and applications. Windows 10 Home does not include
Remote Desktop, while Windows 10 Pro for Workstations and Windows 10 Enterprise are more
expensive versions of Windows 10 that include additional features for businesses

Question: 9
Once weekly a user needs Linux to run a specific open-source application that is not available for the
currently installed Windows platform. The user has limited bandwidth throughout the day. Which of
the following solutions would be the MOST efficient, allowing for parallel execution of the Linux
application and Windows applications?

A. Install and run Linux and the required application in a PaaS cloud environment
B. Install and run Linux and the required application as a virtual machine installed under the
Windows OS
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive
Swap the drives as needed
D. Set up a dual boot system by selecting the option to install Linux alongside Windows

Answer: B
Explanation:

The user should install and run Linux and the required application as a virtual machine installed
under the Windows OS. This solution would allow for parallel execution of the Linux application and
Windows applications2.
The MOST efficient solution that allows for parallel execution of the Linux application and Windows
Exam Dumps 5/269

applications is to install and run Linux and the required application as a virtual machine installed
under the Windows OS. This is because it allows you to run both Linux and Windows together
without the need to keep the Linux portion confined to a VM window3.

Question: 10
A technician at a customer site is troubleshooting a laptop A software update needs to be
downloaded but the company's proxy is blocking traffic to the update site. Which of the following
should the technician perform?

A. Change the DNS address to 1.1.1.1


B. Update Group Policy
C. Add the site to the client's exceptions list
D. Verity the software license is current.

Answer: C
Explanation:

The technician should add the update site to the client’s exceptions list to bypass the proxy. This can
be done through the client’s web browser settings, where the proxy settings can be configured. By
adding the update site to the exceptions list, the client will be able to access the site and download
the software update.

Question: 11

A technician is installing new software on a macOS computer. Which of the following file types will
the technician MOST likely use?

A. .deb
B. .vbs
C. .exe
D. .app

Answer: D
Explanation:

The file type that the technician will MOST likely use when installing new software on a macOS
computer is .app. This is because .app is the file extension for applications on macOS1.

Question: 12
Which of the following is the MOST important environmental concern inside a data center?

A. Battery disposal
B. Electrostatic discharge mats
C. Toner disposal
D. Humidity levels
Exam Dumps 6/269

Answer: D
Explanation:

One of the most important environmental concerns inside a data center is the level of humidity. High
levels of humidity can cause condensation, which can result in corrosion of components and other
equipment. Low levels of humidity can cause static electricity to build up, potentially leading to
electrostatic discharge (ESD) and damage to components. Therefore, it is crucial to maintain a
relative humidity range of 40-60% in a data center to protect the equipment and ensure proper
operation.

Question: 13

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a
least privilege environment. The user will need to access advanced features and configuration
settings for several applications. Which of the following BEST describes the account access level the
user will need?

A. Power user account


B. Standard account
C. Guest account
D. Administrator account

Answer: B
Explanation:

The account access level the user will need to access advanced features and configuration settings
for several applications while adhering to corporate policy requiring a least privilege environment is
a standard account. This is because a standard account allows the user to access advanced features
and configuration settings for several applications while adhering to corporate policy requiring a
least privilege environment1.

Question: 14
A change advisory board just approved a change request. Which of the following is the MOST likely
next step in the change process?

A. End user acceptance


B. Perform risk analysis
C. Communicate to stakeholders
D. Sandbox testing

Answer: D
Explanation:

The risk analysis should be performed before it's taken to the board. The step after the board
approves the change is End User Agreenment Reference:
Exam Dumps 7/269

https://www.youtube.com/watch?v=Ru77iZxuElA&list=PLG49S3nxzAnna96gzhJrzkii4hH_mgW4b&in
dex=59

Question: 15
A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily
lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task
Manager would contain the information a technician would use to identify the cause of this issue?

A. Services
B. Processes
C. Performance
D. Startup

Answer: B
Explanation:

Processes tab in Task Manager would contain the information a technician would use to identify the
cause of this issue. The Processes tab in Task Manager displays all the processes running on the
computer, including the CPU and memory usage of each process. The technician can use this tab to
identify the process that is causing the hard drive activity light to remain lit and the performance
degradation1

Question: 16
A user contacted the help desk to report pop-ups on a company workstation indicating the computer
has been infected with 137 viruses and payment is needed to remove them. The user thought the
company-provided antivirus software would prevent this issue. The help desk ticket states that the
user only receives these messages when first opening the web browser. Which of the following steps
would MOST likely resolve the issue? (Select TWO)

A. Scan the computer with the company-provided antivirus software


B. Install a new hard drive and clone the user's drive to it
C. Deploy an ad-blocking extension to the browser.
D. Uninstall the company-provided antivirus software
E. Click the link in the messages to pay for virus removal
F. Perform a reset on the user's web browser

Answer: C, F
Explanation:

"The user thought the company-provided antivirus software would prevent this issue."
The most likely steps to resolve the issue are to deploy an ad-blocking extension to the browser and
perform a reset on the user’s web browser. Ad-blocking extensions can help to prevent pop-ups and
other unwanted content from appearing in the browser, and resetting the browser can help to
remove any malicious extensions or settings that may be causing the issue.
Exam Dumps 8/269

Question: 17

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime
where a remote-access tool that the bank uses for support was also used in this crime. The report
stated that attackers were able to brute force passwords to access systems. Which of the following
would BEST limit the bark's risk? (Select TWO)

A. Enable multifactor authentication for each support account


B. Limit remote access to destinations inside the corporate network
C. Block all support accounts from logging in from foreign countries
D. Configure a replacement remote-access tool for support cases.
E. Purchase a password manager for remote-access tool users
F. Enforce account lockouts after five bad password attempts

Answer: A, F
Explanation:

The best ways to limit the bank’s risk are to enable multifactor authentication for each support
account and enforce account lockouts after five bad password attempts. Multifactor authentication
adds an extra layer of security to the login process, making it more difficult for attackers to gain
access to systems. Account lockouts after five bad password attempts can help to prevent brute force
attacks by locking out accounts after a certain number of failed login attempts.

Question: 18

A technician is asked to resize a partition on the internal storage drive of a computer running macOS.
Which of the followings tools should the technician use to accomplish this task?

A. Consoltf
B. Disk Utility
C. Time Machine
D. FileVault

Answer: B
Explanation:

The technician should use Disk Utility to resize a partition on the internal storage drive of a
computer running macOS. Disk Utility is a built-in utility that allows users to manage disks,
partitions, and volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to
format disks and volumes.

Question: 19

A technician is working with a company to determine the best way to transfer sensitive personal
information between offices when conducting business. The company currently uses USB drives and
is resistant to change. The company's compliance officer states that all media at rest must be
encrypted. Which of the following would be the BEST way to secure the current workflow?
Exam Dumps 9/269

A. Deploy a secondary hard drive with encryption on the appropriate workstation


B. Configure a hardened SFTP portal for file transfers between file servers
C. Require files to be individually password protected with unique passwords
D. Enable BitLocker To Go with a password that meets corporate requirements

Answer: D
Explanation:

The BEST way to secure the current workflow of transferring sensitive personal information between
offices when conducting business is to enable BitLocker To Go with a password that meets corporate
requirements. This is because BitLocker To Go is a full-disk encryption feature that encrypts all data
on a USB drive, which is what the company currently uses, and requires a password to access the
data.

Question: 20

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices
make use of full disk encryption at all limes Which of the following encryption solutions should the
technician choose?

A. Encrypting File System


B. FileVault
C. BitLocker
D. Encrypted LVM

Answer: A
Explanation:

The encryption solution that the technician should choose when configuring a new Windows laptop
and corporate policy requires that mobile devices make use of full disk encryption at all times is
BitLocker. This is because BitLocker is a full-disk encryption feature that encrypts all data on a hard
drive and is included with Window

Question: 21

Which of the following must be maintained throughout the forensic evidence life cycle when dealing
with a piece of evidence?

A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management

Answer: B
Explanation:
Exam Dumps 10/269

The aspect of forensic evidence life cycle that must be maintained when dealing with a piece of
evidence is chain of custody. This is because chain of custody is the documentation of the movement
of evidence from the time it is collected to the time it is presented in court, and it is important to
maintain the integrity of the evidence

Question: 22

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not
take the call and sets the phone to silent. Which of the following BEST describes the technician's
actions?

A. Avoid distractions
B. Deal appropriately with customer's confidential material
C. Adhere to user privacy policy
D. Set and meet timelines

Answer: A
Explanation:

The technician has taken the appropriate action by not taking the call and setting the phone to silent
in order to avoid any distractions and remain focused on the task at hand. This is a good example of
how to maintain focus and productivity when working on a customer's PC, and will help to ensure
that the job is completed in a timely and efficient manner.

Question: 23

An architecture firm is considering upgrading its computer-aided design (CAD) software to the
newest version that forces storage of backups of all CAD files on the software's cloud server. Which of
the following is MOST likely to be of concern to the IT manager?

A. All updated software must be tested with alt system types and accessories
B. Extra technician hours must be budgeted during installation of updates
C. Network utilization will be significantly increased due to the size of CAD files
D. Large update and installation files will overload the local hard drives.

Answer: C
Explanation:

The IT manager is most likely to be concerned about network utilization being significantly increased
due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a
large amount of data being transferred over the network, which can cause network congestion and
slow down other network traffic.

Question: 24

A wireless network is set up, but it is experiencing some interference from other nearby SSIDs.
Which of the following can BEST resolve the interference?
Exam Dumps 11/269

A. Changing channels
B. Modifying the wireless security
C. Disabling the SSIO broadcast
D. Changing the access point name

Answer: A
Explanation:

Changing channels can best resolve interference from other nearby SSIDs. Wireless networks
operate on different channels, and changing the channel can help to avoid interference from other
nearby networks.

Question: 25

A technician suspects a rootkit has been installed and needs to be removed. Which of the following
would BEST resolve the issue?

A. Application updates
B. Anti-malware software
C. OS reinstallation
D. File restore

Answer: C
Explanation:

If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall the
operating system. This is because rootkits are designed to be difficult to detect and remove, and they
can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the
operating system
https://www.minitool.com/backup-tips/how-to-get-rid-of-rootkit-windows-10.html

Question: 26
A customer reported that a home PC with Windows 10 installed in the default configuration is having
issues loading applications after a reboot occurred in the middle of the night. Which of the following
is the FIRST step in troubleshooting?

A. Install alternate open-source software in place of the applications with issues


B. Run both CPU and memory tests to ensure that all hardware functionality is normal
C. Check for any installed patches and roll them back one at a time until the issue is resolved
D. Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

Answer: C
Explanation:

The first step in troubleshooting is to check for any installed patches and roll them back one at a time
Exam Dumps 12/269

until the issue is resolved. This can help to identify any patches that may be causing the issue and
allow them to be removed.

Question: 27

A technician has been tasked with installing a workstation that will be used tor point-of-sale
transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the
following encryption technologies should be used to secure the workstation in case of theft?

A. Data-in-transit encryption
B. File encryption
C. USB drive encryption
D. Disk encryption

Answer: D
Explanation:

Disk encryption should be used to secure the workstation in case of theft. Disk encryption can help to
protect data on the hard drive by encrypting it so that it cannot be accessed without the correct
encryption key.

Question: 28

A company installed a new backup and recovery system. Which of the following types of backups
should be completed FIRST?

A. Full
B. Non-parity
C. Differential
D. Incremental

Answer: A
Explanation:

The type of backup that should be completed FIRST after installing a new backup and recovery
system is a full backup. This is because a full backup is a complete backup of all data and is the
foundation for all other backups. After a full backup is completed, other types of backups, such as
differential and incremental backups, can be performed.

Question: 29

A call center technician receives a call from a user asking how to update Windows Which of the
following describes what the technician should do?

A. Have the user consider using an iPad if the user is unable to complete updates
B. Have the user text the user's password to the technician.
C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
Exam Dumps 13/269

D. Advise the user to wait for an upcoming, automatic patch

Answer: C
Explanation:

The technician should guide the user to update Windows through the built-in "Check for Updates"
feature. This can be done by having the user click in the Search field, type "Check for Updates", and
then press the Enter key. This will bring up the Windows Update function, which will search for any
available updates and give the user the option to install them.

Question: 30

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which
of the following describes this incident?

A. Pretexting
B. Spoofing
C. Vishing
D. Scareware

Answer: C
Explanation:

Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate
entity, such as a bank or financial institution, in order to gain access to sensitive information. The
caller will typically use a variety of techniques, such as trying to scare the target or providing false
information, in order to get the target to provide the information they are after. Vishing is often used
to gain access to usernames, passwords, bank account information, and other sensitive data.

Question: 31

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are
lost or stolen. Which of the following provides the BEST solution?

A. Anti-malware
B. Remote wipe
C. Locator applications
D. Screen lock

Answer: B
Explanation:

This is because remote wipe allows the data on the smartphone to be erased remotely, which helps
to ensure that sensitive data does not fall into the wrong hands.

Question: 32
Exam Dumps 14/269

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer
would like the most secure wireless network possible. Which of the following should the technician
configure?

A. WPA2 with TKIP


B. WPA2 with AES
C. WPA3withAES-256
D. WPA3 with AES-128

Answer: B
Explanation:

This is because WPA2 with AES is the most secure wireless network configuration that is available on
a ten-year-old SOHO wireless router.

Question: 33

A technician has been tasked with using the fastest and most secure method of logging in to laptops.
Which of the following log-in options meets these requirements?

A. PIN
B. Username and password
C. SSO
D. Fingerprint

Answer: A
Explanation:

This is because a PIN is a fast and secure method of logging in to laptops, and it is more secure than
a password because it is not susceptible to keyloggers.

Question: 34
A technician is replacing the processor in a desktop computer prior to opening the computer, the
technician wants to ensure the internal components are protected. Which of the following safety
procedures would BEST protect the components in the PC? (Select TWO).

A. Utilizing an ESD strap


B. Disconnecting the computer from the power source
C. Placing the PSU in an antistatic bag
D. Ensuring proper ventilation
E. Removing dust from the ventilation fans
F. Ensuring equipment is grounded

Answer: A, C
Explanation:
Exam Dumps 15/269

The two safety procedures that would best protect the components in the PC are:
Utilizing an ESD strap
Placing the PSU in an antistatic bag

https://www.professormesser.com/free-a-plus-training/220-902/computer-safety-procedures-2/
https://www.skillsoft.com/course/comptia-a-core-2-safety-procedures-environmental-impacts-
cbdf0f2c-61c0-4f4a-a659-dc98f1f00158

Question: 35
A user's mobile phone has become sluggish A systems administrator discovered several malicious
applications on the device and reset the phone. The administrator installed MDM software. Which of
the following should the administrator do to help secure the device against this threat in the future?
(Select TWO).

A. Prevent a device root


B. Disable biometric authentication
C. Require a PIN on the unlock screen
D. Enable developer mode
E. Block a third-party application installation
F. Prevent GPS spoofing

Answer: C, E
Explanation:

To help secure the device against this threat in the future, the administrator should require a PIN on
the unlock screen and block a third-party application installation. Requiring a PIN on the unlock
screen can help to prevent unauthorized access to the device, while blocking third-party application
installation can help to prevent malicious applications from being installed on the device.

Question: 36

A company wants to remove information from past users' hard drives in order to reuse the hard
drives Witch of the following is the MOST secure method

A. Reinstalling Windows
B. Performing a quick format
C. Using disk-wiping software
D. Deleting all files from command-line interface

Answer: C
Explanation:

Using disk-wiping software is the most secure method for removing information from past users’
hard drives in order to reuse the hard drives. Disk-wiping software can help to ensure that all data on
the hard drive is completely erased and cannot be recovered.
Exam Dumps 16/269

Question: 37

A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be
used. The company wants the server to maintain the same IP address at all times. Which of the
following should the technician use?

A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT

Answer: A
Explanation:

The technician should use DHCP reservation to maintain the same IP address for the server at all
times. DHCP reservation allows the server to obtain an IP address dynamically from the DHCP server,
while ensuring that the same IP address is assigned to the server each time it requests an IP address.

Question: 38

A user is unable to use any internet-related functions on a smartphone when it is not connected to
Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and
receive email. The user is also able to send and receive text messages and phone calls when the
smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is
unable to use the internet on the smartphone when it is not connected to Wi-Fi?

A. The smartphone's line was not provisioned with a data plan


B. The smartphone's SIM card has failed
C. The smartphone's Bluetooth radio is disabled.
D. The smartphone has too many applications open

Answer: A
Explanation:

The smartphone’s line was not provisioned with a data plan. The user is unable to use any internet-
related functions on the smartphone when it is not connected to Wi-Fi because the smartphone’s
line was not provisioned with a data plan. The user can send and receive text messages and phone
calls when the smartphone is not connected to Wi-Fi because these functions do not require an
internet connection1

Question: 39
A technician is investigating an employee's smartphone that has the following symptoms
• The device is hot even when it is not in use.
•Applications crash, especially when others are launched
• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode
Exam Dumps 17/269

Which of the following can the technician do to MOST likely resolve these issues with minimal
impact? (Select TWO).

A. Turn on autorotation
B. Activate airplane mode.
C. Close unnecessary applications
D. Perform a factory reset
E. Update the device's operating system
F. Reinstall the applications that have crashed.

Answer: AC
Explanation:

The technician can close unnecessary applications and turn on autorotation to resolve these issues
with minimal impact. Autorotation can help the device to switch between portrait and landscape
modes automatically. Closing unnecessary applications can help to free up the device’s memory and
reduce the device’s temperature1
Reference:
CompTIA A+ Certification Exam: Core 2 (220-1102) Exam Objectives Version 4.0. Retrieved from
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)

Question: 40

A user corrects a laptop that is running Windows 10 to a docking station with external monitors
when working at a desk. The user would like to close the laptop when it is docked, but the user
reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the
laptop from going to sleep when it is closed and on the docking station?

A. Within the Power Options of the Control Panel utility click the Change Plan Settings button for the
enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never
B. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the
enabled power plan and select Put the Computer to Sleep under the On Battery category to Never
C. Within the Power Options of the Control Panel utility select the option Choose When to Turn Off
the Display and select Turn Off the Display under the Plugged In category to Never
D. Within the Power Options of the Control Panel utility, select the option Choose What Closing the
Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Answer: D
Explanation:

The laptop has an additional option under power and sleep settings that desktops do not have.
Switching to do nothing prevents the screen from turning off when closed.

Question: 41
A department has the following technical requirements for a new application:
Exam Dumps 18/269

The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will
the company be able to fully take advantage of after the upgrade?

A. CPU
B. Hard drive
C. RAM
D. Touch screen

Answer: C
Explanation:

https://www.makeuseof.com/tag/difference-32-bit-64-bit-windows/
After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully take
advantage of the RAM of the computer. This is because a 64-bit operating system is able to use larger
amounts of RAM compared to a 32-bit operating system, which may benefit the system’s overall
performance if it has more than 4GB of RAM installed

Question: 42
Which of the following Wi-Fi protocols is the MOST secure?

A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP

Answer: A
Explanation:

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)

Question: 43
A user attempts to open some files, but a message appears stating that the files are encrypted. The
user was able to access these files before without receiving this message and no changes have been
made within the company. Which of the following has infected the computer?

A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger
Exam Dumps 19/269

Answer: C
Explanation:

Ransomware is malicious software that encrypts files on a computer, making them inaccessible until
a ransom is paid. In this case, the user was able to access the files before without issue, and no
changes have been made within the company, so it is likely that the computer was infected with
ransomware.

Question: 44

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above
normal system baselines. The technician discovers an unknown executable with a random string
name running on the system. The technician terminates the process, and the system returns to
normal operation. The technician thinks the issue was an infected file, but the antivirus is not
detecting a threat. The technician is concerned other machines may be infected with this unknown
virus. Which of the following is the MOST effective way to check other machines on the network for
this unknown threat?

A. Run a startup script that removes files by name.


B. Provide a sample to the antivirus vendor.
C. Manually check each machine.
D. Monitor outbound network traffic.

Answer: C
Explanation:

The most effective way to check other machines on the network for this unknown threat is to
manually check each machine. This can help to identify any other machines that may be infected
with the unknown virus and allow them to be cleaned.

Question: 45

A user reports that a PC seems to be running more slowly than usual. A technician checks system
resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU
temperature is extremely high. Which of the following types of malware is MOST likely to blame?

A. Spyware
B. Cryptominer
C. Ransormvare
D. Boot sector virus

Answer: B
Explanation:

The type of malware that is most likely to blame for a PC running more slowly than usual and having
an extremely high GPU temperature is a “cryptominer”. Cryptominers are a type of malware that use
the resources of a computer to mine cryptocurrency. This can cause the computer to run more slowly
Exam Dumps 20/269

than usual and can cause the GPU temperature to rise. Spyware is a type of malware that is used to
spy on a user’s activities, but it does not typically cause high GPU temperatures. Ransomware is a
type of malware that encrypts a user’s files and demands payment to unlock them, but it does not
typically cause high GPU temperatures. Boot sector viruses are a type of malware that infects the
boot sector of a hard drive, but they do not typically cause high GPU temperatures12

Question: 46
Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90cBcc97fa7c211b767aB
Which of the following BEST describes the purpose of this string?

A. XSS verification
B. AES-256 verification
C. Hash verification
D. Digital signature verification

Answer: C
Explanation:

Hash verification is a process that verifies the integrity of a file by comparing the hash value of the
downloaded file to the hash value provided by the source1

Question: 47
Which of the following OS types provides a lightweight option for workstations thai need an easy-to-
use browser-based interface?

A. FreeBSD
B. Chrome OS
C. macOS
D. Windows

Answer: B
Explanation:

Chrome OS provides a lightweight option for workstations that need an easy-to-use browser-based
interface1

Question: 48
Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe
Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

A. Network and Sharing Center


B. Programs and Features
C. Default Apps
Exam Dumps 21/269

D. Add or Remove Programs

Answer: C
Explanation:

Default Apps should be used to ensure all PDF files open in Adobe Reader1

Question: 49
Which of the following provide the BEST way to secure physical access to a data cento server room?
(Select TWO).

A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule

Answer: AB
Explanation:

A biometric lock requires an authorized user to provide a unique biometric identifier, such as a
fingerprint, in order to gain access to the server room. A badge reader requires an authorized user to
swipe an access card in order to gain access. Both of these methods ensure that only authorized
personnel are able to access the server room. Additionally, video surveillance and access control
vestibules can be used to further secure the server room. Finally, a locking rack can be used to
physically secure the servers, so that they cannot be accessed without the appropriate key.

Question: 50

During a recent flight an executive unexpectedly received several dog and cat pictures while trying to
watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending
pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive
should:

A. set AirDrop so that transfers are only accepted from known contacts
B. completely disable all wireless systems during the flight
C. discontinue using iMessage and only use secure communication applications
D. only allow messages and calls from saved contacts

Answer: A
Explanation:

To best resolve this issue, the executive should set AirDrop so that transfers are only accepted from
known contacts (option A). AirDrop is a feature on iOS devices that allows users to share files,
photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers
Exam Dumps 22/269

from known contacts, the executive can ensure that unwanted files and photos are not sent to their
device. Additionally, the executive should ensure that the AirDrop setting is only enabled when it is
necessary, as this will protect their device from any unwanted files and photos.

Question: 51

A user reports that antivirus software indicates a computer is infected with viruses. The user thinks
this happened white browsing the internet. The technician does not recognize the interface with
which the antivirus message is presented. Which of the following is the NEXT step the technician
should take?

A. Shut down the infected computer and swap it with another computer
B. Investigate what the interface is and what triggered it to pop up
C. Proceed with initiating a full scan and removal of the viruses using the presented interface
D. Call the phone number displayed in the interface of the antivirus removal tool

Answer: B
Explanation:

The technician should not proceed with initiating a full scan and removal of the viruses using the
presented interface or call the phone number displayed in the interface of the antivirus removal
tool12
Shutting down the infected computer and swapping it with another computer is not necessary at this
point12

The technician should not immediately assume that the message is legitimate or perform any actions
without knowing what the interface is and what triggered it to pop up. It is important to investigate
the issue further, including checking the legitimacy of the antivirus program and the message it is
displaying.

Question: 52
The command cac cor.pti
a. txt was issued on a Linux terminal. Which of the following results should be expected?
A. The contents of the text comptia.txt will be replaced with a new blank document
B. The contents of the text comptia. txt would be displayed.
C. The contents of the text comptia.txt would be categorized in alphabetical order.
D. The contents of the text comptia. txt would be copied to another comptia. txt file

Answer: B
Explanation:

The command cac cor.ptia. txt was issued on a Linux terminal. This command would display the
contents of the text comptia.txt.

Question: 53
Exam Dumps 23/269

A user's smartphone data usage is well above average. The user suspects an installed application is
transmitting data in the background. The user would like to be alerted when an application attempts
to communicate with the internet. Which of the following BEST addresses the user's concern?

A. Operating system updates


B. Remote wipe
C. Antivirus
D. Firewall

Answer: D
Explanation:

A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. In this scenario, the user is concerned about an installed
application transmitting data in the background, so a firewall would be the best solution to address
their concern. By installing and configuring a firewall, the user can block unauthorized connections to
and from the device, and receive alerts whenever an application tries to access the internet.

Question: 54

A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST
likely reason?

A. The domain's processor compatibility is not met


B. The laptop has Windows 10 Home installed
C. The laptop does not have an onboard Ethernet adapter
D. The Laptop does not have all current Windows updates installed

Answer: B
Explanation:

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)

Question: 55
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are
loading on startup but causing excessive boot times. Which of the following should the technician do
to selectively prevent programs from loading?

A. Right-click the Windows button, then select Run entering shell startup and clicking OK, and then
move items one by one to the Recycle Bin
B. Remark out entries listed
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
C. Manually disable all startup tasks currently listed as enabled and reboot checking for issue
resolution at startup
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot,
Exam Dumps 24/269

checking for issue resolution at each startup.

Answer: D
Explanation:

This is the most effective way to selectively prevent programs from loading on a Windows 10
machine. The Startup tab can be accessed by opening Task Manager and then selecting the Startup
tab. From there, the technician can methodically disable items that are currently listed as enabled,
reboot the machine, and check for issue resolution at each startup. If the issue persists, the
technician can then move on to disabling the next item on the list.

Question: 56

A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee.
Which of the following methods should the technician use to refresh the laptop?

A. Internet-based upgrade
B. Repair installation
C. Clean install
D. USB repair
E. In place upgrade

Answer: C
Explanation:

The desktop specialist should use a clean install to refresh the laptop. A clean install will remove all
data and applications from the laptop and install a fresh copy of Windows 10, ensuring that the
laptop is ready for the newly hired employee.

Question: 57

A technician found that an employee is mining cryptocurrency on a work desktop. The company has
decided that this action violates its guidelines. Which of the following should be updated to reflect
this new requirement?

A. MDM
B. EULA
C. IRP
D. AUP

Answer: D
Explanation:

AUP (Acceptable Use Policy) should be updated to reflect this new requirement. The AUP is a
document that outlines the acceptable use of technology within an organization. It is a set of rules
that employees must follow when using company resources. The AUP should be updated to include a
policy on cryptocurrency mining on work desktops
Exam Dumps 25/269

Question: 58

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a
program on the desktop is requesting payment in exchange for file access A technician verifies the
user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

A. Scan and remove the malware


B. Schedule automated malware scans
C. Quarantine the system
D. Disable System Restore

Answer: C
Explanation:

The technician should quarantine the system first1


Reference:
CompTIA A+ Certification Exam: Core 2 Objectives Version 4.0. Retrieved from
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)

Question: 59

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is
equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on
all computers in the environment. Which of the following options describes how to set up Windows
Hello Fingerprint for the user?

A. Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change
Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a
fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete
B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options,
select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader
repeatedly until Windows indicates setup is complete.
C. Navigate to the Windows 10 Settings menu, select the Update & Security submenu select
Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the
fingerprint reader repeatedly until Windows indicates setup is complete
D. Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user
account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the
fingerprint reader repeatedly until Windows indicates setup is complete.

Answer: B
Explanation:

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options,
select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader
repeatedly until Windows indicates setup is complete. Windows Hello Fingerprint can be set up by
Exam Dumps 26/269

navigating to the Windows 10 Settings menu, selecting the Accounts submenu, selecting Sign in
options, and then selecting Windows Hello Fingerprint. The user will then be asked to place a
fingerprint on the fingerprint reader repeatedly until Windows indicates that setup is complete.
Windows Hello Fingerprint allows the user to log into the laptop using just their fingerprint,
providing an additional layer of security.

Question: 60

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive.
Which of the following tools should the technician use?

A. resmon exe
B. msconfig.extf
C. dfrgui exe
D. msmfo32.exe

Answer: C
Explanation:

The technician should use dfrgui.exe to defragment the hard drive1

Question: 61
A user reports a computer is running slow. Which of the following tools will help a technician identify
the issue?

A. Disk Cleanup
B. Group Policy Editor
C. Disk Management
D. Resource Monitor

Answer: D
Explanation:

Resource Monitor is a Windows utility that can be used to monitor and analyze the system resources
and processes running on a computer. It can be used to identify and troubleshoot any issues that
might be causing the computer to run slowly, such as CPU usage, memory usage, disk I/O, and
network usage.

Question: 62

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the
same network. A technician logs in lo the desktop PC with a local account but is unable to browse to
the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause
of the issue?

A. Time drift
Exam Dumps 27/269

B. Dual in-line memory module failure


C. Application crash
D. Filesystem errors

Answer: A
Explanation:

The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a computer is
not synchronized with the clock on the domain controller. This can cause authentication problems
when a user tries to log in to the domain. The fact that the technician is unable to browse to the
secure intranet site to get troubleshooting tools suggests that there may be a problem with the
network connection or the firewall settings on the desktop PC12

Question: 63
Which of the following could be used to implement secure physical access to a data center?

A. Geofence
B. Alarm system
C. Badge reader
D. Motion sensor

Answer: C
Explanation:

Badge readers are used to implement secure physical access to a data center. They are used to read
the identification information on an employee’s badge and grant access to the data center if the
employee is authorized2.
This system requires individuals to have an access badge that contains their identification
information or a unique code that can be scanned by a reader. After the badge is scanned, the system
compares the information on the badge with the authorized personnel database to authenticate if
the individual has the required clearance to enter that area. The other options listed, such as a
geofence, alarm system, or motion sensor are security measures that may be used in conjunction
with badge readers, but do not provide identification and authentication features.

Question: 64

A user wants to set up speech recognition on a PC In which of the following Windows Settings tools
can the user enable this option?

A. Language
B. System
C. Personalization
D. Ease of Access

Answer: D
Explanation:
Exam Dumps 28/269

The user can enable speech recognition on a PC in the Ease of Access settings tool. To set up Speech
Recognition on a Windows PC, the user should open Control Panel, click on Ease of Access, click on
Speech Recognition, and click the Start Speech Recognition link. Language settings can be used to
change the language of the speech recognition feature, but they will not enable the feature. System
settings can be used to configure the hardware and software of the PC, but they will not enable the
speech recognition feature. Personalization settings can be used to customize the appearance and
behavior of the PC, but they will not enable the speech recognition feature1
Open up ease of access, click on speech, then there is an on and off button for speech recognition.

Question: 65

A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried
several times to roll back the state but the malware persists. Which of the following would MOST
likely resolve the issue?

A. Quarantining system files


B. Reimaging the workstation
C. Encrypting the hard drive
D. Disabling TLS 1.0 support

Answer: C
Explanation:

Encrypting the hard drive would most likely resolve the issue1

Question: 66
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a
Windows computer. Which of the following filesystems will the technician MOST likely use?

A. FAT32
B. ext4
C. NTFS
D. exFAT

Answer: C
Explanation:

Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a whole range
of them including FAT32 and NTFS, it is highly recommended to format the partition or disk you want
to share in either FAT32 or NTFS, but since FAT32 has a file size limit of 4.2 GB, if you happen to work
with huge files, then it is better you use NTFS

Question: 67
A technician is setting up a desktop computer in a small office. The user will need to access files on a
Exam Dumps 29/269

drive shared from another desktop on the network. Which of the following configurations should the
technician employ to achieve this goal?

A. Configure the network as private


B. Enable a proxy server
C. Grant the network administrator role to the user
D. Create a shortcut to public documents

Answer: A
Explanation:

The technician should configure the network as private to allow the user to access files on a drive
shared from another desktop on the network1

Question: 68
A technician needs to transfer a large number of files over an unreliable connection. The technician
should be able to resume the process if the connection is interrupted. Which of the following tools
can be used?

A. afc
B. ehkdsk
C. git clone
C. zobocopy

Answer: A
Explanation:

The technician should use afc to transfer a large number of files over an unreliable connection and be
able to resume the process if the connection is interrupted1

Question: 69
An incident handler needs to preserve evidence for possible litigation. Which of the following will
the incident handler MOST likely do to preserve the evidence?

A. Encrypt the files


B. Clone any impacted hard drives
C. Contact the cyber insurance company
D. Inform law enforcement

Answer: B
Explanation:

The incident handler should clone any impacted hard drives to preserve evidence for possible
litigation1
Exam Dumps 30/269

Question: 70

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's
bank. Which of the following should the technician perform FIRST?

A. Update the browser's CRLs


B. File a trouble ticket with the bank.
C. Contact the ISP to report the CFCs concern
D. Instruct the CFO to exit the browser

Answer: A
Explanation:

The technician should update the browser’s CRLs first. The error message indicates that the
certificate revocation list (CRL) is not up to date. Updating the CRLs will ensure that the browser can
verify the authenticity of the bank’s website.

Question: 71

A technician has spent hours trying to resolve a computer issue for the company's Chief Executive
Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following steps
should the technician take NEXT?

A. Continue researching the issue


B. Repeat the iterative processes
C. Inform the CEO the repair will take a couple of weeks
D. Escalate the ticket

Answer: D
Explanation:
Exam Dumps 31/269

The technician should escalate the ticket to ensure that the CEO’s device is returned as soon as
possible1

Question: 72
A technician needs to exclude an application folder from being cataloged by a Windows 10 search.
Which of the following utilities should be used?

A. Privacy
B. Indexing Options
C. System
D. Device Manager

Answer: B
Explanation:

To exclude an application folder from being cataloged by a Windows 10 search, the technician should
use the Indexing Options utility1

Question: 73
The network was breached over the weekend System logs indicate that a single user's account was
successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST
mitigate this threat?

A. Encryption at rest
B. Account lockout
C. Automatic screen lock
D. Antivirus

Answer: B
Explanation:

Account lockout would best mitigate the threat of a dictionary attack1

Question: 74
As part of a CYOD policy a systems administrator needs to configure each user's Windows device to
require a password when resuming from a period of sleep or inactivity. Which of the following paths
will lead the administrator to the correct settings?

A. Use Settings to access Screensaver settings


B. Use Settings to access Screen Timeout settings
C. Use Settings to access General
D. Use Settings to access Display.
Exam Dumps 32/269

Answer: A
Explanation:

The systems administrator should use Settings to access Screensaver settings to configure each user’s
Windows device to require a password when resuming from a period of sleep or inactivity1

Question: 75
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings
should the user change FIRST?

A. Encryption
B. Wi-Fi channel
C. Default passwords
D. Service set identifier

Answer: C
Explanation:

the user should change the default passwords first when configuring a new SOHO Wi-Fi router1

Question: 76
An organization is centralizing support functions and requires the ability to support a remote user's
desktop. Which of the following technologies will allow a technician to see the issue along with the
user?

A. RDP
B. VNC
C. SSH
D. VPN

Answer: B
Explanation:

VNC will allow a technician to see the issue along with the user when an organization is centralizing
support functions and requires the ability to support a remote user’s desktop1

Question: 77
A user reports that a workstation is operating sluggishly Several other users operate on the same
workstation and have reported that the workstation is operating normally. The systems administrator
has validated that the workstation functions normally. Which of the following steps should the
systems administrator most likely attempt NEXT?

A. Increase the paging file size


Exam Dumps 33/269

B. Run the chkdsk command


C. Rebuild the user's profile
D. Add more system memory.
E. Defragment the hard drive.

Answer: C
Explanation:

Since the systems administrator has validated that the workstation functions normally and other
users operate on the same workstation without any issues, the next step should be to rebuild the
user’s profile. This will ensure that any corrupted files or settings are removed and the user’s profile
is restored to its default state.

Question: 78

An executive has contacted you through the help-desk chat support about an issue with a mobile
device.
Assist the executive to help resolve the issue.
Exam Dumps 34/269

Which of the following should be done NEXT?

A. Educate the user on the solution that was performed.


B. Tell the user to take time to fix it themselves next time.
C. Close the ticket out.
D. Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Answer: A
Explanation:

Question: 79

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to
connect it to the company’s wireless network. All the corporate laptops are connecting without
issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and
resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All
button.
Exam Dumps 35/269
Exam Dumps 36/269
Exam Dumps 37/269
Exam Dumps 38/269
Exam Dumps 39/269
Exam Dumps 40/269

Answer: See the


Explanation below:
Explanation:
Exam Dumps 41/269

Click on 802.11 and Select ac

Click on SSID and select CORP


Exam Dumps 42/269

Click on Frequency and select 5GHz

At Wireless Security Mode, Click on Security Mode

Select the WPA2

Ann needs to connect to the BYOD SSID, using 2.4GHZ. The selected security method chose should be
WPA PSK, and the password should be set to TotallySecret.
Exam Dumps 43/269

Question: 80
HOTSPOT
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in
your helpdesk ticket queue.
Click on individual tickers to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient
resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification
to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.
Exam Dumps 44/269
Exam Dumps 45/269
Exam Dumps 46/269
Exam Dumps 47/269

Answer:
Explanation:

Question: 81
HOTSPOT
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in
your helpdesk ticket queue.
Click on individual tickers to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient
resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification
to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.
Exam Dumps 48/269
Exam Dumps 49/269
Exam Dumps 50/269

Answer:
Explanation:

Question: 82
A user reports a computer is running slow. Which of the following tools will help a technician identity
the issued

A. Disk Cleanup
B. Group Policy Editor
C. Disk Management
D. Resource Monitor

Answer: D
Explanation:

Resource Monitor will help a technician identify the issue when a user reports a computer is running
slow1

Question: 83
Exam Dumps 51/269

An Android user contacts the help desk because a company smartphone failed to complete a
tethered OS update A technician determines there are no error messages on the device Which of the
following should the technician do NEXT?

A. Verify all third-party applications are disabled


B. Determine if the device has adequate storage available.
C. Check if the battery is sufficiently charged
D. Confirm a strong internet connection is available using Wi-Fi or cellular data

Answer: C
Explanation:

Since there are no error messages on the device, the technician should check if the battery is
sufficiently charged1
If the battery is low, the device may not have enough power to complete the update2

In this scenario, the technician has already determined that there are no error messages on the
device. The next best step would be to check if the battery is sufficiently charged. If the battery is
low, it could be preventing the device from completing the update process.
Verifying that third-party applications are disabled, determining if the device has adequate storage
available, and confirming a strong internet connection are all important steps in troubleshooting
issues with mobile devices. However, since the problem in this scenario is related to a failed OS
update, it is important to first check the battery level before proceeding with further troubleshooting
steps.

Question: 84

A user reports that text on the screen is too small. The user would like to make the text larger and
easier to see. Which of the following is the BEST way for the user to increase the size of text,
applications, and other items using the Windows 10 Settings tool?

A. Open Settings select Devices, select Display, and change the display resolution to a lower
resolution option
B. Open Settings, select System, select Display, and change the display resolution to a lower
resolution option.
C. Open Settings Select System, select Display, and change the Scale and layout setting to a higher
percentage.
D. Open Settings select Personalization, select Display and change the Scale and layout setting to a
higher percentage

Answer: C
Explanation:

Open Settings, select System, select Display, and change the Scale and layout setting to a higher
percentage123
Reference: 4. How to Increase the Text Size on Your Computer. Retrieved from
https://www.laptopmag.com/articles/increase-text-size-computer 5. How to Change the Size of Text
Exam Dumps 52/269

in Windows 10. Retrieved from https://www.howtogeek.com/370055/how-to-change-the-size-of-


text-in-windows-10/ 6. Change the size of text in Windows. Retrieved from
https://support.microsoft.com/en-us/windows/change-the-size-of-text-in-windows-1d5830c3-eee3-
8eaa-836b-abcc37d99b9a

Question: 85

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is
secured against external threats on the Internet. Which of the following actions should the
technician do FIRST?

A. Lock all devices in a closet.


B. Ensure all devices are from the same manufacturer.
C. Change the default administrative password.
D. Install the latest operating system and patches

Answer: C
Explanation:

The technician should change the default administrative password FIRST to ensure the network
equipment is secured against external threats on the Internet. Changing the default administrative
password is a basic security measure that can help prevent unauthorized access to the network
equipment. Locking all devices in a closet is a physical security measure that can help prevent theft
or damage to the devices, but it does not address external threats on the Internet. Ensuring all
devices are from the same manufacturer is not a security measure and does not address external
threats on the Internet. Installing the latest operating system and patches is important for
maintaining the security of the network equipment, but it is not the first action the technician should
take1

Question: 86
Which of the following Linux commands would be used to install an application?

A. yum
B. grep
C. Is
D. sudo

Answer: D
Explanation:

The Linux command used to install an application is sudo. The sudo command allows users to run
programs with the security privileges of another user, such as the root user. This is necessary to
install applications because it requires administrative privileges1

Question: 87
Exam Dumps 53/269

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following
should the technician verify in the command prompt to address the issue without making any
changes?

A. Run sfc / scannow on the drive as the administrator.


B. Run clearnmgr on the drive as the administrator
C. Run chkdsk on the drive as the administrator.
D. Run dfrgui on the drive as the administrator.

Answer: C
Explanation:

The technician should verify bad sectors on the user’s computer by running chkdsk on the drive as
the administrator. Chkdsk (check disk) is a command-line utility that detects and repairs disk errors,
including bad sectors. It runs a scan of the disk and displays any errors that are found

Question: 88

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the
following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A. Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image
the user wants to use as the wallpaper
B. Open Settings, select Personalization, click Browse, and then locate and open the image the user
wants to use as the wallpaper
C. Open Settings, select System, select Display, click Browse, and then locate and open the image the
user wants to use as the wallpaper
D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the
image the user wants to use as the wallpaper.

Answer: B
Explanation:

To change the desktop wallpaper on a Windows 10 computer using a Windows 10 Settings tool, the
user should open Settings, select Personalization, click Browse, and then locate and open the image
the user wants to use as the wallpaper1
https://www.lifewire.com/change-desktop-background-windows-11-5190733

Question: 89
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker
Drive Encryption menu item in Control Panel. Which of the following explains why the technician
unable to find this menu item?

A. The hardware does not meet BitLocker's minimum system requirements.


B. BitLocker was renamed for Windows 10.
C. BitLocker is not included on Windows 10 Home.
Exam Dumps 54/269

D. BitLocker was disabled in the registry of the laptop

Answer: C
Explanation:

BitLocker is only available on Windows 10 Pro, Enterprise, and Education editions1. Therefore, the
technician is unable to find the BitLocker Drive Encryption menu item in Control Panel because it is
not included in the Windows 10 Home edition1.

Question: 90
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A
technician is able to ping the user's laptop. The technician checks the antivirus parent servers and
sees the latest signatures have been installed. The technician then checks the user's laptop and finds
the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

A. Ransomware
B. Failed OS updates
C. Adware
D. Missing system files

Answer: B
Explanation:

The most likely reason for the antivirus protection on a company laptop being out of date is failed OS
updates1. Antivirus software relies on the operating system to function properly. If the operating
system is not up-to-date, the antivirus software may not function properly and may not be able to
receive the latest virus definitions and updates2. Therefore, it is important to keep the operating
system up-to-date to ensure the antivirus software is functioning properly2.

Question: 91
Which of the following is a proprietary Cisco AAA protocol?

A. TKIP
B. AES
C. RADIUS
D. TACACS+

Answer: D
Explanation:

TACACS+ is a proprietary Cisco AAA protocol

Question: 92
Exam Dumps 55/269

A technician needs to interconnect two offices to the main branch while complying with good
practices and security standards. Which of the following should the technician implement?

A. MSRA
B. VNC
C. VPN
D. SSH

Answer: C
Explanation:

A technician needs to interconnect two offices to the main branch while complying with good
practices and security standards. The technician should implement VPN

Question: 93

A Chief Executive Officer has learned that an exploit has been identified on the web server software,
and a patch is not available yet. Which of the following attacks MOST likely occurred?

A. Brute force
B. Zero day
C. Denial of service
D. On-path

Answer: B
Explanation:

A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer


application, meaning that the attack occurs on “day zero” of awareness of the vulnerability
Configuring AAA Services. Retrieved from
https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-
0/security/configuration/guide/sc40crsbook_chapter1.html

Question: 94
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a
Windows computer. Which of the following filesystems will the technician MOST likely use?

A. FAT32
B. ext4
C. NTFS
D. exFAT

Answer: D
Explanation:

exFAT is a file system that is supported by both Linux and Windows and can handle large files1.
Exam Dumps 56/269

Question: 95

A user purchased a netbook that has a web-based, proprietary operating system. Which of the
following operating systems is MOST likely installed on the netbook?

A. macOS
B. Linux
C. Chrome OS
D. Windows

Answer: C
Explanation:

4. Chrome OS. Retrieved from https://en.wikipedia.org/wiki/Chrome_OS 5. What is Chrome OS?


Retrieved from https://www.google.com/chromebook/chrome-os/
A netbook with a web-based, proprietary operating system is most likely running Chrome OS.
Chrome OS is a web-based operating system developed by Google that is designed to work with web
applications and cloud storage. It is optimized for netbooks and other low-power devices and is
designed to be fast, secure, and easy to use.

Question: 96

An Android user reports that when attempting to open the company's proprietary mobile application
it immediately doses. The user states that the issue persists, even after rebooting the phone. The
application contains critical information that cannot be lost. Which of the following steps should a
systems administrator attempt FIRST?

A. Uninstall and reinstall the application


B. Reset the phone to factory settings
C. Install an alternative application with similar functionality
D. Clear the application cache.

Answer: D
Explanation:

The systems administrator should clear the application cache12


If clearing the application cache does not work, the systems administrator should uninstall and
reinstall the application12
Resetting the phone to factory settings is not necessary at this point12
Installing an alternative application with similar functionality is not necessary at this point12

Question: 97
A technician needs to document who had possession of evidence at every step of the process. Which
of the following does this process describe?
Exam Dumps 57/269

A. Rights management
B. Audit trail
C. Chain of custody
D. Data integrity

Answer: C
Explanation:

The process of documenting who had possession of evidence at every step of the process is called
chain of custody

Question: 98
A user calls the help desk to report potential malware on a computer. The anomalous activity began
after the user clicked a link to a free gift card in a recent email The technician asks the user to
describe any unusual activity, such as slow performance, excessive pop-ups, and browser
redirections. Which of the following should the technician do NEXT?

A. Advise the user to run a complete system scan using the OS anti-malware application
B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities
are still present
C. Have the user check for recently installed applications and outline those installed since the link in
the email was clicked
D. Instruct the user to disconnect the Ethernet connection to the corporate network.

Answer: D
Explanation:

First thing you want to do is quarantine/disconnect the affected system from the network so
whatever malicious software doesn't spread.

Question: 99

A company needs to securely dispose of data stored on optical discs. Which of the following is the
MOST effective method to accomplish this task?

A. Degaussing
B. Low-level formatting
C. Recycling
D. Shredding

Answer: D
Explanation:

Shredding is the most effective method to securely dispose of data stored on optical discs12
Reference: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek. Retrieved from
https://www.howtogeek.com/174307/how-can-i-safely-destroy-sensitive-data-cdsdvds/ 5. Disposal
Exam Dumps 58/269

— UK Data Service. Retrieved from https://ukdataservice.ac.uk/learning-hub/research-data-


management/store-your-data/disposal/

Question: 100

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m
an organization The certificate will be used in conjunction with the user's existing username and
password Which of the following BEST describes the security benefits realized after this deployment?

A. Multifactor authentication will be forced for Wi-Fi


B. All Wi-Fi traffic will be encrypted in transit
C. Eavesdropping attempts will be prevented
D. Rogue access points will not connect

Answer: A
Explanation:

Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be used for
Wi-Fi access for all devices in an organization3
Reference:
CompTIA Security+ (Plus) Practice Test Questions | CompTIA. Retrieved from
https://www.comptia.org/training/resources/comptia-security-practice-tests

Question: 101

A bank would like to enhance building security in order to prevent vehicles from driving into the
building while also maintaining easy access for customers. Which of the following BEST addresses
this need?

A. Guards
B. Bollards
C. Motion sensors
D. Access control vestibule

Answer: B
Explanation:

Bollards are the best solution to enhance building security in order to prevent vehicles from driving
into the building while also maintaining easy access for customers4
Reference: 2. Bollards. Retrieved from https://en.wikipedia.org/wiki/Bollard

Question: 102

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an
apartment complex. The technician discovers that employees and patients are not the only people
on the network. Which of the following should the technician do to BEST minimize this issue?
Exam Dumps 59/269

A. Disable unused ports.

B. Remove the guest network

C. Add a password to the guest network

D. Change the network channel.

Answer: D
Explanation:

Changing the network channel is the best solution to minimize the issue of employees and patients
not being the only people on the Wi-Fi network5
Reference: 3. Sample CompTIA Security+ exam questions and answers. Retrieved from
https://www.techtarget.com/searchsecurity/quiz/Sample-CompTIA-Security-exam-questions-and-
answers

Question: 103

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The
technician notices the Windows OS has only 4GB of RAM available for use. Which of the following
explains why the OS can only access 46B of RAM?

A. The UEFI settings need to be changed.

B. The RAM has compatibility issues with Windows 10.

C. Some of the RAM is defective.

D. The newly installed OS is x86.

Answer: D
Explanation:

The newly installed OS is x86. The x86 version of Windows 10 can only use up to 4GB of RAM. The
x64 version of Windows 10 can use up to 2TB of RAM1.

Question: 104

Which of the following is a data security standard for protecting credit cards?
Exam Dumps 60/269

A. PHI

B. NIST

C. PCI

D. GDPR

Answer: C
Explanation:

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to
ensure that ALL companies that accept, process, store or transmit credit card information maintain a
secure environment.

Question: 105

Which of the following should be used to control security settings on an Android phone in a domain
environment?

A. MDM

B. MFA

C. ACL

D. SMS

Answer: A
Explanation:

The best answer to control security settings on an Android phone in a domain environment is to use
“Mobile Device Management (MDM)”. MDM is a type of software that is used to manage and secure
mobile devices such as smartphones and tablets. MDM can be used to enforce security policies,
configure settings, and remotely wipe data from devices. In a domain environment, MDM can be
used to manage Android phones and enforce security policies such as password requirements,
encryption, and remote wipe capabilities12

Question: 106

A user is being directed by the help desk to look up a Windows PC's network name so the help desk
can use a remote administration tool to assist the user. Which of the following commands would
Exam Dumps 61/269

allow the user to give the technician the correct information? (Select TWO).

A. ipconfig /all

B. hostname

C. netstat /?

D. nslookup localhost

E. arp —a

F. ping :: 1

Answer: AB
Explanation:

The user can use the following commands to give the technician the correct information: ipconfig
/all and hostname 1. The ipconfig /all command displays the IP address, subnet mask, and default
gateway for all adapters on the computer 1. The hostname command displays the name of the
computer 1.

Question: 107

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted
by others. Which of the following applications should the technician use to assist the user with hiding
the file?

A. Device Manager

B. Indexing Options

C. File Explorer

D. Administrative Tools

Answer: C
Explanation:

The technician should use the File Explorer application to assist the user with hiding the file 1. The
user can right-click the file and select Properties. In the Properties dialog box, select the Hidden
check box, and then click OK 1.
Exam Dumps 62/269

Question: 108

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file
types are supported by default?

A. .py

B. .js

C. .vbs

D. .sh

Answer: D
Explanation:

https://www.educba.com/shell-scripting-in-linux/

Question: 109

Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the
following tools can the user employ to schedule the browser to automatically launch a traffic website
at 4:45 p.m.?

A. taskschd.msc

B. perfmon.msc

C. lusrmgr.msc

D. Eventvwr.msc

Answer: A
Explanation:

The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically launch
a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule
tasks to run automatically at specified times or in response to certain events.

Question: 110
Exam Dumps 63/269

A technician is installing a new business application on a user's desktop computer. The machine is
running Windows 10 Enterprise 32-bit operating system. Which of the following files should the
technician execute in order to complete the installation?

A. Installer_x64.exe
B. Installer_Files.zip
C. Installer_32.msi
D. Installer_x86.exe
E. Installer_Win10Enterprise.dmg

Answer: D
Explanation:

The 32-bit operating system can only run 32-bit applications, so the technician should execute the
32-bit installer. The “x86” in the file name refers to the 32-bit architecture.

https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating-systems/

Question: 111

A user is having issues with document-processing software on a Windows workstation. Other users
that log in to the same device do not have the same issue.
Which of the following should a technician do to remediate the issue?

A. Roll back the updates.


B. Increase the page file.
C. Update the drivers.
D. Rebuild the profile.

Answer: D
Explanation:

The issue is specific to the user’s profile, so the technician should rebuild the profile. Rebuilding the
profile will create a new profile and transfer the user’s data to the new profile1

Question: 112

Which of the following is an example of MFA?

A. Fingerprint scan and retina scan


B. Password and PIN
C. Username and password
D. Smart card and password
Exam Dumps 64/269

Answer: D
Explanation:

Smart card and password is an example of two-factor authentication (2FA), not multi-factor
authentication (MFA). MFA requires two or more authentication factors. Smart card and password is
an example of two-factor authentication (2FA)2

Question: 113

Which of the following command-line tools will delete a directory?

A. md
B. del
C. dir
D. rd
E. cd

Answer: D
Explanation:

To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you
can remove files and subdirectories from it using the /s switch. You can also use the /q switch to
suppress confirmation messages (quiet mode).

Question: 114

A police officer often leaves a workstation for several minutes at a time. Which of the following is the
BEST way the officer can secure the workstation quickly when walking away?

A. Use a key combination to lock the computer when leaving.


B. Ensure no unauthorized personnel are in the area.
C. Configure a screensaver to lock the computer automatically after approximately 30 minutes of
inactivity.
D. Turn off the monitor to prevent unauthorized visibility of information.

Answer: A
Explanation:

The BEST way to secure the workstation quickly when walking away is to use a key combination to
lock the computer when leaving1

Question: 115
Exam Dumps 65/269

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst
notices that call center agents often walk away from their workstations, leaving patient data visible
for anyone to see. Which of the following should a network administrator do to BEST prevent data
theft within the call center?

A. Encrypt the workstation hard drives.


B. Lock the workstations after five minutes of inactivity.
C. Install privacy screens.
D. Log off the users when their workstations are not in use.

Answer: B
Explanation:

The BEST solution for preventing data theft within the call center in this scenario would be to lock the
workstations after a period of inactivity. This would prevent unauthorized individuals from accessing
patient data if call center agents were to step away from their workstations without logging out.

Question: 116

A technician is setting up a backup method on a workstation that only requires two sets of tapes to
restore. Which of the following would BEST accomplish this task?

A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup

Answer: D
Explanation:

To accomplish this task, the technician should use a Full backup method1
A full backup only requires two sets of tapes to restore because it backs up all the data from the
workstation. With a differential backup, the backups need to be taken multiple times over a period of
time, so more tapes would be needed to restore the data1

Question: 117
A help desk team lead contacts a systems administrator because the technicians are unable to log in
to a Linux server that is used to access tools. When the administrator tries to use remote desktop to
log in to the server, the administrator sees the GUI is crashing. Which of the following methods can
the administrator use to troubleshoot the server effectively?

A. SFTP
B. SSH
C. VNC
Exam Dumps 66/269

D. MSRA

Answer: C
Explanation:

The administrator can use Virtual Network Computing (VNC) to troubleshoot the server effectively.
VNC is a graphical desktop sharing system that allows the administrator to remotely control the
desktop of a Linux server.

Question: 118

A user turns on a new laptop and attempts to log in to specialized software, but receives a message
stating that the address is already in use. The user logs on to the old desktop and receives the same
message. A technician checks the account and sees a comment that the user requires a specifically
allocated address before connecting to the software. Which of the following should the technician do
to MOST likely resolve the issue?

A. Bridge the LAN connection between the laptop and the desktop.
B. Set the laptop configuration to DHCP to prevent conflicts.
C. Remove the static IP configuration from the desktop.
D. Replace the network card in the laptop, as it may be defective.

Answer: C
Explanation:

The new laptop was set up with the static IP it needs to connect to the software. The old desktop is
still configured with that IP, hence the conflict.

Question: 119
Which of the following should be done NEXT?

A. Send an email to Telecom to inform them of the issue and prevent reoccurrence.
B. Close the ticket out.
C. Tell the user to take time to fix it themselves next time.
D. Educate the user on the solution that was performed.

Answer: D
Explanation:

educating the user on the solution that was performed is a good next step after resolving an issue.
This can help prevent similar issues from happening again and empower users to solve problems on
their own.

Question: 120
Exam Dumps 67/269

A user calls the help desk and reports a workstation is infected with malicious software. Which of the
following tools should the help desk technician use to remove the malicious software? (Select TWO).

A. File Explorer
B. User Account Control
C. Windows Backup and Restore
D. Windows Firewall
E. Windows Defender
F. Network Packet Analyzer

Answer: AE
Explanation:

The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in
antivirus program that can detect and remove malicious software from a workstation. File Explorer
can be used to locate and delete files associated with the malicious software1

Question: 121
A technician has just used an anti-malware removal tool to resolve a user's malware issue on a
corporate laptop. Which of the following BEST describes what the technician should do before
returning the laptop to the user?

A. Educate the user on malware removal.


B. Educate the user on how to reinstall the laptop OS.
C. Educate the user on how to access recovery mode.
D. Educate the user on common threats and how to avoid them.

Answer: D
Explanation:

educating the user on common threats and how to avoid them (D) would be a good step before
returning the laptop to the user. This can help prevent similar issues from happening again.

Question: 122

A technician is upgrading the backup system for documents at a high-volume law firm. The current
backup system can retain no more than three versions of full backups before failing. The law firm is
not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?

A. Full
B. Mirror
C. Incremental
D. Differential
Exam Dumps 68/269

Answer: C
Explanation:

The law firm wants to retain more versions of the backups when possible, so the best backup method
for the technician to implement in this scenario would be Incremental backup. Incremental backups
only save the changes made since the last backup, which allows for more frequent backups and
minimizes the amount of storage required. This would allow the law firm to retain more than three
versions of backups without risking backup failure.
To retain more versions of backups, the technician should implement an Incremental backup
method12
An incremental backup method only backs up the data that has changed since the last backup, so it
requires less storage space than a full backup12

Question: 123
While assisting a customer with an issue, a support representative realizes the appointment is taking
longer than expected and will cause the next customer meeting to be delayed by five minutes. Which
of the following should the support representative do NEXT?

A. Send a quick message regarding the delay to the next customer.


B. Cut the current customer's lime short and rush to the next customer.
C. Apologize to the next customer when arriving late.
D. Arrive late to the next meeting without acknowledging the lime.

Answer: A
Explanation:

The support representative should send a quick message regarding the delay to the next customer.
This will help the next customer understand the situation and adjust their schedule accordingly.

Question: 124

A company discovered that numerous computers from multiple geographic locations are sending a
very high number of connection requests which is causing the company’s web server to become
unavailable to the general public. Which of the following attacks is occurring?

A. Zero day
B. SOL injection
C. Cross-site scripting
D. Distributed denial of service

Answer: D
Explanation:

The company is experiencing a distributed denial of service (DDoS) attack. A DDoS attack is a type of
cyber attack in which multiple compromised systems are used to target a single system, causing a
denial of service for users of the targeted system.
Exam Dumps 69/269

Question: 125

While browsing a website, a staff member received a message that the website could not be trusted.
Shortly afterward, several other colleagues reported the same issue across numerous other
websites. Remote users who were not connected to corporate resources did not have any issues.
Which of the following is MOST likely the cause of this issue?

A. A bad antivirus signature update was installed.


B. A router was misconfigured and was blocking traffic.
C. An upstream internet service provider was flapping.
D. The time or date was not in sync with the website.

Answer: B
Explanation:

The most likely cause of this issue is that a router was misconfigured and was blocking traffic. This
would explain why remote users who were not connected to corporate resources did not have any
issues.

Question: 126

Security software was accidentally uninstalled from all servers in the environment. After requesting
the same version of the software be reinstalled, the security analyst learns that a change request will
need to be filled out. Which of the following is the BEST reason to follow the change management
process in this scenario?

A. Owners can be notified a change is being made and can monitor it for performance impact. Most
Voted
B. A risk assessment can be performed to determine if the software is needed.
C. End users can be aware of the scope of the change.
D. A rollback plan can be implemented in case the software breaks an application.

Answer: A
Explanation:

change management process can help ensure that owners are notified of changes being made and
can monitor them for performance impact (A). This can help prevent unexpected issues from arising.

Question: 127

Which of the following is the MOST basic version of Windows that includes BitLocker?

A. Home
Exam Dumps 70/269

B. pro
C. Enterprise
D. Pro for Workstations

Answer: D
Explanation:

The most basic version of Windows that includes BitLocker is Windows Pro. BitLocker is a feature of
Windows Pro that provides full disk encryption for all data on a storage drive [1]. It helps protect data
from unauthorized access or theft and can help secure data from malicious attacks. Pro for
Workstations includes this feature, as well as other features such as support for up to 6 TB of RAM
and ReFS.

Question: 128

A user receives a notification indicating the data plan on the user's corporate phone has reached its
limit. The user has also noted the performance of the phone is abnormally slow. A technician
discovers a third-party GPS application was installed on the phone. Which of the following is the
MOST likely cause?

A. The GPS application is installing software updates.


B. The GPS application contains malware.
C. The GPS application is updating its geospatial map data.
D. The GPS application is conflicting with the built-in GPS.

Answer: B
Explanation:

The GPS application contains malware. The third-party GPS application is likely the cause of the slow
performance of the phone. The application may contain malware that is using up system resources
and slowing down the phone. The user should uninstall the application and run a malware scan on
the phone1

Question: 129

A technician is setting up a backup method on a workstation that only requires two sets of tapes to
restore. Which of the following would BEST accomplish this task?

A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup

Answer: D
Exam Dumps 71/269

Explanation:

A full backup involves creating a copy of all data on the workstation, including system files and user-
created data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that
the data can be restored in the event of a system failure or data loss.

Question: 130

A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP


application, The PC uses a USB microphone connected to a powered hub. The technician verifies the
microphone works on the PC using Voice Recorder. Which of the following should the technician do
to solve the issue?

A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
C. Delete the microphone from Device Manager and scan for new hardware,
D. Replace the USB microphone with one that uses a traditional 3.5mm plug.

Answer: B
Explanation:

In Windows 10, there are privacy settings that control access to certain devices, such as
microphones, cameras, and other input devices. If the microphone is not enabled under these
privacy settings, the VoIP application may not have access to it, causing a lack of outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App
permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP
application to allow it to access the microphone.
Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may
or may not solve the issue, as the issue could be related to the privacy settings. Deleting the
microphone from Device Manager and scanning for new hardware may also not solve the issue, as
the issue could be related to the privacy settings. Replacing the USB microphone with one that uses a
traditional 3.5mm plug is not recommended, as it would require purchasing a new microphone and
may not solve the issue.

Question: 131

A technician is setting up a new laptop for an employee who travels, Which of the following is the
BEST security practice for this scenario?

A. PIN-based login
B. Quarterly password changes
C. Hard drive encryption
D. A physical laptop lock

Answer: C
Explanation:
Exam Dumps 72/269

Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is secure,
even if the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone
without the correct encryption key. This is an important security measure for any laptop used by an
employee who travels, as it helps to protect the data stored on the laptop from unauthorized access.

Question: 132

A user in a corporate office reports the inability to connect to any network drives. No other users
have reported this issue. Which of the following is the MOST likely reason the user is having this
issue?

A. The user is not connected to the VPN.


B. The file server is offline.
C. A low battery is preventing the connection.
D. The log-in script failed.

Answer: A
Explanation:

Question: 133

A user received the following error upon visiting a banking website:


The security presented by website was issued a different website' s address .
A technician should instruct the user to:

A. clear the browser cache and contact the bank.


B. close out of the site and contact the bank.
C. continue to the site and contact the bank.
D. update the browser and contact the bank.

Answer: A
Explanation:

The technician should instruct the user to clear the browser cache and contact the bank (option A).
This error indicates that the website the user is visiting is not the correct website and is likely due to
a cached version of the website being stored in the user's browser. Clearing the browser cache
should remove any stored versions of the website and allow the user to access the correct website.
The user should also contact the bank to confirm that they are visiting the correct website and to
report the error.

Question: 134

A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar
web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following
Exam Dumps 73/269

would MOST likely solve the issue?

A. Updating the operating system


B. Changing proxy settings
C. Reinstalling the browser
D. Enabling port forwarding

Answer: C
Explanation:

Reinstalling the browser would most likely solve the issue. This would remove any malicious software
or add-ons that may be causing the issue and restore the browser to its default settings.

Question: 135

A technician is tasked with configuring a computer for a visually impaired user. Which of the
following utilities should the technician use?

A. Device Manager
B. System
C. Ease of Access Center
D. Programs and Features

Answer: C
Explanation:

The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a
computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of
Access Center, the technician can turn on options like high contrast display, screen magnification, and
screen reader software to help the user better interact with the computer.

Question: 136

An analyst needs GUI access to server software running on a macOS server. Which of the following
options provides the BEST way for the analyst to access the macOS server from the Windows
workstation?

A. RDP through RD Gateway


B. Apple Remote Desktop
C. SSH access with SSH keys
D. VNC with username and password

Answer: B
Explanation:
Exam Dumps 74/269

Apple Remote Desktop is a remote access solution that allows a user to access and control another
macOS computer from their Windows workstation. It provides a graphical user interface so that the
analyst can easily access the server software running on the macOS server. Apple Remote Desktop
also supports file transfers, so the analyst can easily transfer files between the two computers.
Additionally, Apple Remote Desktop supports encryption, so data is secure during transmission.

Question: 137

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The
company wants to reduce this risk with minimal impact to users who want to use their laptops when
not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

A. Requiring strong passwords


B. Disabling cached credentials
C. Requiring MFA to sign on
D. Enabling BitLocker on all hard drives

Answer: D
Explanation:

BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop.
This will protect the data stored on the drive in the event that the laptop is lost or stolen, and will
help to reduce the risk of data loss. Additionally, BitLocker can be configured to require a PIN or
other authentication in order to unlock the drive, providing an additional layer of security.

Question: 138

A technician has been asked to set up a new wireless router with the best possible security. Which of
the following should the technician implement?

A. WPS
B. TKIP
C. WPA3
D. WEP

Answer: C
Explanation:

WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the highest
level of protection available. It is designed to protect against brute force password attempts and
protect against eavesdropping and man-in-the-middle attacks. WPA3 also supports the use of
stronger encryption algorithms, such as the Advanced Encryption Standard (AES), which provides
additional protection for wireless networks. WPA3 should be implemented in order to ensure the
best possible security for the new wireless router.

Question: 139
Exam Dumps 75/269

A field technician applied a Group Policy setting to all the workstations in the network. This setting
forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the
following is the MOST likely cause of this issue?

A. The SNTP server is offline.


B. A user changed the time zone on a local machine.
C. The Group Policy setting has disrupted domain authentication on the system,
D. The workstations and the authentication server have a system clock difference.

Answer: D
Explanation:

The workstations and the authentication server have a system clock difference. If a Group Policy
setting is applied that forces the workstations to use a specific SNTP server, but the system clock on
the workstations and the authentication server are out of sync, then this can cause authentication
issues and users will be unable to log in. In this case, the most likely cause of the issue is a difference
in system clocks and the technician should ensure that the clocks on the workstations and the
authentication server are in sync.

Question: 140

A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows
10 Pro, The technician must ensure files and user preferences are retained, must perform the
operation locally, and should migrate one station at a time. Which of the following methods would
be MOST efficient?

A. Golden image
B. Remote network install
C. In-place upgrade
D. Clean install

Answer: C
Explanation:

An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10
Pro, as it will retain all user files and preferences, can be done locally, and can be done one station at
a time. An in-place upgrade involves installing the new version of Windows over the existing version,
and can be done quickly and easily.

Question: 141

A suite of security applications was installed a few days ago on a user's home computer. The user
reports that the
computer has been running slowly since the installation. The user notices the hard drive activity light
Exam Dumps 76/269

is constantly solid. Which of the following should be checked FIRST?

A. Services in Control Panel to check for overutilization


B. Performance Monitor to check for resource utilization
C. System File Checker to check for modified Windows files
D. Event Viewer to identify errors

Answer: C
Explanation:

System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows
utility that can be used to scan for and restore corrupt Windows system files. SFC can be used to
detect and fix any modified or corrupted system files on a computer, and thus should be checked first
when a user reports that their computer has been running slowly since the installation of security
applications [1][2]. By checking SFC, any modified or corrupted system files can be identified and
fixed, potentially improving the overall performance of the computer.

Question: 142

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus
system identified malware from a recent download, but it was unable to remove the malware. Which
of the following actions would be BEST to remove the malware while also preserving the user's files?

A. Run the virus scanner in an administrative mode.


B. Reinstall the operating system.
C. Reboot the system in safe mode and rescan.
D. Manually delete the infected files.

Answer: C
Explanation:

Rebooting the system in safe mode will limit the number of programs and processes running,
allowing the antivirus system to more effectively identify and remove the malware. Rescanning the
system will allow the antivirus system to identify and remove the malware while preserving the
user's files.

Question: 143

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which
of the following methods does the technician use to force the program to close in macOS?

A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen
application in the list, and clicks Force Quit.
B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard
Exam Dumps 77/269

for 10 seconds Which causes the application to force quit.


C. The technician opens Finder, navigates to the Applications folder, locates the application that is
frozen in the list, right-clicks on the application, and selects the Force Quit option.
D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the
list, and clicks Force Quit.

Answer: D
Explanation:

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the
list, and clicks Force Quit. This is the most common method of force quitting a program in macOS.
This can be done by clicking on the Apple icon in the top left of the screen, selecting Force Quit,
selecting the frozen application in the list, and then clicking Force Quit. This will force the application
to quit and the spinning round cursor will disappear.

Question: 144

Which of the following is a consequence of end-of-lite operating systems?

A. Operating systems void the hardware warranty.


B. Operating systems cease to function.
C. Operating systems no longer receive updates.
D. Operating systems are unable to migrate data to the new operating system.

Answer: C
Explanation:

End-of-life operating systems are those which have reached the end of their life cycle and are no
longer supported by the software developer. This means that the operating system will no longer
receive updates, security patches, or other new features. This can leave users vulnerable to security
threats, as the system will no longer be protected against the latest threats. Additionally, this can
make it difficult to migrate data to a newer operating system, as the old system is no longer
supported.

Question: 145

Which of the following data is MOST likely to be regulated?

A. Name in a Phone book


B. Name on a medical diagnosis
C. Name on a job application
D. Name on a employer's website

Answer: B
Explanation:
Exam Dumps 78/269

A name on a medical diagnosis (B) is most likely to be regulated. This is because it falls under the
category of protected health information (PHI), which is subject to regulations such as the Health
Insurance Portability and Accountability Act (HIPAA) in the United States. These regulations aim to
protect the privacy and security of individuals’ health information.

Question: 146

Which of the following file extensions are commonly used to install applications on a macOS
machine? (Select THREE).

A. .mac
B. .Pkg
C. .deb
D. .dmg
E. .msi
F. .appx
G. .app
H. .apk

Answer: BDG
Explanation:

https://support.microsoft.com/en-us/windows/common-file-name-extensions-in-windows-
da4a4430-8e76-89c5-59f7-1cdbbc75cb01

.pkg and .dmg are files used to distribute and install applications on macOS. .pkg files are installer
packages that may contain multiple files and executable code, while .dmg files are disk images that
can contain a single bundled application or multiple applications. .app files are typically the main
executable files for macOS applications. The other options listed are file extensions for applications
or installers on other platforms (such as .deb for Debian-based Linux systems, .msi for Windows, and
.apk for Android). This information is covered in the Comptia A+ Core2 documents/guide under the
Mac OS section.

Question: 147

A help desk technician runs the following script: Inventory.py. The technician receives the following
error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

A. Scripts are not permitted to run.


Exam Dumps 79/269

B. The script was not built for Windows.

C. The script requires administrator privileges,

D. The runtime environment is not installed.

Answer: D
Explanation:

The error message is indicating that the script is not associated with any program on the computer
that can open and run it. This means that the script requires a runtime environment, such as Python,
to be installed in order for it to execute properly. Without the appropriate runtime environment, the
script will not be able to run.

Question: 148

A technician downloaded software from the Internet that required the technician to scroll through a
text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

A. DRM

B. NDA

C. EULA

D. MOU

Answer: C
Explanation:

The most likely agreement in use here is a EULA (End User License Agreement). This is a legally
binding agreement between the user and the software developer, outlining the terms and conditions
that the user must agree to in order to use the software. It is important that the user understands
and agrees to the EULA before they can proceed with downloading and installing the software. As
stated in the CompTIA A+ Core 2 exam objectives, users should be aware of the EULA before
downloading any software.

Question: 149

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it
on. The technician attempts to boot the computer via the NIC to image the computer, but this
Exam Dumps 80/269

method does not work. Which of the following is the MOST likely reason the computer is unable to
boot into the imaging system via the network?

A. The computer's CMOS battery failed.

B. The computer's NIC is faulty.

C. The PXE boot option has not been enabled

D. The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Answer: C
Explanation:

The most likely reason the computer is unable to boot into the imaging system via the network is
that the PXE boot option has not been enabled. PXE (Preboot Execution Environment) is an
environment that allows computers to boot up over the network, instead of from a local disk. In
order for this to work, the PXE boot option must be enabled in the computer's BIOS settings. As
stated in the CompTIA A+ Core 2 exam objectives, technicians should know how to enable PXE in
BIOS to enable network booting on a computer.

Question: 150

A systems administrator is tasked with configuring desktop systems to use a new proxy server that
the organization has added to provide content filtering. Which of the following Windows utilities IS
the BEST choice for accessing the necessary configuration to complete this goal?

A. Security and Maintenance

B. Network and Sharing Center

C. Windows Defender Firewall

D. Internet Options

Answer: D
Explanation:

The best choice for accessing the necessary configuration to configure the desktop systems to use a
new proxy server is the Internet Options utility. This utility can be found in the Control Panel and
allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+
Core 2 exam objectives, technicians should be familiar with the Internet Options utility and how to
configure proxy settings.
Exam Dumps 81/269

Question: 151

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive,
legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many
years. Which of the following backup methods

would BEST meet the requirements?

A. A daily, incremental backup that is saved to the corporate file server

B. An additional, secondary hard drive in a mirrored RAID configuration

C. A full backup of the data that is stored of site in cold storage

D. Weekly, differential backups that are stored in a cloud-hosting provider

Answer: C
Explanation:

According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest
protection against data loss in the event of a ransomware attack or other data disaster. By storing the
backup in a separate physical location, it is less likely to be affected by the same event that could
cause data loss on the original system. Cold storage is a term used for data archiving, which typically
refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but
still needs to be kept for regulatory or compliance reasons.

Question: 152

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is
mounted to the left of the new monitor. When moving the mouse to the right from the original
monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which
of the following will allow the mouse to correctly move to the new monitor?

A. Rearranging the monitor's position in display settings

B. Swapping the cables for the monitors

C. Using the Ctrl+AIt+> to correct the display orientation

D. Updating the display drivers for the video card


Exam Dumps 82/269

Answer: B
Explanation:

The correct answer is B. Swapping the cables for the monitors. When the second monitor is
connected with the HDMI port, it is necessary to swap the cables for the monitors so that the mouse
can move from the original monitor to the new monitor. This is because the HDMI port is designed to
only support one monitor, and the mouse will not be able to move from one to the other without the
cables being swapped.
According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the
cables used to connect the displays must be swapped between the displays. For example, if a
monitor is connected to a system using a VGA cable, the VGA cable must be moved to the next
display to allow the mouse to move between the two displays."

Question: 153

A technician receives a call from a user who is on vacation. The user provides the necessary
credentials and asks the technician to log in to the
users account and read a critical email that the user has been expecting. The technician refuses
because this is a violation of the:

A. acceptable use policy.

B. regulatory compliance requirements.

C. non-disclosure agreement

D. incident response procedures

Answer: A
Explanation:

Logging into a user's account without their explicit permission is a violation of the acceptable use
policy, which outlines the rules and regulations by which a user must abide while using a computer
system. By logging into the user's account without their permission, the technician would be
violating this policy. Additionally, this action could be seen as a breach of confidentiality, as the
technician would have access to information that should remain confidential.

Question: 154

A new service desk is having a difficult time managing the volume of requests. Which of the
following is the BEST solution for the department?
Exam Dumps 83/269

A. Implementing a support portal

B. Creating a ticketing system

C. Commissioning an automated callback system

D. Submitting tickets through email

Answer: A
Explanation:

A support portal is an online system that allows customers to access customer service tools, submit
requests and view status updates, as well as access information such as how-to guides, FAQs, and
other self-service resources. This would be the best solution for the service desk, as it would allow
them to easily manage the volume of requests by allowing customers to submit their own requests
and view the status of their requests. Additionally, the portal would provide customers with self-
service resources that can help them resolve their own issues, reducing the amount of tickets that
need to be handled by the service desk.

Question: 155

An IT services company that supports a large government contract replaced the Ethernet cards on
several hundred desktop machines to comply With regulatory requirements. Which of the following
disposal methods for the non-compliant cards is the MOST environmentally friendly?

A. incineration

B. Resale

C. Physical destruction

D. Dumpster for recycling plastics

Answer: D
Explanation:

When disposing of non-compliant Ethernet cards, the most environmentally friendly option is to use
a dumpster for recycling plastics. This method is the most effective way to reduce the amount of
waste that is sent to landfills, and it also helps to reduce the amount of energy used in the
production of new materials. Additionally, recycling plastics helps to reduce the amount of toxic
chemicals that can be released into the environment.
According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal method
for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This method is the most
effective way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the
amount of energy used in the production of new materials."
Exam Dumps 84/269

https://sustainability.yale.edu/blog/how-sustainably-dispose-your-technological-waste

Question: 156
A technician has verified that a user's computer has a virus, and the antivirus software is out Of date.
Which of the following steps should the technician take NEXT?

A. Quarantine the computer.

B. use a previous restore point,

C. Educate the end user about viruses

D. Download the latest virus definitions

Answer: D
Explanation:

This will ensure that the antivirus software is up-to-date, and can detect any new viruses that may
have been released since the last virus definition update.

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.3 Explain the
importance of security awareness and 2.2 Given a scenario, use secure data management and
disaster recovery principles.

Question: 157
A systems administrator needs to reset a users password because the user forgot it. The systems
administrator creates the new password and wants to further protect the user's account Which of
the following should the systems administrator do?

A. Require the user to change the password at the next log-in.

B. Disallow tie user from changing the password.

C. Disable the account

D. Choose a password that never expires.

Answer: A
Explanation:
Exam Dumps 85/269

This will ensure that the user is the only one who knows their password, and that the new password
is secure.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use
appropriate data destruction and disposal methods.

Question: 158

A technician received a call stating that all files in a user's documents folder appear to be Changed,
and each of the files now has a look file
extension Which pf the following actions is the FIRST step the technician should take?

A. Runa live disk clone.

B. Run a full antivirus scan.

C. Use a batch file to rename the files-

D. Disconnect the machine from the network

Answer: D
Explanation:

The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a
scenario, use appropriate resources to support users and 1.3 Explain the importance of security
awareness.

Question: 159

An administrator has received approval for a change request for an upcoming server deployment.
Which of the following steps should be completed NEXT?

A. Perform a risk analysis.


B. Implement the deployment.
C. Verify end user acceptance
D. Document the lessons learned.

Answer: A
Explanation:

Before making any changes to the system, it is important to assess the risks associated with the
change and determine whether it is worth implementing. Risk analysis involves identifying potential
risks, assessing their likelihood and impact, and determining what steps can be taken to mitigate
them. It is important to perform this step before making any changes, as this allows the
administrator to make an informed decision about whether or not the change should be
Exam Dumps 86/269

implemented. Once the risks have been assessed and the administrator has decided to go ahead
with the change, the next step is to implement the deployment.

Question: 160

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not
take the call and sets the phone to silent. Which of the following BEST describes the technician's
actions?

A. Avoid distractions
B. Deal appropriately with customer's confidential material .
C. Adhere to user privacy policy
D. Set and meet timelines

Answer: A
Explanation:

The technician's action of setting the phone to silent while troubleshooting the customer's PC is an
example of avoiding distractions. By setting the phone to silent, the technician is ensuring that they
are able to focus on the task at hand without any distractions that could potentially disrupt their
workflow. This is an important practice when handling customer's confidential material, as it ensures
that the technician is able to focus on the task and not be distracted by any external sources.
Furthermore, it also adheres to user privacy policies, as the technician is not exposing any
confidential information to any external sources.

Question: 161

A manager reports that staff members often forget the passwords to their mobile devices and
applications. Which of the following should the systems administrator do to reduce the number of
help desk tickets submitted?

A. Enable multifactor authentication.


B. Increase the failed log-in threshold.
C. Remove complex password requirements.
D. Implement a single sign-on with biometrics.

Answer: A
Explanation:

Multifactor authentication (MFA) is a security measure that requires users to provide multiple pieces
of evidence when logging in to an account or system. This can include a combination of something
the user knows (e.g. a password or PIN), something the user has (e.g. a security token or
smartphone) and something the user is (e.g. biometrics such as a fingerprint or face scan). By
enabling MFA, the systems administrator can ensure that users are required to provide multiple
pieces of evidence when logging in, making it more difficult for unauthorized users to gain access to
the system. This can help reduce the number of help desk tickets submitted due to forgotten
Exam Dumps 87/269

passwords.

Question: 162

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need
access to the corporate domain to access email and shared drives. Which of the following versions of
Windows would a technician MOST likely deploy for the user?

A. Windows Enterprise Edition


B. Windows Professional Edition
C. Windows Server Standard Edition
D. Windows Home Edition

Answer: B
Explanation:

The Windows Professional Edition is the most likely version that a technician would deploy for a user
at a target corporation. This version of Windows is designed for business use and provides the
necessary features and capabilities that a user would need to access the corporate domain, such as
email and shared drives.

Question: 163

A small business owner wants to install newly purchased software on all networked PCs. The
network is not configured as a domain, and the owner wants to use the easiest method possible.
Which of the following is the MOST deficient way lor the owner to install the application?

A. Use a network share to share the installation files.


B. Save software to an external hard drive to install.
C. Create an imaging USB for each PC.
D. Install the software from the vendor's website

Answer: B
Explanation:

Saving software to an external hard drive and installing it on each individual PC is the most inefficient
method for the small business owner. This method requires manual intervention on each PC, and
there is a higher risk of error or inconsistencies between PCs. Additionally, if the software needs to
be updated or reinstalled in the future, this process would need to be repeated on each PC.

Question: 164

A user is setting up a computer for the first time and would like to create a secondary login with
permissions that are different than the primary login. The secondary login will need to be protected
Exam Dumps 88/269

from certain content such as games and websites. Which of the following Windows settings should
the user utilize to create the secondary login?

A. Privacy
B. Accounts
C. Personalization
D. Shared resources

Answer: B
Explanation:

To create a secondary login with different permissions in Windows 10, the user should utilize
the Accounts setting. Here are the steps to create a new user account with different permissions:
Right-click the Windows Start menu button.
Select Control Panel.
Select User Accounts.
Select Manage another account.
Select Add a new user in PC settings.
Use the Accounts dialog box to configure a new account.1

Question: 165

Which of the following is MOST likely contained in an EULA?

A. Chain of custody
B. Backup of software code
C. Personally identifiable information
D. Restrictions of use

Answer: D
Explanation:

An EULA (End-User License Agreement) is a legally binding contract between a software supplier and
a customer or end-user, generally made available to the customer via a retailer acting as an
intermediary. A EULA specifies in detail the rights and restrictions which apply to the use of the
software. Some of the main terms included in an EULA are the terms and scope of the license, any
licensing fees, warranties and disclaimers, limitation of liability, revocation or termination of the
license, and intellectual property information and restrictions on using the license (e.g. modification
and copying)1
https://www.termsfeed.com/blog/eula-vs-terms-conditions/

Question: 166

A user installed a new application that automatically starts each time the user logs in to a Windows
10 system. The user does not want this to happen and has asked for this setting to be changed.
Exam Dumps 89/269

Which of the following tools would the technician MOST likely use to safely make this change?

A. Registry Editor
B. Task Manager
C. Event Viewer
D. Local Users and Groups

Answer: B
Explanation:

The technician would most likely use the Task Manager tool to safely make this change12
The Task Manager tool can be used to disable applications from starting automatically on Windows
10

The tool that a technician would most likely use to stop an application from automatically starting
when a user logs in to a Windows 10 system is the Task Manager. The Task Manager can be used to
view and manage processes, including those that are set to automatically start when a user logs in to
the system.

Question: 167

A laptop user is visually impaired and requires a different cursor color. Which of the following OS
utilities is used to change the color of the cursor?

A. Keyboard
B. Touch pad
C. Ease of Access Center
D. Display settings

Answer: C
Explanation:

The OS utility used to change the color of the cursor in Windows is Ease of Access Center12
The user can change the cursor color by opening the Settings app, selecting Accessibility in the left
sidebar, selecting Mouse pointer and touch under Vision, and choosing one of the cursor options.
The user can select Custom to pick a color and use the Size slider to make the cursor larger or
smaller12

The Ease of Access Center in the Windows OS provides accessibility options for users with disabilities
or impairments. One of these options allows the user to change the color and size of the cursor,
making it more visible and easier to locate on the screen. The Keyboard and Touchpad settings do not
offer the option to change cursor color, and Display Settings are used to adjust the resolution and
other properties of the display. Therefore, C is the best answer. This information is covered in the
Comptia A+ Core2 documents/guide under the Accessibility section.

Question: 168
Exam Dumps 90/269

A user is attempting to make a purchase at a store using a phone. The user places the phone on the
payment pad, but the device does not recognize the phone. The user attempts to restart the phone
but still has the same results. Which of the following should the user do to resolve the issue?

A. Turn off airplane mode while at the register.


B. Verify that NFC is enabled.
C. Connect to the store's Wi-Fi network.
D. Enable Bluetooth on the phone.

Answer: B
Explanation:

The user should verify that NFC is enabled on their phone. NFC is a technology that allows two
devices to communicate with each other when they are in close proximity2.

NFC (Near Field Communication) technology allows a phone to wirelessly communicate with a
payment terminal or other compatible device. In order to use NFC to make a payment or transfer
information, the feature must be enabled on the phone. Therefore, the user should verify that NFC is
enabled on their phone before attempting to make a payment with it. The other options, such as
turning off airplane mode, connecting to Wi-Fi, or enabling Bluetooth, do not pertain to the NFC
feature and are unlikely to resolve the issue. This information is covered in the Comptia A+ Core2
documents/guide under the Mobile Devices section.

Question: 169

A junior administrator is responsible for deploying software to a large group of computers in an


organization. The administrator finds a script on a popular coding website to automate this
distribution but does not understand the scripting language. Which of the following BEST describes
the risks in running this script?

A. The instructions from the software company are not being followed.
B. Security controls will treat automated deployments as malware.
C. The deployment script is performing unknown actions.
D. Copying scripts off the internet is considered plagiarism.

Answer: C
Explanation:

The risks in running this script are that the deployment script is performing unknown
actions. Running the script blindly could cause unintended actions, such as deploying malware or
deleting important files, which could negatively impact the organization’s network and data1.
Exam Dumps 91/269

Question: 170

An administrator has submitted a change request for an upcoming server deployment. Which of the
following must be completed before the change can be approved?

A. Risk analysis
B. Sandbox testing
C. End user acceptance
D. Lessons learned

Answer: A
Explanation:

A risk analysis must be completed before a change request for an upcoming server deployment can
be approved 1

Risk analysis is an important step in the change management process because it helps identify and
mitigate potential risks before changes are implemented. Once the risks have been analyzed and the
appropriate measures have been taken to minimize them, the change can be approved and
implemented.

Question: 171

A user reports a workstation has been performing strangely after a suspicious email was opened on it
earlier in the week. Which of the following should the technician perform FIRST?

A. Escalate the ticket to Tier 2.


B. Run a virus scan.
C. Utilize a Windows restore point.
D. Reimage the computer.

Answer: B
Explanation:

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)
When a user reports that their workstation is behaving strangely after opening a suspicious email,
the first step a technician should take is to run a virus scan on the computer. This is because opening
a suspicious email is a common way for viruses and malware to infect a computer. Running a virus
scan can help identify and remove any infections that may be causing the computer to behave
strangely.

Question: 172
Exam Dumps 92/269

Each time a user tries to go to the selected web search provider, a different website opens. Which of
the following should the technician check FIRST?

A. System time
B. IP address
C. DNS servers
D. Windows updates

Answer: C
Explanation:

When a user experiences unexpected or erratic behavior while browsing the internet, it could be
caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP
addresses, which computers can use to communicate with web servers. If the DNS servers are not
functioning correctly or have been compromised, it can result in the browser being redirected to
unintended websites.

Question: 173

Which of the following is the STRONGEST wireless configuration?

A. WPS
B. WPA3
C. WEP
D. WMN

Answer: B
Explanation:

The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption
protocol and is the most secure choice. It replaces PSK with SAE, a more secure way to do the initial
key exchange. At the same time, the session key size of WPA3 increases to 128-bit in WPA3-Personal
mode and 192-bit in WPA3-Enterprise, which makes the password harder to crack than the previous
Wi-Fi security standards
https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/

Question: 174

A technician has an external SSD. The technician needs to read and write to an external SSD on both
Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

A. NTFS
B. APFS
C. ext4
Exam Dumps 93/269

D. exFAT

Answer: D
Explanation:

The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a file system
that is designed to be used on flash drives like USB sticks and SD cards. It is supported by both Macs
and Windows PCs, and it can handle large files and volumes
https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html

Question: 175

A user's system is infected with malware. A technician updates the anti-malware software and runs a
scan that removes the malware. After the user reboots the system, it once again becomes infected
with malware. Which of the following will MOST likely help to permanently remove the malware?

A. Enabling System Restore


B. Educating the user
C. Booting into safe mode
D. Scheduling a scan

Answer: B
Explanation:

Although updating the anti-malware software and running scans are important steps in removing
malware, they may not be sufficient to permanently remove the malware if the user keeps engaging
in behaviors that leave the system vulnerable, such as downloading unknown files or visiting
malicious websites. Therefore, educating the user on safe computing practices is the best way to
prevent future infections and permanently remove the malware.
Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most efficient
ways to permanently remove the malware. Enabling System Restore and Booting into safe mode may
help in some cases, but they may not be sufficient to permanently remove the malware. Scheduling a
scan is also important for detecting and removing malware, but it may not be sufficient to prevent
future infections.

https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives- (3-
0)

Question: 176

A user connected a laptop to a wireless network and was tricked into providing login credentials for a
website. Which of the following threats was used to carry out the attack?

A. Zero day
B. Vishing
Exam Dumps 94/269

C. DDoS
D. Evil twin

Answer: B
Explanation:

Vishing, also known as voice phishing, is a type of social engineering attack where the attacker tricks
the victim into divulging sensitive information over the phone. In this case, the attacker tricked the
user into providing login credentials for a website.

Question: 177

Which of the following change management documents includes how to uninstall a patch?

A. Purpose of change
B. Rollback plan
C. Scope of change
D. Risk analysis

Answer: B
Explanation:

The change management document that includes how to uninstall a patch is called the “rollback
plan”. The rollback plan is a document that outlines the steps that should be taken to undo a change
that has been made to a system. In the case of a patch, the rollback plan would include instructions
on how to uninstall the patch if it causes problems or conflicts with other software12

Question: 178

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in
an organization. The certificate will be used in conjunction with the user's existing username and
password. Which of the following BEST describes the security benefits realized after this
deployment?

A. Multifactor authentication will be forced for Wi-Fi.


B. All Wi-Fi traffic will be encrypted in transit.
C. Eavesdropping attempts will be prevented.
D. Rogue access points will not connect.

Answer: B
Explanation:

The security benefits realized after deploying a client certificate to be used for Wi-Fi access for all
devices in an organization are that all Wi-Fi traffic will be encrypted in transit. This means that any
data transmitted over the Wi-Fi network will be protected from eavesdropping attempts. Rogue
Exam Dumps 95/269

access points will not connect to the network because they will not have the client
certificate. However, multifactor authentication will not be forced for Wi-Fi because the client
certificate is being used in conjunction with the user’s existing username and password12

Question: 179

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select
TWO).

A. A new IT policy requires users to set up a lock screen PIN.


B. A user is overseas and wants to use a compatible international SIM Card.
C. A user left the phone at home and wants to prevent children from gaining access to the phone.
D. A user traded in the company phone for a cell carrier upgrade by mistake.
E. A user cannot locate the phone after attending a play at a theater.
F. A user forgot the phone in a taxi, and the driver called the company to return the device.

Answer: EF
Explanation:

Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in
situations where a device is lost or stolen, or when sensitive data needs to be removed from a
device. Remote wipe capabilities are most likely to be used in the following scenarios:
E) A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a
taxi, and the driver called the company to return the device1
In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device
and to protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data
on the device before it is returned to the user.

Question: 180

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved
application was installed, and the user has full access to the device's command shell. Which of the
following is the NEXT step the technician should take to find the cause of the leaked data?

A. Restore the device to factory settings.


B. Uninstall the unapproved application.
C. Disable the ability to install applications from unknown sources.
D. Ensure the device is connected to the corporate WiFi network.

Answer: B
Explanation:

The technician should disable the user’s access to the device’s command shell. This will prevent the
user from accessing sensitive data and will help to prevent further data leaks. The technician should
then investigate the unapproved application to determine if it is the cause of the data leak. If the
Exam Dumps 96/269

application is found to be the cause of the leak, the technician should uninstall the application and
restore the device to factory settings. If the application is not the cause of the leak, the technician
should investigate further to determine the cause of the leak. Disabling the ability to install
applications from unknown sources can help to prevent future data leaks, but it is not the next step
the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi
network is not relevant to this scenario1

Question: 181

A technician is attempting to mitigate micro power outages, which occur frequently within the area
of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which
of the following should the technician use to mitigate this issue?

A. Surge suppressor
B. Battery backup
C. CMOS battery
D. Generator backup

Answer: B
Explanation:

A battery backup, also known as an uninterruptible power supply (UPS), is a device that provides
backup power during a power outage. When the power goes out, the battery backup provides a
short amount of time (usually a few minutes up to an hour, depending on the capacity of the device)
to save any work and safely shut down the equipment.

Question: 182

A user has a license for an application that is in use on a personal home laptop. The user approaches
a systems administrator about using the same license on
multiple computers on the corporate network. Which of the following BEST describes what the
systems administrator should tell the user?

A. Use the application only on the home laptop because it contains the initial license.
B. Use the application at home and contact the vendor regarding a corporate license.
C. Use the application on any computer since the user has a license.
D. Use the application only on corporate computers.

Answer: B
Explanation:

Use the application at home and contact the vendor regarding a corporate license. The user should
use the application only on the home laptop because it contains the initial license. The user should
contact the vendor regarding a corporate license if they want to use the application on multiple
computers on the corporate network1
Exam Dumps 97/269

Question: 183

A technician is setting up a new laptop. The company's security policy states that users cannot install
virtual machines. Which of the following should the technician implement to prevent users from
enabling virtual technology on their laptops?

A. UEFI password
B. Secure boot
C. Account lockout
D. Restricted user permissions

Answer: B
Explanation:

A technician setting up a new laptop must ensure that users cannot install virtual machines as the
company's security policy states One way to prevent users from enabling virtual technology is by
implementing Secure Boot. Secure Boot is a feature of UEFI firmware that ensures the system only
boots using firmware that is trusted by the manufacturer. It verifies the signature of all bootloaders,
operating systems, and drivers before running them, preventing any unauthorized modifications to
the boot process. This will help prevent users from installing virtual machines on the laptop without
authorization.

Question: 184

The web browsing speed on a customer's mobile phone slows down every few weeks and then
returns to normal after three or four days. Restarting the device does not usually restore
performance. Which of the following should a technician check FIRST to troubleshoot this issue?

A. Data usage limits


B. Wi-Fi connection speed
C. Status of airplane mode
D. System uptime

Answer: B
Explanation:

The technician should check the Wi-Fi connection speed first to troubleshoot this issue. Slow web
browsing speed on a mobile phone can be caused by a slow Wi-Fi connection. The technician should
check the Wi-Fi connection speed to ensure that it is fast enough to support web browsing. If the Wi-
Fi connection speed is slow, the technician should troubleshoot the Wi-Fi network to identify and
resolve the issue.

Question: 185
Exam Dumps 98/269

Following a recent power outage, several computers have been receiving errors when booting. The
technician suspects file corruption has occurred. Which of the following steps should the technician
try FIRST to correct the issue?

A. Rebuild the Windows profiles.


B. Restore the computers from backup.
C. Reimage the computers.
D. Run the System File Checker.

Answer: D
Explanation:

The technician should run the System File Checker (SFC) first to correct file corruption errors on
computers after a power outage. SFC is a command-line utility that scans for and repairs corrupted
system files. It can be run from the command prompt or from the Windows Recovery
Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging
the computers are more drastic measures that should be taken only if SFC fails to correct the issue1

Question: 186

A user is unable to access a website, which is widely used across the organization, and receives the
following error message:
The security certificate presented by this website has expired or is not yet valid.
The technician confirms the website works when accessing it from another computer but not from
the user's computer. Which of the following should the technician perform NEXT to troubleshoot the
issue?

A. Reboot the computer.


B. Reinstall the OS.
C. Configure a static 12
D. Check the computer's date and time.

Answer: D
Explanation:

The error message indicates that the security certificate presented by the website has either expired
or is not yet valid. This can happen if the computer's clock has the wrong date or time, as SSL/TLS
certificates have a specific validity period. If the clock is off by too much, it may cause the certificate
to fail to validate. Therefore, the technician should check the computer's date and time and ensure
that they are correct.

Question: 187

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the
following is the BEST method to dispose of the drives?
Exam Dumps 99/269

A. Drilling
B. Degaussing
C. Low-level formatting
D. Erasing/wiping

Answer: D
Explanation:

Erasing/wiping the hard drives is the best method to dispose of the drives containing PII

Question: 188

After a company installed a new SOHO router customers were unable to access the company-hosted
public website. Which of the following will MOST likely allow customers to access the website?

A. Port forwarding
B. Firmware updates
C. IP filtering
D. Content filtering

Answer: B
Explanation:

If customers are unable to access the company-hosted public website after installing a new SOHO
router, the company should check for firmware updates1. Firmware updates can fix bugs and
compatibility issues that may be preventing customers from accessing the website1. The company
should also ensure that the router is properly configured to allow traffic to the website1. If the router
is blocking traffic to the website, the company should configure the router to allow traffic to the
website1.

Question: 189

A new spam gateway was recently deployed at a small business However; users still occasionally
receive spam. The management team is concerned that users will open the messages and potentially
infect the network systems. Which of the following is the MOST effective method for dealing with
this Issue?

A. Adjusting the spam gateway


B. Updating firmware for the spam appliance
C. Adjusting AV settings
D. Providing user training

Answer: D
Explanation:
Exam Dumps 100/269

The most effective method for dealing with spam messages in a small business is to provide user
training1. Users should be trained to recognize spam messages and avoid opening them1. They
should also be trained to report spam messages to the IT department so that appropriate action can
be taken1. In addition, users should be trained to avoid clicking on links or downloading attachments
from unknown sources1. By providing user training, the management team can reduce the risk of
users opening spam messages and potentially infecting the network systems1.

Question: 190

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following
should the technician perform NEXT?

A. resmon_exe
B. dfrgui_exe
C. msinf032exe
D. msconfig_exe

Answer: A
Explanation:

If a technician suspects high disk I/O, the technician should use the Resource Monitor (resmon.exe)
to identify the process that is causing the high disk I/O1. Resource Monitor provides detailed
information about the system’s resource usage, including disk I/O1. The technician can use this
information to identify the process that is causing the high disk I/O and take appropriate action1.

Question: 191
DRAG DROP

A customer recently experienced a power outage at a SOHO. The customer does not think the
components are connected properly. A print job continued running for several minutes after the
power failed, but the customer was not able to interact with the computer. Once the UPS stopped
beeping, all functioning devices also turned off. In case of a future power failure, the customer wants
to have the most time available to save cloud documents and shut down the computer without
losing any data.
Exam Dumps 101/269

Answer:
Explanation:

UPS > Surge protector = Computer, wifi router, cable modem


Surge protector = wallOutlet , printer and scanner

Question: 192

A macOS user needs to create another virtual desktop space. Which of the following applications will
allow the user to accomplish this task?

A. Dock

B. Spotlight

C. Mission Control

D. Launchpad

Answer: C
Explanation:

application that will allow a macOS user to create another virtual desktop space is Mission Control
Mission Control lets you create additional desktops, called spaces, to organize the windows of your
apps. You can create a space by entering Mission Control and clicking the Add button in the Spaces
bar1. You can also assign apps to specific spaces and move between them easily1.

Question: 193
Exam Dumps 102/269

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the
following is the FIRST step the technician should take?

A. Put on an ESD strap

B. Disconnect the power before servicing the PC.

C. Place the PC on a grounded workbench.

D. Place components on an ESD mat.

Answer: B
Explanation:

The first step a technician should take when troubleshooting a computer with a suspected short in
the power supply is B. Disconnect the power before servicing the PC. This is to prevent any electrical
shock or damage to the components. A power supply can be dangerous even when unplugged, as
capacitors can maintain a line voltage charge for a long time1. Therefore, it is important to
disconnect the power cord and press the power button to discharge any residual power before
opening the case2. The other steps are also important for safety and proper diagnosis, but they
should be done after disconnecting the power.

Question: 194

A team of support agents will be using their workstations to store credit card dat
a. Which of the following should the IT department enable on the workstations in order to remain
compliant with common regulatory controls? (Select TWO).

A. Encryption

B. Antivirus

C. AutoRun

D. Guest accounts

E. Default passwords

F. Backups

Answer: AF
Explanation:
Exam Dumps 103/269

Encryption is a way of protecting cardholder data by transforming it into an unreadable format that
can only be decrypted with a secret key1. Backups are a way of ensuring that cardholder data is not
lost or corrupted in case of a disaster or system failure2. Both encryption and backups are part of the
PCI DSS requirements that apply to any entity that stores, processes, or transmits cardholder data1.
The other options are not directly related to credit card data security or compliance.

Question: 195

A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on
the wired network. The user has been on an extended leave and has not logged in to the computer in
several months. Which of the following is causing the login issue?

A. Expired certificate

B. OS update failure

C. Service not started

D. Application crash

E. Profile rebuild needed

Answer: A
Explanation:

EAP-TLS is a method of authentication that uses certificates to establish a secure tunnel between the
client and the server3. The certificates have a validity period and must be renewed before they
expire1. If the user has been on an extended leave and has not logged in to the computer in several
months, it is possible that the certificate on the client or the server has expired and needs to be
renewed2. The other options are not directly related to EAP-TLS authentication or 802.1X network
access.

Question: 196

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that
users will root/jailbreak their phones. Which of the following technologies can be implemented to
prevent this issue?
Exam Dumps 104/269

A. Signed system images

B. Antivirus

C. SSO

D. MDM

Answer: D
Explanation:

MDM stands for Mobile Device Management, and it is a way of remotely managing and securing
mobile devices that are used for work purposes1. MDM can enforce policies and restrictions on the
devices, such as preventing users from installing unauthorized apps, modifying system settings, or
accessing root privileges2. MDM can also monitor device status, wipe data, lock devices, or locate
lost or stolen devices1.

Question: 197

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is
unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT
step the technician should take to resolve the issue?

A. Run the antivirus scan.

B. Add the required snap-in.

C. Restore the system backup

D. use the administrator console.

Answer: B
Explanation:

Local Users and Groups is a Microsoft Management Console (MMC) snap-in that allows you to
manage user accounts or groups on your computer1. If you cannot find it in the MMC console, you
can add it manually by following these steps2:
Press Windows key + R to open the Run dialog box, or open the Command Prompt.
Type mmc and hit Enter. This will open a blank MMC console.
Click File and then Add/Remove Snap-in.
In the Add or Remove Snap-ins window, select Local Users and Groups from the Available snap-ins
list, and click Add.
In the Select Computer window, choose Local computer or Another computer, depending on which
computer you want to manage, and click Finish.
Exam Dumps 105/269

Click OK to close the Add or Remove Snap-ins window. You should now see Local Users and Groups in
the MMC console.

Question: 198

A technician needs to manually set an IP address on a computer that is running macOS. Which of the
following commands should the technician use?

A. ipconfig
B. ifconfig
C. arpa
D. ping

Answer: B
Explanation:

ifconfig is a command-line utility that allows you to configure network interfaces on macOS and
other Unix-like systems1. To set an IP address using ifconfig, you need to know the name of the
network interface you want to configure (such as en0 or en1), and the IP address you want to assign
(such as 192.168.0.150). You also need to use sudo to run the command with administrative
privileges2. The syntax of the command is:
sudo ifconfig interface address
For example, to set the IP address of en1 to 192.168.0.150, you would type:
sudo ifconfig en1 192.168.0.150
You may also need to specify other parameters such as subnet mask, gateway, or DNS servers,
depending on your network configuration3. The other commands are not directly related to setting
an IP address on macOS. ipconfig is a similar command for Windows systems4, arpa is a domain
name used for reverse DNS lookup, and ping is a command for testing network connectivity.

Question: 199

A mobile phone user has downloaded a new payment application that allows payments to be made
with a mobile device. The user attempts to use the device at a payment terminal but is unable to do
so successfully. The user contacts a help desk technician to report the issue. Which of the following
should the technician confirm NEXT as part of the troubleshooting process?

A. If airplane mode is enabled

B. If Bluetooth is disabled

C. If NFC is enabled
Exam Dumps 106/269

D. If WiFi is enabled

E. If location services are disabled

Answer: C
Explanation:

NFC stands for Near Field Communication, and it is a wireless technology that allows your phone to
act as a contactless payment device, among other things2. Payment applications that allow
payments to be made with a mobile device usually rely on NFC to communicate with the payment
terminal1. Therefore, if NFC is disabled on the phone, the payment will not work. To enable NFC on
an Android phone, you need to follow these steps3:
On your Android device, open the Settings app.
Select Connected devices.
Tap on Connection preferences.
You should see the NFC option. Toggle it on.
The other options are not directly related to using a payment application with a mobile
device. Airplane mode is a setting that disables all wireless communication on the phone, including
NFC4, but it also affects calls, texts, and internet access. Bluetooth is a wireless technology that
allows you to connect your phone with other devices such as headphones or speakers, but it is not
used for contactless payments. Wi-Fi is a wireless technology that allows you to access the internet
or a local network, but it is also not used for contactless payments. Location services are a feature
that allows your phone to determine your geographic location using GPS or other methods, but they
are not required for contactless payments.

Question: 200

Antivirus software indicates that a workstation is infected with ransomware that cannot be
quarantined. Which of the following should be performed FIRST to prevent further damage to the
host and other systems?

A. Power off the machine.


B. Run a full antivirus scan.
C. Remove the LAN card.
D. Install a different endpoint solution.

Answer: A
Explanation:

Ransomware is a type of malware that encrypts the files on a system and demands a ransom for their
decryption1. Ransomware can also spread to other systems on the network or exfiltrate sensitive
data to the attackers2. Therefore, it is important to isolate the infected machine as soon as possible
to contain the infection and prevent further damage3. Powering off the machine is a quick and
effective way of disconnecting it from the network and stopping any malicious processes running on
Exam Dumps 107/269

it12. The other options are not directly related to preventing ransomware damage or may not be
effective. Running a full antivirus scan may not be able to detect or remove the ransomware,
especially if it is a new or unknown variant1. Removing the LAN card may disconnect the machine
from the network, but it may not stop any malicious processes running on it or any data encryption
or exfiltration that has already occurred2. Installing a different endpoint solution may not be possible
or helpful if the system is already infected and locked by ransomware1.

Question: 201

A user updates a mobile device's OS. A frequently used application becomes consistently
unresponsive immediately after the device is launched. Which of the following troubleshooting steps
should the user perform FIRST?

A. Delete the application's cache.

B. Check for application updates.

C. Roll back the OS update.

D. Uninstall and reinstall the application.

Answer: B
Explanation:

Sometimes, an OS update can cause compatibility issues with some applications that are not
optimized for the new version of the OS. To fix this, the user should check if there are any updates
available for the application that can resolve the issue. The user can check for application updates by
following these steps:
On an Android device, open the Google Play Store app and tap on the menu icon in the top left
corner. Then tap on My apps & games and look for any updates available for the application. If there
is an update, tap on Update to install it.
On an iOS device, open the App Store app and tap on the Updates tab at the bottom. Then look for
any updates available for the application. If there is an update, tap on Update to install it.

Question: 202

A technician needs to provide recommendations about how to upgrade backup solutions for a site in
an area that has frequent hurricanes and an unstable power grid. Which of the following should the
technician recommend implementing?

A. High availability
Exam Dumps 108/269

B. Regionally diverse backups

C. On-site backups

D. Incremental backups

Answer: B
Explanation:

Regionally diverse backups are backups that are stored in different geographic locations, preferably
far away from the primary site1. This way, if a disaster such as a hurricane or a power outage affects
one location, the backups in another location will still be available and accessible2. Regionally
diverse backups can help ensure business continuity and data recovery in case of a disaster3. The
other options are not the best backup solutions for a site in an area that has frequent hurricanes and
an unstable power grid. High availability is a feature that allows a system to remain operational and
accessible even if one or more components fail, but it does not protect against data loss or
corruption4. On-site backups are backups that are stored in the same location as the primary site,
which means they are vulnerable to the same disasters that can affect the primary site. Incremental
backups are backups that only store the changes made since the last backup, which means they
require less storage space and bandwidth, but they also depend on previous backups to restore data
and may not be sufficient for disaster recovery.

Question: 203

A technician is troubleshooting application crashes on a Windows workstation. Each time the


workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

A. Rebuild Windows profiles.

B. Reimage the workstation

C. Roll back updates

D. Perform a system file check

Answer: D
Explanation:

If this file is missing or corrupted, it can cause application crashes or errors when trying to open
Exam Dumps 109/269

websites in a browser. To fix this, the technician can perform a system file check, which is a utility
that scans and repairs corrupted or missing system files1. To perform a system file check, the
technician can follow these steps:
Open the Command Prompt as an administrator. To do this, type cmd in the search box on the
taskbar, right-click on Command Prompt, and select Run as administrator.
In the Command Prompt window, type sfc /scannow and hit Enter. This will start the scanning and
repairing process, which may take some time.
Wait for the process to complete. If any problems are found and fixed, you will see a message saying
Windows Resource Protection found corrupt files and successfully repaired them. If no problems are
found, you will see a message saying Windows Resource Protection did not find any integrity
violations.
Restart your computer and check if the issue is resolved.

Question: 204

A user needs assistance installing software on a Windows PC but will not be in the office. Which of
the following solutions would a technician MOST likely use to assist the user without having to install
additional software?

A. VPN
B. MSRA
C. SSH
D. RDP

Answer: B
Explanation:

MSRA stands for Microsoft Remote Assistance, and it is a feature that allows a technician to remotely
view and control another user’s Windows PC with their permission. MSRA is built-in to Windows and
does not require any additional software installation. To use MSRA, the technician and the user need
to follow these steps:
On the user’s PC, type msra in the search box on the taskbar and select Invite someone to connect to
your PC and help you, or offer to help someone else.
Select Save this invitation as a file and choose a location to save the file. This file contains a password
that the technician will need to connect to the user’s PC.
Send the file and the password to the technician via email or another secure method.
On the technician’s PC, type msra in the search box on the taskbar and select Help someone who has
invited you.
Select Use an invitation file and browse to the location where the file from the user is saved. Enter
the password when prompted.
The user will see a message asking if they want to allow the technician to connect to their PC. The
user should select Yes.
The technician will see the user’s desktop and can request control of their PC by clicking Request
control on the top bar. The user should allow this request by clicking Yes.
The technician can now view and control the user’s PC and assist them with installing software.
Exam Dumps 110/269

Question: 205

A technician is upgrading the backup system for documents at a high-volume law firm. The current
backup system can retain no more than three versions of full backups before failing. The law firm is
not concerned about restore times but asks the technician to retain more versions when possible.
Which of the following backup methods should the technician MOST likely implement?

A. Full

B. Mirror

C. Incremental

D. Differential

Answer: C
Explanation:

Incremental backup is a backup method that only backs up the files that have changed since the last
backup, whether it was a full or an incremental backup. Incremental backup can save storage space
and bandwidth, as it does not copy the same files over and over again. Incremental backup can also
retain more versions of backups, as it only stores the changes made to the files. However,
incremental backup can have longer restore times, as it requires restoring the last full backup and all
the subsequent incremental backups in order to recover the data. The law firm is not concerned
about restore times but asks the technician to retain more versions when possible, so incremental
backup would be a suitable choice for them.

Question: 206

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook
worked fine yesterday, but the computer may have restarted sometime overnight. Which of the
following is the MOST likely reason Outlook has stopped functioning?

A. Spam filter installation

B. Invalid registry settings

C. Malware infection

D. Operating system update


Exam Dumps 111/269

Answer: D
Explanation:

Operating system updates can sometimes cause compatibility issues with some applications, such as
Outlook, that may prevent them from opening or working properly. This can happen if the update
changes some system files or settings that Outlook relies on, or if the update conflicts with some
Outlook add-ins or extensions. To fix this, the technician can try some of these troubleshooting steps:
Start Outlook in safe mode and disable add-ins. Safe mode is a way of starting Outlook without any
add-ins or extensions that may interfere with its functionality. To start Outlook in safe mode, press
and hold the Ctrl key while clicking on the Outlook icon. You should see a message asking if you want
to start Outlook in safe mode. Click Yes. If Outlook works fine in safe mode, it means one of the add-
ins is causing the problem. To disable add-ins, go to File > Options > Add-ins. In the Manage drop-
down list, select COM Add-ins and click Go. Uncheck any add-ins that you don’t need and click
OK. Restart Outlook normally and check if the issue is resolved4.
Create a new Outlook profile. A profile is a set of settings and information that Outlook uses to
manage your email accounts and data. Sometimes, a profile can get corrupted or damaged and
cause Outlook to malfunction. To create a new profile, go to Control Panel > Mail > Show Profiles.
Click Add and follow the instructions to set up a new profile with your email account. Make sure to
select the option to use the new profile as the default one. Restart Outlook and check if the issue is
resolved5.
Repair your Outlook data files. Data files are files that store your email messages, contacts, calendar
events, and other items on your computer. Sometimes, data files can get corrupted or damaged and
cause Outlook to malfunction. To repair your data files, you can use a tool called scanpst.exe, which is
located in the same folder where Outlook is installed (usually C:\Program Files\Microsoft
Office\root\Office16). To use scanpst.exe, close Outlook and locate the tool in the folder. Double-click
on it and browse to the location of your data file (usually
C:\Users\username\AppData\Local\Microsoft\Outlook). Select the file and click Start to begin the
scanning and repairing process. When it’s done, restart Outlook and check if the issue is resolved.
Run the /resetnavpane command. The navigation pane is the panel on the left side of Outlook that
shows your folders and accounts. Sometimes, the navigation pane can get corrupted or damaged and
cause Outlook to malfunction. To reset the navigation pane, press Windows key + R to open the Run
dialog box, or open the Command Prompt. Type outlook.exe /resetnavpane and hit Enter. This will
clear and regenerate the navigation pane settings for Outlook. Restart Outlook and check if the issue
is resolved.

Question: 207

Which of the following editions of Windows 10 requires reactivation every 180 days?

A. Enterprise

B. Pro for Workstation


Exam Dumps 112/269

C. Home
D. Pro

Answer: A
Explanation:

Windows 10 Enterprise is an edition of Windows 10 that is designed for large organizations that need
advanced security and management features. Windows 10 Enterprise can be activated using
different methods, such as Multiple Activation Key (MAK), Active Directory-based Activation (ADBA),
or Key Management Service (KMS)1. KMS is a method of activation that uses a local server to
activate multiple devices on a network. KMS activations are valid for 180 days and need to be
renewed periodically by connecting to the KMS server2. If a device does not renew its activation
within 180 days, it will enter a grace period of 30 days, after which it will display a warning message
and lose some functionality until it is reactivated3. The other editions of Windows 10 do not require
reactivation every 180 days. Windows 10 Pro for Workstation is an edition of Windows 10 that is
designed for high-performance devices that need advanced features such as ReFS file system,
persistent memory, and faster file sharing. Windows 10 Pro for Workstation can be activated using a
digital license or a product key. Windows 10 Home is an edition of Windows 10 that is designed for
personal or home use. Windows 10 Home can be activated using a digital license or a product key.
Windows 10 Pro is an edition of Windows 10 that is designed for business or professional use.
Windows 10 Pro can be activated using a digital license or a product key. None of these editions
require reactivation every 180 days unless there are significant hardware changes or other issues that
affect the activation status.

Question: 208

A BSOD appears on a user's workstation monitor. The user immediately presses the power button to
shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears,
so the user contacts the help desk. Which of the following should the technician use to determine
the cause?

A. Stop code

B. Event Mewer

C. Services

D. System Configuration

Answer: A
Explanation:
Exam Dumps 113/269

When a Blue Screen of Death (BSOD) appears on a Windows workstation, it indicates that there is a
serious problem with the operating system. The stop code displayed on the BSOD can provide
valuable information to help determine the cause of the issue. The stop code is a specific error code
that is associated with the BSOD, and it can help identify the root cause of the problem.
In this scenario, the user has encountered a BSOD and has restarted the PC, only to see the BSOD
reappear. This suggests that the problem is persistent and requires further investigation. By analyzing
the stop code displayed on the BSOD, a technician can begin to identify the underlying issue and take
appropriate actions to resolve it.

Question: 209

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see
which programs are starting with the OS but receives a message that it can no longer be used to view
startup items. Which of the following programs can the technician use to view startup items?

A. msinfo32
B. perfmon
C. regedit
D. taskmgr

Answer: D
Explanation:

When troubleshooting boot times for a user, a technician may want to check which programs are
starting with the operating system to identify any that may be slowing down the boot process.
MSConfig is a tool that can be used to view startup items on a Windows system, but it may not
always be available or functional.
In this scenario, the technician receives a message that MSConfig cannot be used to view startup
items. As an alternative, the technician can use Task Manager (taskmgr), which can also display the
programs that run at startup. To access the list of startup items in Task Manager, the technician can
follow these steps:
Open Task Manager by pressing Ctrl+Shift+Esc.
Click the "Startup" tab.
The list of programs that run at startup will be displayed.

Question: 210

A desktop engineer is deploying a master image. Which of the following should the desktop engineer
consider when building the master image? (Select TWO).

A. Device drivers
Exam Dumps 114/269

B. Keyboard backlight settings

C. Installed application license keys

D. Display orientation

E. Target device power supply

F. Disabling express charging

Answer: AC
Explanation:

A) Device drivers23: Device drivers are software components that enable the operating system to
communicate with hardware devices. Different devices may require different drivers, so the desktop
engineer should include the appropriate drivers in the master image or configure the deployment
process to install them automatically.
C. Installed application license keys2: Installed application license keys are codes that activate or
authenticate software applications. Some applications may require license keys to be entered during
installation or after deployment. The desktop engineer should include the license keys in the master
image or configure the deployment process to apply them automatically.

Question: 211

A technician is setting up a conference room computer with a script that boots the application on
login. Which of the following would the technician use to accomplish this task? (Select TWO).

A. File Explorer

B. Startup Folder

C. System Information

D. Programs and Features

E. Task Scheduler

F. Device Manager

Answer: BE
Explanation:

B) Startup Folder1: The Startup folder is a special folder that contains shortcuts to programs or scripts
Exam Dumps 115/269

that will run automatically when a user logs on. The technician can create a shortcut to the script and
place it in the Startup folder for the conference room computer or for all users.
E. Task Scheduler23: The Task Scheduler is a tool that allows you to create tasks that run at specified
times or events. The technician can create a task that runs the script at logon for the conference
room computer or for all users.

Question: 212

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user
do after changing the network configuration to prevent the neighbor from being able to connect
again?

A. Disable the SSID broadcast.

B. Disable encryption settings.

C. Disable DHCP reservations.

D. Disable logging.

Answer: A
Explanation:

A) Disable the SSID broadcast1: The SSID broadcast is a feature that allows a Wi-Fi network to be
visible to nearby devices. Disabling the SSID broadcast can make the network harder to find by
unauthorized users, but it does not prevent them from accessing it if they know the network name
and password.

Question: 213

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager,
the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

A. Keylogger

B. Rootkit

C. Ransomware
Exam Dumps 116/269

D. Trojan

Answer: C
Explanation:

Ransomware is a type of malware that encrypts the files on the victim’s computer and demands a
ransom for their decryption. Ransomware can cause high disk throughput by encrypting large
amounts of data in a short time.

Question: 214

A homeowner recently moved and requires a new router for the new ISP to function correctly. The
internet service has been installed and has been confirmed as functional. Which of the following is
the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

A. Convert the PC from a DHCP assignment to a static IP address.

B. Run a speed test to ensure the advertised speeds are met.

C. Test all network sharing and printing functionality the customer uses.

D. Change the default passwords on new network devices.

Answer: D
Explanation:

When a homeowner moves and sets up a new router for the new ISP it is important to take
appropriate security measures to protect their network from potential security threats. The FIRST
step that the homeowner should take after installation of all relevant cabling and hardware is to
change the default passwords on new network devices.
Most modern routers come with default usernames and passwords that are widely known to
potential attackers. If these defaults are not changed, it could make it easier for external attackers to
gain unauthorized access to the network. Changing the passwords on new network devices is a
simple but effective way to improve the security posture of the network.

Question: 215

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though
the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?
Exam Dumps 117/269

A. Recalibrating the magnetometer

B. Recalibrating the compass

C. Recalibrating the digitizer

D. Recalibrating the accelerometer

Answer: D
Explanation:

When a user rotates a cell phone horizontally to read emails and the display remains vertical, even
though the settings indicate autorotate is on, this is typically due to a problem with the phone's
accelerometer. The accelerometer is the sensor that detects changes in the phone's orientation and
adjusts the display accordingly. If the accelerometer is not calibrated correctly, the display may not
rotate as expected.
Recalibrating the accelerometer is the most likely solution to this issue. The process for recalibrating
the accelerometer can vary depending on the specific device and operating system, but it typically
involves going to the device's settings and finding the option to calibrate or reset the sensor. Users
may need to search their device's documentation or online resources to find specific instructions for
their device.

Question: 216

Which of the following is the proper way for a technician to dispose of used printer consumables?

A. Proceed with the custom manufacturer's procedure.

B. Proceed with the disposal of consumables in standard trash receptacles.

C. Empty any residual ink or toner from consumables before disposing of them in a standard
recycling bin.

D. Proceed with the disposal of consumables in standard recycling bins.

Answer: A
Explanation:

When it comes to disposing of used printer consumables , it is important to follow the


manufacturer's instructions or guidelines for proper disposal, as different types of consumables may
require different disposal procedures. Some manufacturers provide specific instructions for proper
disposal, such as sending the used consumables back to the manufacturer or using special recycling
programs.
Therefore, the proper way for a technician to dispose of used printer consumables is to proceed with
the custom manufacturer's procedure , if provided. This option ensures that the disposal is handled
Exam Dumps 118/269

in an environmentally friendly and safe manner.

Question: 217

A large company is selecting a new Windows operating system and needs to ensure it has built-in
encryption and endpoint protection. Which of the following Windows versions will MOST likely be
selected?

A. Home
B. Pro
C. Pro for Workstations
D. Enterprise

Answer: D
Explanation:

When selecting a new Windows operating system for a large company that needs built-in encryption
and endpoint protection, the Enterprise edition is the most likely choice. This edition provides
advanced security features such as Windows Defender Advanced Threat Protection (ATP), AppLocker,
and BitLocker Drive Encryption. These features can help to protect the company's data and endpoints
against malware attacks, unauthorized access, and data theft.
The Home and Pro editions of Windows do not include some of the advanced security features
provided by the Enterprise edition, such as Windows Defender ATP and AppLocker. The Pro for
Workstations edition is designed for high-performance and high-end hardware configurations, but it
does not provide additional security features beyond those provided by the Pro edition.

Question: 218

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing
the web browser cache does not resolve the issue. Which of the following should a technician
investigate NEXT to resolve the issue?

A. Enable firewall ACLs.


B. Examine the localhost file entries.
C. Verify the routing tables.
D. Update the antivirus definitions.

Answer: B
Explanation:

A possible cause of the user being redirected to unexpected websites is that the localhost file entries
have been modified by malware or hackers to point to malicious or unwanted websites. The
localhost file is a text file that maps hostnames to IP addresses and can override DNS settings. By
Exam Dumps 119/269

examining the localhost file entries, a technician can identify and remove any suspicious or
unauthorized entries that may cause the redirection issue. Enabling firewall ACLs may not resolve the
issue if the firewall rules do not block the malicious or unwanted websites. Verifying the routing
tables may not resolve the issue if the routing configuration is correct and does not affect the web
traffic. Updating the antivirus definitions may help prevent future infections but may not remove the
existing malware or changes to the localhost file. Reference: CompTIA A+ Core 2 (220-1002)
Certification Exam Objectives Version 4.0, Domain 1.3

Question: 219

A network technician installed a SOHO router for a home office user. The user has read reports about
home routers being targeted by malicious actors and then used in DDoS attacks. Which of the
following can the technician MOST likely do to defend against this threat?

A. Add network content filtering.


B. Disable the SSID broadcast.
C. Configure port forwarding.
D. Change the default credentials.

Answer: D
Explanation:

One of the most effective ways to defend against malicious actors targeting home routers for DDoS
attacks is to change the default credentials of the router. The default credentials are often well-
known or easily guessed by attackers, who can then access and compromise the router settings and
firmware. By changing the default credentials to strong and unique ones, a technician can prevent
unauthorized access and configuration changes to the router. Adding network content filtering may
help block some malicious or unwanted websites but may not prevent attackers from exploiting
router vulnerabilities or backdoors. Disabling the SSID broadcast may help reduce the visibility of the
wireless network but may not prevent attackers from scanning or detecting it. Configuring port
forwarding may help direct incoming traffic to specific devices or services but may not prevent
attackers from sending malicious packets or requests to the router. Reference: CompTIA A+ Core 2
(220-1002) Certification Exam Objectives Version 4.0, Domain 3.3

Question: 220

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the
following steps should the technician complete BEFORE removing the virus?

A. Disable System Restore.


B. Schedule a malware scan.
C. Educate the end user.
D. Run Windows Update.
Exam Dumps 120/269

Answer: A
Explanation:

Before removing a Trojan virus from a workstation, a technician should disable System Restore.
System Restore is a feature that allows users to restore their system to a previous state in case of
problems or errors. However, System Restore can also restore infected files or registry entries that
were removed by antivirus software or manual actions. By disabling System Restore, a technician can
ensure that the Trojan virus is completely removed and does not reappear after a system restore
operation. Scheduling a malware scan may help detect and remove some malware but may not be
effective against all types of Trojan viruses. Educating the end user may help prevent future
infections but does not address the current issue of removing the Trojan virus. Running Windows
Update may help patch some security vulnerabilities but does not guarantee that the Trojan virus will
be removed. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0,
Domain 1.3

Question: 221

A new employee was hired recently. Which of the following documents will the new employee need
to sign before being granted login access to the network?

A. MSDS
B. EULA
C. UAC
D. AUP

Answer: D
Explanation:

A new employee will need to sign an AUP before being granted login access to the network. An AUP
is an Acceptable Use Policy that defines the rules and guidelines for using network resources and
services in an organization. An AUP typically covers topics such as security, privacy, ethics,
compliance and liability issues related to network usage. An AUP helps protect the organization and
its users from legal, regulatory and reputational risks associated with network activities. An MSDS is
a Material Safety Data Sheet that provides information about hazardous substances and how to
handle them safely. An MSDS is not related to network access or usage. A EULA is an End User
License Agreement that specifies the terms and conditions for using a software product or service. A
EULA is usually provided by software vendors or developers and does not apply to network access or
usage in general. A UAC is a User Account Control that is a security feature that prompts users for
permission or confirmation before performing certain actions that require elevated privileges or
affect system settings. A UAC is not a document that needs to be signed by users but a mechanism
that helps prevent unauthorized changes or malware infections on a system. Reference: CompTIA A+
Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.1

Question: 222
A user lost a company tablet that was used for customer intake at a doctor's office. Which of the
following actions would BEST protect against unauthorized access of the data?
Exam Dumps 121/269

A. Changing the office's Wi-Fi SSID and password


B. Performing a remote wipe on the device
C. Changing the user's password
D. Enabling remote drive encryption

Answer: B
Explanation:

The best action to protect against unauthorized access of the data on the lost company tablet is to
perform a remote wipe on the device. A remote wipe is a feature that allows an administrator or a
user to erase all the data and settings on a device remotely, usually through a web portal or an email
command. A remote wipe can help prevent the data from being accessed or compromised by anyone
who finds or steals the device. Changing the office’s Wi-Fi SSID and password may prevent the device
from connecting to the office network but may not prevent the data from being accessed locally or
through other networks. Changing the user’s password may prevent the device from logging in to the
user’s account but may not prevent the data from being accessed by other means or accounts.
Enabling remote drive encryption may protect the data from being read by unauthorized parties but
may not be possible if the device is already lost or turned off. Reference: CompTIA A+ Core 2 (220-
1002) Certification Exam Objectives Version 4.0, Domain 3.1

Question: 223
Which of the following is used to explain issues that may occur during a change implementation?

A. Scope change
B. End-user acceptance
C. Risk analysis
D. Rollback plan

Answer: C
Explanation:

Risk analysis is used to explain issues that may occur during a change implementation. Risk analysis
is a process of identifying, assessing and prioritizing potential risks that may affect a project or an
activity. Risk analysis can help determine the likelihood and impact of various issues that may arise
during a change implementation, such as technical errors, compatibility problems, security breaches,
performance degradation or user dissatisfaction. Risk analysis can also help plan and prepare for
mitigating or avoiding these issues. Scope change is a modification of the original goals,
requirements or deliverables of a project or an activity. Scope change is not used to explain issues
that may occur during a change implementation but to reflect changes in expectations or needs of
the stakeholders. End-user acceptance is a measure of how well the users are satisfied with and
adopt a new system or service. End-user acceptance is not used to explain issues that may occur
during a change implementation but to evaluate the success and effectiveness of the change.
Rollback plan is a contingency plan that describes how to restore a system or service to its previous
state in case of a failed or problematic change implementation. Rollback plan is not used to explain
issues that may occur during a change implementation but to recover from them. Reference:
Exam Dumps 122/269

CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.2

Question: 224

Which of the following would MOST likely be deployed to enhance physical security for a building?
(Select TWO).

A. Multifactor authentication
B. Badge reader
C. Personal identification number
D. Firewall
E. Motion sensor
F. Soft token

Answer: BE
Explanation:

Badge reader and motion sensor are devices that can be deployed to enhance physical security for a
building. A badge reader is a device that scans and verifies an identification card or tag that grants
access to authorized personnel only. A badge reader can help prevent unauthorized entry or
intrusion into a building or a restricted area. A motion sensor is a device that detects movement and
triggers an alarm or an action when motion is detected. A motion sensor can help deter or alert
potential intruders or trespassers in a building or an area. Multifactor authentication is a method of
verifying identity using two or more factors, such as something you know, something you have or
something you are. Multifactor authentication is not a device that can be deployed to enhance
physical security for a building but a technique that can be used to enhance logical security for
systems or services. Personal identification number is a numeric code that can be used as part of
authentication or access control. Personal identification number is not a device that can be deployed
to enhance physical security for a building but an example of something you know factor in
multifactor authentication. Firewall is a device or software that filters network traffic based on rules
and policies. Firewall is not a device that can be deployed to enhance physical security for a building
but a device that can be used to enhance network security for systems or services. Soft token is an
application or software that generates one-time passwords or codes for authentication purposes.
Soft token is not a device that can be deployed to enhance physical security for a building but an
example of something you have factor in multifactor authentication. Reference: CompTIA A+ Core 2
(220-1002) Certification Exam Objectives Version 4.0, Domain 3.3

Question: 225

A technician is troubleshooting an issue with a computer that contains sensitive information. The
technician determines the computer needs to be taken off site for repair. Which of the following
should the technician do NEXT?

A. Remove the HDD and then send the computer for repair.
B. Check corporate polices for guidance.
C. Delete the sensitive information before the computer leaves the building.
D. Get authorization from the manager.
Exam Dumps 123/269

Answer: D
Explanation:

The next step that the technician should do before taking the computer off site for repair is to get
authorization from the manager. Getting authorization from the manager is important because it
ensures that the technician has permission and approval to remove the computer from the premises
and perform the repair work off site. Getting authorization from the manager can also help
document and communicate the reason and duration of the repair and avoid any misunderstanding
or conflict with the user or the organization. Removing the HDD and then sending the computer for
repair may not be feasible or necessary if the issue is not related to the HDD or if the HDD contains
essential data or software for the repair. Checking corporate policies for guidance may be a good step
but it does not replace getting authorization from the manager who is responsible for the computer
and its data. Deleting the sensitive information before the computer leaves the building may not be
possible or advisable if the issue prevents access to the data or if the data is needed for
troubleshooting or recovery purposes. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam
Objectives Version 4.0, Domain 5.1

Question: 226

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The
technician needs to make use of a tool natively designed for Linux. Which of the following tools will
the technician MOST likely use?

A. VNC
B. MFA
C. MSRA
D. RDP

Answer: A
Explanation:

The tool that the technician will most likely use to remotely connect to a Linux desktop is VNC. VNC
stands for Virtual Network Computing and is a protocol that allows remote access and control of a
graphical desktop environment over a network. VNC is natively designed for Linux and can also
support other operating systems, such as Windows and Mac OS. VNC can be used to assist users with
troubleshooting by viewing and interacting with their desktops remotely. MFA stands for Multi-
Factor Authentication and is a method of verifying identity using two or more factors, such as
something you know, something you have or something you are. MFA is not a tool that can be used
to remotely connect to a Linux desktop but a technique that can be used to enhance security for
systems or services. MSRA stands for Microsoft Remote Assistance and is a feature that allows
remote access and control of a Windows desktop environment over a network. MSRA is not natively
designed for Linux and may not be compatible or supported by Linux systems. RDP stands for Remote
Desktop Protocol and is a protocol that allows remote access and control of a Windows desktop
environment over a network. RDP is not natively designed for Linux and may not be compatible or
supported by Linux systems. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives
Version 4.0, Domain 1.6
Exam Dumps 124/269

Question: 227

A user receives a call from someone who claims to be from the user's bank and requests information
to ensure the user's account is safe. Which of the following social-engineering attacks is the user
experiencing?

A. Phishing
B. Smishing
C. Whaling
D. Vishing

Answer: D
Explanation:

The user is experiencing a vishing attack. Vishing stands for voice phishing and is a type of social-
engineering attack that uses phone calls or voice messages to trick users into revealing personal or
financial information. Vishing attackers often pretend to be from legitimate organizations, such as
banks, government agencies or service providers, and use various tactics, such as urgency, fear or
reward, to persuade users to comply with their requests. Phishing is a type of social-engineering
attack that uses fraudulent emails or websites to trick users into revealing personal or financial
information. Phishing does not involve phone calls or voice messages. Smishing is a type of social-
engineering attack that uses text messages or SMS to trick users into revealing personal or financial
information. Smishing does not involve phone calls or voice messages. Whaling is a type of social-
engineering attack that targets high-profile individuals, such as executives, celebrities or politicians,
to trick them into revealing personal or financial information. Whaling does not necessarily involve
phone calls or voice messages. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam
Objectives Version 4.0, Domain 3.1

Question: 228
A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the
following tools should the technician use to resolve this issue?

A. taskschd.msc
B. eventvwr.msc
C. de vmgmt. msc
D. diskmgmt.msc

Answer: C
Explanation:

The tool that the technician should use to resolve the connection issues with the third-party USB
adapter is devmgmt.msc. Devmgmt.msc is a command that opens the Device Manager, which is a
utility that allows users to view and manage the hardware devices and drivers installed on a
computer. The technician can use the Device Manager to check the status, properties and
compatibility of the USB adapter and its driver, and perform actions such as updating, uninstalling or
Exam Dumps 125/269

reinstalling the driver, enabling or disabling the device, or scanning for hardware changes.
Taskschd.msc is a command that opens the Task Scheduler, which is a utility that allows users to
create and manage tasks that run automatically at specified times or events. The Task Scheduler is
not relevant or useful for resolving connection issues with the USB adapter. Eventvwr.msc is a
command that opens the Event Viewer, which is a utility that allows users to view and monitor the
system logs and events. The Event Viewer may provide some information or clues about the
connection issues with the USB adapter, but it does not allow users to manage or troubleshoot the
device or its driver directly. Diskmgmt.msc is a command that opens the Disk Management, which is
a utility that allows users to view and manage the disk drives and partitions on a computer. The Disk
Management is not relevant or useful for resolving connection issues with the USB adapter.
Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6

Question: 229

A technician, who is working at a local office, has found multiple copies of home edition software
installed on computers. Which of the following does this MOST likely violate?

A. EULA
B. Pll
C. DRM
D. Open-source agreement

Answer: A
Explanation:

The installation of home edition software on computers at a local office most likely violates the EULA.
EULA stands for End User License Agreement and is a legal contract that specifies the terms and
conditions for using a software product or service. EULA typically covers topics such as license scope,
duration and limitations, rights and obligations of the parties, warranties and disclaimers, liability
and indemnity clauses, and termination procedures. EULA may also restrict the use of home edition
software to personal or non-commercial purposes only, and prohibit the use of home edition
software in business or professional settings. Violating EULA may result in legal actions or penalties
from the software vendor or developer. PII stands for Personally Identifiable Information and is any
information that can be used to identify or locate an individual, such as name, address, phone
number, email address, social security number or credit card number. PII is not related to software
installation or licensing but to data protection and privacy. DRM stands for Digital Rights
Management and is a technology that controls or restricts the access and use of digital content, such
as music, movies, books or games. DRM is not related to software installation or licensing but to
content distribution and piracy prevention. Open-source agreement is a type of license that allows
users to access, modify and distribute the source code of a software product or service freely and
openly. Open-source agreement does not restrict the use of software to home edition only but
encourages collaboration and innovation among developers and users. Reference: CompTIA A+ Core
2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.1

Question: 230
A user reports that the pages flash on the screen two or three times before finally staying open when
Exam Dumps 126/269

attempting to access banking web pages. Which of the following troubleshooting steps should the
technician perform NEXT to resolve the issue?

A. Examine the antivirus logs.


B. Verify the address bar URL.
C. Test the internet connection speed.
D. Check the web service status.

Answer: B
Explanation:

The next troubleshooting step that the technician should perform to resolve the issue of pages
flashing on the screen before staying open when accessing banking web pages is to verify the
address bar URL. The address bar URL is the web address that appears in the browser’s address bar
and indicates the location of the web page being accessed. Verifying the address bar URL can help
determine if the user is accessing a legitimate or malicious website, as some phishing websites may
try to impersonate banking websites by using similar-looking URLs or domains.

Question: 231

A Windows user recently replaced a computer The user can access the public internet on the
computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading.
Which of the following should a technician adjust to resolve the issue?

A. Default gateway settings


B. DHCP settings
C. IP address settings
D. Firewall settings
E. Antivirus settings

Answer: D
Explanation:

The technician should adjust the firewall settings to resolve the issue of not being able to access an
internal site at https://companyintranet.com:8888. The firewall settings control how the firewall
filters and allows network traffic based on rules and policies. The firewall settings may be blocking or
preventing the access to the internal site by mistake or by default, especially if the site uses a non-
standard port number such as 8888. The technician should check and modify the firewall settings to
allow the access to the internal site or its port number. Default gateway settings determine how a
computer connects to other networks or the internet. Default gateway settings are not likely to cause
the issue of not being able to access an internal site if the user can access the public internet. DHCP
settings determine how a computer obtains its IP address and other network configuration
parameters automatically from a DHCP server. DHCP settings are not likely to cause the issue of not
being able to access an internal site if the user can access other network resources. IP address
settings determine how a computer identifies itself and communicates with other devices on a
network. IP address settings are not likely to cause the issue of not being able to access an internal
site if the user can access other network resources. Antivirus settings control how the antivirus
Exam Dumps 127/269

software scans and protects the computer from malware and threats. Antivirus settings are less likely
to cause the issue of not being able to access an internal site than firewall settings, unless the
antivirus software has its own firewall feature that may interfere with the network traffic. Reference:
CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6

Question: 232

A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock.
Which of the following options in the Windows settings should the technician use?

A. Ease of Access
B. Privacy
C. Personalization
D. Update and Security

Answer: C
Explanation:

The technician should use the Personalization option in the Windows settings to enable a
Screensaver lock. The Personalization option allows users to customize the appearance and behavior
of their desktop, such as themes, colors, backgrounds, lock screen and screensaver. The technician
can enable a Screensaver lock by choosing a screensaver from the drop-down menu, setting a wait
time in minutes and checking the box that says “On resume, display logon screen”. This will lock the
computer and require a password or PIN to log back in after the screensaver is activated. Ease of
Access is an option in the Windows settings that allows users to adjust accessibility features and
settings, such as narrator, magnifier, high contrast and keyboard shortcuts. Ease of Access is not
related to enabling a Screensaver lock. Privacy is an option in the Windows settings that allows users
to manage privacy and security settings, such as location, camera, microphone and app permissions.
Privacy is not related to enabling a Screensaver lock. Update and Security is an option in the
Windows settings that allows users to check and install updates, troubleshoot problems, backup files
and restore system. Update and Security is not related to enabling a Screensaver lock. Reference:
CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.7

Question: 233

A user calls the help desk to report that mapped drives are no longer accessible. The technician
verifies that clicking on any of the drives on the user's machine results in an error message. Other
users in the office are not having any issues. As a first step, the technician would like to remove and
attempt to reconnect the drives. Which of the following command-line tools should the technician
use?

A. net use
B. set
C. mkdir
D. rename

Answer: A
Exam Dumps 128/269

Explanation:

The technician should use net use command-line tool to remove and reconnect mapped drives. Net
use is a command that allows users to manage network connections and resources, such as shared
folders or printers. Net use can be used to map or unmap network drives by specifying their drive
letters and network paths. For example, net use Z: \server\share maps drive Z: to \server\share
folder, and net use Z: /delete unmaps drive Z:. Set is a command that displays or modifies
environment variables for the current user or process. Set is not related to managing mapped drives.
Mkdir is a command that creates a new directory or folder in the current or specified location. Mkdir
is not related to managing mapped drives. Rename is a command that renames a file or folder in the
current or specified location. Rename is not related to managing mapped drives. Reference:
CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6

Question: 234

A user has been unable to receive emails or browse the internet from a smartphone while traveling.
However, text messages and phone calls are working without issue. Which of the following should a
support technician check FIRST?

A. User account status


B. Mobile OS version
C. Data plan coverage
D. Network traffic outages

Answer: C
Explanation:

The first thing that a support technician should check to resolve the issue of not being able to receive
emails or browse the internet from a smartphone while traveling is the data plan coverage. The data
plan coverage determines how much data and where the user can use on the smartphone’s cellular
network. The data plan coverage may vary depending on the user’s location, carrier and
subscription. The data plan coverage may not include or support certain areas or countries that the
user is traveling to, or may charge extra fees or limit the speed or amount of data that the user can
use. The data plan coverage does not affect text messages and phone calls, which use different
network services and protocols. User account status is not likely to cause the issue of not being able
to receive emails or browse the internet from a smartphone while traveling, unless the user account
has been suspended or terminated by the carrier or the email provider. Mobile OS version is not
likely to cause the issue of not being able to receive emails or browse the internet from a
smartphone while traveling, unless the mobile OS has a major bug or compatibility problem with the
network or the email app. Network traffic outages may cause the issue of not being able to receive
emails or browse the internet from a smartphone while traveling, but they are less likely and less
common than data plan coverage issues, and they should also affect text messages and phone calls.
Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.5

Question: 235
Which of the following script types is used with the Python language by default?
Exam Dumps 129/269

A. .ps1
B. .vbs
C. .bat
D. .py

Answer: D
Explanation:

The script type that is used with the Python language by default is .py. .py is a file extension that
indicates a Python script file that contains Python code that can be executed by a Python interpreter
or compiler. Python is a high-level, general-purpose and interpreted programming language that can
be used for various applications, such as web development, data analysis, machine learning and
automation. .ps1 is a file extension that indicates a PowerShell script file that contains PowerShell
code that can be executed by a PowerShell interpreter or compiler. PowerShell is a task-based,
command-line and scripting language that can be used for system administration and automation on
Windows systems. .vbs is a file extension that indicates a VBScript file that contains VBScript code
that can be executed by a VBScript interpreter or compiler. VBScript is an Active Scripting language
that can be used for web development and automation on Windows systems. .bat is a file extension
that indicates a batch file that contains a series of commands that can be executed by a command-
line interpreter or shell on Windows systems. Batch files can be used for system administration and
automation on Windows systems. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam
Objectives Version 4.0, Domain 4.3

Question: 236

A user added a second monitor and wants to extend the display to it. In which of the following
Windows settings will the user MOST likely be able to make this change?

A. System
B. Devices
C. Personalization
D. Accessibility

Answer: A
Explanation:

The user can most likely make the change of extending the display to a second monitor in the
System option in the Windows settings. The System option allows users to manage system settings
and features, such as display, sound, notifications, power and storage. The user can extend the
display to a second monitor by selecting Display from the System option and then choosing Extend
these displays from the Multiple displays drop-down menu. This will allow the user to use both
monitors as one large desktop area. Devices is an option in the Windows settings that allows users to
add and manage devices connected to the computer, such as printers, scanners, mice and keyboards.
Devices is not related to extending the display to a second monitor but to configuring device settings
and preferences. Personalization is an option in the Windows settings that allows users to customize
the appearance and behavior of their desktop, such as themes, colors, backgrounds, lock screen and
Exam Dumps 130/269

screensaver.

Question: 237
Which of the following only has a web browser interface?

A. Linux
B. Microsoft Windows
C. iOS
D. Chromium

Answer: D
Explanation:

Chromium is an operating system that only has a web browser interface. Chromium is an open-
source project that provides the source code and framework for Chrome OS, which is a Linux-based
operating system developed by Google. Chromium and Chrome OS are designed to run web
applications and cloud services through the Chrome web browser, which is the only user interface
available on the system. Chromium and Chrome OS are mainly used on devices such as
Chromebooks, Chromeboxes and Chromebits. Linux is an operating system that does not only have a
web browser interface but also a graphical user interface and a command-line interface. Linux is an
open-source and customizable operating system that can run various applications and services on
different devices and platforms. Linux can also support different web browsers, such as Firefox,
Opera and Chromium. Microsoft Windows is an operating system that does not only have a web
browser interface but also a graphical user interface and a command-line interface. Microsoft
Windows is a proprietary and popular operating system that can run various applications and
services on different devices and platforms. Microsoft Windows can also support different web
browsers, such as Edge, Internet Explorer and Chrome. iOS is an operating system that does not only
have a web browser interface but also a graphical user interface and a voice-based interface. iOS is a
proprietary and mobile operating system developed by Apple that can run various applications and
services on devices such as iPhone, iPad and iPod Touch. iOS can also support different web
browsers, such as Safari, Firefox and Chrome. Reference: CompTIA A+ Core 2 (220-1002) Certification
Exam Objectives Version 4.0, Domain 1.1

Question: 238

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow
customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours,
the login screen locks. Which of the following sign-on options would allow any employee the ability
to unlock the kiosk?

A. Requiring employees to enter their usernames and passwords


B. Setting up facial recognition for each employee
C. Using a PIN and providing it to employees
D. Requiring employees to use their fingerprints

Answer: C
Exam Dumps 131/269

Explanation:

The best sign-on option that would allow any employee the ability to unlock the kiosk that relies
exclusively on a numeric keypad is to use a PIN and provide it to employees. A PIN is a Personal
Identification Number that is a numeric code that can be used as part of authentication or access
control. A PIN can be entered using only a numeric keypad and can be easily shared with employees
who need to unlock the kiosk. Requiring employees to enter their usernames and passwords may not
be feasible or convenient if the kiosk only has a numeric keypad and no other input devices. Setting
up facial recognition for each employee may not be possible or secure if the kiosk does not have a
camera or biometric sensor. Requiring employees to use their fingerprints may not be possible or
secure if the kiosk does not have a fingerprint scanner or biometric sensor. Reference: CompTIA A+
Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 3.3

Question: 239

A user calls the help desk to report that Windows installed updates on a laptop and rebooted
overnight. When the laptop started up again, the touchpad was no longer working. The technician
thinks the software that controls the touchpad might be the issue. Which of the following tools
should the technician use to make adjustments?

A. eventvwr.msc
B. perfmon.msc
C. gpedic.msc
D. devmgmt.msc

Answer: D
Explanation:

The technician should use devmgmt.msc tool to make adjustments for the touchpad issue after
Windows installed updates on a laptop. Devmgmt.msc is a command that opens the Device
Manager, which is a utility that allows users to view and manage the hardware devices and drivers
installed on a computer. The technician can use the Device Manager to check the status, properties
and compatibility of the touchpad device and its driver, and perform actions such as updating,
uninstalling or reinstalling the driver, enabling or disabling the device, or scanning for hardware
changes. Eventvwr.msc is a command that opens the Event Viewer, which is a utility that allows users
to view and monitor the system logs and events. The Event Viewer may provide some information or
clues about the touchpad issue, but it does not allow users to manage or troubleshoot the device or
its driver directly. Perfmon.msc is a command that opens the Performance Monitor, which is a utility
that allows users to measure and analyze the performance of the system

Question: 240

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM,
even though the technician installed 8GB. Which of the following is the MOST likely reason this
system is not utilizing all the available RAM?

A. The system is missing updates.


Exam Dumps 132/269

B. The system is utilizing a 32-bit OS.


C. The system's memory is failing.
D. The system requires BIOS updates

Answer: B
Explanation:

The most likely reason that the system is not utilizing all the available RAM is that the system is
utilizing a 32-bit OS. A 32-bit OS is an operating system that uses 32 bits to address memory locations
and perform calculations. A 32-bit OS can only support up to 4GB of RAM, and some of that RAM
may be reserved for hardware devices or system functions, leaving less than 4GB of usable RAM for
applications and processes. A 32-bit OS cannot recognize or utilize more than 4GB of RAM, even if
more RAM is installed on the system. To utilize all the available RAM, the system needs to use a 64-
bit OS, which can support much more RAM than a 32-bit OS. The system missing updates may cause
some performance or compatibility issues, but it does not affect the amount of usable RAM on the
system. The system’s memory failing may cause some errors or crashes, but it does not affect the
amount of usable RAM on the system. The system requiring BIOS updates may cause some
configuration or compatibility issues, but it does not affect the amount of usable RAM on the system.
Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.1

Question: 241

A Windows workstation that was recently updated with approved system patches shut down instead
of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the
root OS folder. The technician promptly performs a System Restore and reboots the workstation, but
the malware is still detected. Which of the following BEST describes why the system still has
malware?

A. A system patch disabled the antivirus protection and host firewall.


B. The system updates did not include the latest anti-malware definitions.
C. The system restore process was compromised by the malware.
D. The malware was installed before the system restore point was created.

Answer: D
Explanation:

The best explanation for why the system still has malware after performing a System Restore is that
the malware was installed before the system restore point was created. A system restore point is a
snapshot of the system settings and configuration at a certain point in time. A System Restore is a
feature that allows users to restore their system to a previous state in case of problems or errors.
However, a System Restore does not affect personal files or folders, and it may not remove malware
that was already present on the system before the restore point was created. A system patch
disabling the antivirus protection and host firewall may increase the risk of malware infection, but it
does not explain why the malware persists after a System Restore. The system updates not including
the latest anti-malware definitions may reduce the effectiveness of malware detection and removal,
but it does not explain why the malware persists after a System Restore. The system restore process
being compromised by the malware may prevent a successful System Restore, but it does not explain
Exam Dumps 133/269

why the malware persists after a System Restore. Reference: CompTIA A+ Core 2 (220-1002)
Certification Exam Objectives Version 4.0, Domain 1.3

Question: 242
Which of the following is the default GUI and file manager in macOS?

A. Disk Utility
B. Finder
C. Dock
D. FileVault

Answer: B
Explanation:

Finder is the default GUI and file manager in macOS. Finder is an application that allows users to
access and manage files and folders on their Mac computers. Finder also provides features such as
Quick Look, Spotlight, AirDrop and iCloud Drive. Finder uses a graphical user interface that consists
of icons, menus, toolbars and windows to display and interact with files and folders. Disk Utility is a
utility that allows users to view and manage disk drives and partitions on their Mac computers. Disk
Utility is not a GUI or a file manager but a disk management tool. Dock is a feature that allows users
to access and launch applications on their Mac computers. Dock is not a GUI or a file manager but an
application launcher. FileVault is a feature that allows users to encrypt and protect their data on their
Mac computers. FileVault is not a GUI or a file manager but an encryption tool. Reference: CompTIA
A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.1

Question: 243

A technician needs to add an individual as a local administrator on a Windows home PC. Which of
the following utilities would the technician MOST likely use?

A. Settings > Personalization


B. Control Panel > Credential Manager
C. Settings > Accounts > Family and Other Users
D. Control Panel > Network and Sharing Center

Answer: C
Explanation:

The technician would most likely use Settings > Accounts > Family and Other Users to add an
individual as a local administrator on a Windows home PC. Settings > Accounts > Family and Other
Users allows users to add and manage other user accounts on their Windows PC. The technician can
add an individual as a local administrator by selecting Add someone else to this PC under Other users
and following the steps to create a new user account with administrator privileges. Settings >
Personalization allows users to customize the appearance and behavior of their desktop, such as
themes, colors, backgrounds, lock screen and screensaver. Settings > Personalization is not related to
adding an individual as a local administrator on a Windows home PC but to configuring desktop
Exam Dumps 134/269

settings and preferences. Control Panel > Credential Manager allows users to view and manage their
web credentials and Windows credentials stored on their Windows PC. Control Panel > Credential
Manager is not related to adding

Question: 244

Which of the following features allows a technician to configure policies in a Windows 10


Professional desktop?

A. gpedit
B. gpmc
C. gpresult
D. gpupdate

Answer: A
Explanation:

The feature that allows a technician to configure policies in a Windows 10 Professional desktop is
gpedit. Gpedit is a command that opens the Local Group Policy Editor, which is a utility that allows
users to view and modify local group policies on their Windows PC. Local group policies are a set of
rules and settings that control the behavior and configuration of the system and its users. Local group
policies can be used to configure policies such as security, network, software installation and user
rights. Gpmc is a command that opens the Group Policy Management Console, which is a utility that
allows users to view and modify domain-based group policies on a Windows Server. Domain-based
group policies are a set of rules and settings that control the behavior and configuration of the
computers and users in a domain. Domain-based group policies are not available on a Windows 10
Professional desktop. Gpresult is a command that displays the result of applying group policies on a
Windows PC. Gpresult can be used to troubleshoot or verify group policy settings but not to
configure them. Gpupdate is a command that updates or refreshes the group policy settings on a
Windows PC. Gpupdate can be used to apply new or changed group policy settings but not to
configure them. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0,
Domain 1.6

Question: 245
Which of the following defines the extent of a change?

A. Scope
B. Purpose
C. Analysis
D. Impact

Answer: A
Explanation:

The term that defines the extent of a change is scope. Scope is a measure of the size, scale and
boundaries of a project or an activity. Scope defines what is included and excluded in the project or
Exam Dumps 135/269

activity, such as goals, requirements, deliverables, tasks and resources. Scope helps determine the
feasibility, duration and cost of the project or activity. Scope also helps manage the expectations and
needs of the stakeholders involved in the project or activity. Purpose is the reason or objective for
doing a project or an activity. Purpose defines why the project or activity is important or necessary,
such as solving a problem, meeting a need or achieving a goal. Purpose helps provide direction,
motivation and justification for the project or activity. Analysis is the process of examining,
evaluating and interpreting data or information related to a project or an activity. Analysis helps
identify, understand and prioritize issues, risks, opportunities and solutions for the project or activity.
Impact is the effect or outcome of a project or an activity on something or someone else. Impact
defines how the project or activity affects or influences other factors, such as performance, quality,
satisfaction or value. Impact helps measure the success and effectiveness of the project or activity.
Reference: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.2

Question: 246

Which of the following filesystem formats would be the BEST choice to ensure read and write
compatibility of USB flash drives across several generations of Microsoft operating systems?

A. APFS
B. ext4
C. CDFS
D. FAT32

Answer: D
Explanation:

The best filesystem format to ensure read and write compatibility of USB flash drives across several
generations of Microsoft operating systems is FAT32. FAT32 stands for File Allocation Table 32-bit and
is a filesystem format that organizes and manages files and folders on storage devices using 32-bit
clusters. FAT32 is compatible with most Microsoft operating systems since Windows 95 OSR2, as well
as other operating systems such as Linux and Mac OS X. FAT32 can support storage devices up to 2TB
in size and files up to 4GB in size. APFS stands for Apple File System and is a filesystem format that
organizes and manages files and folders on storage devices using encryption, snapshots and cloning
features. APFS is compatible with Mac OS X 10.13 High Sierra and later versions but not with
Microsoft operating systems natively. Ext4 stands for Fourth Extended File System and is a filesystem
format that organizes and manages files and folders on storage devices using journaling, extents and
delayed allocation features. Ext4 is compatible with Linux operating systems but not with Microsoft
operating systems natively.

Question: 247

A technician is troubleshooting a mobile device that was dropped. The technician finds that the
screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of
hardware should the technician replace to resolve the issue?

A. LCD
B. Battery
Exam Dumps 136/269

C. Accelerometer
D. Digitizer

Answer: C
Explanation:

The piece of hardware that the technician should replace to resolve the issue of the screen failing to
rotate on a mobile device that was dropped is the accelerometer. The accelerometer is a sensor that
detects the orientation and movement of the mobile device by measuring the acceleration forces
acting on it. The accelerometer allows the screen to rotate automatically according to the position
and angle of the device. If the accelerometer is damaged or malfunctioning, the screen may not
rotate properly or at all, even if the settings are correctly applied. LCD stands for Liquid Crystal
Display and is a type of display that uses liquid crystals and backlight to produce images on the
screen. LCD is not related to the screen rotation feature but to the quality and brightness of the
display. Battery is a component that provides power to the mobile device by storing and releasing
electrical energy. Battery is not related to the screen rotation feature but to the battery life and
performance of the device. Digitizer is a component that converts touch inputs into digital signals
that can be processed by the mobile device. Digitizer is not related to the screen rotation feature but
to the touch sensitivity and accuracy of the display. Reference: CompTIA A+ Core 2 (220-1002)
Certification Exam Objectives Version 4.0, Domain 1.5

Question: 248

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the
download is complete, the technician again validates the hash, but the value returns as 2a876a7d3.
Which of the following is the MOST likely cause of the issue?

A. Private-browsing mode
B. Invalid certificate
C. Modified file
D. Browser cache

Answer: C
Explanation:

The most likely cause of the issue of having different hash values for a downloaded security tool is a
modified file. A hash value is a unique and fixed-length string that is generated from an algorithm
that processes data or files. A hash value can be used to verify the integrity and authenticity of data
or files by comparing it with a known or expected value. If the hash values do not match, it means
that the data or file has been altered or corrupted in some way. A modified file may result from
intentional or unintentional changes, such as editing, encryption, compression or malware infection.
Private-browsing mode is a feature that allows users to browse the web without storing any
browsing history, cookies or cache on their browser. Private-browsing mode does not affect the hash
value of a downloaded file but only how the browser handles user data. Invalid certificate is an error
that occurs when a website or a server does not have a valid or trusted digital certificate that proves
its identity and secures its communication. Invalid certificate does not affect the hash value of a
downloaded file but only how the browser verifies the website or server’s credibility. Browser cache
Exam Dumps 137/269

is a temporary storage that stores copies of web pages, images and other content that users have
visited on their browser.

Question: 249

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless
network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network
has open authentication. The technician needs to secure the vendor's sensitive dat
a. Which of the following should the specialist do FIRST to protect the company's data?
A. Manually configure an IP address, a subnet mask, and a default gateway.
B. Connect to the vendor's network using a VPN.
C. Change the network location to private.
D. Configure MFA on the network.

Answer: B
Explanation:

The first thing that the specialist should do to protect the company’s data on an insecure network
with open authentication is to connect to the vendor’s network using a VPN. A VPN stands for Virtual
Private Network and is a technology that creates a secure and encrypted connection over a public or
untrusted network. A VPN can protect the company’s data by preventing eavesdropping,
interception or modification of the network traffic by unauthorized parties. A VPN can also provide
access to the company’s internal network and resources remotely. Manually configuring an IP
address, a subnet mask and a default gateway may not be necessary or possible if the vendor’s
network uses DHCP to assign network configuration parameters automatically. Manually configuring
an IP address, a subnet mask and a default gateway does not protect the company’s data from
network attacks or threats. Changing the network location to private may not be advisable or
effective if the vendor’s network is a public or untrusted network. Changing the network location to
private does not protect the company’s data from network attacks or threats. Configuring MFA on
the network may not be feasible or sufficient if the vendor’s network has open authentication and
does not support or require MFA. Configuring MFA on the network does not protect the company’s
data from network attacks or threats. Reference: CompTIA A+ Core 2 (220-1002) Certification Exam
Objectives Version 4.0, Domain 3.3

Question: 250
A user contacts a technician about an issue with a laptop. The user states applications open without
being launched and the browser redirects when trying to go to certain websites. Which of the
following is MOST likely the cause of the user's issue?

A. Keylogger
B. Cryptominers
C. Virus
D. Malware

Answer: D
Explanation:
Exam Dumps 138/269

The most likely cause of the user’s issue of applications opening without being launched and browser
redirects when trying to go to certain websites is malware. Malware is a general term that refers to
any software or code that is malicious or harmful to a computer or system. Malware can perform
various unwanted or unauthorized actions on a computer or system, such as opening applications,
redirecting browsers, displaying ads, stealing data, encrypting files or damaging hardware. Malware
can infect a computer or system through various means, such as email attachments, web downloads,
removable media or network connections. Keylogger is a type of malware that records and transmits
the keystrokes made by a user on a keyboard. Keylogger can be used to steal personal or sensitive
information, such as passwords, credit card numbers or chat messages. Keylogger does not typically
open applications or redirect browsers but only captures user inputs. Cryptominers are a type of
malware that use the computing resources of a computer or system to mine cryptocurrency, such as
Bitcoin or Ethereum. Cryptominers can degrade the performance and increase the power
consumption of a computer or system. Cryptominers do not typically open applications or redirect
browsers but only consume CPU or GPU cycles. Virus is a type of malware that infects and replicates
itself on other files or programs on a computer or system.

Question: 251

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet
but will not require the same private address each time. Which of the following protocols will the
technician MOST likely utilize?

A. DHCP
B. SMTP
C. DNS
D. RDP

Answer: A
Explanation:

DHCP stands for Dynamic Host Configuration Protocol and it is used to assign IP addresses and other
network configuration parameters to devices on a network automatically. This is useful for devices
that do not require the same private address each time they connect to the internet.

Question: 252
A user is no longer able to start the OS on a computer and receives an error message indicating there
is no OS found. A technician reviews the audit logs and notes that the user's system posted a
S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this
issue?

A. Boot order
B. Malware
C. Drive failure
D. Windows updates
Exam Dumps 139/269

Answer: C
Explanation:

A S.M.A.R.T. error is a warning that a hard drive is about to fail or has failed. This means that the OS
cannot be loaded from the drive and the user will see an error message indicating there is no OS
found. The most likely cause of this issue is drive failure.

Question: 253
A manager called the help desk to ask for assistance with creating a more secure environment for the
finance department- which resides in a non-domain environment. Which of the following would be
the BEST method to protect against unauthorized use?

A. Implementing password expiration


B. Restricting user permissions
C. Using screen locks
D. Disabling unnecessary services

Answer: B
Explanation:

Restricting user permissions is a method of creating a more secure environment for the finance
department in a non-domain environment. This means that users will only have access to the files
and resources that they need to perform their tasks and will not be able to modify or delete other
files or settings that could compromise security or functionality.

Question: 254
Which of the following options should MOST likely be considered when preserving data from a hard
drive for forensic analysis? (Select TWO).

A. Licensing agreements
B. Chain of custody
C. Incident management documentation
D. Data integrity
E. Material safety data sheet
F. Retention requirements

Answer: B
Explanation:

Chain of custody and data integrity are two options that should most likely be considered when
preserving data from a hard drive for forensic analysis. Chain of custody refers to the documentation
and tracking of who has access to the data and how it is handled, stored, and transferred. Data
integrity refers to the assurance that the data has not been altered, corrupted, or tampered with
during the preservation process
Exam Dumps 140/269

Question: 255

A customer calls a service support center and begins yelling at a technician about a feature for a
product that is not working to the customer's satisfaction. This feature is not supported by the
service support center and requires a field technician to troubleshoot. The customer continues to
demand service. Which of the following is the BEST course of action for the support center
representative to take?

A. Inform the customer that the issue is not within the scope of this department.
B. Apologize to the customer and escalate the issue to a manager.
C. Ask the customer to explain the issue and then try to fix it independently.
D. Respond that the issue is something the customer should be able to fix.

Answer: B
Explanation:

Apologizing to the customer and escalating the issue to a manager is the best course of action for
the support center representative to take. This shows empathy and professionalism and allows the
manager to handle the situation and provide the appropriate service or resolution for the customer.

Question: 256
All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was
working fine until a recent software patch was deployed. Which of the following would BEST resolve
the issue?

A. Rolling back video card drivers


B. Restoring the PC to factory settings
C. Repairing the Windows profile
D. Reinstalling the Windows OS

Answer: A
Explanation:

Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a user’s
newly issued PC. This means restoring the previous version of the drivers that were working fine
before the software patch was deployed. The software patch may have caused compatibility issues or
corrupted the drivers, resulting in display problems

Question: 257
A technician is installing a program from an ISO file. Which of the following steps should the
technician take?

A. Mount the ISO and run the installation file.


B. Copy the ISO and execute on the server.
C. Copy the ISO file to a backup location and run the ISO file.
Exam Dumps 141/269

D. Unzip the ISO and execute the setup.exe file.

Answer: A
Explanation:

Mounting the ISO and running the installation file is the correct way to install a program from an ISO
file. An ISO file is an image of a disc that contains all the files and folders of a program. Mounting the
ISO means creating a virtual drive that can access the ISO file as if it were a physical disc. Running the
installation file means executing the setup program that will install the program on the computer

Question: 258
Which of the following would MOST likely be used to change the security settings on a user's device
in a domain environment?

A. Security groups
B. Access control list
C. Group Policy
D. Login script

Answer: C
Explanation:

Group Policy is the most likely tool to be used to change the security settings on a user’s device in a
domain environment. Group Policy is a feature of Windows that allows administrators to manage
and configure settings for multiple devices and users in a centralized way. Group Policy can be used
to enforce security policies such as password complexity, account lockout, firewall rules, encryption
settings, etc.

Question: 259
While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs
have very similar names. Which of the following social-engineering attacks is being attempted?

A. Evil twin
B. Impersonation
C. Insider threat
D. Whaling

Answer: A
Explanation:

An evil twin is a type of social-engineering attack that involves setting up a rogue wireless access
point that mimics a legitimate one. The attacker can then intercept or modify the traffic of the users
who connect to the fake SSID. The attacker may also use phishing or malware to steal credentials or
personal information from the users
Exam Dumps 142/269

Question: 260

Which of the following is used to integrate Linux servers and desktops into Windows Active Directory
environments?

A. apt-get
B. CIFS
C. Samba
D. greP

Answer: C
Explanation:

Samba is a software suite that allows Linux servers and desktops to integrate with Windows Active
Directory environments. Samba can act as a domain controller, a file server, a print server, or a client
for Windows networks. Samba can also provide authentication and authorization services for Linux
users and devices using Active Directory.

Question: 261
A technician installed a new application on a workstation. For the program to function properly, it
needs to be listed in the Path Environment Variable. Which of the following Control Panel utilities
should the technician use?

A. System
B. Indexing Options
C. Device Manager
D. Programs and Features

Answer: A
Explanation:

System is the Control Panel utility that should be used to change the Path Environment Variable. The
Path Environment Variable is a system variable that specifies the directories where executable files
are located. To edit the Path Environment Variable, the technician should go to System > Advanced
system settings > Environment Variables and then select Path from the list of system variables and
click Edit.

Question: 262
An organization implemented a method of wireless security that requires both a user and the user's
computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the
following wireless security methods BEST describes what this organization implemented?

A. TKIP
B. RADIUS
C. WPA2
Exam Dumps 143/269

D. AES

Answer: B
Explanation:

RADIUS stands for Remote Authentication Dial-In User Service and it is a protocol that provides
centralized authentication, authorization, and accounting for network access. RADIUS can be used to
implement a method of wireless security that requires both a user and the user’s computer to be in
specific managed groups on the server in order to connect to Wi-Fi. This is also known as 802.1X
authentication or EAP-TLS authentication

Question: 263
A company acquired a local office, and a technician is attempting to join the machines at the office to
the local domain. The technician notes that the domain join option appears to be missing. Which of
the following editions of Windows is MOST likely installed on the machines?

A. Windows Professional
B. Windows Education
C. Windows Enterprise
D. Windows Home

Answer: D
Explanation:

Windows Home is the most likely edition of Windows installed on the machines that do not have the
domain join option. Windows Home is a consumer-oriented edition that does not support joining a
domain or using Group Policy. Only Windows Professional, Education, and Enterprise editions can
join a domain

Question: 264
Which of the following macOS features provides the user with a high-level view of all open windows?

A. Mission Control
B. Finder
C. Multiple Desktops
D. Spotlight

Answer: A
Explanation:

Mission Control is the macOS feature that provides the user with a high-level view of all open
windows. Mission Control allows the user to see and switch between multiple desktops, full-screen
apps, and windows in a single screen. Mission Control can be accessed by swiping up with three or
four fingers on the trackpad, pressing F3 on the keyboard, or moving the cursor to a hot corner
Exam Dumps 144/269

Question: 265

Which of the following should be used to secure a device from known exploits?

A. Encryption
B. Remote wipe
C. Operating system updates
D. Cross-site scripting

Answer: C
Explanation:

Operating system updates are used to secure a device from known exploits. Operating system
updates are patches or fixes that are released by the vendor to address security vulnerabilities, bugs,
or performance issues. Operating system updates can also provide new features or enhancements to
the device. It is important to keep the operating system updated to prevent attackers from exploiting
known flaws or weaknesses.

Question: 266
The audio on a user's mobile device is inconsistent when the user uses wireless headphones and
moves around. Which of the following should a technician perform to troubleshoot the issue?

A. Verify the Wi-Fi connection status.


B. Enable the NFC setting on the device.
C. Bring the device within Bluetooth range.
D. Turn on device tethering.

Answer: C
Explanation:

Bringing the device within Bluetooth range is the best way to troubleshoot the issue of inconsistent
audio when using wireless headphones and moving around. Bluetooth is a wireless technology that
allows devices to communicate over short distances, typically up to 10 meters or 33 feet. If the
device is too far from the headphones, the Bluetooth signal may be weak or interrupted, resulting in
poor audio quality or loss of connection.

Question: 267
A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the
following would the technician need to execute after editing the hosts file?

A. Enable promiscuous mode.


B. Clear the browser cache.
C. Add a new network adapter.
D. Reset the network adapter.
Exam Dumps 145/269

Answer: D
Explanation:

Resetting the network adapter is the best way to apply the changes made to the hosts file on a few
PCs. The hosts file is a text file that maps hostnames to IP addresses and can be used to block certain
domains by redirecting them to invalid or local addresses. Resetting the network adapter will clear
the DNS cache and force the PC to use the new entries in the hosts file.

Question: 268
A data center is required to destroy SSDs that contain sensitive information. Which of the following is
the BEST method to use for the physical destruction of SSDs?

A. Wiping
B. Low-level formatting
C. Shredding
D. Erasing

Answer: C
Explanation:

Shredding is the best method to use for the physical destruction of SSDs because it reduces them to
small pieces that cannot be recovered or accessed. Wiping, low-level formatting, and erasing are not
effective methods for destroying SSDs because they do not physically damage the flash memory
chips that store data1.

Question: 269
After a failed update, an application no longer launches and generates the following error message:
Application needs to be repaired. Which of the following Windows 10 utilities should a technician
use to address this concern?

A. Device Manager
B. Administrator Tools
C. Programs and Features
D. Recovery

Answer: D
Explanation:

Recovery is a Windows 10 utility that can be used to address the concern of a failed update that
prevents an application from launching. Recovery allows the user to reset the PC, go back to a
previous version of Windows, or use advanced startup options to troubleshoot and repair the
system2. Device Manager, Administrator Tools, and Programs and Features are not Windows 10
utilities that can fix a failed update.
Exam Dumps 146/269

Question: 270

A technician receives a call (rom a user who is having issues with an application. To best understand
the issue, the technician simultaneously views the user's screen with the user. Which of the following
would BEST accomplish this task?

A. SSH
B. VPN
C. VNC
D. RDP

Answer: C
Explanation:

VNC (Virtual Network Computing) is a protocol that allows a technician to simultaneously view and
control a user’s screen remotely. VNC uses a server-client model, where the user’s computer runs a
VNC server and the technician’s computer runs a VNC client. VNC can work across different platforms
and operating systems3. SSH (Secure Shell) is a protocol that allows a technician to access a user’s
command-line interface remotely, but not their graphical user interface. VPN (Virtual Private
Network) is a technology that creates a secure and encrypted connection over a public network, but
does not allow screen sharing. RDP (Remote Desktop Protocol) is a protocol that allows a technician
to access a user’s desktop remotely, but not simultaneously with the user.

Question: 271

A computer on a corporate network has a malware infection. Which of the following would be the
BEST method for returning the computer to service?

A. Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to
service
B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS
C. Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
D. Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Answer: B
Explanation:

Flashing the BIOS, reformatting the drive, and then reinstalling the OS is the best method for
returning a computer with a malware infection to service. Flashing the BIOS updates the firmware of
the motherboard and can remove any malware that may have infected it. Reformatting the drive
erases all data on it and can remove any malware that may have infected it. Reinstalling the OS
restores the system files and settings to their original state and can remove any malware that may
have modified them. Scanning the system with a Linux live disc may not detect or remove all
malware infections. Degaussing the hard drive is an extreme method of destroying data that may
damage the drive beyond repair. Reinstalling the OS before flashing the BIOS or scanning with
antivirus may not remove malware infections that persist in the BIOS or other files.
Exam Dumps 147/269

Question: 272

A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although
the connection is unsuccessful, the technician is able to ping the computer successfully. Which of the
following is MOST likely preventing the connection?

A. The Windows 10 desktop has Windows 10 Home installed.


B. The Windows 10 desktop does not have DHCP configured.
C. The Windows 10 desktop is connected via Wi-Fi.
D. The Windows 10 desktop is hibernating.

Answer: A
Explanation:

The Windows 10 desktop has Windows 10 Home installed, which does not support RDP (Remote
Desktop Protocol) as a host. Only Windows 10 Pro, Enterprise, and Education editions can act as RDP
hosts and allow remote access to their desktops1. The Windows 10 desktop does not have DHCP
configured, is connected via Wi-Fi, or is hibernating are not likely to prevent the RDP connection if
the technician is able to ping the computer successfully.

Question: 273

Which of the following often uses an SMS or third-party application as a secondary method to access
a system?

A. MFA
B. WPA2
C. AES
D. RADIUS

Answer: A
Explanation:

MFA (Multi-Factor Authentication) is a security measure that often uses an SMS or third-party
application as a secondary method to access a system. MFA requires the user to provide two or more
pieces of evidence to prove their identity, such as something they know (e.g., password), something
they have (e.g., phone), or something they are (e.g., fingerprint)2. WPA2 (Wi-Fi Protected Access 2)
is a security protocol for wireless networks that does not use SMS or third-party applications. AES
(Advanced Encryption Standard) is a symmetric encryption algorithm that does not use SMS or third-
party applications. RADIUS (Remote Authentication Dial-In User Service) is a network protocol that
provides centralized authentication and authorization for remote access clients, but does not use
SMS or third-party applications.

Question: 274
A company needs employees who work remotely to have secure access to the corporate intranet.
Which of the following should the company implement?
Exam Dumps 148/269

A. Password-protected Wi-Fi
B. Port forwarding
C. Virtual private network
D. Perimeter network

Answer: C
Explanation:

A virtual private network (VPN) is a technology that creates a secure and encrypted connection over
a public network, such as the internet. A VPN allows remote employees to access the corporate
intranet as if they were physically connected to the local network3. Password-protected Wi-Fi is a
security measure for wireless networks that does not provide access to the corporate intranet. Port
forwarding is a technique that allows external devices to access services on a private network
through a router, but does not provide access to the corporate intranet. A perimeter network is a
network segment that lies between an internal network and an external network, such as the
internet, and provides an additional layer of security, but does not provide access to the corporate
intranet.

Question: 275

A systems administrator is creating a new document with a list of the websites that users are allowed
to access. Which of the following types of documents is the administrator MOST likely creating?

A. Access control list

B. Acceptable use policy

C. Incident report

D. Standard operating procedure

Answer: A
Explanation:

An access control list (ACL) is a list of permissions associated with a system resource (object), such as
a website. An ACL specifies which users or system processes are granted access to objects, as well as
what operations are allowed on given objects1. A systems administrator can create an ACL to define
the list of websites that users are allowed to access.
Reference: 1: Access-control list - Wikipedia (https://en.wikipedia.org/wiki/Access-control_list)

Question: 276
A user's corporate phone was stolen, and the device contains company trade secrets. Which of the
following technologies should be implemented to mitigate this risk? (Select TWO).
Exam Dumps 149/269

A. Remote wipe

B. Firewall

C. Device encryption

D. Remote backup

E. Antivirus

F. Global Positioning System

Answer: AC
Explanation:

Remote wipe is a feature that allows data to be deleted from a device or system remotely by an
administrator or owner1. It is used to protect data from being compromised if the device is lost,
stolen, or changed hands1. Device encryption is a feature that helps protect the data on a device by
making it unreadable to unauthorized users2. It requires a key or a password to access the data2.
Both features can help mitigate the risk of losing company trade secrets if a corporate phone is
stolen.
Reference: 1: How to remote wipe Windows laptop (https://www.thewindowsclub.com/remote-
wipe-windows-10) 2: Device encryption in Windows (https://support.microsoft.com/en-
us/windows/device-encryption-in-windows-ad5dcf4b-dbe0-2331-228f-7925c2a3012d)

Question: 277
A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A. Repair Windows.

B. Partition the hard disk.

C. Reimage the workstation.

D. Roll back the updates.

Answer: A
Explanation:

The error “BOOTMGR is missing” indicates that the boot sector is damaged or missing1. The boot
Exam Dumps 150/269

sector is a part of the hard disk that contains the code and information needed to start Windows1. To
fix this error, one of the possible methods is to run Startup Repair from Windows Recovery
Environment (WinRE)1. Startup Repair is a tool that can automatically diagnose and repair problems
with the boot process2.
Reference: 1: “Bootmgr is missing Press Ctrl+Alt+Del to restart” error when you start Windows
(https://support.microsoft.com/en-us/topic/-bootmgr-is-missing-press-ctrl-alt-del-to-restart-error-
when-you-start-windows-8bc1b94b-d243-1027-5410-aeb04d5cd5e2) 2: Startup Repair: frequently
asked questions (https://support.microsoft.com/en-us/windows/startup-repair-frequently-asked-
questions-f5f412a0-19c4-8e0a-9f68-bb0f17f3daa0)

Question: 278

A user requires local administrative access to a workstation. Which of the following Control Panel
utilities allows the technician to grant access to the user?

A. System

B. Network and Sharing Center

C. User Accounts

D. Security and Maintenance

Answer: C
Explanation:

User Accounts is a Control Panel utility that allows the technician to manage user accounts and
groups on a workstation1. The technician can use User Accounts to grant local administrative access
to a user by adding the user to the Administrators group1. The Administrators group has full control
over the workstation and can perform tasks such as installing software, changing system settings, and
accessing all files.
Reference: 1: User Accounts (Control Panel) (https://docs.microsoft.com/en-
us/windows/win32/shell/user-accounts) : Local Users and Groups (https://docs.microsoft.com/en-
us/windows-server/identity/ad-ds/plan/security-best-practices/local-users-and-groups)

Question: 279
A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

A. Proceed to the site.

B. Use a different browser.


Exam Dumps 151/269

C. Report the error to the bank.

D. Reinstall the browser.

Answer: C
Explanation:

The error message “Your connection is not private. Authority invalid.” means that the web browser
cannot verify the identity or security of the website’s SSL certificate. This could indicate that the
website has been compromised, has a configuration error, or has an expired or invalid certificate. The
user should not proceed to the site or use a different browser, as this could expose their sensitive
information to potential attackers. The user should also not reinstall the browser, as this is unlikely to
fix the error and could cause data loss. The best action for the user to take is to report the error to
the bank and wait for them to resolve it.
Reference: : How to Fix “Your Connection Is Not Private” Errors
(https://www.howtogeek.com/874436/how-to-fix-your-connection-is-not-private-errors/) : Fix
connection errors (https://support.google.com/chrome/answer/6098869?hl=en)

Question: 280

A user notices a small USB drive is attached to the user's computer after a new vendor visited the
office. The technician notices two files named grabber.exe and output.txt. Which of the following
attacks is MOST likely occurring?

A. Trojan

B. Rootkit

C. Cryptominer

D. Keylogger

Answer: D
Explanation:

A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote
attacker1. The attacker can use the captured information to steal passwords, credit card numbers, or
other sensitive dat
a. A keylogger can be installed on a computer by attaching a small USB drive that contains a
malicious executable file, such as grabber.exe2. The output.txt file may contain the recorded
keystrokes. The user should remove the USB drive and scan the computer for malware.
Reference: 2: What is grabber.exe? (https://www.freefixer.com/library/file/grabber.exe-55857/) 1:
What is a keylogger? (https://www.kaspersky.com/resource-center/definitions/keylogger)

Question: 281
Exam Dumps 152/269

A SOHO client is having trouble navigating to a corporate website. Which of the following should a
technician do to allow access?

A. Adjust the content filtering.

B. Unmap port forwarding.

C. Disable unused ports.

D. Reduce the encryption strength

Answer: A
Explanation:

Content filtering is a process that manages or screens access to specific emails or webpages based on
their content categories1. Content filtering can be used by organizations to control content access
through their firewalls and enforce corporate policies around information system management2. A
SOHO client may have content filtering enabled on their network and may need to adjust it to allow
access to a corporate website that is blocked by default. The client can use a software program, a
hardware device, or a subscription service to configure the content filtering settings and whitelist the
desired website2.
Reference: 1: Web content filtering (https://learn.microsoft.com/en-us/microsoft-
365/security/defender-endpoint/web-content-filtering?view=o365-worldwide) 2: What is Content
Filtering? Definition and Types of Content Filters
(https://www.fortinet.com/resources/cyberglossary/content-filtering)

Question: 282

Which of the following is used as a password manager in the macOS?

A. Terminal

B. FileVault

C. Privacy

D. Keychain

Answer: D
Explanation:

Keychain is a feature of macOS that securely stores passwords, account numbers, and other
confidential information for your Mac, apps, servers, and websites1. You can use the Keychain Access
Exam Dumps 153/269

app on your Mac to view and manage your keychains and the items stored in them1. Keychain can
also sync your passwords and other secure information across your devices using iCloud Keychain1.
Keychain can be used as a password manager in macOS to help you keep track of and protect your
passwords.
Reference: 1: Manage passwords using keychains on Mac (https://support.apple.com/guide/mac-
help/use-keychains-to-store-passwords-mchlf375f392/mac)

Question: 283

A user reports that after a recent software deployment to upgrade applications, the user can no
longer use the Testing program.

However, other employees can successfully use the Testing program.

INSTRUCTIONS

Review the information in each tab to verify the results of the deployment and resolve any issues
discovered by selecting the:

Index number of the Event Viewer issue

First command to resolve the issue

Second command to resolve the issue

BSOD

Commands:
Exam Dumps 154/269

Event Viewer:

System Error:
Exam Dumps 155/269

Answer: see the


answer below in
explanation.
Explanation:

The user is experiencing a system error that prevents them from using the Testing program. The error
message indicates that the file MSVCP100.dll is missing from the computer. This file is part of the
Microsoft Visual C++ 2010 Redistributable Package, which is required by some applications to run
properly. The error may have occurred due to a corrupted or incomplete software deployment.
Exam Dumps 156/269

To resolve this issue, the user needs to restore the missing file and register it in the system. One
possible way to do this is to copy the file from another computer that has the Testing program
installed and working, and then use the regsvr32 command to register it. The steps are as follows:
On another computer (User-PC02) that has the Testing program installed and working, locate the file
MSVCP100.dll in the folder C:\Program Files\Testing.
Share the folder C:\Windows\System32 on User-PC02 by right-clicking on it, selecting Properties,
then Sharing, then Advanced Sharing, then checking Share this folder, then clicking OK.
On the user’s computer (User-PC01), open a command prompt as an administrator by clicking Start,
typing cmd, right-clicking on Command Prompt, and selecting Run as administrator.
In the command prompt, type the following command to copy the file MSVCP100.dll from User-PC02
to User-PC01: copy "C:\Program Files\Testing\msvcp100.dll" "\\User-PC02\C$\Windows\System32"
After the file is copied, type the following command to register it in the system: regsvr32
msvcp100.dll
Restart the user’s computer and try to run the Testing program again.
Therefore, based on the instructions given by the user, the correct answers are:
Select Event Viewer Issue: 2187
Select First Command: copy "C:\Program Files\Testing\msvcp100.dll" "\\User-
PC02\C$\Windows\System32"
Select Second Command: regsvr32 msvcp100.dll

Question: 284

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine.


The source data is very dynamic, and files are either added or deleted regularly. Which of the
following utilities can be used to ‘mirror the source data for the backup?

A. copy

B. xcopy

C. robocopy

D. Copy-Item

Answer: C
Explanation:

Robocopy is a command-line utility that can be used to mirror the source data for the backup. It can
copy files and folders with various options, such as copying only changed files, preserving attributes
and permissions, and retrying failed copies. Robocopy is more powerful and flexible than copy or
xcopy, which are simpler commands that can only copy files and folders without mirroring or other
advanced features. Copy-Item is a PowerShell cmdlet that can also copy files and folders, but it is not
a native Windows utility and it requires PowerShell to run1.
Reference: 1: https://windowsreport.com/mirror-backup-software/

Question: 285
Exam Dumps 157/269

A change advisory board authorized a setting change so a technician is permitted to implement the
change. The technician successfully implemented the change. Which of the following should be done
NEXT?

A. Document the date and time of change.

B. Document the purpose of the change.

C. Document the risk level.

D. Document findings of the sandbox test.

Answer: A
Explanation:

After implementing a change authorized by the change advisory board (CAB), the technician should
document the date and time of change as part of the post-implementation review. This helps to track
the change history, verify the success of the change, and identify any issues or incidents caused by
the change1. Documenting the purpose of the change, the risk level, and the findings of the sandbox
test are all part of the pre-implementation activities that should be done before submitting the
change request to the CAB2.
Reference: 2: https://www.manageengine.com/products/service-desk/itil-change-management/cab-
change-advisory-board.html 1: https://www.servicenow.com/content/dam/servicenow-
assets/public/en-us/doc-type/success/quick-answer/change-advisory-board-setup.pdf

Question: 286

A technician is in the process of installing a new hard drive on a server but is called away to another
task. The drive has been unpackaged and left on a desk. Which of the following should the technician
perform before leaving?

A. Ask coworkers to make sure no one touches the hard drive.

B. Leave the hard drive on the table; it will be okay while the other task is completed.

C. Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D. Connect an electrostatic discharge strap to the drive.

Answer: C
Explanation:

The technician should place the hard drive in an antistatic bag and secure the area containing the
hard drive before leaving. This will protect the hard drive from electrostatic discharge (ESD), dust,
moisture, and physical damage. Asking coworkers to make sure no one touches the hard drive is not
Exam Dumps 158/269

a reliable or secure way to prevent damage. Leaving the hard drive on the table exposes it to ESD and
other environmental hazards. Connecting an electrostatic discharge strap to the drive is not enough
to protect it from dust, moisture, and physical damage.

Question: 287

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM,
even though the technician installed 8GB. Which of the following is the MOST likely reason this
system is not utilizing all the
available RAM?

A. The system is missing updates.

B. The systems utilizing a 32-bit OS.

C. The system's memory is failing.

D. The system requires BIOS updates.

Answer: B
Explanation:

The most likely reason that the system is not utilizing all the available RAM is that it is running a 32-
bit OS. A 32-bit OS can only address up to 4GB of RAM, and some of that is reserved for hardware
and system use1. Therefore, even if the technician installed 8GB of RAM, the system can only use
around 3.5GB of usable RAM. To use the full 8GB of RAM, the technician would need to install a 64-
bit OS, which can address much more memory2. The system missing updates, the system’s memory
failing, or the system requiring BIOS updates are not likely to cause this issue.
Reference: 2: https://support.microsoft.com/en-us/windows/windows-10-system-requirements-
6d4e9a79-66bf-7950-467c-795cf0386715 1: https://www.makeuseof.com/tag/unlock-64gb-ram-32-
bit-windows-pae-patch/

Question: 288

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the
user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of
the following should the
technician perform to fix the issue?

A. Disable the Windows Update service.


B. Check for updates.
C. Restore hidden updates.
D. Rollback updates.

Answer: D
Exam Dumps 159/269

Explanation:

The technician should perform a rollback of the Windows update that caused the issue with the
locally attached devices. A rollback is a process of uninstalling an update and restoring the previous
version of the system. This can help to fix any compatibility or performance issues caused by the
update1. To rollback an update, the technician can use the Settings app, the Control Panel, or the
System Restore feature. The technician should also check for any device driver updates that might be
needed after rolling back the update. Disabling the Windows Update service is not a good practice,
as it can prevent the system from receiving important security and feature updates. Checking for
updates might not fix the issue, as the update that caused the issue might still be installed. Restoring
hidden updates is not relevant, as it only applies to updates that have been hidden by the user to
prevent them from being installed2.
Reference: 1: https://www.windowscentral.com/how-uninstall-and-reinstall-updates-windows-10 2:
https://support.microsoft.com/en-us/windows/show-or-hide-updates-in-windows-10-9c9f0a4f-
9a6e-4c8e-8b44-afbc6b33f3cf

Question: 289

A macOS user is installing a new application. Which of the following system directories is the
software MOST likely to install by default?

A. /etc/services

B. /Applications

C. /usr/bin

D. C:\Program Files

Answer: B
Explanation:

The software is most likely to install by default in the /Applications directory, which is the standard
location for macOS applications. This directory can be accessed from the Finder sidebar or by
choosing Go > Applications from the menu bar. The /Applications directory contains all the
applications that are available to all users on the system1. Some applications might also offer the
option to install in the ~/Applications directory, which is a personal applications folder for a single
user2. The /etc/services directory is a system configuration file that maps service names to port
numbers and protocols3. The /usr/bin directory is a system directory that contains executable
binaries for various commands and utilities4. The C:\Program Files directory is a Windows directory
that does not exist on macOS.

Question: 290

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the
Exam Dumps 160/269

following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

A. Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image
the user wants to use as the wallpaper.
B. Open Settings, select Personalization, click Browse, and then locate and open the image the user
wants to use as the wallpaper.
C. Open Settings, select System, select Display, click Browse, and then locate and open the image the
user wants to use as the wallpaper.
D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the
image the user wants to use as the wallpaper.

Answer: B
Explanation:

The user can change the wallpaper using a Windows 10 Settings tool by following these steps12:
Open Settings by pressing the Windows key and typing Settings, or by clicking the gear icon in the
Start menu.
Select Personalization from the left navigation menu.
On the right side of the window, click Background.
In the Background settings, click the drop-down menu and select Picture as the background type.
Click Browse and then locate and open the image the user wants to use as the wallpaper.
The other options are incorrect because they do not lead to the Background settings or they do not
allow the user to browse for an image. Accounts, System, and Apps are not related to personalization
settings. Your info, Display, and Apps & features are not related to wallpaper settings.
Reference: 1: https://support.microsoft.com/en-us/windows/change-your-desktop-background-
image-175618be-4cf1-c159-2785-ec2238b433a8 2:
https://www.computerhope.com/issues/ch000592.htm

Question: 291

Which of the following default system tools can be used in macOS to allow the technician to view the
screen simultaneously with the user?

A. Remote Assistance

B. Remote Desktop Protocol

C. Screen Sharing

D. Virtual Network Computing

Answer: C
Explanation:

Screen Sharing is the default system tool that can be used in macOS to allow the technician to view
the screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their
Exam Dumps 161/269

Mac screen with another Mac on the network. The user can enable screen sharing in the System
Preferences > Sharing pane, and then allow other users to request or enter a password to access
their screen1. The technician can launch the Screen Sharing app from the Spotlight search or the
Finder sidebar, and then enter the user’s name, address, or Apple ID to connect to their
screen2. Remote Assistance is a Windows feature that allows users to invite someone to help them
with a problem on their PC3. Remote Desktop Protocol (RDP) is a protocol that allows users to
connect to a remote computer over a network4. Virtual Network Computing (VNC) is a technology
that allows users to share their screen with other devices using a VNC viewer app1. These are not
default system tools in macOS, although they can be used with third-party software or settings.
Reference: 1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-mac-
mh14066/mac 2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-with-
another-mac/ 3: https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remote-
connection-b077e31a-16f4-2529-1a47-21f6a9040bf3 4: https://docs.microsoft.com/en-us/windows-
server/remote/remote-desktop-services/clients/remote-desktop-protocol

Question: 292

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware
that may infect these devices. Which of the following should the company deploy to address these
concerns?

A. UAC

B. MDM

C. LDAP

D. SSO

Answer: B
Explanation:

MDM stands for mobile device management, which is a type of software solution that allows remote
management and security of mobile devices. MDM can help a company reduce data disclosure
caused by malware that may infect these devices by enforcing security policies, such as encryption,
password protection, antivirus software, and remote wipe. MDM can also monitor and control the
access of personal devices to corporate data and networks. UAC stands for user account control,
which is a feature of Windows that prompts users for permission or an administrator password
before making changes that affect the system. UAC may not be effective in preventing malware
infection or data disclosure on personal devices. LDAP stands for lightweight directory access
protocol, which is a protocol for accessing and managing information stored in a directory service,
such as user names and passwords. LDAP does not directly address the issue of malware infection or
data disclosure on personal devices. SSO stands for single sign-on, which is a feature that allows
users to access multiple applications or services with one set of credentials. SSO may not prevent
malware infection or data disclosure on personal devices, and may even increase the risk if the
credentials are compromised.
Exam Dumps 162/269

https://www.nist.gov/news-events/news/2021/03/mobile-device-security-bring-your-own-device-
byod-draft-sp-1800-22

Question: 293

A technician is working on a way to register all employee badges and associated computer IDs.
Which of the following options should the technician use in order to achieve this objective?

A. Database system

B. Software management

C. Active Directory description

D. Infrastructure as a Service

Answer: A
Explanation:

A database system is a software application that allows storing, organizing, and managing data in a
structured way. A database system can be used to register all employee badges and associated
computer IDs by creating a table or a record for each employee that contains their badge number,
computer ID, name, and other relevant information. A database system can also facilitate searching,
updating, and deleting data as needed. Software management is a general term that refers to the
process of planning, developing, testing, deploying, and maintaining software applications. It does
not directly address the issue of registering employee badges and computer IDs. Active Directory
description is a field in Active Directory that can be used to store additional information about an
object, such as a user or a computer. It is not a software application that can be used to register
employee badges and computer IDs by itself. Infrastructure as a Service (IaaS) is a cloud computing
model that provides servers, storage, networking, and software over the internet. It does not directly
address the issue of registering employee badges and computer IDs either.
https://www.idcreator.com/

https://www.alphacard.com/photo-id-systems/card-type/employee-badges

Question: 294

An IT security team is implementing a new Group Policy that will return a computer to the login after
three minutes. Which of the following BEST describes the change in policy?

A. Login times
B. Screen lock
C. User permission
D. Login lockout attempts
Exam Dumps 163/269

Answer: B
Explanation:

Screen lock is a feature that returns a computer to the login screen after a period of inactivity,
requiring the user to enter their credentials to resume their session. Screen lock can be configured
using Group Policy settings, such as Screen saver timeout and Interactive logon: Machine inactivity
limit. Screen lock can help prevent unauthorized access to a computer when the user is away from
their desk. Login times are not a feature that returns a computer to the login screen, but a measure
of how long it takes for a user to log in to a system. User permission is not a feature that returns a
computer to the login screen, but a set of rights and privileges that determine what a user can do on
a system. Login lockout attempts are not a feature that returns a computer to the login screen, but a
security policy that locks out a user account after a number of failed login attempts.
https://woshub.com/windows-lock-screen-after-idle-via-gpo/

Question: 295

A technician needs to transfer a file to a user's workstation. Which of the following would BEST
accomplish this task utilizing the workstation's built-in protocols?

A. VPN

B. SMB

C. RMM

D. MSRA

Answer: B
Explanation:

SMB stands for Server Message Block, which is a network file sharing protocol that allows
applications on a computer to read and write to files and to request services from server programs in
a computer network. SMB is a built-in protocol in Windows operating systems and can be used to
transfer files between computers over a network. The technician can use SMB to access a file share
on the user’s workstation and copy the file to or from it. VPN stands for virtual private network,
which is a technology that creates a secure and encrypted connection over a public network. VPN is
not a built-in protocol in Windows operating systems and does not directly transfer files between
computers. RMM stands for remote monitoring and management, which is a type of software
solution that allows remote management and monitoring of devices and networks. RMM is not a
built-in protocol in Windows operating systems and does not directly transfer files between
computers. MSRA stands for Microsoft Remote Assistance, which is a feature that allows a user to
invite another user to view or control their computer remotely. MSRA is not a protocol, but an
application that uses Remote Desktop Protocol (RDP) to establish a connection. MSRA does not
directly transfer files between computers.
https://www.pcmag.com/picks/the-best-desktop-workstations
Exam Dumps 164/269

Question: 296

A customer called the help desk to report that a machine that was recently updated is no longer
working. The support technician checks the latest logs to see what updates were deployed, but
nothing was
deployed in more than three weeks. Which of the following should the support technician do to BEST
resolve the situation?

A. Offer to wipe and reset the device for the customer.

B. Advise that the help desk will investigate and follow up at a later date.

C. Put the customer on hold and escalate the call to a manager.

D. Use open-ended questions to further diagnose the issue.

Answer: D
Explanation:

Open-ended questions are questions that require more than a yes or no answer and encourage the
customer to provide more details and information. Using open-ended questions can help the support
technician to understand the problem better, identify the root cause, and find a suitable solution.
Some examples of open-ended questions are:
What exactly is not working on your machine?
When did you notice the problem?
How often does the problem occur?
What were you doing when the problem happened?
What have you tried to fix the problem?
Offering to wipe and reset the device for the customer is not a good option, as it may result in data
loss and inconvenience for the customer. It should be used as a last resort only if other
troubleshooting steps fail. Advising that the help desk will investigate and follow up at a later date is
not a good option, as it may leave the customer unsatisfied and frustrated. It should be used only if
the problem requires further research or escalation and cannot be resolved on the first call. Putting
the customer on hold and escalating the call to a manager is not a good option, as it may waste time
and resources. It should be used only if the problem is beyond the support technician’s scope or
authority and requires managerial intervention.

Question: 297

Which of the following is MOST likely used to run .vbs files on Windows devices?

A. winmgmt.exe

B. powershell.exe
Exam Dumps 165/269

C. cscript.exe

D. explorer.exe

Answer: C
Explanation:

A .vbs file is a Virtual Basic script written in the VBScript scripting language. It contains code that can
be executed within Windows via the Windows-based script host (Wscript.exe), to perform certain
admin and processing functions1. Cscript.exe is a command-line version of the Windows Script Host
that provides command-line options for setting script properties. Therefore, cscript.exe is most likely
used to run .vbs files on Windows devices. Reference: 1: https://fileinfo.com/extension/vbs :
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cscript

Question: 298

A user requires local administrative access to a workstation. Which of the following Control Panel
utilities allows the technician to grant access to the user?

A. System

B. Network and Sharing Center

C. User Accounts

D. Security and Maintenance

Answer: C
Explanation:

User Accounts is a Control Panel utility that allows the technician to manage user accounts and
groups on a local computer. The technician can use this utility to add a user to the local
administrators group, which grants the user local administrative access to the workstation. The other
options are not relevant for this task. Reference: : https://docs.microsoft.com/en-us/windows-
server/identity/ad-fs/operations/manage-user-accounts-and-groups

Question: 299
A user notices a small USB drive is attached to the user's computer after a new vendor visited the
office. The technician notices two files named grabber.exe and output.txt. Which of the following
attacks is MOST likely occurring?

A. Trojan
Exam Dumps 166/269

B. Rootkit

C. Cryptominer

D. Keylogger

Answer: D
Explanation:

A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote
attacker. A keylogger can be used to steal passwords, credit card numbers, personal information, and
other sensitive data. A keylogger can be delivered through a USB drive that contains a malicious
executable file, such as grabber.exe, and an output file that stores the captured keystrokes, such as
output.txt. The other options are not likely to use this method of attack. Reference: :
https://www.comptia.org/training/resources/exam-objectives/comptia-a-core-2-exam-objectives :
https://www.kaspersky.com/resource-center/definitions/keylogger

Question: 300

A user updates a mobile device's OS. A frequently used application becomes consistently
unresponsive immediately after the device is launched. Which of the following troubleshooting steps
should the user perform FIRST?

A. Delete the application's cache.

B. Check for application updates.

C. Roll back the OS update.

D. Uninstall and reinstall the application.

Answer: B
Explanation:

Checking for application updates is the first troubleshooting step that the user should perform,
because the application may not be compatible with the new OS version and may need an update to
fix the issue. Deleting the application’s cache, rolling back the OS update, or uninstalling and
reinstalling the application are possible solutions, but they are more time-consuming and disruptive
than checking for updates. Reference: : https://www.comptia.org/training/resources/exam-
objectives/comptia-a-core-2-exam-objectives : https://www.lifewire.com/how-to-update-apps-on-
android-4173855

Question: 301
A company is retiring old workstations and needs a certificate of destruction for all hard drives.
Which of the following would be BEST to perform on the hard drives to ensure the data is
unrecoverable? (Select TWO).
Exam Dumps 167/269

A. Standard formatting
B. Drilling
C. Erasing
D. Recycling
E. Incinerating
F. Low-level formatting

Answer: BE
Explanation:

Drilling and incinerating are physical destruction methods that make the data on hard drives
unrecoverable. Standard formatting, erasing and low-level formatting are logical methods that can
be reversed with data recovery tools. Recycling is not a destruction method at all. Verified Reference:
https://www.comptia.org/blog/what-is-a-certificate-of-destruction
https://www.comptia.org/certifications/a

Question: 302
A small-office customer needs three PCs to be configured in a network with no server. Which of the
following network types is the customer's BEST choice for this environment?

A. Workgroup network
B. Public network
C. Wide area network
D. Domain network

Answer: A
Explanation:

A workgroup network is a peer-to-peer network where each PC can share files and resources with
other PCs without a central server. A public network is a network that is accessible to anyone on the
internet. A wide area network is a network that spans a large geographic area, such as a country or a
continent. A domain network is a network where a server controls the access and security of the PCs.
Verified Reference: https://www.comptia.org/blog/network-types
https://www.comptia.org/certifications/a

Question: 303
A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the
following protocols is capable of enduring enhanced security?

A. DNS
B. IPS
C. VPN
D. SSH
Exam Dumps 168/269

Answer: C
Explanation:

A VPN (virtual private network) is a protocol that creates a secure tunnel between two devices over
the internet, hiding their IP addresses and encrypting their traffic. DNS (domain name system) is a
protocol that translates domain names to IP addresses. IPS (intrusion prevention system) is a device
that monitors and blocks malicious network traffic. SSH (secure shell) is a protocol that allows
remote access and command execution on another device. Verified Reference:
https://www.comptia.org/blog/what-is-a-vpn https://www.comptia.org/certifications/a

Question: 304
A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine
and needs to Investigate to determine the source of the traffic. Which of the following tools can the
administrator use to view which processes on the kiosk machine are connecting to the internet?

A. Resource Monitor
B. Performance Monitor
C. Command Prompt
D. System Information

Answer: A
Explanation:

Resource Monitor is a tool that shows the network activity of each process on a Windows machine,
including the TCP connections and the sent and received bytes. Performance Monitor is a tool that
shows the performance metrics of the system, such as CPU, memory, disk and network usage.
Command Prompt is a tool that allows running commands and scripts on a Windows machine.
System Information is a tool that shows the hardware and software configuration of a Windows
machine. Verified Reference: https://www.comptia.org/blog/how-to-use-resource-monitor
https://www.comptia.org/certifications/a

Question: 305
A developer receives the following error while trying to install virtualization software on a
workstation:
VTx not supported by system
Which of the following upgrades will MOST likely fix the issue?

A. Processor
B. Hard drive
C. Memory
D. Video card

Answer: A
Explanation:
Exam Dumps 169/269

The processor is the component that determines if the system supports virtualization technology
(VTx), which is required for running virtualization software. The hard drive, memory and video card
are not directly related to VTx support, although they may affect the performance of the virtual
machines. Verified Reference: https://www.comptia.org/blog/what-is-virtualization
https://www.comptia.org/certifications/a

Question: 306
A user's iPhone was permanently locked after several tailed login attempts. Which of the following
will restore access to the device?

A. Fingerprint and pattern


B. Facial recognition and PIN code
C. Primary account and password
D. Secondary account and recovery code

Answer: D
Explanation:

A secondary account and recovery code are used to reset the primary account and password on an
iPhone after it has been locked due to failed login attempts. Fingerprint, pattern, facial recognition
and PIN code are biometric or numeric methods that can be used to unlock an iPhone, but they are
not helpful if the device has been permanently locked. Verified Reference:
https://support.apple.com/en-us/HT204306 https://www.comptia.org/certifications/a

Question: 307
An Internet cafe has several computers available for public use. Recently, users have reported the
computers are much slower than they were the previous week. A technician finds the CPU is at 100%
utilization, and antivirus scans report no current infection. Which of the following is MOST likely
causing the issue?

A. Spyware is redirecting browser searches.


B. A cryptominer is verifying transactions.
C. Files were damaged from a cleaned virus infection.
D. A keylogger is capturing user passwords.

Answer: B
Explanation:

A cryptominer is a malicious program that uses the CPU resources of a computer to generate
cryptocurrency, such as Bitcoin or Ethereum. This can cause the CPU to run at 100% utilization and
slow down the system. Spyware, virus and keylogger are other types of malware, but they do not
necessarily cause high CPU usage. Verified Reference: https://www.comptia.org/blog/what-is-
cryptomining https://www.comptia.org/certifications/a

Question: 308
Exam Dumps 170/269

Which of the following physical security controls can prevent laptops from being stolen?

A. Encryption
B. LoJack
C. Multifactor authentication
D. Equipment lock
E. Bollards

Answer: D
Explanation:

An equipment lock is a physical security device that attaches a laptop to a fixed object, such as a desk
or a table, with a cable and a lock. This can prevent the laptop from being stolen by unauthorized
persons. Encryption, LoJack, multifactor authentication and bollards are other security measures, but
they do not physically prevent theft. Verified Reference: https://www.comptia.org/blog/physical-
security https://www.comptia.org/certifications/a

Question: 309
A user attempts to install additional software and receives a UAC prompt. Which of the following is
the BEST way to resolve this issue?

A. Add a user account to the local administrator's group.


B. Configure Windows Defender Firewall to allow access to all networks.
C. Create a Microsoft account.
D. Disable the guest account.

Answer: A
Explanation:

A user account that belongs to the local administrator’s group has the permission to install software
on a Windows machine. If a user receives a UAC (user account control) prompt when trying to install
software, it means the user does not have enough privileges and needs to enter an administrator’s
password or switch to an administrator’s account. Adding the user account to the local
administrator’s group can resolve this issue. Configuring Windows Defender Firewall, creating a
Microsoft account and disabling the guest account are not related to this issue. Verified Reference:
https://www.comptia.org/blog/user-account-control https://www.comptia.org/certifications/a

Question: 310
Which of the following wireless security features can be enabled lo allow a user to use login
credentials to attach lo available corporate SSIDs?

A. TACACS+
B. Kerberos
C. Preshared key
Exam Dumps 171/269

D. WPA2/AES

Answer: D
Explanation:

WPA2/AES (Wi-Fi Protected Access 2/Advanced Encryption Standard) is a wireless security standard
that supports enterprise mode, which allows a user to use login credentials (username and
password) to authenticate to available corporate SSIDs (service set identifiers). TACACS+ (Terminal
Access Controller Access-Control System Plus) and Kerberos are network authentication protocols,
but they are not wireless security features. Preshared key is another wireless security feature, but it
does not use login credentials. Verified Reference: https://www.comptia.org/blog/wireless-security-
standards https://www.comptia.org/certifications/a

Question: 311
Which of the following Is a package management utility for PCs that are running the Linux operating
system?

A. chmod
B. yum
C. man
D. grep

Answer: B
Explanation:

yum (Yellowdog Updater Modified) is a package management utility for PCs that are running the
Linux operating system. It can be used to install, update and remove software packages from
repositories. chmod (change mode) is a command that changes the permissions of files and
directories in Linux. man (manual) is a command that displays the documentation of other
commands in Linux. grep (global regular expression print) is a command that searches for patterns in
text files in Linux. Verified Reference: https://www.comptia.org/blog/linux-package-management
https://www.comptia.org/certifications/a

Question: 312
A malicious file was executed automatically when a flash drive was plugged in. Which of the
following features would prevent this type of incident?

A. Disabling UAC
B. Restricting local administrators
C. Enabling UPnP
D. Turning off AutoPlay

Answer: D
Exam Dumps 172/269

Explanation:

AutoPlay is a feature that automatically runs programs or files when a removable media device, such
as a flash drive, is plugged in. This can be exploited by malware authors who place malicious files on
flash drives that execute automatically when inserted into a computer. Turning off AutoPlay can
prevent this type of incident by requiring the user to manually open or run files from removable
media devices. Disabling UAC (user account control), restricting local administrators and enabling
UPnP (universal plug and play) are not effective ways to prevent this type of incident. Verified
Reference: https://www.comptia.org/blog/autoplay-security-risk
https://www.comptia.org/certifications/a

Question: 313
Which of the following protects a mobile device against unwanted access when it is left unattended?

A. PIN code
B. OS updates
C. Antivirus software
D. BYOD policy

Answer: A
Explanation:

A PIN code is a numeric password that protects a mobile device against unwanted access when it is
left unattended. It requires the user to enter the correct code before unlocking the device. OS
updates, antivirus software and BYOD policy are other security measures for mobile devices, but they
do not prevent unauthorized access when the device is left unattended. Verified Reference:
https://www.comptia.org/blog/mobile-device-security https://www.comptia.org/certifications/a

Question: 314
A user is unable to access a web-based application. A technician verifies the computer cannot access
any web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician
verifies the user can ping localhost. the gateway, and known IP addresses on the interne! and receive
a response. Which of the following Is the MOST likely reason tor the Issue?

A. A firewall is blocking the application.


B. The wrong VLAN was assigned.
C. The incorrect DNS address was assigned.
D. The browser cache needs to be cleared

Answer: C
Explanation:

DNS (domain name system) is a protocol that translates domain names to IP addresses. If the
computer has an incorrect DNS address assigned, it will not be able to resolve the domain names of
web-based applications and access them. A firewall, a VLAN (virtual local area network) and a
Exam Dumps 173/269

browser cache are not the most likely reasons for the issue, since the computer can ping known IP
addresses on the internet and receive a response. Verified Reference:
https://www.comptia.org/blog/what-is-dns https://www.comptia.org/certifications/a

Question: 315
A technician is trying to encrypt a single folder on a PC. Which of the following should the technician
use to accomplish this task?

A. FAT32
B. exFAT
C. BitLocker
D. EFS

Answer: D
Explanation:

EFS (Encrypting File System) is a feature that allows a user to encrypt a single folder or file on a
Windows PC. It uses a public key encryption system to protect the data from unauthorized access.
FAT32 and exFAT are file system formats that do not support encryption. BitLocker is a feature that
encrypts the entire drive, not a single folder or file. Verified Reference:
https://www.comptia.org/blog/what-is-efs https://www.comptia.org/certifications/a

Question: 316
A technician removed a virus from a user's device. The user returned the device a week later with
the same virus on it. Which of the following should the technician do to prevent future infections?

A. Disable System Restore.


B. Educate the end user.
C. Install the latest OS patches.
D. Clean the environment reinstallation.

Answer: B
Explanation:

Educating the end user is the best way to prevent future infections by viruses or other malware. The
technician should teach the user how to avoid risky behaviors, such as opening suspicious
attachments, clicking on unknown links, downloading untrusted software, etc. Disabling System
Restore, installing the latest OS patches and performing a clean installation are possible ways to
remove existing infections, but they do not prevent future ones. Verified Reference:
https://www.comptia.org/blog/how-to-prevent-malware https://www.comptia.org/certifications/a

Question: 317
A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of
the following Windows 10 settings should the technician recommend?
Exam Dumps 174/269

A. Personalization
B. Apps
C. Updates
D. Display

Answer: A
Explanation:

Personalization is a Windows 10 setting that allows a user to modify the desktop wallpaper, as well
as other aspects of the appearance and behavior of the desktop, such as colors, themes, sounds, etc.
Apps is a Windows 10 setting that allows a user to manage the installed applications and their
features. Updates is a Windows 10 setting that allows a user to check for and install the latest
updates for the OS and other components. Display is a Windows 10 setting that allows a user to
adjust the screen resolution, brightness, orientation, etc. Verified Reference:
https://www.comptia.org/blog/windows-10-settings https://www.comptia.org/certifications/a

Question: 318
A systems administrator installed the latest Windows security patch and received numerous tickets
reporting slow performance the next day. Which of the following should the administrator do to
resolve this issue?

A. Rebuild user profiles.


B. Roll back the updates.
C. Restart the services.
D. Perform a system file check.

Answer: B
Explanation:

Rolling back the updates is the best way to resolve the issue of slow performance caused by installing
the latest Windows security patch. This can be done by using the System Restore feature or by
uninstalling the specific update from the Control Panel. Rebuilding user profiles, restarting the
services and performing a system file check are not likely to fix the issue, since they do not undo the
changes made by the update. Verified Reference: https://www.comptia.org/blog/how-to-roll-back-
windows-updates https://www.comptia.org/certifications/a

Question: 319
A corporation purchased new computers for a school. The computers are the same make and model
and need to have the standard image loaded. Which of the following orchestration tools should a
desktop administrator use tor wide-scale deployment?

A. USB drive
B. DVD Installation media
C. PXE boot
Exam Dumps 175/269

D. Recovery partition

Answer: C
Explanation:

PXE (Preboot eXecution Environment) boot is an orchestration tool that allows a desktop
administrator to deploy a standard image to multiple computers over a network. It requires a PXE
server that hosts the image and a PXE client that boots from the network interface card (NIC). USB
drive and DVD installation media are not orchestration tools, but manual methods of installing an
image on each computer individually. Recovery partition is not an orchestration tool, but a hidden
partition on the hard drive that contains an image of the factory settings. Verified Reference:
https://www.comptia.org/blog/what-is-pxe-boot https://www.comptia.org/certifications/a

Question: 320
Every time a user tries to open the organization's proprietary application on an Android tablet, the
application immediately closes. Other applications are operating normally. Which of the following
troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

A. Uninstalling the application


B. Gaining root access to the tablet
C. Resetting the web browser cache
D. Deleting the application cache
E. Clearing the application storage
F. Disabling mobile device management

Answer: AE
Explanation:

Uninstalling and reinstalling the application can resolve the issue of it crashing immediately on an
Android tablet, as it can fix any corrupted or missing files or settings. Clearing the application storage
can also resolve the issue, as it can free up space and remove any conflicting data. Gaining root
access to the tablet, resetting the web browser cache, deleting the application cache and disabling
mobile device management are not likely to resolve the issue, as they do not affect how the
application runs. Verified Reference: https://www.comptia.org/blog/how-to-fix-android-apps-
crashing https://www.comptia.org/certifications/a

Question: 321
A user's permissions are limited to read on a shared network folder using NTFS security settings.
Which of the following describes this type of security control?

A. SMS
B. MFA
C. ACL
D. MDM
Exam Dumps 176/269

Answer: C
Explanation:

ACL (access control list) is a security control that describes what permissions a user or group has on a
shared network folder using NTFS (New Technology File System) security settings. It can be used to
grant or deny read, write, modify, delete or execute access to files and folders. SMS (short message
service), MFA (multifactor authentication), MDM (mobile device management) are not security
controls that apply to shared network folders. Verified Reference:
https://www.comptia.org/blog/what-is-an-acl https://www.comptia.org/certifications/a

Question: 322
A company is looking lot a solution that provides a backup for all data on the system while providing
the lowest impact to the network. Which of the following backup types will the company MOST likely
select?

A. Off-site
B. Synthetic
C. Full
D. Differential

Answer: B
Explanation:

A synthetic backup is a backup type that provides a backup for all data on the system while providing
the lowest impact to the network. It combines a full backup with one or more incremental backups to
create a single backup set, without requiring access to the original data source. Off-site is a backup
location, not a backup type. Full and differential are backup types, but they have a higher impact on
the network than synthetic. Verified Reference: https://www.comptia.org/blog/what-is-a-synthetic-
backup https://www.comptia.org/certifications/a

Question: 323

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following
tools should the technician use?

A. Disk Cleanup
B. Resource Monitor
C. Disk Defragment
D. Disk Management

Answer: A
Explanation:

Disk Cleanup is a tool that can free up some space on a system drive that is nearly full. It can delete
temporary files, cached files, recycle bin files, old system files and other unnecessary data. Resource
Monitor is a tool that shows the network activity of each process on a Windows machine. Disk
Exam Dumps 177/269

Defragment is a tool that optimizes the performance of a hard drive by rearranging the data into
contiguous blocks. Disk Management is a tool that allows creating, formatting, resizing and deleting
partitions on a hard drive. Verified Reference: https://www.comptia.org/blog/how-to-use-disk-
cleanup https://www.comptia.org/certifications/a

Question: 324
A technician needs to establish a remote access session with a user who has a Windows workstation.
The session must allow for simultaneous viewing of the workstation by both the user and technician.
Which of the following remote access technologies should be used?

A. RDP
B. VPN
C. SSH
D. MSRA

Answer: D
Explanation:

MSRA (Microsoft Remote Assistance) is a remote access technology that allows a technician to
establish a session with a user who has a Windows workstation. The session allows for simultaneous
viewing of the workstation by both the user and technician, as well as remote control and file
transfer capabilities. RDP (remote desktop protocol) is another remote access technology, but it does
not allow simultaneous viewing by default. VPN (virtual private network) and SSH (secure shell) are
protocols that create secure tunnels between two devices over the internet, but they do not allow
remote access sessions. Verified Reference: https://www.comptia.org/blog/what-is-msra
https://www.comptia.org/certifications/a

Question: 325
A technician is selling up a newly built computer. Which of the following is the FASTEST way for the
technician to install Windows 10?

A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation

Answer: D
Explanation:

An unattended installation is the fastest way to install Windows 10 on a newly built computer. It uses
an answer file that contains all the configuration settings and preferences for the installation, such as
language, product key, partition size, etc. It does not require any user interaction or input during the
installation process. Factory reset, System Restore and in-place upgrade are not methods of installing
Windows 10 on a new computer, but ways of restoring or updating an existing Windows installation.
Verified Reference: https://www.comptia.org/blog/what-is-an-unattended-installation
Exam Dumps 178/269

https://www.comptia.org/certifications/a

Question: 326
A systems administrator notices that a server on the company network has extremely high CPU
utilization. Upon further inspection, the administrator sees that the server Is consistently
communicating with an IP address that is traced back to a company that awards digital currency for
solving hash algorithms. Which of the following was MOST likely used to compromise the server?

A. Keylogger
B. Ransomware
C. Boot sector virus
D. Cryptomining malware

Answer: D
Explanation:

Cryptomining malware is a type of malicious program that uses the CPU resources of a compromised
server to generate cryptocurrency, such as Bitcoin or Ethereum. It can cause extremely high CPU
utilization and network traffic to the IP address of the cryptocurrency service. Keylogger, ransomware
and boot sector virus are other types of malware, but they do not cause the same symptoms as
cryptomining malware. Verified Reference: https://www.comptia.org/blog/what-is-cryptomining
https://www.comptia.org/certifications/a

Question: 327
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician
notices the OS Is several versions out of date. The user Is unaware the OS version is not current
because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

A. The device does not have enough free space lo download the OS updates.
B. The device needs domain administrator confirmation to update to a major release.
C. The device is not compatible with the newest version of the OS.
D. The device is restricted from updating due to a corporate security policy.

Answer: D
Explanation:

A corporate security policy can restrict a corporate-managed mobile device from updating its OS
automatically, even if the auto-update feature is turned on. This can be done to prevent
compatibility issues, security risks or performance problems caused by untested or unwanted
updates. The device administrator can control when and how the updates are applied to the device.
The device not having enough free space, needing domain administrator confirmation or being
incompatible with the newest version of the OS are not likely causes of the issue, since the user
would receive an error message or a notification in those cases. Verified Reference:
https://www.comptia.org/blog/mobile-device-management
https://www.comptia.org/certifications/a
Exam Dumps 179/269

Question: 328

A user is receiving repeated pop-up advertising messages while browsing the internet. A malware
scan Is unable to locate the source of an infection. Which of the following should the technician
check NEXT?

A. Windows updates
B. DNS settings
C. Certificate store
D. Browser plug-ins

Answer: D
Explanation:

Browser plug-ins are software components that add functionality to a web browser, such as playing
videos, displaying animations, etc. However, some browser plug-ins can also be malicious or
compromised and cause unwanted pop-up advertising messages while browsing the internet. A
malware scan may not be able to locate the source of the infection if it is hidden in a browser plug-in.
Windows updates, DNS settings and certificate store are not likely sources of pop-up advertising
messages. Verified Reference: https://www.comptia.org/blog/browser-security
https://www.comptia.org/certifications/a

Question: 329
Which of The following refers to the steps to be taken if an Issue occurs during a change
Implementation?

A. Testing
B. Rollback
C. Risk
D. Acceptance

Answer: B
Explanation:

Rollback refers to the steps to be taken if an issue occurs during a change implementation. It means
restoring the system to its previous state before the change was applied, using backup data or
configuration files. It can minimize the impact and downtime caused by a failed change. Testing
refers to the steps to be taken before a change implementation, to verify that the change works as
expected and does not cause any errors or conflicts. Risk refers to the potential negative
consequences of a change implementation, such as data loss, security breach, performance
degradation, etc. Acceptance refers to the steps to be taken after a change implementation, to
confirm that the change meets the requirements and expectations of the stakeholders. Verified
Reference: https://www.comptia.org/blog/change-management-process
https://www.comptia.org/certifications/a
Exam Dumps 180/269

Question: 330

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is
also very dim when not plugged in to an outlet Everything else seems to be functioning normally.
Which of the following Windows settings should be configured?

A. Power Plans
B. Hibernate
C. Sleep/Suspend
D. Screensaver

Answer: A
Explanation:

Power Plans are Windows settings that allow a user to configure how a laptop’s screen behaves
when plugged in or running on battery power. They can adjust the screen brightness and the time
before the screen turns off due to inactivity. Hibernate, Sleep/Suspend and Screensaver are other
Windows settings that affect how a laptop’s screen behaves, but they do not allow changing the
screen brightness or turning off time. Verified Reference: https://www.comptia.org/blog/windows-
power-plans https://www.comptia.org/certifications/a

Question: 331
Which of the following security methods supports the majority of current Wi-Fi-capable devices
without sacrificing security?

A. WPA3
B. MAC filleting
C. RADIUS
D. TACACS+

Answer: A
Explanation:

WPA3 (Wi-Fi Protected Access 3) is a wireless security method that supports the majority of current
Wi-Fi-capable devices without sacrificing security. It is backward compatible with WPA2 devices and
offers enhanced encryption and authentication features. MAC filtering is another wireless security
method, but it can be easily bypassed by spoofing MAC addresses. RADIUS (Remote Authentication
Dial-In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) are
network authentication protocols, but they are not wireless security methods by themselves.
Verified Reference: https://www.comptia.org/blog/wireless-security-standards
https://www.comptia.org/certifications/a

Question: 332
Which of the following macOS utilities uses AES-128 to encrypt the startup disk?
Exam Dumps 181/269

A. fdisk
B. Diskpart
C. Disk Utility
D. FileVault

Answer: D
Explanation:

FileVault is a macOS utility that uses AES-128 (Advanced Encryption Standard) to encrypt the startup
disk of a Mac computer. It protects the data from unauthorized access if the computer is lost or
stolen. fdisk and Diskpart are disk partitioning utilities for Linux and Windows, respectively. Disk
Utility is another macOS utility that can perform disk management tasks, such as formatting, resizing,
repairing, etc. Verified Reference: https://www.comptia.org/blog/what-is-filevault
https://www.comptia.org/certifications/a

Question: 333
A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license.
The user is not sure how to upgrade the OS. Which of the following should the technician do to apply
this license?

A. Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.


B. Redeem the included activation key card for a product key.
C. Insert a Windows USB hardware dongle and initiate activation.
D. Activate with the digital license included with the device hardware.

Answer: B
Explanation:

Redeeming the included activation key card for a product key is the correct way to apply a Windows
10 Pro license to a computer that has Windows 10 Home installed. The activation key card is a
physical or digital card that contains a 25-digit code that can be used to activate Windows 10 Pro
online or by phone. Copying the windows.lie file, inserting a Windows USB hardware dongle and
activating with the digital license are not valid methods of applying a Windows 10 Pro license.
Verified Reference: https://www.comptia.org/blog/how-to-upgrade-windows-10-home-to-pro
https://www.comptia.org/certifications/a

Question: 334
A user is unable to access files on a work PC after opening a text document. The text document was
labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the
following should a support technician do FIRST?

A. Quarantine the host in the antivirus system.


B. Run antivirus scan tor malicious software.
C. Investigate how malicious software was Installed.
D. Reimage the computer.
Exam Dumps 182/269

Answer: B
Explanation:

Running an antivirus scan for malicious software is the first step that a support technician should do
when a user reports a virus on a PC. The antivirus scan can detect and remove the virus, as well as
prevent further damage or infection. Quarantining the host, investigating how the malware was
installed and reimaging the computer are possible steps that can be done after running the antivirus
scan, depending on the situation and the results of the scan. Verified Reference:
https://www.comptia.org/blog/how-to-remove-a-virus https://www.comptia.org/certifications/a

Question: 335
Which of the following Is used to identify potential issues with a proposed change poor lo
implementation?

A. Request form
B. Rollback plan
C. End-user acceptance
D. Sandbox testing

Answer: D
Explanation:

Sandbox testing is a method of identifying potential issues with a proposed change prior to
implementation. It involves creating a simulated or isolated environment that mimics the real system
and applying the change to it. This can help to verify that the change works as expected and does not
cause any errors or conflicts. Request form, rollback plan and end-user acceptance are other
components of a change management process, but they do not involve identifying issues with a
change. Verified Reference: https://www.comptia.org/blog/what-is-sandbox-testing
https://www.comptia.org/certifications/a

Question: 336
Which of the following operating systems is considered closed source?

A. Ubuntu
B. Android
C. CentOS
D. OSX

Answer: D
Explanation:

OSX (now macOS) is an operating system that is considered closed source, meaning that its source
code is not publicly available or modifiable by anyone except its developers. It is owned and
maintained by Apple Inc. Ubuntu, Android and CentOS are operating systems that are considered
Exam Dumps 183/269

open source, meaning that their source code is publicly available and modifiable by anyone who
wants to contribute or customize them. Verified Reference: https://www.comptia.org/blog/open-
source-vs-closed-source-software https://www.comptia.org/certifications/a

Question: 337
The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's
handling of evidence. Which of the following was MOST likely violated during the investigation?

A. Open-source software
B. EULA
C. Chain of custody
D. AUP

Answer: C
Explanation:

Chain of custody is a process that documents how evidence is collected, handled, stored and
transferred during a cybercrime investigation. It ensures that the evidence is authentic, reliable and
admissible in court. If the chain of custody is violated during an investigation, it can compromise the
integrity of the evidence and lead to the case being dismissed. Open-source software, EULA (end-
user license agreement) and AUP (acceptable use policy) are not related to cybercrime investigations
or evidence handling. Verified Reference: https://www.comptia.org/blog/what-is-chain-of-custody
https://www.comptia.org/certifications/a

Question: 338
A remote user is having issues accessing an online share. Which of the following tools would MOST
likely be used to troubleshoot the Issue?

A. Screen-sharing software
B. Secure shell
C. Virtual private network
D. File transfer software

Answer: A
Explanation:

Screen-sharing software is a tool that allows a technician to remotely view and control a user’s
screen over the internet. It can be used to troubleshoot issues with accessing an online share, as well
as other problems that require visual inspection or guidance. Secure shell (SSH) is a protocol that
allows remote access and command execution on another device, but it does not allow screen-
sharing. Virtual private network (VPN) is a protocol that creates a secure tunnel between two devices
over the internet, but it does not allow remote troubleshooting. File transfer software is a tool that
allows transferring files between two devices over the internet, but it does not allow screen-sharing.
Verified Reference: https://www.comptia.org/blog/what-is-screen-sharing-software
https://www.comptia.org/certifications/a
Exam Dumps 184/269

Question: 339

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software,
and the PC begins performing extremely slow. Which of the following steps should the technician
take to resolve the issue?

A. Uninstall one antivirus software program and install a different one.


B. Launch Windows Update, and then download and install OS updates
C. Activate real-time protection on both antivirus software programs
D. Enable the quarantine feature on both antivirus software programs.
E. Remove the user-installed antivirus software program.

Answer: E
Explanation:

Removing the user-installed antivirus software program is the best way to resolve the issue of
extremely slow performance caused by installing additional real-time protection antivirus software
on a PC. Having more than one antivirus software program running at the same time can cause
conflicts, resource consumption and performance degradation. Uninstalling one antivirus software
program and installing a different one, activating real-time protection on both antivirus software
programs, enabling the quarantine feature on both antivirus software programs and launching
Windows Update are not effective ways to resolve the issue. Verified Reference:
https://www.comptia.org/blog/why-you-shouldnt-run-multiple-antivirus-programs-at-the-same-
time https://www.comptia.org/certifications/a

Question: 340
A technician received a call from a user who clicked on a web advertisement Now. every time the
user moves the mouse, a pop-up display across the monitor. Which of the following procedures
should the technician perform?

A. Boot into safe mode.


B. Perform a malware scan.
C. Restart the machine.
D. Reinstall the browser

Answer: AB
Explanation:

Booting into safe mode and performing a malware scan are the steps that a technician should
perform when troubleshooting an issue with pop-up advertising messages on a PC. Safe mode is a
diagnostic mode that starts the PC with minimal drivers and services, which can prevent the pop-up
malware from running. Malware scan is a tool that can detect and remove the pop-up malware, as
well as prevent further infection or damage. Investigating how the malware was installed, reinstalling
the browser and restarting the machine are possible steps that can be done after booting into safe
mode and performing a malware scan, depending on the situation and the results of the scan.
Exam Dumps 185/269

Verified Reference: https://www.comptia.org/blog/how-to-boot-into-safe-mode


https://www.comptia.org/certifications/a

Question: 341
A systems administrator is experiencing Issues connecting from a laptop to the corporate network
using PKI. Which to the following tools can the systems administrator use to help remediate the
issue?

A. certmgr.msc
B. msconfig.exe
C. lusrmgr.msc
D. perfmon.msc

Answer: A
Explanation:

certmgr.msc is a tool that can be used to troubleshoot issues with PKI (public key infrastructure) on a
Windows machine. It allows a system administrator to view, manage and import certificates, as well
as check their validity, expiration and revocation status. msconfig.exe, lusrmgr.msc and perfmon.msc
are other tools that can be used for different purposes on a Windows machine, but they are not
related to PKI. Verified Reference: https://www.comptia.org/blog/what-is-certmgr-msc
https://www.comptia.org/certifications/a

Question: 342
An application user received an email indicating the version of the application currently in use will no
longer be sold. Users with this version of the application will no longer receive patches or updates
either. Which of the following indicates a vendor no longer supports a product?

A. AUP
B. EULA
C. EOL
D. UAC

Answer: C
Explanation:

EOL (end-of-life) is a term that indicates a vendor no longer supports a product. It means that the
product will no longer be sold, updated or patched by the vendor, and that the users should migrate
to a newer version or alternative product. AUP (acceptable use policy), EULA (end-user license
agreement) and UAC (user account control) are not terms that indicate a vendor no longer supports
a product. Verified Reference: https://www.comptia.org/blog/what-is-end-of-life
https://www.comptia.org/certifications/a

Question: 343
Exam Dumps 186/269

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The
technician thinks that background services may be using extra bandwidth. Which of the following
tools should the technician use to investigate connections on the laptop?

A. nslookup
B. net use
C. netstat
D. net user

Answer: C
Explanation:

netstat is a tool that can be used to investigate connections on a Windows machine. It displays
information about the active TCP connections, listening ports, routing tables, network statistics, etc.
nslookup is a tool that can be used to query DNS servers and resolve domain names to IP addresses.
net use is a tool that can be used to connect or disconnect network drives or printers. net user is a
tool that can be used to create or modify user accounts on a Windows machine. Verified Reference:
https://www.comptia.org/blog/what-is-netstat https://www.comptia.org/certifications/a

Question: 344
Which of the following common security vulnerabilities can be mitigated by using input validation?

A. Brute-force attack
B. Cross-site scripting
C. SQL injection
D. Cross-site request forgery

Answer: BC
Explanation:

Cross-site scripting (XSS) and SQL injection are common security vulnerabilities that can be mitigated
by using input validation. Input validation is a technique that checks the user input for any malicious
or unexpected characters or commands before processing it. XSS is an attack that injects malicious
scripts into web pages to steal cookies, session tokens or other sensitive information from users or
web servers. SQL injection is an attack that injects malicious SQL statements into web applications to
manipulate databases, execute commands or access unauthorized data. Verified Reference:
https://www.comptia.org/blog/what-is-input-validation https://www.comptia.org/certifications/a

Question: 345
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The
meeting presenters are unable to play a video with sound. The following error is received:
The Audio Driver is not running.
Which of the following will MOST likely resolve the issue?

A. compmgmt.msc
Exam Dumps 187/269

B. regedit.exe
C. explorer.exe
D. taskmgt.exe
E. gpmc.msc
F. services.msc

Answer: F
Explanation:

services.msc is a tool that can be used to resolve the issue of “The Audio Driver is not running” on a
Windows machine. It allows a technician to view, start, stop and configure the services that run on
the system, such as the Windows Audio service. compmgmt.msc, regedit.exe, explorer.exe,
taskmgt.exe and gpmc.msc are other tools that can be used for different purposes on a Windows
machine, but they are not related to audio drivers or services. Verified Reference:
https://www.comptia.org/blog/what-is-services-msc https://www.comptia.org/certifications/a

Question: 346
A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user
togged in to the laptop with a simple password. and no other security mechanisms were in place.
Which of the following would MOST likely prevent the stored data from being recovered?

A. Biometrics
B. Full disk encryption
C. Enforced strong system password
D. Two-factor authentication

Answer: B
Explanation:

Full disk encryption is a security mechanism that encrypts the entire data on a hard drive, making it
unreadable without the correct decryption key or password. It can prevent the stored data from
being recovered by unauthorized persons who steal or access the laptop. Biometrics, enforced strong
system password and two-factor authentication are other security mechanisms, but they only
protect the login access to the laptop, not the data on the hard drive. Verified Reference:
https://www.comptia.org/blog/what-is-full-disk-encryption
https://www.comptia.org/certifications/a

Question: 347

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile
device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to
resolve the issue?

A. Restart the mobile device.


Exam Dumps 188/269

B. Turn on airplane mode.

C. Check that the accessory is ready to pair.

D. Clear all devices from the phone's Bluetooth settings.

Answer: C
Explanation:

The first step in troubleshooting a Bluetooth connection issue is to check that the accessory is ready
to pair with the mobile device. Some accessories may have a button or a switch that needs to be
pressed or turned on to initiate pairing mode. If the accessory is not ready to pair, the mobile device
will not be able to detect it.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 2.4

Question: 348
An administrator is designing and implementing a server backup system that minimizes the capacity
of storage used. Which of the following is the BEST backup approach to use in conjunction with
synthetic full backups?

A. Differential

B. Open file

C. Archive

D. Incremental

Answer: D
Explanation:

Incremental backups are backups that only include the changes made since the last backup, whether
it was a full or an incremental backup. Incremental backups minimize the capacity of storage used
and are often used in conjunction with synthetic full backups, which are backups that combine a full
backup and subsequent incremental backups into a single backup set.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 3.3

Question: 349
Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

A. A forgotten keychain password

B. An employee's Apple ID used on the device

C. An operating system that has been jailbroken


Exam Dumps 189/269

D. An expired screen unlock code

Answer: B
Explanation:

Activation Lock is a feature that prevents anyone from erasing or activating an iOS device without the
owner’s Apple ID and password. If a corporate-owned iOS device is linked to an employee’s Apple ID,
it will have an Activation Lock issue when the employee leaves the company or forgets their Apple ID
credentials.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 4.1

Question: 350
A technician discovers user input has been captured by a malicious actor. Which of the following
malware types is MOST likely being used?

A. Cryptominers
B. Rootkit
C. Spear phishing
D. Keylogger

Answer: D
Explanation:

A keylogger is a type of malware that captures user input, such as keystrokes, mouse clicks, and
clipboard data, and sends it to a malicious actor. Keyloggers can be used to steal passwords, credit
card numbers, personal information, and other sensitive data.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 5.1

Question: 351
Windows updates need to be performed on a department's servers. Which of the following methods
should be used to connect to the server?

A. FIP

B. MSRA

C. RDP

D. VPN

Answer: C
Explanation:

RDP (Remote Desktop Protocol) is a protocol that allows a user to connect to and control a remote
Exam Dumps 190/269

computer over a network. RDP can be used to perform Windows updates on a department’s servers
without physically accessing them.
Reference: CompTIA A+ Core 2 Exam Objectives, Section 5.6

Question: 352
A salesperson's computer is unable to print any orders on a local printer that is connected to the
computer Which of the following tools should the salesperson use to restart the print spooler?

A. Control Panel

B. Processes

C. Startup

D. Services

Answer: D
Explanation:

The correct answer is D) Services. The print spooler is a service that manages the print queue and
sends print jobs to the printer. To restart the print spooler, the salesperson can use the Services app,
which allows them to stop and start the service. Alternatively, they can also use the Task Manager or
the Command Prompt to restart the print spooler.
Reference and
The Services app is a tool that displays all the services that are running on the computer. It can be
accessed by typing services.msc in the Run window or by searching for Services in the Start menu.
The Services app allows users to start, stop, restart, or configure any service, including the print
spooler123.
The Task Manager is a tool that shows information about the processes, applications, and services
that are running on the computer. It can be accessed by pressing Ctrl + Shift + Esc or by right-clicking
on the taskbar and selecting Task Manager. The Task Manager allows users to start, stop, or restart
any service by going to the Services tab and right-clicking on the service name12.
The Command Prompt is a tool that allows users to execute commands and perform tasks using text
input. It can be accessed by typing cmd in the Run window or by searching for Command Prompt in
the Start menu. The Command Prompt allows users to start, stop, or restart any service by using the
net command with the service name. For example, to restart the print spooler, users can type net
stop spooler and then net start spooler1.
The Control Panel is a tool that provides access to various settings and options for the computer. It
can be accessed by typing control panel in the Run window or by searching for Control Panel in the
Start menu. The Control Panel does not allow users to restart the print spooler directly, but it can be
used to access other tools such as Devices and Printers, Troubleshooting, or Administrative Tools2.
The Processes tab is a part of the Task Manager that shows information about the processes that are
running on the computer. It can be accessed by opening the Task Manager and selecting the
Processes tab. The Processes tab does not allow users to restart the print spooler directly, but it can
be used to end any process that is related to printing or causing problems with the print spooler2.
Exam Dumps 191/269

The Startup tab is a part of the Task Manager that shows information about the programs that run
automatically when the computer starts. It can be accessed by opening the Task Manager and
selecting the Startup tab. The Startup tab does not allow users to restart the print spooler directly,
but it can be used to disable or enable any program that affects printing or interferes with the print
spooler2.

Question: 353
A change advisory board authorized a setting change so a technician is permitted to Implement the
change. The technician successfully implemented the change. Which of the following should be done
next?

A. Document the date and time of change

B. Document the purpose of the change.

C. Document the risk level.

D. Document the findings of the sandbox test,

Answer: A
Explanation:
The correct answer is
A) Document the date and time of change. After implementing a change, the technician should
document the date and time of change in the change log or record. This helps to track the change
history, monitor the change performance, and identify any issues or incidents related to the change.
Documenting the date and time of change is also a good practice for auditing and compliance
purposes.
Documenting the purpose of the change (B) and the risk level © are steps that should be done before
implementing the change, not after. These are important information that help to justify, prioritize,
and plan the change. The purpose of the change should explain why the change is needed and what
benefits it will bring to the organization. The risk level should assess the potential impact and
probability of the change causing any problems or disruptions to the business.
Documenting the findings of the sandbox test (D) is also a step that should be done before
implementing the change, not after. A sandbox test is a way of testing the change in an isolated
environment that mimics the production environment. This helps to verify that the change works as
expected and does not cause any errors or conflicts with other systems or processes. The findings of
the sandbox test should be documented and reviewed by the change advisory board (CAB) before
approving the change for implementation.
Reference:
What is a Change Advisory Board? (Overview, Roles, and Responsibilities)
Best Practices in Change Management
10 Top change management best practices

Question: 354
Which of the following macOS features can help a user close an application that has stopped
Exam Dumps 192/269

responding?

A. Finder

B. Mission Control

C. System Preferences

D. Force Quit

Answer: D
Explanation:

The correct answer is D) Force Quit. Force Quit is a macOS feature that allows users to close an
application that has stopped responding. To use Force Quit, users can press and hold Option (or Alt),
Command, and Esc (Escape) keys together, or choose Force Quit from the Apple menu in the corner
of the screen. A Force Quit window will open, where users can select the application that they want
to close and click Force Quit123.
Reference and
The web search results provide information about how to force an app to quit on Mac using different
methods, such as keyboard shortcuts, mouse clicks, or menu options. The results also explain what
to do if the app cannot be forced to quit or if the Mac does not respond.
The first result1 is from the official Apple Support website and provides detailed instructions and
screenshots on how to force an app to quit on Mac using the keyboard shortcut or the Apple menu. It
also explains how to force quit the Finder app and how to restart or turn off the Mac if needed.
The second result2 is from the same website but for a different region (UK). It has the same content
as the first result but with some minor differences in spelling and wording.
The third result4 is from a website called Lifehacker that provides tips and tricks for various topics,
including technology. It compares how to close a program that is not responding on different
operating systems, such as Windows, Mac, and Linux. It briefly mentions how to force quit an app on
Mac using the keyboard shortcut or the mouse click.
The fourth result3 is from a website called Parallels that provides software solutions for running
Windows on Mac. It focuses on how to force quit an app on Mac using the keyboard shortcut and
provides a video tutorial and a screenshot on how to do it. It also suggests some alternative ways to
close an app that is not responding, such as using Activity Monitor or Terminal commands.

Question: 355

A department manager submits a help desk ticket to request the migration of a printer's port
utilization from USB to Ethernet so multiple users can access the printer. This will be a new network
printer, thus a new IP address allocation is required. Which of the following should happen
Immediately before network use is authorized?

A. Document the date and time of the change.


Exam Dumps 193/269

B. Submit a change request form

C. Determine the risk level of this change

D. Request an unused IP address.

Answer: B
Explanation:
The correct answer is B) Submit a change request form. A change request form is a document that
describes the proposed change, the reason for the change, the expected benefits and impacts, the
risks and mitigation strategies, the implementation plan, and the approval process. A change request
form is an essential part of change management best practices, as it helps to ensure that the change
is well-planned, communicated, and authorized before it is implemented12.
A change request form should be submitted immediately before network use is authorized, because
it provides the necessary information and justification for the change to the relevant stakeholders,
such as the network administrator, the IT manager, and the department manager. The change
request form also allows the stakeholders to review and approve or reject the change, or request
more information or modifications. The change request form also serves as a record of the change
history and status12.

Question: 356
A PC is taking a long time to boot Which of the following operations would be best to do to resolve
the issue at a minimal expense? (Select two).

A. Installing additional RAM

B. Removing the applications from startup

C. Installing a faster SSD

D. Running the Disk Cleanup utility

E. Defragmenting the hard drive

F. Ending the processes in the Task Manager

Answer: BD
Explanation:
The best operations to do to resolve the issue of a long boot time at a minimal expense are B.
Removing the applications from startup and D. Running the Disk Cleanup utility. These are two
simple and effective ways to speed up your PC’s boot time without spending any money on hardware
upgrades.
Removing the applications from startup means preventing unnecessary programs from launching
automatically when you turn on your computer. This can reduce the load on your system resources
Exam Dumps 194/269

and make the boot process faster. You can do this in Windows 10 by pressing Ctrl + Alt + Esc to open
the Task Manager, and going to the Startup tab. There, you can see a list of programs that start with
your computer, and their impact on the startup performance. You can disable any program that you
don’t need by right-clicking on it and choosing Disable12.
Running the Disk Cleanup utility means deleting temporary files, system files, and other unnecessary
data that may be taking up space and slowing down your computer. This can free up some disk space
and improve the performance of your system. You can do this in Windows 10 by typing disk cleanup
in the search box and selecting the Disk Cleanup app. There, you can choose which files you want to
delete, such as Recycle Bin, Temporary Internet Files, Thumbnails, etc. You can also click on Clean up
system files to delete more files, such as Windows Update Cleanup, Previous Windows
installation(s), etc34.

Question: 357
A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic
Which of the following types of infections are the workstations most likely experiencing? (Select two)

A. Zombies

B. Keylogger

C. Adware

D. Botnet

E. Ransomvvare

F. Spyware

Answer: AD
Explanation:
The correct answers are A and D) Zombies and botnets are types of infections that allow malicious
actors to remotely control infected computers and use them to launch distributed denial-of-service
(DDoS) attacks against a target. A DDoS attack is a type of cyberattack that aims to overwhelm a
server or a network with a large volume of traffic from multiple sources, causing it to slow down or
crash.
A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote
server, often for the purpose of stealing passwords, credit card numbers, or other sensitive
information.
Adware is a type of software that displays unwanted advertisements on a user’s computer, often in
the form of pop-ups, banners, or redirects. Adware can also collect user data and compromise the
security and performance of the system.
Ransomware is a type of malware that encrypts the files or locks the screen of a user’s computer and
demands a ransom for their restoration. Ransomware can also threaten to delete or expose the
user’s data if the ransom is not paid.
Spyware is a type of software that covertly monitors and collects information about a user’s online
activities, such as browsing history, search queries, or personal data. Spyware can also alter the
Exam Dumps 195/269

settings or functionality of the user’s system without their consent.

Question: 358
A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which
of the following components should the developer upgrade to improve the hypervisor’s
performance?

A. Amount of system RAM

B. NIC performance

C. Storage IOPS

D. Dedicated GPU

Answer: A
Explanation:

The correct answer is A) Amount of system RAM. A Type 2 hypervisor is a virtualization software that
runs on top of a host operating system, which means it shares the system resources with the host OS
and other applications. Therefore, increasing the amount of system RAM can improve the
performance of the hypervisor and the virtual machines running on it. RAM is used to store data and
instructions that are frequently accessed by the CPU, and having more RAM can reduce the need for
swapping data to and from the storage device, which is slower than RAM.
NIC performance, storage IOPS, and dedicated GPU are not as relevant for improving the
hypervisor’s performance in this scenario. NIC performance refers to the speed and quality of the
network interface card, which is used to connect the computer to a network. Storage IOPS refers to
the number of input/output operations per second that can be performed by the storage device,
which is a measure of its speed and efficiency. Dedicated GPU refers to a separate graphics
processing unit that can handle complex graphics tasks, such as gaming or video editing. These
components may affect other aspects of the computer’s performance, but they are not directly
related to the hypervisor’s ability to compile new source code.

Question: 359

A technician is setting up a newly built computer. Which of the following is the fastest way for the
technician to install Windows 10?

A. Factory reset

B. System Restore

C. In-place upgrade
Exam Dumps 196/269

D. Unattended installation

Answer: D
Explanation:

The correct answer is D) Unattended installation. An unattended installation is a way of installing


Windows 10 without requiring any user input or interaction. It uses a configuration file called answer
file that contains the settings and preferences for the installation, such as the product key, language,
partition, and network settings. An unattended installation can be performed by using a bootable
USB flash drive or DVD that contains the Windows 10 installation files and the answer file1. This is
the fastest way for the technician to install Windows 10 on a newly built computer, as it automates
the whole process and saves time.
A factory reset is a way of restoring a computer to its original state by deleting all the data and
applications and reinstalling the operating system. A factory reset can be performed by using the
recovery partition or media that came with the computer, or by using the Reset this PC option in
Windows 10 settings2. A factory reset is not a way of installing Windows 10 on a newly built
computer, as it requires an existing operating system to be present.
A system restore is a way of undoing changes to a computer’s system files and settings by using a
restore point that was created earlier. A system restore can be performed by using the System
Restore option in Windows 10 settings or by using the Advanced Startup Options menu3. A system
restore is not a way of installing Windows 10 on a newly built computer, as it requires an existing
operating system and restore points to be present.
An in-place upgrade is a way of upgrading an existing operating system to a newer version without
losing any data or applications. An in-place upgrade can be performed by using the Windows 10
Media Creation Tool or by running the Setup.exe file from the Windows 10 installation medi
a. An in-place upgrade is not a way of installing Windows 10 on a newly built computer, as it requires
an existing operating system to be present.

Question: 360
A systems administrator is tasked with configuring desktop systems to use a new proxy server that
the organization has added to provide content filtering. Which of the following Windows utilities is
the best choice for accessing the necessary configuration to complete this goal?

A. Security and Maintenance

B. Network and Sharing Center


Exam Dumps 197/269

C. Windows Defender Firewall

D. Internet Options

Answer: D
Explanation:

Explore
The correct answer is D) Internet Options. The Internet Options utility in Windows allows you to
configure various settings related to your internet connection, including the proxy server settings. To
access the Internet Options utility, you can either open the Control Panel and click on Internet
Options, or open any web browser and click on the Tools menu and then on Internet Options. In the
Internet Options window, go to the Connections tab and click on the LAN settings button. Here, you
can enable or disable the use of a proxy server, as well as enter the address and port number of the
proxy server you want to use12.
Security and Maintenance is a utility in Windows that allows you to view and manage the security
and maintenance status of your computer, such as firewall, antivirus, backup, troubleshooting, and
recovery settings. It does not have any option to configure proxy server settings.
Network and Sharing Center is a utility in Windows that allows you to view and manage your
network connections, such as Wi-Fi, Ethernet, VPN, or dial-up. It also allows you to change network
settings, such as network discovery, file and printer sharing, homegroup, and adapter settings. It
does not have any option to configure proxy server settings.
Windows Defender Firewall is a utility in Windows that allows you to enable or disable the firewall
protection for your computer, as well as configure firewall rules for inbound and outbound traffic. It
does not have any option to configure proxy server settings.

Question: 361

A technician receives a help desk ticket from a user who is unable to update a phone. The technician
investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos.
Which of the following is the best way to resolve the issue?
Exam Dumps 198/269

A. Exchange the device for a newer one.

B. Upgrade the onboard storage

C. Allocate more space by removing factory applications

D. Move factory applications to external memory.

Answer: D
Explanation:
The best way to resolve the issue is to move factory applications to external memory. This will free
up some space on the phone’s internal storage, which is required for updating the phone. To do this,
you can follow these steps1:
Insert a microSD card into your phone if you don’t have one already.
Go to Settings > Apps and tap on the app you want to move.
Tap on Storage and then on Change.
Select the SD card option and tap on Move.
You may need to repeat this process for multiple apps until you have enough space to update your
phone. Alternatively, you can also clear the cache and data of some apps, or uninstall the apps that
you don’t use frequently. You can find more information on how to fix insufficient storage error on
your phone in these articles234. I hope this helps.

Question: 362
A company recently experienced a security incident in which a USB drive containing malicious
software was able to covertly install malware on a workstation_ Which of the following actions
should be taken to prevent this Incident from happening again? (Select two).

A. Install a host-based IDS

B. Restrict log-in times.

C. Enable a BIOS password

D. Update the password complexity

E. Disable AutoRun.

F. Update the antivirus definitions.

G. Restrict user permissions.

Answer: EF
Explanation:
The correct answers are E and F) Disabling AutoRun and updating the antivirus definitions are two
Exam Dumps 199/269

actions that should be taken to prevent the incident from happening again.
AutoRun is a feature of Windows that automatically executes a predetermined action when a
removable media such as a USB drive is inserted in a computer. For example, AutoRun can launch or
install a new program on the media, or open the file in File Explorer. However, this feature can also
be exploited by malicious software that can run without the user’s consent or knowledge. Therefore,
disabling AutoRun can help prevent accidental installation of viruses and other malware from USB
drives123.
Updating the antivirus definitions is another important action that can help prevent malware
infections from USB drives. Antivirus definitions are files that contain information about the latest
known threats and how to detect and remove them. By updating the antivirus definitions regularly,
you can ensure that your antivirus software can recognize and block any malicious software that may
be on the USB drive before it can harm your computer45.
A host-based IDS is a system that monitors and analyzes the activity on a single computer or device
for any signs of intrusion or malicious behavior. A host-based IDS can help detect and prevent
malware infections from USB drives, but it is not a sufficient action by itself. A host-based IDS needs
to be complemented by other security measures, such as disabling AutoRun and updating the
antivirus definitions6.
Restricting login times, enabling a BIOS password, and updating the password complexity are all
actions that can help improve the security of a computer or device, but they are not directly related
to preventing malware infections from USB drives. These actions can help prevent unauthorized
access to the computer or device, but they do not affect how the computer or device interacts with
the USB drive or its contents.
Restricting user permissions is an action that can help limit the damage that malware can cause on a
computer or device, but it does not prevent the malware from being installed in the first place.
Restricting user permissions means limiting what actions a user can perform on the computer or
device, such as installing or deleting programs, modifying system settings, or accessing certain files
or folders. By restricting user permissions, you can reduce the impact of malware infections by
preventing them from affecting other users or system components7.

Question: 363
A new employee is having difficulties using a laptop with a docking station The laptop is connected to
the docking station, and the laptop is closed. The external monitor works for a few seconds, but then
the laptop goes to sleep. Which of the following options should the technician configure in order to
fix the Issue?

A. Hibernate

B. Sleep/suspend

C. Choose what closing the lid does

D. Turn on fast startup

Answer: C
Explanation:
The correct answer is C) Choose what closing the lid does. This option allows you to configure how
Exam Dumps 200/269

the laptop behaves when you close the lid, such as whether it goes to sleep, hibernates, shuts down,
or does nothing. To access this option, you can follow these steps :
Go to Settings > System > Power & sleep.
Click on Additional power settings on the right side.
Click on Choose what closing the lid does on the left side.
Under When I close the lid, select Do nothing for both On battery and Plugged in.
Click on Save changes.
This will prevent the laptop from going to sleep when you close the lid while it is connected to the
docking station and the external monitor.
Hibernate, sleep/suspend, and turn on fast startup are not the options that should be configured to
fix the issue. Hibernate and sleep/suspend are both power-saving modes that allow you to resume
your work without losing any dat
a. However, they also turn off the display and other components of the laptop, which means you will
not be able to use the external monitor when the laptop is closed. Turn on fast startup is a feature
that reduces the boot time of Windows by saving some system information to a file when you shut
down. It does not affect how the laptop behaves when you close the lid .

Question: 364
A technician needs to ensure that USB devices are not suspended by the operating system Which of
the following Control Panel utilities should the technician use to configure the setting?

A. System

B. Power Options

C. Devices and Printers

D. Ease of Access

Answer: B
Explanation:

The correct answer is B) Power Options. The Power Options utility in the Control Panel allows you to
configure various settings related to how your computer uses and saves power, such as the power
plan, the sleep mode, the screen brightness, and the battery status. To access the Power Options
utility, you can follow these steps:
Go to Control Panel > Hardware and Sound > Power Options.
Click on Change plan settings for the power plan you are using.
Click on Change advanced power settings.
Expand the USB settings category and then the USB selective suspend setting subcategory.
Set the option to Disabled for both On battery and Plugged in.
Click on OK and then on Save changes.
This will prevent the operating system from suspending the USB devices to save power .
System, Devices and Printers, and Ease of Access are not the utilities that should be used to configure
the setting. System is a utility that provides information about your computer’s hardware and
software, such as the processor, memory, operating system, device manager, and system protection.
Exam Dumps 201/269

Devices and Printers is a utility that allows you to view and manage the devices and printers
connected to your computer, such as adding or removing devices, changing device settings, or
troubleshooting problems. Ease of Access is a utility that allows you to customize your computer’s
accessibility options, such as the narrator, magnifier, high contrast, keyboard, mouse, and speech
recognition. None of these utilities have any option to configure the USB selective suspend setting.

Question: 365
Which of the following filesystem types does macOS use?

A. ext4
B. exFAT
C. NTFS
D. APFS

Answer: D
Explanation:

APFS stands for Apple File System and it is the default filesystem type for macOS since High Sierra
(10.13) version1. APFS is optimized for flash storage and supports features such as encryption,
snapshots, cloning, and space sharing1.

Question: 366
A user is unable to access several documents saved on a work PC. A technician discovers the files
were corrupted and must change several system settings within Registry Editor to correct the issue.
Which of the following should the technician do before modifying the registry keys?

A. Update the anti-malware software.


B. Create a restore point.
C. Run the PC in sate mode.
D. Roll back the system updates.

Answer: B
Explanation:

A restore point is a snapshot of the system settings and configuration at a specific point in
time2. Creating a restore point before modifying the registry keys allows the technician to revert the
system back to a previous state if something goes wrong or causes instability2. Updating the anti-
malware software, running the PC in safe mode, and rolling back the system updates are not
necessary steps before modifying the registry keys.

Question: 367
A systems administrator is configuring centralized desktop management for computers on a domain.
Exam Dumps 202/269

The management team has decided that all users' workstations should have the same network
drives, printers, and configurations. Which of the following should the administrator use to
accomplish this task?

A. Network and Sharing Center


B. net use
C. User Accounts
D. regedit
E. Group Policy

Answer: E
Explanation:

Group Policy is a feature of Windows that allows administrators to centrally manage and apply
policies and settings to computers and users on a domain3. Group Policy can be used to configure
network drives, printers, security settings, desktop preferences, and other configurations for all
users’ workstations3. Network and Sharing Center, net use, User Accounts, and regedit are not tools
that can accomplish this task.

Question: 368

A user connected an external hard drive but is unable to see it as a destination to save files. Which of
the following tools will allow the drive to be formatted?

A. Disk Management
B. Device Manager
C. Disk Cleanup
D. Disk Defragmenter

Answer: A
Explanation:

Disk Management is a tool that allows users to create, format, delete, shrink, extend, and manage
partitions on hard drives. If the external hard drive is not formatted or has an incompatible
filesystem type, Disk Management can be used to format it with a supported filesystem type such as
NTFS, FAT32, or exFAT. Device Manager, Disk Cleanup, and Disk Defragmenter are not tools that can
format a hard drive.

Question: 369

A technician is concerned about a large increase in the number of whaling attacks happening in the
industry. The technician wants to limit the company's risk to avoid any issues. Which of the following
items should the technician implement?

A. Screened subnet
B. Firewall
C. Anti-phishing training
Exam Dumps 203/269

D. Antivirus

Answer: C
Explanation:

Anti-phishing training is a method of educating users on how to identify and avoid phishing attacks,
which are attempts to trick users into revealing sensitive information or performing malicious actions
by impersonating legitimate entities or persons. Whaling attacks are a specific type of phishing attack
that target high-level executives or influential individuals within an organization. Anti-phishing
training can help users recognize the signs of whaling attacks and prevent them from falling victim to
them. Screened subnet, firewall, and antivirus are not items that can directly address the issue of
whaling attacks.

Question: 370

While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The
technician tries the administrator password, but it is rejected. Which of the following does the
technician need in order to continue the OS repair?

A. SSL key
B. Preshared key
C. WPA2 key
D. Recovery key

Answer: D
Explanation:

A recovery key is a code that can be used to unlock a BitLocker-encrypted drive when the normal
authentication methods (such as password or PIN) are not available or have been forgotten.
BitLocker is a feature of Windows that encrypts the entire drive to protect data from unauthorized
access. If a technician is trying to repair a Windows 10 OS that has BitLocker enabled, they will need
the recovery key to access the drive and continue the OS repair. SSL key, preshared key, and WPA2
key are not keys that are related to BitLocker or OS repair.

Question: 371

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the
following should the technician do first?

A. Quarantine the computer.


B. Disable System Restore.
C. Update the antivirus software definitions.
D. Boot to safe mode.

Answer: A
Explanation:
Exam Dumps 204/269

Quarantining the computer means isolating it from the network and other devices to prevent the
spread of malware or ransomware. Ransomware is a type of malware that encrypts the files on a
computer and demands payment (usually in cryptocurrency) to restore them. If a technician sees a
file that is requesting payment to a cryptocurrency address, it is likely that the computer has been
infected by ransomware. Quarantining the computer should be the first step to contain the infection
and prevent further damage. Disabling System Restore, updating the antivirus software definitions,
and booting to safe mode are not steps that should be done before quarantining the computer.

Question: 372

A user contacts the help desk to request assistance with a program feature. The user is in a different
building but on the same network as the help desk technician. Which of the following should the
technician use to assist the user?

A. AAA
B. SSH
C. RDP
D. VPN

Answer: C
Explanation:

RDP stands for Remote Desktop Protocol and it is a protocol that allows a user to remotely access
and control another computer over a network. A technician can use RDP to assist a user who is in a
different building but on the same network by connecting to the user’s computer and viewing their
screen, keyboard, and mouse. AAA, SSH, and VPN are not protocols that can be used to assist a user
with a program feature.

Question: 373

A technician is installing RAM in a new workstation and needs to protect against electrostatic
discharge. Which of the following will best resolve this concern?

A. Battery backup
B. Thermal paste
C. ESD strap
D. Consistent power

Answer: C
Explanation:

An ESD strap, also known as an antistatic wrist strap, is a device that prevents electrostatic discharge
(ESD) from damaging sensitive electronic components such as RAM. ESD is the sudden flow of
electricity between two objects with different electrical charges, which can cause permanent
damage or malfunction to electronic devices. An ESD strap connects the technician’s wrist to a
grounded surface, such as a metal case or a mat, and equalizes the electrical potential between the
technician and the device. Battery backup, thermal paste, and consistent power are not devices that
Exam Dumps 205/269

can protect against ESD.

Question: 374

The battery life on an employee's new phone seems to be drastically less than expected, and the
screen stays on for a very long time after the employee sets the phone down. Which of the following
should the technician check first to troubleshoot this issue? (Select two).

A. Screen resolution
B. Screen zoom
C. Screen timeout
D. Screen brightness
E. Screen damage
F. Screen motion smoothness

Answer: C, D
Explanation:

Screen timeout is the setting that determines how long the screen stays on after the user stops
interacting with the phone. Screen brightness is the setting that determines how much light the
screen emits. Both of these settings affect the battery life of the phone, as keeping the screen on
longer and brighter consumes more power than turning it off sooner and dimmer. A technician
should check these settings first to troubleshoot the issue of low battery life and adjust them
accordingly. Screen resolution, screen zoom, screen damage, and screen motion smoothness are not
settings that directly affect the battery life or the screen staying on for a long time.

Question: 375

A hard drive that previously contained PI I needs to be repurposed for a public access workstation.
Which of the following data destruction methods should a technician use to ensure data is
completely removed from the hard drive?

A. Shredding
B. Degaussing
C. Low-level formatting
D. Recycling

Answer: A
Explanation:

Shredding is a data destruction method that physically destroys the hard drive by cutting it into small
pieces using a machine. Shredding ensures that data is completely removed from the hard drive and
cannot be recovered by any means. Shredding is suitable for hard drives that contain PII (personally
identifiable information), which is any information that can be used to identify, contact, or locate an
individual. Degaussing, low-level formatting, and recycling are not data destruction methods that can
guarantee complete data removal from a hard drive.
Exam Dumps 206/269

Question: 376

Which of the following best describes when to use the YUM command in Linux?

A. To add functionality
B. To change folder permissions
C. To show documentation
D. To list file contents

Answer: A
Explanation:

YUM stands for Yellowdog Updater Modified and it is a command-line tool that allows users to
install, update, remove, and manage software packages in Linux. YUM can be used to add
functionality to a Linux system by installing new software packages or updating existing ones. To
change folder permissions, show documentation, or list file contents, other commands such as
chmod, man, or ls can be used in Linux.

Question: 377

A technician installs specialized software on a workstation. The technician then attempts to run the
software. The workstation displays a message indicating the software is not authorized to run. Which
of the following should the technician do to most likely resolve the issue?

A. Install the software in safe mode.


B. Attach the external hardware token.
C. Install OS updates.
D. Restart the workstation after installation.

Answer: B
Explanation:

A hardware token is a physical device that provides an additional layer of security for software
authorization. Some specialized software may require a hardware token to be attached to the
workstation in order to run. A hardware token may contain a cryptographic key, a password, or a one-
time code that verifies the user’s identity or permission. Installing the software in safe mode,
installing OS updates, and restarting the workstation after installation are not likely to resolve the
issue of software authorization.

Question: 378

A user requires a drive to be mapped through a Windows command line. Which of the following
command-line tools can be utilized to map the drive?

A. gpupdate
B. net use
C. hostname
Exam Dumps 207/269

D. dir

Answer: B
Explanation:

Net use is a command-line tool that can be used to map a drive in Windows. Mapping a drive means
assigning a drive letter to a network location or a local folder, which allows the user to access it more
easily and quickly. Net use can also be used to disconnect a mapped drive, display information about
mapped drives, or connect to shared resources on another computer. Gpupdate, hostname, and dir
are not command-line tools that can be used to map a drive.

Question: 379

A desktop technician has received reports that a user's PC is slow to load programs and saved files.
The technician investigates and discovers an older HDD with adequate free space. Which of the
following should the technician use to alleviate the issue first?

A. Disk Management
B. Disk Defragment
C. Disk Cleanup
D. Device Manager

Answer: B
Explanation:

Disk Defragment is a tool that can be used to improve the performance of a hard disk drive (HDD).
HDDs store data in sectors and clusters on spinning platters. Over time, as data is written, deleted,
and moved, the data may become fragmented, meaning that it is spread across different locations on
the disk. This causes the HDD to take longer to access and load data, resulting in slower
performance. Disk Defragment consolidates the fragmented data and rearranges it in a contiguous
manner, which reduces the seek time and increases the speed of the HDD. Disk Management, Disk
Cleanup, and Device Manager are not tools that can alleviate the issue of slow HDD performance.

Question: 380
A user wants to back up a Windows 10 device. Which of the following should the user select?

A. Devices and Printers


B. Email and Accounts
C. Update and Security
D. Apps and Features

Answer: C
Explanation:

Update and Security is the section in Windows 10 Settings that allows the user to back up their
device. Backing up a device means creating a copy of the data and settings on the device and storing
Exam Dumps 208/269

it in another location, such as an external drive or a cloud service. Backing up a device can help the
user restore their data and settings in case of data loss, corruption, or theft. Devices and Printers,
Email and Accounts, and Apps and Features are not sections in Windows 10 Settings that allow the
user to back up their device.

Question: 381
Which of the following would most likely be used in a small office environment?

A. Print server
B. Virtualization
C. Domain access
D. Workgroup

Answer: D
Explanation:

A workgroup is a network configuration that allows computers to communicate and share resources
with each other without requiring a centralized server or domain controller. A workgroup is suitable
for small office environments where there are only a few computers and users who need simple file
and printer sharing. A workgroup does not have centralized management or security policies, which
may be desirable for larger or more complex networks. Print server, virtualization, and domain
access are not network configurations that are most likely used in a small office environment.

Question: 382

A department manager submits a help desk ticket to request the migration of a printer's port
utilization from USB to Ethernet so multiple users can access the printer. This will be a new network
printer; thus a new IP address allocation is required. Which of the following should happen
immediately before network use is authorized?

A. Document the date and time of the change.


B. Submit a change request form.
C. Determine the risk level of this change.
D. Request an unused IP address.

Answer: D
Explanation:

An IP address is a unique identifier that allows a device to communicate with other devices on a
network. A network printer needs an IP address to be accessible by multiple users on the network.
Requesting an unused IP address from the network administrator or using an IP address scanner is
the step that should happen immediately before network use is authorized, as it ensures that there is
no IP address conflict or duplication on the network. Documenting the date and time of the change,
submitting a change request form, and determining the risk level of this change are steps that should
happen before requesting an unused IP address.
Exam Dumps 209/269

Question: 383

A Windows administrator is creating user profiles that will include home directories and network
printers for several new users. Which of the following is the most efficient way for the technician to
complete this task?

A. Access control
B. Authentication application
C. Group Policy
D. Folder redirection

Answer: C
Explanation:

Group Policy is a feature of Windows that allows administrators to centrally manage and apply
policies and settings to computers and users on a domain. Group Policy can be used to create user
profiles that include home directories and network printers for several new users, as well as other
configurations such as security settings, desktop preferences, and software installation. Group Policy
can save time and effort for the administrator by applying the same settings to multiple users at
once. Access control, authentication application, and folder redirection are not the most efficient
ways to create user profiles that include home directories and network printers for several new
users.

Question: 384

A company recently experienced a security incident in which a USB drive containing malicious
software was able to covertly install malware on a workstation. Which of the following actions should
be taken to prevent this incident from happening again? (Select two).

A. Install a host-based IDS.


B. Restrict log-in times.
C. Enable a BIOS password.
D. Update the password complexity.
E. Disable AutoRun.
F. Update the antivirus definitions.
G. Restrict user permissions.

Answer: E, G
Explanation:

AutoRun is a feature of Windows that automatically executes a program or file when a removable
media such as a USB drive is inserted into the computer. Disabling AutoRun can prevent a USB drive
containing malicious software from covertly installing malware on a workstation, as it would require
the user to manually open the drive and run the file. Restricting user permissions can also prevent a
USB drive containing malicious software from covertly installing malware on a workstation, as it
would limit the user’s ability to execute or install unauthorized programs or files. Installing a host-
based IDS, restricting log-in times, enabling a BIOS password, updating the password complexity, and
Exam Dumps 210/269

updating the antivirus definitions are not actions that can directly prevent this incident from
happening again.

Question: 385

A technician needs to ensure that USB devices are not suspended by the operating system. Which of
the following Control Panel utilities should the technician use to configure the setting?

A. System
B. Power Options
C. Devices and Printers
D. Ease of Access

Answer: B
Explanation:

Power Options is a Control Panel utility that allows users to configure the power settings of their
computer, such as when to turn off the display, when to put the computer to sleep, and how to
manage the battery life. Power Options also allows users to configure the USB selective suspend
setting, which is a feature that automatically suspends the power supply to USB devices that are not
in use, in order to save energy. A user can disable this setting if they want to ensure that USB devices
are not suspended by the operating system. System, Devices and Printers, and Ease of Access are not
Control Panel utilities that can be used to configure the USB selective suspend setting.

Question: 386

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve
the issue at a minimal expense? (Select two).

A. Installing additional RAM


B. Removing the applications from startup
C. Installing a faster SSD
D. Running the Disk Cleanup utility
E. Defragmenting the hard drive
F. Ending the processes in the Task Manager

Answer: B, D
Explanation:

Removing the applications from startup can improve the boot time of a PC by reducing the number
of programs that load automatically when the PC starts. Some applications may add themselves to
the startup list without the user’s knowledge or consent, which can slow down the PC’s
performance. Running the Disk Cleanup utility can also improve the boot time of a PC by deleting
unnecessary or temporary files that take up disk space and affect the PC’s speed. Disk Cleanup can
also remove old system files that may cause conflicts or errors during booting. Installing additional
RAM, installing a faster SSD, defragmenting the hard drive, and ending the processes in the Task
Manager are not operations that would be best to do to resolve the issue of slow boot time at a
Exam Dumps 211/269

minimal expense, as they may require purchasing new hardware or software, or may have negative
impacts on other aspects of the PC’s performance.

Question: 387

During an enterprise rollout of a new application, a technician needs to validate compliance with an
application's EULA while also reducing the number of licenses to manage. Which of the following
licenses would best accomplish this goal?

A. Personal use license


B. Corporate use license
C. Open-source license
D. Non-expiring license

Answer: B
Explanation:

A corporate use license, also known as a volume license, is a type of software license that allows an
organization to purchase and use multiple copies of a software product with a single license key. A
corporate use license can help validate compliance with an application’s EULA (end-user license
agreement), which is a legal contract that defines the terms and conditions of using the software. A
corporate use license can also reduce the number of licenses to manage, as it eliminates the need to
activate and track individual licenses for each copy of the software. Personal use license, open-source
license, and non-expiring license are not types of licenses that can best accomplish this goal.

Question: 388

A technician is setting up a newly built computer. Which of the following is the fastest way for the
technician to install Windows 10?

A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation

Answer: D
Explanation:

An unattended installation is a method of installing Windows 10 that does not require any user input
or interaction during the installation process. An unattended installation can be performed by using
an answer file, which is a file that contains all the configuration settings and preferences for the
installation, such as the product key, the language, the partition size, and the user accounts. An
unattended installation can be the fastest way to install Windows 10, as it automates and streamlines
the installation process. Factory reset, System Restore, and in-place upgrade are not methods of
installing Windows 10.
Exam Dumps 212/269

Question: 389

The screen on a user's mobile device is not autorotating even after the feature has been enabled and
the device has been restarted. Which of the following should the technician do next to troubleshoot
the issue?

A. Calibrate the phone sensors.


B. Enable the touch screen.
C. Reinstall the operating system.
D. Replace the screen.

Answer: A
Explanation:

Calibrating the phone sensors is a step that can troubleshoot the issue of screen not autorotating on
a mobile device. Screen autorotation is a feature that automatically adjusts the screen orientation
based on the device’s position and movement. Screen autorotation relies on sensors such as
accelerometer and gyroscope to detect the device’s tilt and rotation. Calibrating the phone sensors
can help fix any errors or inaccuracies in the sensor readings that may prevent screen autorotation
from working properly. Enabling the touch screen, reinstalling the operating system, and replacing
the screen are not steps that should be done next to troubleshoot this issue.

Question: 390
Which of the following would most likely be used to extend the life of a device?

A. Battery backup
B. Electrostatic discharge mat
C. Proper ventilation
D. Green disposal

Answer: C
Explanation:

Proper ventilation is a factor that can extend the life of a device by preventing overheating and
thermal damage to the device’s components. Proper ventilation means ensuring that there is
enough airflow around and inside the device to dissipate heat and maintain a suitable temperature
for optimal performance. Proper ventilation can be achieved by using fans, heat sinks, vents, or
liquid cooling systems, as well as avoiding placing the device near heat sources or in enclosed spaces.
Battery backup, electrostatic discharge mat, and green disposal are not factors that can extend the
life of a device.

Question: 391

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic.
Which of the following types of infections are the workstations most likely experiencing? (Select
two).
Exam Dumps 213/269

A. Zombies
B. Keylogger
C. Adware
D. Botnet
E. Ransomware
F. Spyware

Answer: A, D
Explanation:

Zombies and botnets are terms that describe the types of infections that can cause internal
workstations to participate in a DDoS (distributed denial-of-service) attack. A DDoS attack is a
malicious attempt to disrupt the normal functioning of a website or a network by overwhelming it
with a large amount of traffic from multiple sources. Zombies are infected computers that are
remotely controlled by hackers without the owners’ knowledge or consent. Botnets are networks of
zombies that are coordinated by hackers to launch DDoS attacks or other malicious activities.
Keylogger, adware, ransomware, and spyware are not types of infections that can cause internal
workstations to participate in a DDoS attack.

Question: 392

A help desk technician determines a motherboard has failed. Which of the following is the most
logical next step in the remediation process?

A. Escalating the issue to Tier 2


B. Verifying warranty status with the vendor
C. Replacing the motherboard
D. Purchasing another PC

Answer: B
Explanation:

Verifying warranty status with the vendor is the most logical next step in the remediation process
after determining that a motherboard has failed. A warranty is a guarantee from the vendor that
covers the repair or replacement of defective or faulty products within a specified period of time.
Verifying warranty status with the vendor can help the technician determine if the motherboard is
eligible for warranty service and what steps to take to obtain it. Escalating the issue to Tier 2,
replacing the motherboard, and purchasing another PC are not the most logical next steps in the
remediation process.

Question: 393

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a
court of law?

A. Data integrity form


Exam Dumps 214/269

B. Valid operating system license


C. Documentation of an incident
D. Chain of custody

Answer: D
Explanation:

Chain of custody is a process that helps ensure that a piece of evidence extracted from a PC is
admissible in a court of law. Chain of custody refers to the documentation and tracking of who
handled, accessed, modified, or transferred the evidence, when, where, why, and how. Chain of
custody can help establish the authenticity, integrity, and reliability of the evidence, as well as
prevent tampering, alteration, or loss of the evidence. Data integrity form, valid operating system
license, and documentation of an incident are not processes that can ensure that a piece of evidence
extracted from a PC is admissible in a court of law.

Question: 394

A user installed a new computer game. Upon starting the game, the user notices the frame rates are
low. Which of the following should the user upgrade to resolve the issue?

A. Hard drive
B. Graphics card
C. Random-access memory
D. Monitor

Answer: B
Explanation:

A graphics card, also known as a video card or a GPU (graphics processing unit), is a component that
can affect the performance of a computer game. A graphics card is responsible for rendering and
displaying graphics on the screen, such as images, animations, and effects. A computer game may
require a high level of graphics processing power to run smoothly and achieve high frame rates,
which are the number of frames per second (FPS) that the game can display. Upgrading to a better
graphics card can improve the performance of a computer game by increasing its graphics quality
and frame rates. Hard drive, random-access memory, and monitor are not components that can
directly improve the performance of a computer game.

Question: 395

A company would like to implement multifactor authentication for all employees at a minimal cost.
Which of the following best meets the company's requirements?

A. Biometrics
B. Soft token
C. Access control lists
D. Smart card
Exam Dumps 215/269

Answer: B
Explanation:

A soft token, also known as a software token or an OTP (one-time password) app, is a type of
multifactor authentication that generates a temporary code or password on a user’s device, such as a
smartphone or a tablet. The user must enter this code or password along with their username and
password to access their account or service. A soft token can help improve security by adding an
extra layer of verification and preventing unauthorized access even if the user’s credentials are
compromised. A soft token can also be implemented at a minimal cost, as it does not require any
additional hardware or infrastructure. Biometrics, access control lists, and smart card are not types of
multifactor authentication that can be implemented at a minimal cost.

Question: 396
Which of the following allows access to the command line in macOS?

A. PsExec
B. command.com
C. Terminal
D. CMD

Answer: C
Explanation:

Terminal is an application that allows access to the command line in macOS. The command line is an
interface that allows users to interact with the operating system and perform various tasks by typing
commands and arguments. Terminal can be used to launch programs, manage files and folders,
configure settings, troubleshoot issues, and run scripts in macOS. PsExec, command.com, and CMD
are not applications that allow access to the command line in macOS.

Question: 397

A user visits a game vendor's website to view the latest patch notes, but this information is not
available on the page. Which of the following should the user perform before reloading the page?

A. Synchronize the browser data.


B. Enable private browsing mode.
C. Mark the site as trusted.
D. Clear the cached file.

Answer: D
Explanation:

Clearing the cached file is an action that can help resolve the issue of not seeing the latest patch
notes on a game vendor’s website. A cached file is a copy of a web page or file that is stored locally
on the user’s browser or device for faster loading and offline access. However, sometimes a cached
file may become outdated or corrupted and prevent the user from seeing the most recent or
Exam Dumps 216/269

accurate version of a web page or file. Clearing the cached file can force the browser to download
and display the latest version from the server instead of using the old copy from the cache.
Synchronizing the browser data, enabling private browsing mode, and marking the site as trusted are
not actions that can help resolve this issue.

Question: 398

An administrator responded to an incident where an employee copied financial data to a portable


hard drive and then left the company with the dat
a. The administrator documented the movement of the evidence. Which of the following concepts
did the administrator demonstrate?
A. Preserving chain of custody
B. Implementing data protection policies
C. Informing law enforcement
D. Creating a summary of the incident

Answer: A
Explanation:

Preserving chain of custody is a concept that refers to the documentation and tracking of who
handled, accessed, modified, or transferred a piece of evidence, when, where, why, and how.
Preserving chain of custody can help establish the authenticity, integrity, and reliability of the
evidence, as well as prevent tampering, alteration, or loss of the evidence. An administrator who
documented the movement of the evidence demonstrated the concept of preserving chain of
custody. Implementing data protection policies, informing law enforcement, and creating a summary
of the incident are not concepts that describe the action of documenting the movement of the
evidence.

Question: 399
Which of the following threats will the use of a privacy screen on a computer help prevent?

A. Impersonation
B. Shoulder surfing
C. Whaling
D. Tailgating

Answer: B
Explanation:

Shoulder surfing is a threat that involves someone looking over another person’s shoulder to observe
their screen, keyboard, or other sensitive information. Shoulder surfing can be used to steal
passwords, personal identification numbers (PINs), credit card numbers, or other confidential data.
The use of a privacy screen on a computer can help prevent shoulder surfing by limiting the viewing
angle of the screen and making it harder for someone to see the screen from the side or behind.
Impersonation, whaling, and tailgating are not threats that can be prevented by using a privacy
screen on a computer.
Exam Dumps 217/269

Question: 400

Users access files in the department share. When a user creates a new subfolder, only that user can
access the folder and Its files. Which of the following will MOST likely allow all users to access the
new folders?

A. Assigning share permissions


B. Enabling inheritance
C. Requiring multifactor authentication
D. Removing archive attribute

Answer: B
Explanation:

Enabling inheritance is a method that allows new subfolders to inherit the permissions and settings
from their parent folder. If users can access files in the department share, but not in the new
subfolders created by other users, it may indicate that inheritance is disabled and that each new
subfolder has its own permissions and settings that restrict access to only the creator. Enabling
inheritance can help resolve this issue by allowing all users to access the new subfolders with the
same permissions and settings as the department share. Assigning share permissions, requiring
multifactor authentication, and removing archive attribute are not methods that can most likely
allow all users to access the new folders.

Question: 401

A remote user is experiencing issues with Outlook settings and asks a technician to review the
settings. Which of the following can the technician use to access the user's computer remotely?

A. VPN

B. RDP

C. RMM

D. SSH

Answer: B
Explanation:
One of the possible ways to access the user’s computer remotely is to use RDP, which stands for
Remote Desktop Protocol. RDP is a protocol that allows a user to connect to another computer over
a network and use its graphical interface. RDP is commonly used for remote desktop software, such
as Microsoft Remote Desktop Connection1. To use RDP, the user’s computer must run RDP server
software, and the technician must run RDP client software. The technician can then enter the user’s
IP address or hostname, and provide the appropriate credentials to log in to the user’s computer.
Once connected, the technician can view and control the user’s desktop, and review the Outlook
settings.
Exam Dumps 218/269

Question: 402
A workstation is displaying a message indicating that a user must exchange cryptocurrency for a
decryption key. Which of the following is the best way for a technician to return the device to service
safely?

A. Run an AV scan.

B. Reinstall the operating system

C. Install a software firewall.

D. Perform a system restore.

E. Comply with the on-screen instructions.

Answer: B
Explanation:
The best way for a technician to return the device to service safely is to reinstall the operating
system. This is because the device is infected by ransomware, which is a form of malware that
encrypts files and demands payment for decryption. Reinstalling the operating system will erase the
ransomware and restore the device to its original state. However, this will also delete any data that
was not backed up before the infection. Therefore, it is important to have regular backups of critical
data and protect them from ransomware attacks1.
The other options are not effective or safe for ransomware recovery. Running an AV scan may not
detect or remove the ransomware, especially if it is a new or unknown variant. Installing a software
firewall may prevent future attacks, but it will not help with the current infection. Performing a
system restore may not work if the ransomware has corrupted or deleted the restore points.
Complying with the on-screen instructions is not advisable, as it will encourage the attackers and
there is no guarantee that they will provide the decryption key after receiving the payment.
To prevent and recover from ransomware attacks, it is recommended to follow some best practices,
such as234:
Use strong passwords and multifactor authentication for all accounts and devices.
Keep all software and firmware updated with the latest security patches.
Avoid opening suspicious or unsolicited emails and attachments.
Educate users and staff on how to recognize and report phishing and social engineering attempts.
Use antivirus software and enable real-time protection.
Enable network segmentation and firewall rules to limit the spread of ransomware.
Implement a Zero Trust security model to verify all requests and devices before granting access.
Create and test backups of critical data and store them offline or in a separate network.
Recover safely by isolating the infected devices, identifying the ransomware variant, and restoring
data from backups.
Report any ransomware incidents to law enforcement agencies and seek help from experts.

Question: 403
Exam Dumps 219/269

A customer has a USB-only printer attached to a computer. A technician is configuring an


arrangement that allows other computers on the network to use the printer. In which of the
following locations on the customer's desktop should the technician make this configuration?

A. Printing Preferences/Advanced tab

B. Printer Properties/Sharing tab

C. Printer Properties/Security tab

D. Printer Properties/Ports tab

Answer: B
Explanation:
The correct answer is B. Printer Properties/Sharing tab. This is the location where the technician can
enable printer sharing and assign a share name for the USB printer. This will allow other computers
on the network to access the printer by using the share name or the IP address of the computer that
has the printer attached1.
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 15, section 1.9.

Question: 404
A company recently outsourced its night-shift cleaning service. A technician is concerned about
having unsupervised contractors in the building. Which of the following security measures can be
used to prevent the computers from being accessed? (Select two).

A. Implementing data-at-rest encryption

B. Disabling AutoRun

C. Restricting user permissions

D. Restricting log-in times

E. Enabling a screen lock

F. Disabling local administrator accounts

Answer: DE
Explanation:
The correct answers are D. Restricting log-in times and E. Enabling a screen lock. These are the
security measures that can be used to prevent the computers from being accessed by unsupervised
contractors in the building.
Exam Dumps 220/269

Restricting log-in times means setting a policy that allows users to log in only during certain hours,
such as the regular working hours of the company. This will prevent unauthorized access by
contractors who work at night1.
Enabling a screen lock means setting a policy that requires users to enter a password or a PIN to
unlock their screens after a period of inactivity. This will prevent unauthorized access by contractors
who might try to use the computers when the users are away2.
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 19, section 2.3. 2: CompTIA A+
Certification Exam: Core 2 Objectives, page 20, section 2.4.

Question: 405
A technician is unable to access the internet or named network resources. The technician receives a
valid IP address from the DHCP server and can ping the default gateway. Which of the following
should the technician check next to resolve the issue?

A. Verify the DNS server settings.

B. Turn off the Windows firewall.

C. Confirm the subnet mask is correct.

D. Configure a static IP address.

Answer: A
Explanation:

The correct answer is


A) Verify the DNS server settings. This is because the DNS server is responsible for resolving domain
names to IP addresses, which is necessary for accessing the internet or named network resources. If
the DNS server settings are incorrect or the DNS server is down, the technician will not be able to
access these resources even if they have a valid IP address and can ping the default gateway1.
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 16, section 1.10.

Question: 406
A PC is taking a long time to boot. Which of the following operations would be best to do to resolve
the issue at a minimal expense? (Select two).

A. Installing additional RAM

B. Removing the applications from startup

C. Installing a faster SSD


Exam Dumps 221/269

D. Running the Disk Cleanup utility

E. Defragmenting the hard drive

F. Ending the processes in the Task Manager

Answer: BE
Explanation:

The correct answers are B) Removing the applications from startup and E. Defragmenting the hard
drive. These are the operations that would be best to do to resolve the issue of a slow boot at a
minimal expense.
Removing the applications from startup means disabling the programs that run automatically when
the PC is turned on. This will reduce the load on the CPU and RAM and speed up the boot process1.
Defragmenting the hard drive means rearranging the files on the disk so that they are stored in
contiguous blocks. This will improve the disk performance and reduce the time it takes to read and
write data2.
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 23, section 3.1. 2: CompTIA A+
Certification Exam: Core 2 Objectives, page 24, section 3.2.

Question: 407

During a network outage, a technician discovers a new network switch that was not listed in the
support documentation. The switch was installed during a recent change window when a new office
was added to the environment. Which of the following would most likely prevent this type of
mismatch after next month's change window?

A. Performing annual network topology reviews

B. Requiring all network changes include updating the network diagrams

C. Allowing network changes once per year

D. Routinely backing up switch configuration files

Answer: B
Explanation:
This would ensure that the support documentation reflects the current state of the network and
prevents any confusion or mismatch during a network outage. Updating the network diagrams is also
one of the best practices for network documentation, as stated in the Official CompTIA A+ Core 2
Study Guide1. The other options are not as effective or feasible as option B. Performing annual
network topology reviews is too infrequent and may not capture recent changes. Allowing network
changes once per year is too restrictive and may not meet the business needs. Routinely backing up
switch configuration files is important, but it does not help with identifying new switches or devices
on the network.
Exam Dumps 222/269

Question: 408
A department manager submits a help desk ticket to request the migration of a printer's port
utilization from USB to Ethernet so multiple users can access the printer. This will be a new network
printer, thus a new IP address allocation is required. Which of the following should happen
immediately before network use is authorized?

A. Document the date and time of the change.

B. Submit a change request form.

C. Determine the risk level of this change.

D. Request an unused IP address.

Answer: B
Explanation:
A change request form is a document that describes the proposed change, the reason for the change,
the impact of the change, and the approval process for the change. A change request form is
required for any planned changes to the network, such as adding a new network printer, to ensure
that the change is authorized, documented, and communicated to all stakeholders. Submitting a
change request form should happen immediately before network use is authorized, as stated in the
Official CompTIA A+ Core 2 Study Guide. The other options are either too late (documenting the date
and time of the change) or too early (determining the risk level of the change and requesting an
unused IP address) in the change management process.

Question: 409

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if
something is accidentally removed. Which of the following backup methods should be used to
provide fast data recovery in this situation?

A. Full

B. Differential

C. Synthetic

D. Incremental

Answer: A
Explanation:
A full backup does not depend on any previous backups, unlike differential or incremental backups,
Exam Dumps 223/269

which only save the changes made since the last backup. A synthetic backup is a type of full backup
that combines an existing full backup with incremental backups to create a new full backup, but it
still requires multiple backup sets to recover dat
a. Therefore, a full backup is the most suitable for the payroll workstation that needs to have its data
readily available and recoverable. You can learn more about the differences between full,
differential, incremental, and synthetic backups from this article.

Question: 410
A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started
sending unusual SMS messages and registering strange network activity A technician thinks a virus or
other malware has infected the device. Which of the following should the technician suggest the user
do to best address these security and privacy concerns? (Select two).

A. Disable Wi-Fi autoconnect.

B. Stay offline when in public places.

C. Uninstall all recently installed applications.

D. Schedule an antivirus scan.

E. Reboot the device

F. Update the OS

Answer: CD
Explanation:

The best way to address the security and privacy concerns caused by a malware infection on a
smartphone is to uninstall all recently installed applications and schedule an antivirus scan.
Uninstalling the applications that may have introduced the malware can help remove the source of
infection and prevent further damage. Scheduling an antivirus scan can help detect and remove any
remaining traces of malware and restore the device’s functionality.
Reference: CompTIA A+ Core 2 (220-1102) Certification Study Guide, Chapter 5: Mobile Devices,
Section 5.3: Mobile Device Security1

Question: 411
A customer is accessing a public kiosk in a company's lobby. Which of the following should be
enforced to mitigate the risk of customer data being accidentally saved to the kiosk?
Exam Dumps 224/269

A. Manually clearing browsing data


B. Private-browsing mode
C. Browser data synchronization
D. Password manager

Answer: B
Explanation:

Private-browsing mode is the best option to mitigate the risk of customer data being accidentally
saved to the kiosk. Private-browsing mode prevents the browser from storing cookies, history,
passwords, and other data that could reveal the customer’s identity or preferences. Manually
clearing browsing data is not a reliable option, as it depends on the customer’s awareness and
willingness to do so. Browser data synchronization and password manager are features that could
actually increase the risk of customer data being exposed, as they could sync or autofill sensitive
information across devices or accounts. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 12
Certification Study Guides and Books | CompTIA IT Certifications, CompTIA A+ Core 1 220-1101
Certification Study Guide, page 234

Question: 412

A company's assets are scanned annually. Which of the following will most likely help the company
gain a holistic view of asset cost?

A. Creating a database
B. Assigning users to assets
C. Inventorying asset tags
D. Updating the procurement account owners

Answer: A
Explanation:

Creating a database is the most likely option to help the company gain a holistic view of asset cost. A
database can store and organize information about the assets, such as purchase date, depreciation
value, maintenance cost, warranty status, and replacement cost. Assigning users to assets,
inventorying asset tags, and updating the procurement account owners are important steps for asset
management, but they do not directly provide a holistic view of asset cost. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 18
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 101

Question: 413
A remote user is experiencing issues connecting to a corporate email account on a laptop. The user
clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk
technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the
following is the first action the technician should take?
Exam Dumps 225/269

A. Restart the wireless adapter.


B. Launch the browser to see if it redirects to an unknown site.
C. Instruct the user to disconnect the Wi-Fi.
D. Instruct the user to run the installed antivirus software.

Answer: C
Explanation:

Instructing the user to disconnect the Wi-Fi is the first action the technician should take if they
suspect a rogue access point. A rogue access point is an unauthorized wireless network that could be
used to intercept or manipulate network traffic, compromise security, or launch attacks.
Disconnecting the Wi-Fi would prevent further exposure or damage to the user’s device or data.
Restarting the wireless adapter, launching the browser, or running the antivirus software are possible
actions to take after disconnecting the Wi-Fi, but they are not as urgent or effective as the first
step. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 22
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456

Question: 414
A technician is investigating options to secure a small office's wireless network. One requirement is
to allow automatic log-ins to the network using certificates instead of passwords. Which of the
following should the wireless solution have in order to support this feature?

A. RADIUS
B. AES
C. EAP-EKE
D. MFA

Answer: A
Explanation:

RADIUS is the correct answer for this question. RADIUS stands for Remote Authentication Dial-In
User Service, and it is a protocol that provides centralized authentication, authorization, and
accounting for wireless networks. RADIUS can support certificate-based authentication, which allows
users to log in to the network automatically without entering passwords. RADIUS also provides other
benefits, such as enforcing security policies, logging user activities, and managing network access.
AES, EAP-EKE, and MFA are not wireless solutions, but rather encryption algorithms, authentication
methods, and security factors, respectively. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 23
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459

Question: 415
A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which
of the following tools should the technician use to disable applications on startup?
Exam Dumps 226/269

A. System Configuration
B. Task Manager
C. Performance Monitor
D. Group Policy Editor

Answer: B
Explanation:

Task Manager is the best tool to use to disable applications on startup in Windows 10. Task Manager
is a built-in utility that shows the current processes, performance, and users on a system. It also has a
Startup tab that lists the applications that run on boot and their impact on the system. The technician
can use Task Manager to disable or enable any application on startup by right-clicking on it and
selecting the appropriate option. System Configuration, Performance Monitor, and Group Policy
Editor are other tools that can be used to manage system settings, but they are not as simple or
convenient as Task Manager for this task. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 13
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103

Question: 416
Which of the following is an advantage of using WPA2 instead of WPA3?

A. Connection security
B. Encryption key length
C. Device compatibility
D. Offline decryption resistance

Answer: C
Explanation:

Device compatibility is an advantage of using WPA2 instead of WPA3. WPA2 is the previous version
of the Wi-Fi Protected Access protocol, which provides security and encryption for wireless
networks. WPA3 is the latest version, which offers improved security features, such as stronger
encryption, enhanced protection against brute-force attacks, and easier configuration. However,
WPA3 is not backward compatible with older devices that only support WPA2 or earlier protocols.
Therefore, using WPA3 may limit the range of devices that can connect to the wireless network.
Connection security, encryption key length, and offline decryption resistance are advantages of using
WPA3 instead of WPA2. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 24
CompTIA A+ Certification All-in-One Exam Guide (Exams 220-1101 & …, page 1000

Question: 417
A large university wants to equip all classrooms with high-definition IP videoconferencing
equipment. Which of the following would most likely be impacted in this situation?

A. SAN
Exam Dumps 227/269

B. LAN
C. GPU
D. PAN

Answer: B
Explanation:

LAN is the most likely option to be impacted in this situation. LAN stands for Local Area Network, and
it is a network that connects devices within a limited area, such as a building or a campus. Installing
high-definition IP videoconferencing equipment in all classrooms would require a high bandwidth
and reliable LAN infrastructure to support the video and audio transmission. The LAN would also
need to be configured with proper security, quality of service, and multicast protocols to ensure the
optimal performance of the videoconferencing system. SAN, GPU, and PAN are not directly related to
this scenario. SAN stands for Storage Area Network, and it is a network that provides access to
consolidated storage devices. GPU stands for Graphics Processing Unit, and it is a hardware
component that handles graphics rendering and computation. PAN stands for Personal Area
Network, and it is a network that connects devices within a short range, such as Bluetooth or
infrared. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 20
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 104

Question: 418
A systems administrator is troubleshooting network performance issues in a large corporate office.
The end users report that traffic to certain internal environments is not stable and often drops. Which
of the following command-line tools can provide the most detailed information for investigating the
issue further?

A. ipconfig
B. arp
C. nslookup
D. pathping

Answer: D
Explanation:

Pathping is the best command-line tool to provide the most detailed information for investigating the
network performance issue further. Pathping is a utility that combines the functions of ping and
tracert, which are two other command-line tools that test network connectivity and latency.
Pathping sends packets to each router on the path to a destination and then computes results based
on the packets returned from each hop. Pathping can show the route taken by the packets, the
number of hops, the latency of each hop, and the packet loss percentage. This information can help
the systems administrator identify where the network problem occurs and how severe it is. Ipconfig,
arp, and nslookup are not as useful as pathping for this task. Ipconfig shows the configuration of the
network interface card, such as IP address, subnet mask, and default gateway. Arp shows the
mapping of IP addresses to MAC addresses in the local network. Nslookup queries DNS servers for
domain name resolution. Reference:
Exam Dumps 228/269

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 21


CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 457

Question: 419
Which of the following would allow physical access to a restricted area while maintaining a record of
events?

A. Hard token
B. Access control vestibule
C. Key fob
D. Door Lock

Answer: B
Explanation:

Access control vestibule is the correct answer for this question. An access control vestibule is a
physical security device that consists of two doors that form an enclosed space between them. The
first door opens only after verifying the identity of the person entering, such as by using a card
reader, biometric scanner, or keypad. The second door opens only after the first door closes, creating
a buffer zone that prevents unauthorized access or tailgating. An access control vestibule also
maintains a record of events, such as who entered or exited, when, and how. Hard token, key fob,
and door lock are not sufficient to meet the requirements of this question. A hard token is a device
that generates a one-time password or code for authentication purposes. A key fob is a small device
that can be attached to a key ring and used to unlock doors or start vehicles remotely. A door lock is a
mechanism that secures a door from opening without a key or a code. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25

Question: 420
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space.
Which of the following partition styles should the technician use to partition the device?

A. EFS
B. GPT
C. MBR
D. FAT32

Answer: B
Explanation:

GPT is the correct answer for this question. GPT stands for GUID Partition Table, and it is a partition
style that supports up to 128 primary partitions and up to 18 exabytes of disk size per partition. GPT
also uses a unique identifier for each partition and provides better data protection and recovery. GPT
is suitable for partitioning a hard disk that has five primary partitions with 4TB of free space each.
EFS, MBR, and FAT32 are not correct answers for this question. EFS stands for Encrypting File System,
and it is a feature that allows encrypting files and folders on NTFS volumes. EFS is not a partition
Exam Dumps 229/269

style, but rather a file system attribute. MBR stands for Master Boot Record, and it is an older
partition style that supports up to four primary partitions and up to 2TB of disk size per partition.
MBR cannot handle five primary partitions with 4TB of free space each. FAT32 stands for File
Allocation Table 32, and it is a file system that supports up to 32GB of disk size per partition and up to
4GB of file size. FAT32 is not a partition style, but rather a file system type. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 14
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 105

Question: 421
A user is setting up backups on a workstation. The user wants to ensure that the restore process is as
simple as possible. Which of the following backup types should the user select?

A. Full
B. Incremental
C. Differential
D. Synthetic

Answer: A
Explanation:

Full backup is the best option to ensure that the restore process is as simple as possible. A full backup
is a backup type that copies all the data from the source to the destination, regardless of whether the
data has changed or not. A full backup provides the most complete and consistent backup of the
data, and it allows the user to restore the data from a single backup set without relying on any
previous or subsequent backups. Incremental, differential, and synthetic backups are not as simple as
full backups for restoring data. An incremental backup is a backup type that copies only the data that
has changed since the last backup, whether it was full or incremental. An incremental backup
requires less time and space than a full backup, but it also requires multiple backup sets to restore
the data completely. A differential backup is a backup type that copies only the data that has changed
since the last full backup. A differential backup requires more time and space than an incremental
backup, but it also requires fewer backup sets to restore the data than an incremental backup. A
synthetic backup is a backup type that combines a full backup with one or more incremental or
differential backups to create a consolidated backup set. A synthetic backup requires less time and
bandwidth than a full backup, but it also requires more processing power and storage space than an
incremental or differential backup. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458

Question: 422
A computer technician is investigating a computer that is not booting. The user reports that the
computer was working prior to shutting it down last night. The technician notices a removable USB
device is inserted, and the user explains the device is a prize the user received in the mail yesterday.
Which of the following types of attacks does this describe?

A. Phishing
Exam Dumps 230/269

B. Dumpster diving
C. Tailgating
D. Evil twin

Answer: A
Explanation:

Phishing is the correct answer for this question. Phishing is a type of attack that uses fraudulent
emails or other messages to trick users into revealing sensitive information or installing malicious
software. Phishing emails often impersonate legitimate entities or individuals and offer incentives or
threats to lure users into clicking on malicious links or attachments. In this scenario, the user
received a removable USB device in the mail as a prize, which could be a phishing attempt to infect
the user’s computer with malware or gain access to the user’s data. Dumpster diving, tailgating, and
evil twin are not correct answers for this question. Dumpster diving is a type of attack that involves
searching through trash bins or recycling containers to find discarded documents or devices that
contain valuable information. Tailgating is a type of attack that involves following an authorized
person into a restricted area without proper identification or authorization. Evil twin is a type of
attack that involves setting up a rogue wireless access point that mimics a legitimate one to intercept
or manipulate network traffic. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25
[CompTIA Security+ SY0-601 Certification Study Guide], page 1004

Question: 423

An engineer is configuring a new server that requires a bare-metal installation. Which of the
following installation methods should the engineer use if installation media is not available on site?

A. Image deployment
B. Recovery partition installation
C. Remote network installation
D. Repair installation

Answer: C
Explanation:

Remote network installation is the best option for configuring a new server that requires a bare-
metal installation without installation media on site. A remote network installation is a method of
installing an operating system or an application over a network connection, such as LAN, WAN, or
Internet. A remote network installation can use various protocols, such as PXE, HTTP, FTP, or SMB, to
access the installation files from a server or a cloud service. A remote network installation can also
use various tools, such as Windows Deployment Services, Microsoft Deployment Toolkit, or Red Hat
Kickstart, to automate and customize the installation process. A remote network installation can save
time and resources by eliminating the need for physical media and allowing centralized management
of multiple installations. Image deployment, recovery partition installation, and repair installation
are not correct answers for this question. Image deployment is a method of installing an operating
system or an application by copying a preconfigured image file to a target device. Image deployment
requires an existing image file and a compatible device. Recovery partition installation is a method of
Exam Dumps 231/269

restoring an operating system or an application from a hidden partition on the hard disk that
contains the original factory settings. Recovery partition installation requires an existing recovery
partition and a functional hard disk. Repair installation is a method of fixing an operating system or
an application that is corrupted or damaged by replacing or repairing the system files without
affecting the user data or settings. Repair installation requires an existing operating system or
application and a working device. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 16
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 106

Question: 424
A technician needs administrator access on a Windows workstation to facilitate system changes
without elevating permissions. Which of the following would best accomplish this task?

A. Group Policy Editor


B. Local Users and Groups
C. Device Manager
D. System Configuration

Answer: B
Explanation:

Local Users and Groups is the best option to accomplish this task. Local Users and Groups is a tool
that allows managing the local user accounts and groups on a Windows workstation. The technician
can use this tool to create a new user account with administrator privileges or add an existing user
account to the Administrators group. This way, the technician can log in with the administrator
account and make system changes without elevating permissions. Group Policy Editor, Device
Manager, and System Configuration are not correct answers for this question. Group Policy Editor is a
tool that allows configuring policies and settings for users and computers in a domain environment.
Device Manager is a tool that allows managing the hardware devices and drivers on a Windows
workstation. System Configuration is a tool that allows modifying the startup options and services on
a Windows workstation. None of these tools can directly grant administrator access to a user
account. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 13
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103

Question: 425
A technician receives an invalid certificate error when visiting a website. Other workstations on the
same local network are unable to replicate this issue. Which of the following is most likely causing
the issue?

A. Date and time


B. User access control
C. UEFI boot mode
D. Log-on times
Exam Dumps 232/269

Answer: A
Explanation:

Date and time is the most likely cause of the issue. The date and time settings on a workstation
affect the validity of the certificates used by websites to establish secure connections. If the date and
time are incorrect, the workstation may not recognize the certificate as valid and display an invalid
certificate error. Other workstations on the same local network may not have this issue if their date
and time are correct. User access control, UEFI boot mode, and log-on times are not likely causes of
the issue. User access control is a feature that prevents unauthorized changes to the system by
prompting for confirmation or credentials. UEFI boot mode is a firmware interface that controls the
boot process of the workstation. Log-on times are settings that restrict when a user can log in to the
workstation. None of these factors affect the validity of the certificates used by websites. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 14
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456

Question: 426
A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of
the following data destruction methods should the company use?

A. Degaussing
B. Standard formatting
C. Low-level wiping
D. Deleting

Answer: C
Explanation:

Low-level wiping is the best data destruction method for recycling old hard drives for reuse. Low-
level wiping is a process that overwrites every bit of data on a hard drive with zeros or random
patterns, making it impossible to recover any data from the drive. Low-level wiping also restores the
drive to its factory state, removing any bad sectors or errors that may have accumulated over time.
Low-level wiping can be done using specialized software tools or hardware devices that connect to
the drive. Degaussing, standard formatting, and deleting are not suitable data destruction methods
for recycling old hard drives for reuse. Degaussing is a process that exposes a hard drive to a strong
magnetic field, destroying both the data and the drive itself. Degaussing renders the drive unusable
for reuse. Standard formatting is a process that erases the data on a hard drive by removing the file
system structure, but it does not overwrite the data itself. Standard formatting leaves some data
recoverable using forensic tools or software utilities. Deleting is a process that removes the data
from a hard drive by marking it as free space, but it does not erase or overwrite the data itself.
Deleting leaves most data recoverable using undelete tools or software utilities. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 105

Question: 427
Which of the following is used to ensure users have the appropriate level of access to perform their
Exam Dumps 233/269

job functions?

A. Access control list


B. Multifactor authentication
C. Least privilege
D. Mobile device management

Answer: C
Explanation:

Least privilege is the principle that is used to ensure users have the appropriate level of access to
perform their job functions. Least privilege means granting users only the minimum amount of
access rights and permissions they need to perform their tasks, and nothing more. Least privilege
reduces the risk of unauthorized access, data leakage, malware infection, or accidental damage by
limiting what users can do on the system or network. Access control list, multifactor authentication,
and mobile device management are not principles, but rather mechanisms or methods that can
implement least privilege. Access control list is a list that specifies the users or groups that are
allowed or denied access to a resource, such as a file, folder, or printer. Multifactor authentication is
a method that requires users to provide two or more pieces of evidence to prove their identity, such
as a password, a token, or a biometric factor. Mobile device management is a tool that allows
managing and securing mobile devices, such as smartphones or tablets, that are used by employees
to access corporate data or applications. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25
[CompTIA Security+ SY0-601 Certification Study Guide], page 1003

Question: 428
Which of the following is command options is used to display hidden files and directories?

A. -a
B. -s
C. -lh
D. -t

Answer: A
Explanation:

The -a option is used to display hidden files and directories in a command-line interface. Hidden files
and directories are those that start with a dot (.) and are normally not shown by default. The -a
option stands for “all” and shows all files and directories, including the hidden ones. The -a option
can be used with commands such as ls, dir, or find to list or search for hidden files and directories.
The -s, -lh, and -t options are not used to display hidden files and directories. The -s option stands for
“size” and shows the size of files or directories in bytes. The -lh option stands for “long human-
readable” and shows the size of files or directories in a more readable format, such as KB, MB, or GB.
The -t option stands for “time” and sorts the files or directories by modification time. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 17
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 107
Exam Dumps 234/269

Question: 429

Which of the following file types would be used in the Windows Startup folder to automate copying a
personal storage table (.pst file) to a network drive at log-in?

A. .bat
B. .dll
C. .ps1
D. .txt

Answer: A
Explanation:

The .bat file type would be used in the Windows Startup folder to automate copying a personal
storage table (.pst) file to a network drive at log-in. A .bat file is a batch file that contains a series of
commands that can be executed by the command interpreter. A .bat file can be used to perform
various tasks, such as copying, moving, deleting, or renaming files or directories. A .bat file can be
placed in the Windows Startup folder to run automatically when a user logs in to the system. A .bat
file can use the copy command to copy a .pst file from a local drive to a network drive. A .pst file is a
personal storage table file that contains email messages, contacts, calendars, and other data from
Microsoft Outlook. A .pst file can be backed up to a network drive for security or recovery purposes.
The .dll, .ps1, and .txt file types are not used in the Windows Startup folder to automate copying a
.pst file to a network drive at log-in. A .dll file is a dynamic link library file that contains code or data
that can be shared by multiple programs. A .dll file cannot be executed directly by the user or the
system. A .ps1 file is a PowerShell script file that contains commands or expressions that can be
executed by the PowerShell interpreter. A .ps1 file can also perform various tasks, such as copying
files or directories, but it requires PowerShell to be installed and configured on the system. A .txt file
is a plain text file that contains unformatted text that can be read by any text editor or word
processor. A .txt file cannot contain commands or expressions that can be executed by the
system. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 18
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459

Question: 430
A systems administrator received a request to limit the amount of cellular data a user's Windows 10
tablet can utilize when traveling. Which of the following can the administrator do to best solve the
user's issue?

A. Turn on airplane mode.


B. Set the connection to be metered.
C. Configure the device to use a static IP address.
D. Enable the Windows Defender Firewall.

Answer: B
Explanation:
Exam Dumps 235/269

Setting the connection to be metered is the best solution for limiting the amount of cellular data a
user’s Windows 10 tablet can utilize when traveling. A metered connection is a network connection
that has a data limit or charges fees based on the amount of data used. Windows 10 allows users to
set any network connection as metered, which reduces the amount of data that Windows and some
apps use in the background. For example, setting a connection as metered will prevent Windows
from downloading updates automatically, stop some apps from syncing data online, and disable
some live tiles on the Start menu. Setting a connection as metered can help users save cellular data
and avoid extra charges when traveling. Turning on airplane mode, configuring the device to use a
static IP address, and enabling the Windows Defender Firewall are not effective solutions for limiting
the amount of cellular data a user’s Windows 10 tablet can utilize when traveling. Turning on
airplane mode will disable all wireless connections on the device, including Wi-Fi, Bluetooth, and
cellular data. This will prevent the user from accessing any online services or applications on the
tablet. Configuring the device to use a static IP address will assign a fixed IP address to the device
instead of obtaining one dynamically from a DHCP server. This will not affect the amount of cellular
data the device uses, and it may cause IP conflicts or connectivity issues on some networks. Enabling
the Windows Defender Firewall will block or allow incoming and outgoing network traffic based on
predefined or custom rules. This will not reduce the amount of cellular data the device uses, and it
may interfere with some apps or services that require network access. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 19
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 108

Question: 431
A technician successfully removed malicious software from an infected computer after running
updates and scheduled scans to mitigate future risks. Which of the following should the technician
do next?

A. Educate the end user on best practices for security.


B. Quarantine the host in the antivirus system.
C. Investigate how the system was infected with malware.
D. Create a system restore point.

Answer: A
Explanation:

Educating the end user on best practices for security is the next step that the technician should take
after successfully removing malicious software from an infected computer. Educating the end user on
best practices for security is an important part of preventing future infections and mitigating risks.
The technician should explain to the end user how to avoid common sources of malware, such as
phishing emails, malicious websites, or removable media. The technician should also advise the end
user to use strong passwords, update software regularly, enable antivirus and firewall protection,
and backup data frequently. Educating the end user on best practices for security can help the end
user become more aware and responsible for their own security and reduce the likelihood of
recurrence of malware infections. Quarantining the host in the antivirus system, investigating how
the system was infected with malware, and creating a system restore point are not the next steps
that the technician should take after successfully removing malicious software from an infected
computer. Quarantining the host in the antivirus system is a step that the technician should take
Exam Dumps 236/269

before removing malicious software from an infected computer. Quarantining the host in the
antivirus system means isolating the infected computer from the network or other devices to
prevent the spread of malware. Investigating how the system was infected with malware is a step
that the technician should take during or after removing malicious software from an infected
computer. Investigating how the system was infected with malware means identifying the source,
type, and impact of malware on the system and documenting the findings and actions taken.
Creating a system restore point is a step that the technician should take before removing malicious
software from an infected computer. Creating a system restore point means saving a snapshot of the
system’s configuration and settings at a certain point in time, which can be used to restore the
system in case of failure or corruption. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 15
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458

Question: 432
Maintaining the chain of custody is an important part of the incident response process. Which of the
following reasons explains why this is important?

A. To maintain an information security policy


B. To properly identify the issue
C. To control evidence and maintain integrity
D. To gather as much information as possible

Answer: C
Explanation:

Maintaining the chain of custody is important to control evidence and maintain integrity. The chain
of custody is a process that documents who handled, accessed, or modified a piece of evidence,
when, where, how, and why. The chain of custody ensures that the evidence is preserved, protected,
and authenticated throughout the incident response process. Maintaining the chain of custody can
help prevent tampering, alteration, or loss of evidence, as well as establish its reliability and validity
in legal proceedings. Maintaining an information security policy, properly identifying the issue, and
gathering as much information as possible are not reasons why maintaining the chain of custody is
important. Maintaining an information security policy is a general practice that defines the rules and
guidelines for securing an organization’s information assets and resources. Properly identifying the
issue is a step in the incident response process that involves analyzing and classifying the incident
based on its severity, impact, and scope. Gathering as much information as possible is a step in the
incident response process that involves collecting and documenting relevant data and evidence from
various sources, such as logs, alerts, or witnesses. Reference:
Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 26

Question: 433
Which of the following statements describes the purpose of scripting languages?
A. To access the hardware of the computer it is running on
B. To automate tasks and reduce the amount of manual labor
C. To abstract the complexity of the computer system
Exam Dumps 237/269

D. To compile the program into an executable file

Answer: B
Explanation:
Scripting languages are used to write small to medium-sized programs that perform specific
tasks. Some common uses of scripting languages are: automating repetitive processes, web
development, system administration, data processing, multimedia and games, report generation,
document and text processing, writing plugins and extensions for existing programs and
applications1.
Reference: 1 What is Scripting Language?: Introduction, Types, Uses & Career
…(https://leverageedu.com/blog/scripting-language/)

Question: 434

Which of the following file types allows a user to easily uninstall software from macOS by simply
placing it in the trash bin?
A. .exe
B. .dmg
C. .app
D. .rpm
E. .pkg

Answer: C
Explanation:

.app files are application bundles that contain all the necessary files and resources for a Mac
app. They can be easily deleted by dragging them to the Trash or using Launchpad12. Other file
types, such as .exe, .dmg, .rpm, and .pkg, are either not compatible with macOS or require additional
steps to uninstall34.
Reference: 1 Uninstall apps on your Mac - Apple Support(https://support.apple.com/en-
us/102610)2 How to Uninstall Apps on a Mac (and Make Sure Leftover Files Are
…(https://www.pcmag.com/how-to/uninstall-delete-apps-from-mac)3 How to install and uninstall
software on a Mac - Laptop Mag(https://www.laptopmag.com/articles/install-unininstall-mac-
software)4 How to completely uninstall an app on a Mac and delete all junk files(https://www.xda-
developers.com/how-to-uninstall-app-mac/).

Question: 435

An organization is updating the monitors on kiosk machines. While performing the upgrade, the
organization would like to remove physical input devices. Which of the following utilities in the
Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?
A. Devices and Printers
B. Ease of Access
C. Programs and Features
D. Device Manager
Exam Dumps 238/269

Answer: B
Explanation:
Ease of Access is a utility in the Control Panel that allows users to adjust various accessibility settings
on Windows, such as the on-screen keyboard, magnifier, narrator, high contrast, etc. The on-screen
keyboard can be turned on by going to Ease of Access > Keyboard and toggling the switch to
On12. Alternatively, the on-screen keyboard can be opened by pressing Windows + Ctrl + O keys or
by typing osk.exe in the Run dialog box3.
Reference: 1 Use the On-Screen Keyboard (OSK) to type(https://support.microsoft.com/en-
us/windows/use-the-on-screen-keyboard-osk-to-type-ecbb5e08-5b4e-d8c8-f794-
81dbf896267a)2 How to Enable or Disable the On-Screen Keyboard in Windows 10 -
Lifewire(https://www.lifewire.com/enable-or-disable-on-screen-keyboard-in-windows-10-
5180667)3 On-Screen Keyboard Settings, Tips and Tricks in Windows
11/10(https://www.thewindowsclub.com/windows-onscreen-keyboard).

Question: 436
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit
notifications, and experiencing slow response. After checking the device, a technician notices the
device has been jailbroken. Which of the following should the technician do next?
A. Run an antivirus and enable encryption.
B. Restore the defaults and reimage the corporate OS.
C. Back up the files and do a system restore.
D. Undo the jailbreak and enable an antivirus.

Answer: B
Explanation:

Jailbreaking a device exposes it to various security risks, such as malware, data theft, network
attacks, and service disruption1234. Running an antivirus and enabling encryption may not be
enough to remove the threats and restore the device’s functionality. Undoing the jailbreak may not
be possible or effective, depending on the method used. Backing up the files and doing a system
restore may preserve the jailbreak and the associated problems. The best option is to erase the
device and reinstall the original operating system that is compatible with the corporate policies and
standards. This will ensure that the device is clean, secure, and compliant25.
Reference: 1 What is Jailbreaking & Is it safe? - Kaspersky(https://www.kaspersky.com/resource-
center/definitions/what-is-jailbreaking). 2 Jailbreak Detection: Why is jailbreaking a potential
security risk? - Cybersecurity ASEE(https://cybersecurity.asee.co/blog/what-is-
jailbreaking/). 3 Jailbreaking Information for iOS Devices | University
IT(https://uit.stanford.edu/service/mydevices/jailbreak)4 What does it mean to jailbreak your
phone—and is it legal? - Microsoft(https://www.microsoft.com/en-us/microsoft-365-life-
hacks/privacy-and-safety/what-is-jailbreaking-a-phone). 5 Resetting a corporate laptop back to a
personal laptop… Enterprise vs Pro - Windows
10(https://community.spiceworks.com/topic/2196812-resetting-a-corporate-laptop-back-to-a-
personal-laptop-enterprise-vs-pro).

Question: 437
A technician downloaded a software program to a network share. When the technician attempts to
Exam Dumps 239/269

copy the program to the Windows tablet for installation, the technician receives an error. Which of
the following is the best procedure for the technician to use to complete the assignment?
A. Copy the program file to a USB drive and install.
B. Burn the program file to a CD and install.
C. Format the HDD and then do the installation.
D. Replace the HDD and then do the installation.

Answer: A
Explanation:

Copying the program file to a USB drive and installing it from there is the simplest and most reliable
way to transfer the software from the network share to the Windows tablet. The other options are
either unnecessary, risky, or impractical. Burning the program file to a CD requires a CD burner and a
CD reader, which may not be available on the tablet. Formatting or replacing the HDD will erase all
the data and settings on the tablet, which is not advisable unless there is a backup or a serious
problem. Moreover, formatting or replacing the HDD will not solve the issue of copying the program
file from the network share.
Reference: 1 How To Copy A Program From One Computer To Another: 5
Ways(https://www.minitool.com/news/transfer-copy-programs-from-one-computer-to-
another.html)2 Transfer files between your Android tablet and PC using Wi-
Fi(https://www.techrepublic.com/article/transfer-files-between-your-android-tablet-and-pc-using- wi-
fi/)3 Share Files Between Your Tablet and Computer with Huawei
Share(https://consumer.huawei.com/en/support/content/en-us15819174/)4 How to Transfer
Installed Programs to Another PC on Windows 10(https://www.diskpart.com/articles/transfer-
installed-program-to-another-pc-windows-10-0825.html).

Question: 438

Antivirus software indicates that a workstation is infected with ransomware that cannot be
quarantined. Which of the following should be performed first to prevent further damage to the host
and other systems?
A. Turn off the machine.
B. Run a full antivirus scan.
C. Remove the LAN card.
D. Install a different endpoint solution.

Answer: A
Explanation:
Turning off the machine is the first and most urgent step to prevent further damage to the host and
other systems. Ransomware can encrypt files, steal data, and spread to other devices on the network
if the infected machine remains online. Turning off the machine will stop the ransomware process
and isolate the machine from the network12. The other options are either ineffective or risky.
Running a full antivirus scan may not detect or remove the ransomware, especially if it is a new or
unknown variant. Removing the LAN card may disconnect the machine from the network, but it will
not stop the ransomware from encrypting or deleting files on the local drive. Installing a different
endpoint solution may not be possible or helpful if the ransomware has already compromised the
Exam Dumps 240/269

system or blocked the installation.


Reference: 1 3 steps to prevent and recover from ransomware(https://www.microsoft.com/en-
us/security/blog/2021/09/07/3-steps-to-prevent-and-recover-from-
ransomware/)2 #StopRansomware Guide |
CISA(https://www.cisa.gov/stopransomware/ransomware-guide).

Question: 439

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the
following would these guidelines be published?
A. Standard operating procedure
B. Acceptable use policy
C. Security protocols
D. Data flow diagram

Answer: B
Explanation:
An acceptable use policy (AUP) is a document that defines the rules and expectations for the users of
a system, network, or service. It typically covers topics such as the purpose, scope, responsibilities,
and restrictions of using the system, network, or service1. An AUP is a suitable place to publish the
guidelines for the incorporation of generative AI solutions, as it can inform the users of the benefits,
risks, and ethical implications of using such tools. It can also specify the conditions and limitations for
using generative AI solutions, such as the types of data, content, and applications that are allowed or
prohibited, the security and privacy requirements, the legal and regulatory compliance, and the
accountability and reporting mechanisms23.
Reference: 1 What is an Acceptable Use Policy (AUP)? - Definition from
Techopedia(https://security.stackexchange.com/questions/84168/the-difference-of-security-policy-
and-acceptable-use-policy). 2 Guide on the use of Generative AI -
Canada.ca(https://www.canada.ca/en/government/system/digital-government/digital-government-
innovations/responsible-use-ai/guide-use-generative-ai.html)3 Key Considerations for Developing
Organizational Generative AI Policies - ISACA(https://www.isaca.org/resources/news-and-
trends/newsletters/atisaca/2023/volume-44/key-considerations-for-developing-organizational-
generative-ai-policies).

Question: 440
The calendar application on an employee's smartphone is experiencing frequent crashes, and the
smartphone has become unresponsive. Which of the following should a technician do first to resolve
the issue?
A. Reinstall the application on the smartphone.
B. Update the smartphone's OS.
C. Reset the smartphone to factory settings.
D. Reboot the smartphone.

Answer: D
Explanation:
Rebooting the smartphone is the first and simplest step to resolve the issue of frequent crashes and
Exam Dumps 241/269

unresponsiveness. Rebooting clears the memory, closes the background apps, and refreshes the
system. It can also fix minor glitches and bugs that may cause the calendar app or the smartphone to
malfunction12. The other options are either too drastic or unnecessary. Reinstalling the application
may not solve the problem if the issue is with the smartphone itself. Updating the smartphone’s OS
may not be possible or helpful if the device is unresponsive or incompatible. Resetting the
smartphone to factory settings will erase all the data and settings on the device, which should be the
last resort.
Reference: 1 How to Reboot an Android Smartphone or Tablet(https://www.lifewire.com/reboot-
android-smartphone-or-tablet-4127180)2 How to Restart or Shut Down a Smartphone or
Tablet(https://www.computerhope.com/issues/ch001912.htm).

Question: 441

When visiting a particular website, a user receives a message stating, "Your connection is not
private." Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update

Answer: A
Explanation:

A certificate warning is a message that appears when a web browser cannot verify the identity or
security of a website. It usually means that there is a problem with the website’s SSL certificate, such
as expiration, invalidity, or mismatch. A certificate warning can indicate that the website is unsafe or
compromised, and that the user’s connection is not private123.
Reference: 1 How to Fix "Your Connection Is Not Private" Errors - How-To
Geek(https://www.howtogeek.com/874436/how-to-fix-your-connection-is-not-private-
errors/)2 How to fix a “Your connection is not private” error -
Norton(https://us.norton.com/blog/how-to/your-connection-is-not-private)3 "Your Connection Is
Not Private" Error: 8 Ways to Fix It - HubSpot Blog(https://blog.hubspot.com/website/how-to-fix-
your-connection-is-not-private).

Question: 442
Which of the following environmental factors are most important to consider when planning the
configuration of a data center? (Select two).
A. Temperature levels
B. Location of the servers
C. Humidity levels
D. Noise levels
E. Lighting levels
F. Cable management

Answer: AC
Explanation:
Exam Dumps 242/269

Temperature and humidity levels are the most important environmental factors to consider when
planning the configuration of a data center, as they directly affect the performance, reliability, and
energy efficiency of the IT equipment. Excessive heat or moisture can cause overheating, corrosion,
condensation, or static electricity, which can damage the hardware and lead to data loss or service
disruption. Therefore, data centers need to monitor and control the temperature and humidity levels
within the recommended ranges by using various cooling systems, airflow management, and
sensors12.
Reference: 1 5 Factors to Consider for Data Center Environmental
Monitoring(https://community.fs.com/blog/5-factors-to-consider-for-data-center-environmental-
monitoring.html)2 Data Center Environmental standards and Controls -
DataSpan(https://dataspan.com/blog/data-center-environmental-standards/).

Question: 443

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed
software product, but the user does not want to pay for a license. Which of the following license
types should the technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise
Answer: B
Explanation:
Open-source software is software that has its source code available for anyone to inspect, modify,
and distribute. Open-source software is usually free of charge and does not require a license to
use. Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The
other license types are either not free or not suitable for a SOHO PC. Corporate and enterprise
licenses are designed for large-scale organizations and networks, and they usually require a
subscription fee. Personal licenses are for individual users and may have limited features or support.
Reference: 1 What is Open Source Software? - Definition from
Techopedia(https://www.tomsguide.com/us/best-antivirus,review-2588.html). 2 7 Best Lifetime
License Antivirus Tools [2023 Guide] - Windows Report(https://windowsreport.com/antivirus-with-
unlimited-validity/).

Question: 444
An administrator has submitted a change request for an upcoming server deployment. Which of the
following must be completed before the change can be approved?
A. Risk analysis
B. Sandbox testing
C. End user acceptance
D. Lessons learned

Answer: A
Explanation:
Exam Dumps 243/269

Risk analysis is the process of identifying and evaluating the potential threats and impacts of a
change on the system, network, or service. It is an essential step before approving a change request,
as it helps to determine the level of risk, the mitigation strategies, and the contingency plans. Risk
analysis also helps to prioritize the change requests based on their urgency and importance12.
Reference: 1 The Change Request Process and Best
Practices(https://www.processmaker.com/blog/it-change-request-process-best-practices/)2 Risk
Assessment and Analysis Methods: Qualitative and
Quantitative(https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/risk-
assessment-and-analysis-methods).

Question: 445

A user requested that the file permissions on a Linux device be changed to only allow access to a
certain group of users. Which of the following commands should be used to complete the user's
request?
A. cat
B. chmod
C. pwd
D. cacls

Answer: B
Explanation:

The chmod command is used to change the permissions of files and directories in Linux. It can grant
or revoke read, write, and execute permissions for the owner, the group, and others. To change the
file permissions to only allow access to a certain group of users, the chmod command can use either
the symbolic or the numeric mode. For example, to give read and write permissions to the group and
no permissions to others, the command can be:
chmod g+rw,o-rwx filename
or
chmod 660 filename
Reference: 1 Chmod Command in Linux (File Permissions) |
Linuxize(https://linuxize.com/post/chmod-command-in-linux/)2 How To Change File or Directory
Permissions in Linux | Tom’s Hardware(https://www.tomshardware.com/how-to/change-file-
directory-permissions-linux).

Question: 446

A technician is building a new desktop machine for a user who will be using the workstation to
render 3-D promotional movies. Which of the following is the most important component?
A. Dedicated GPU
B. DDR5 SODIMM
C. NVMe disk
D. 64-bit CPU

Answer: A
Exam Dumps 244/269

Explanation:
A dedicated GPU (graphics processing unit) is the most important component for rendering 3-D
promotional movies, as it can handle the complex calculations and graphics operations required for
creating realistic and high-quality images. A dedicated GPU has its own memory and processor,
which are optimized for graphics tasks. A dedicated GPU can also support multiple monitors, high
resolutions, and advanced features such as ray tracing12.
Reference: 1 What Kind of Computer Do You Need for 3D Rendering in
2021?(https://kitbash3d.com/a/blog/best-computer-for-3d-rendering-2021)2 How to Choose the
Best Hardware for a 3D Artist - GarageFarm(https://garagefarm.net/blog/how-to-choose-the-best-
hardware-for-a-3d-artist).

Question: 447
As a corporate technician, you are asked to evaluate several suspect email messages on
a client's computer. Corporate policy requires he following:
. All phishing attempts must be reported.
. Future spam emails to users must be prevented.
INSTRUCTIONS
Review each email and perform the
following within the email:
. Classify the emails
. Identify suspicious items, if applicable, in each email
. Select the appropriate resolution

Answer: See the Full


solution in
Explanation below.
Explanation:
Exam Dumps 245/269

Classification: a) Phishing
This email is a phishing attempt, as it tries to trick the user into clicking on a malicious link that could
compromise their account or personal information. Some suspicious items in this email are:
The email has a generic greeting and does not address the user by name.
The email has spelling errors, such as “unusal” and “Locaked”.
The email uses a sense of urgency and fear to pressure the user into clicking on the link.
The email does not match the official format or domain of the IT Help Desk at CompTIA.
The email has two black bat icons, which are not related to CompTIA or IT support.
The appropriate resolution for this email is
A. Report email to Information Security. The user should not click on the link, reply to the email, or
provide any personal or account information. The user should forward the email to the Information
Security team or use a professional email form to report the phishing attempt. The user should also
delete the email from their inbox and trash folder.

The suspicious items to select are:


b) From address
d) Hyperlinks
These items indicate that the email is not from a legitimate source and that the link is potentially
malicious. The other items are not suspicious in this case, as the to address is the user’s own email
and there are no attachments.

Classification: b) Spam
This email is a spam email, as it is an unsolicited and unwanted message that tries to persuade the
user to participate in a survey and claim a reward. Some suspicious items in this email are:
The email offers a free wireless headphone as an incentive, which is too good to be true.
The email does not provide any details about the survey company, such as its name, address, or
contact information.
The email contains an external survey link, which may lead to a malicious or fraudulent website.
The email does not have an unsubscribe option, which is required by law for commercial emails.
The appropriate resolution for this email is C. Unsubscribe. The user should look for an unsubscribe
link or button at the bottom of the email and follow the instructions to opt out of receiving future
Exam Dumps 246/269

emails from the sender. The user should also mark the email as spam or junk in their email client,
which will help filter out similar emails in the future. The user should not click on the survey link,
reply to the email, or provide any personal or financial information.

Classification: c) Legitimate
This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no
suspicious items in this email, as the from address, the to address, the attachment, and the email
body are all consistent and relevant. The appropriate resolution for this email is B. Perform no
additional actions. The user can open the attachment and review the orientation material as
instructed. The user does not need to report, unsubscribe, or delete this email.
Exam Dumps 247/269

Classification: a) Phishing
This email is a phishing attempt, as it tries to deceive the user into downloading and running a
malicious attachment that could compromise their system or data. Some suspicious items in this
email are:
The email has a generic greeting and does not address the user by name or username.
The email has an urgent tone and claims that a security patch needs to be installed immediately.
The email has an attachment named “patch1.exe”, which is an executable file that could contain
malware or ransomware.
The email does not match the official format or domain of CompTIA Information Security.
The appropriate resolution for this email is A. Report email to Information Security. The user should
not open the attachment, reply to the email, or provide any personal or account information. The
user should forward the email to the Information Security team or use a professional email form to
report the phishing attempt. The user should also delete the email from their inbox and trash folder.
Exam Dumps 248/269

Classification: c) Legitimate
This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no
suspicious items in this email, as the from address, the to address, and the email body are all
consistent and relevant. The appropriate resolution for this email is B. Perform no additional actions.
The user can reply to the email and thank the sender for the interview opportunity. The user does
not need to report, unsubscribe, or delete this email.
Exam Dumps 249/269

Question: 448
A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following
security log:
SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture
The technician analyses the following Windows firewall information:

Which of the following protocols most likely allowed the data theft to occur?

A. 1
B. 53
C. 110
D. 445
Answer: D
Explanation:

The protocol that most likely allowed the data theft to occur is SMB over TCP port 445. SMB is a
network file sharing protocol that enables access to files, printers, and other resources on a network.
Port 445 is used by SMB to communicate directly over TCP without the need for NetBIOS, which is an
Exam Dumps 250/269

older and less secure protocol. The security log shows that the source IP address 192.168.1.1 sent a
file named secrets.zip using SMB protocol to the destination IP address 192.168.1.50, which captured
the file. The Windows firewall information shows that port 445 is enabled for inbound and outbound
traffic, which means that it is not blocked by the firewall. Therefore, port 445 is the most likely port
that was exploited by the attacker to steal the data from the corporate laptop.
Reference:
SMB port number: Ports 445, 139, 138, and 137 explained1
What is an SMB Port + Ports 445 and 139 Explained2
CompTIA A+ Certification Exam Core 2 Objectives3

Question: 449
When a user is in the office, the user's mobile phone loads applications and web browses very slowly
on a cellular connection. Which of the following is the best way to fix this issue?
A. Connect to the company's Wi-Fi network.
B. Change the settings on the phone to connect to a different cellular tower.
C. Install a cellular repeater at the office for this user.
D. Update all applications on the phone.

Answer: A
Explanation:

The best way to fix the issue of slow cellular connection in the office is to connect to the company’s
Wi-Fi network. This will allow the user’s mobile phone to access the internet through a faster and
more reliable wireless network, instead of relying on the cellular network. Connecting to the Wi-Fi
network will also save the user’s data usage and battery life.
Some of the factors that can affect the cellular connection speed are the distance from the cell tower,
the obstructions between the phone and the tower, the network congestion, the network
technology, and the features of the phone12. In the office, the user may experience a weak or
unstable cellular signal due to the building structure, the location, or the interference from other
devices. Therefore, switching to the Wi-Fi network can improve the performance of the phone’s
applications and web browsing.
Reference:
CompTIA A+ Certification Exam Core 2 Objectives3
CompTIA A+ Core 2 (220-1102) Certification Study Guide4
Factors affecting the speed and quality of internet connection1
Why Is Your Mobile Data So Slow? How to Speed It Up in 10 Steps2

Question: 450
A customer calls desktop support and begins yelling at a technician. The customer claims to have
submitted a support ticket two hours ago and complains that the issue still has not been resolved.
Which of the following describes how the technician should respond?
A. Place the customer on hold until the customer calms down.
B. Disconnect the call to avoid a confrontation.
C. Wait until the customer is done speaking and offer assistance.
D. Escalate the issue to a supervisor.
Exam Dumps 251/269

Answer: C
Explanation:
The best way to deal with an angry customer who is yelling at a technician is to wait until the
customer is done speaking and offer assistance. This shows respect, empathy, and professionalism,
and allows the technician to understand the customer’s problem and find a solution. According to
the CompTIA A+ Core 2 (220-1102) Certification Study Guide1, some of the steps to handle angry
customers are:
Stay calm and do not take it personally.
Listen actively and acknowledge the customer’s feelings.
Apologize sincerely and offer to help.
Restate the customer’s issue and ask for clarification if needed.
Explain the possible causes and solutions for the problem.
Provide clear and realistic expectations for the resolution.
Follow up with the customer until the issue is resolved.
The other options are not appropriate ways to deal with angry customers, as they may worsen the
situation or damage the customer relationship. Placing the customer on hold may make them feel
ignored or dismissed. Disconnecting the call may make them feel disrespected or abandoned.
Escalating the issue to a supervisor may make them feel frustrated or powerless, unless the
technician cannot resolve the issue or the customer requests to speak to a supervisor.
Reference:
CompTIA A+ Certification Exam Core 2 Objectives2
CompTIA A+ Core 2 (220-1102) Certification Study Guide1
How To Deal with Angry Customers (With Examples and Tips)3
17 ways to deal with angry customers: Templates and examples4
Six Ways to Handle Angry Customers5

Question: 451
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit
notifications, and experiencing slow response. After checking the device, a technician notices the
device has been jailbroken. Which of the following should the technician do next?
A. Run an antivirus and enable encryption.
B. Restore the defaults and reimage the corporate OS.
C. Back up the files and do a system restore.
D. Undo the jailbreak and enable an antivirus.

Answer: B
Explanation:
The best course of action for the technician is to restore the defaults and reimage the corporate OS
on the device. This will remove the jailbreak and any unauthorized or malicious apps that may have
been installed on the device, as well as restore the security features and policies that the company
has set for its devices. This will also ensure that the device can receive the latest updates and patches
from the manufacturer and the company, and prevent any data leakage or compromise from the
device.
Jailbreaking is a process of bypassing the built-in security features of a device to install software
other than what the manufacturer has made available for that device1. Jailbreaking allows the device
owner to gain full access to the root of the operating system and access all the features1. However,
Exam Dumps 252/269

jailbreaking also exposes the device to various risks, such as:


The loss of warranty from the device manufacturers2.
Inability to update software until a jailbroken version becomes available2.
Increased security vulnerabilities32.
Decreased battery life2.
Increased volatility of the device2.
Some of the signs of a jailbroken device are:
A high number of ads, which may indicate the presence of adware or spyware on the device3.
Receiving data-usage limit notifications, which may indicate the device is sending or receiving data in
the background without the user’s knowledge or consent3.
Experiencing slow response, which may indicate the device is running unauthorized or malicious
apps that consume resources or interfere with the normal functioning of the device3.
Finding apps or icons that the user did not install or recognize, such as Cydia, which is a storefront for
jailbroken iOS devices1.
The other options are not sufficient or appropriate for dealing with a jailbroken device. Running an
antivirus and enabling encryption may not detect or remove all the threats or vulnerabilities that the
jailbreak has introduced, and may not restore the device to its original state or functionality. Backing
up the files and doing a system restore may not erase the jailbreak or the unauthorized apps, and
may also backup the infected or compromised files. Undoing the jailbreak and enabling an antivirus
may not be possible or effective, as the jailbreak may prevent the device from updating or installing
security software, and may also leave traces of the jailbreak or the unauthorized apps on the device.
Reference:
CompTIA A+ Certification Exam Core 2 Objectives4
CompTIA A+ Core 2 (220-1102) Certification Study Guide5
What is Jailbreaking & Is it safe? - Kaspersky1
Is Jailbreaking Safe? The ethics, risks and rewards involved - Comparitech3
Jailbreaking : Security risks and moving past them2

Question: 452
Which of the following is also known as something you know, something you have, and something
you are?
A. ACL
B. MFA
C. SMS
D. NFC

Answer: B
Explanation:
MFA stands for Multi-Factor Authentication, which is a method of verifying a user’s identity using
two or more different factors of authentication. The three factors of authentication are something
you know, something you have, and something you are. These factors correspond to different types
of information or evidence that only the legitimate user should possess or provide. For example:
Something you know: a password, a PIN, a security question, etc.
Something you have: a smart card, a token, a mobile device, etc.
Something you are: a fingerprint, a face, an iris, etc.
MFA provides a higher level of security than single-factor authentication, which only uses one factor,
such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches,
Exam Dumps 253/269

as an attacker would need to compromise more than one factor to impersonate a user. MFA is
commonly used for online banking, email accounts, cloud services, and other sensitive applications

Question: 453
A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently
20 minutes late. The customer will also be late. Which of the following should the technician do
considering proper communication techniques and professionalism?
A. Do not notify the customer if arriving before the customer.
B. Dismiss the customer and proceed with the after-hours work.
C. Contact the customer if the technician is arriving late.
D. Disclose the experience via social media.

Answer: C
Explanation:
The best option for the technician to demonstrate proper communication techniques and
professionalism is to contact the customer if the technician is arriving late. This shows respect for the
customer’s time and expectations, and allows the customer to adjust their schedule accordingly. It
also helps to maintain a positive relationship and trust between the technician and the customer. The
technician should apologize for the delay and provide a realistic estimate of their arrival time. The
technician should also thank the customer for their patience and understanding.
The other options are not appropriate or professional. Do not notify the customer if arriving before
the customer is not a good practice, as it may cause confusion or frustration for the customer. The
customer may have made other plans or arrangements based on the technician’s original schedule,
and may not be available or prepared for the service. Dismiss the customer and proceed with the
after-hours work is rude and disrespectful, as it ignores the customer’s needs and preferences. The
customer may have questions or concerns about the service, or may want to supervise or verify the
work. The technician should always communicate with the customer before, during, and after the
service. Disclose the experience via social media is unethical and unprofessional, as it may violate
the customer’s privacy and the company’s policies. The technician should not share any confidential
or sensitive information about the customer or the service on social media, or make any negative or
inappropriate comments about the customer or the situation.
Reference:
CompTIA A+ Certification Exam Core 2 Objectives1
CompTIA A+ Core 2 (220-1102) Certification Study Guide2
8 Ways You Can Improve Your Communication Skills3
Professionalism in Communication | How To Do It And How It Pays4

Question: 454
Which of the following would typically require the most computing resources from the host
computer?
A. Chrome OS
B. Windows
C. Android
D. macOS
E. Linux
Exam Dumps 254/269

Answer: B
Explanation:

Windows is the operating system that typically requires the most computing resources from the host
computer, compared to the other options. Computing resources include hardware components such
as CPU, RAM, disk space, graphics card, and network adapter. The minimum system requirements for
an operating system indicate the minimum amount of computing resources needed to install and run
the operating system on a computer. The higher the minimum system requirements, the more
computing resources the operating system consumes.
According to the web search results, the minimum system requirements for Windows 10 and
Windows 11 are as follows12:
CPU: 1 GHz or faster with two or more cores (Windows 10); 1 GHz or faster with two or more cores
on a compatible 64-bit processor (Windows 11)
RAM: 1 GB for 32-bit or 2 GB for 64-bit (Windows 10); 4 GB (Windows 11)
Disk space: 16 GB for 32-bit or 32 GB for 64-bit (Windows 10); 64 GB (Windows 11)
Graphics card: DirectX 9 or later with WDDM 1.0 driver (Windows 10); DirectX 12 compatible with
WDDM 2.0 driver (Windows 11)
Network adapter: Ethernet or Wi-Fi (Windows 10); Ethernet or Wi-Fi that supports 5 GHz (Windows
11)
The minimum system requirements for macOS Ventura are as follows:
CPU: Intel Core i3 or higher, or Apple M1 chip
RAM: 4 GB
Disk space: 35.5 GB
Graphics card: Metal-capable
Network adapter: Ethernet or Wi-Fi
The minimum system requirements for Chrome OS are as follows:
CPU: Intel Celeron or higher
RAM: 2 GB
Disk space: 16 GB
Graphics card: Integrated
Network adapter: Ethernet or Wi-Fi
The minimum system requirements for Android are as follows:
CPU: 1 GHz or higher
RAM: 512 MB
Disk space: 8 GB
Graphics card: OpenGL ES 2.0
Network adapter: Ethernet or Wi-Fi
The minimum system requirements for Linux vary depending on the distribution, but a common
example is Ubuntu, which has the following minimum system requirements:
CPU: 2 GHz dual core processor or better
RAM: 4 GB
Disk space: 25 GB
Graphics card: 1024 x 768 screen resolution
Network adapter: Ethernet or Wi-Fi
Based on the comparison of the minimum system requirements, Windows has the highest
requirements for CPU, RAM, disk space, and graphics card, while Chrome OS and Android have the
lowest requirements. macOS and Linux have moderate requirements, depending on the hardware
Exam Dumps 255/269

and software configuration. Therefore, Windows is the operating system that typically requires the
most computing resources from the host computer.
Reference:
Windows, macOS, Chrome OS, or Linux: Which Operating System Is Right for You?1
Comparison of operating systems3
Windows 10 vs 11 Minimum System Requirements: Why Need a New One?2
macOS Monterey - Technical Specifications
Chrome OS - Wikipedia
Android - Wikipedia
Installation/SystemRequirements - Community Help Wiki

Question: 455

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the
following should be disabled to mitigate connection attempts?
A. SSID
B. DHCP
C. Firewall
D. SSD

Answer: A
Explanation:
The SSID (Service Set Identifier) is the name of a wireless network that is broadcasted by the router
or the Wi-Fi base station. The SSID helps nearby devices to identify and connect to the available
networks. However, broadcasting the SSID also exposes the network to potential connection
attempts from unauthorized or malicious users. Therefore, disabling the SSID can mitigate
connection attempts by making the network invisible or hidden to the devices that are not already
connected to it. To connect to a hidden network, the user would need to know the exact SSID and
enter it manually.
The other options are not related to mitigating connection attempts to the corporate Wi-Fi. DHCP
(Dynamic Host Configuration Protocol) is a protocol that assigns IP addresses to the devices on a
network. Firewall is a software or hardware device that filters the incoming and outgoing network
traffic based on predefined rules. SSD (Solid State Drive) is a type of storage device that uses flash
memory to store dat
a. Disabling any of these options would not prevent connection attempts to the Wi-Fi network, and
may cause other problems or issues for the network functionality and performance.
Reference:
What is SSID + how to find (and change) it1
Choosing an SSID2
SSID Meaning: Finding Your Network’s Name3

Question: 456
A network technician is deploying a new machine in a small branch office that does not have a DHCP
server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to
communicate with the rest of the network. Which of the following would restore communication?
Exam Dumps 256/269

A. Static entry
B. ARP table
C. APIPA address
D. NTP specification

Answer: A
Explanation:

A static entry is the best option to restore communication for the new machine in a small branch
office that does not have a DHCP server. A static entry means manually configuring the IP address,
subnet mask, default gateway, and DNS server for the network adapter of the machine. A static entry
ensures that the machine has a valid and unique IP address that matches the network configuration
and can communicate with the rest of the network.
The new machine automatically receives the IP address of 169.254.0.2 because it uses APIPA
(Automatic Private IP Addressing), which is a feature that enables computers to self-assign an IP
address when a DHCP server is not available. However, APIPA only works for local communication
within the same subnet, and does not provide a default gateway or a DNS server. Therefore, the new
machine is unable to communicate with the rest of the network, which may be on a different subnet
or require a gateway or a DNS server to access.
The other options are not related to restoring communication for the new machine. ARP table is a
cache that stores the mapping between IP addresses and MAC addresses for the devices on the
network. NTP specification is a protocol that synchronizes the clocks of the devices on the network.
Reference:
CompTIA A+ Certification Exam Core 2 Objectives1
CompTIA A+ Core 2 (220-1102) Certification Study Guide2
What is APIPA (Automatic Private IP Addressing)? - Study-CCNA3
How to Configure a Static IP Address in Windows and OS X4

Question: 457
A corporate smartphone was stored for five months after setup. During this time, the company did
not have any system updates. When the phone is turned on, an application runs, but it crashes
intermittently. Which of the following should a technician do next?
A. Restart the phone.
B. Reimage the OS.
C. Reinstall the application.
D. Clear the cache.

Answer: C
Explanation:
Reinstalling the application is the best option to fix the intermittent crashing of the application on the
corporate smartphone. Reinstalling the application will ensure that the latest version of the app is
installed, which may have bug fixes and compatibility updates that can resolve the crashing issue.
Reinstalling the app will also clear any corrupted or outdated data or cache that may cause the app to
malfunction.
The other options are not as effective or appropriate as reinstalling the app. Restarting the phone
Exam Dumps 257/269

may temporarily fix the issue, but it will not address the root cause of the app crashing, which may
be related to the app itself or its dat
a. Reimaging the OS is a drastic and unnecessary measure that will erase all the data and settings on
the phone and restore it to its factory state. This will also remove all the other apps and files that
may be important for the corporate use of the phone. Clearing the cache may help to free up some
space and improve the performance of the app, but it will not update the app or fix any bugs that
may cause the app to crash.
Reference:
Top 5 Reasons Behind Your App Crash and Solutions To Fix Them1
How to Stop Apps From Crashing on Android2
Why are my Android phone apps crashing or closing & how to fix the issue3

Question: 458
A technician was assigned a help desk ticket and resolved the issue. Which of the following should
the technician update to assist other technicians in resolving similar issues?
A. End user training
B. Progress notes
C. Knowledge base
D. Acceptable use policy document

Answer: C
Explanation:

A knowledge base is a centralized repository of information that can be used by technicians to find
solutions to common problems, best practices, troubleshooting guides, and other useful
resources12. Updating the knowledge base with the details of the issue and the resolution can help
other technicians who encounter similar issues in the future. It can also reduce the number of tickets
and improve customer satisfaction3.
Reference
1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-11 2: CompTIA A+
Certification Exam Core 2 Objectives, page 13 3: CompTIA A+ Core 2 (220-1102) Certification Study
Guide, page 10-12

Question: 459

A large company is changing its password length requirements. The Chief Information Officer is
mandating that passwords now be at least 12 characters long, instead of 10. Which of the following
should be used to adjust this setting?

A. Group Policy
B. User accounts
C. Access control lists
D. Authenticator applications
Answer: A
Explanation:
Group Policy is a feature of Windows that allows administrators to manage and configure settings for
computers and users on a network12. One of the settings that can be controlled by Group Policy is
Exam Dumps 258/269

the password policy, which defines the rules for creating and changing passwords, such as minimum
length, complexity, expiration, and history34. By using Group Policy, the Chief Information Officer can
enforce the new password length requirement for all users and computers in the company’s domain,
without having to manually adjust each user account or device.
Reference:
1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-11 2: CompTIA A+
Certification Exam Core 2 Objectives, page 13 3: The Official CompTIA A+ Core 2 Instructor Guide
(Exam 220-1102), page 10-12 4: CompTIA A+ Certification Exam: Core 2 (220-1102) Exam Objectives

Question: 460
A developer reports that a workstation's database file extensions have been changed from .db to
.enc. The developer is also unable to open the database files manually. Which of the following is the
best option for recovering the data?
A. Accessing a restore point
B. Rebooting into safe mode
C. Utilizing the backups
D. Using an AV to scan the affected files

Answer: C
Explanation:
The scenario described in the question suggests that the workstation has been infected by a
ransomware, which is a type of malware that encrypts the files on the target system and demands a
ransom for the decryption key12. The file extension .enc is commonly used by some ransomware
variants to mark the encrypted files34. The developer is unable to open the database files manually
because they are encrypted and require the decryption key, which is usually held by the attacker.
The best option for recovering the data is to utilize the backups, assuming that the backups are
recent, valid, and not affected by the ransomware. Backups are copies of the data that are stored in a
separate location or device, and can be used to restore the data in case of a disaster, such as a
ransomware attack . By restoring the data from the backups, the developer can avoid paying the
ransom and losing the data permanently.
Accessing a restore point is not a good option, because restore points are snapshots of the system
settings and configuration, not the data files. Restore points can help to undo some system changes,
such as installing a faulty driver or software, but they cannot recover the encrypted data files .
Rebooting into safe mode is also not a good option, because safe mode is a diagnostic mode that
allows the system to run with minimal drivers and services, but it does not affect the data files. Safe
mode can help to troubleshoot some system issues, such as malware infections, but it cannot
decrypt the data files .
Using an AV to scan the affected files is also not a good option, because an AV is a software that can
detect and remove some malware, but it cannot decrypt the data files. An AV can help to prevent or
remove some ransomware infections, but it cannot recover the encrypted data files .
Reference:
1: CompTIA A+ Certification Exam Core 2 Objectives, page 10 2: CompTIA A+ Core 2 (220-1102)
Complete Video Course, Lesson 26 Documentation 3: How to remove .enc file virus (Ransomware
virus removal guide) 4: Enc File Extension - What is an .enc file and how do I open it? : CompTIA A+
Certification Exam Core 2 Objectives, page 13 : CompTIA A+ Core 2 (220-1102) Complete Video
Course, Lesson 26 Documentation : What is a restore point? : How to use System Restore on
Windows 10 : [What is Safe Mode?] : [How to boot into Safe Mode on Windows 10] : CompTIA A+
Exam Dumps 259/269

Certification Exam Core 2 Objectives, page 10 : [Can antivirus software remove ransomware?]

Question: 461
Which of the following items require special e-waste recycling? (Select two).
A. Solid-state drive
B. A/C adapter
C. Surge protector
D. Laptop battery
E. CRT monitor
F. Power supply

Answer: DE
Explanation:
Some electronic items require special e-waste recycling because they contain hazardous materials
that can harm the environment and human health if disposed of improperly12. Laptop batteries and
CRT monitors are examples of such items.
Laptop batteries are usually made of lithium-ion or nickel-metal hydride, which are both toxic and
flammable substances34. If laptop batteries are thrown in the trash, they can leak, catch fire, or
explode, causing pollution and injuries5 . Therefore, laptop batteries should be recycled at
authorized collection centers or through manufacturer take-back programs .
CRT monitors are old types of display devices that use cathode ray tubes, which are glass tubes that
emit electrons to create images on the screen . CRT monitors contain lead, mercury, cadmium, and
phosphor, which are all harmful metals that can contaminate the soil, water, and air if dumped in
landfills . Therefore, CRT monitors should be recycled at certified e-waste facilities or through retailer
or manufacturer trade-in programs .
Reference:
1: CompTIA A+ Certification Exam Core 2 Objectives, page 13 2: Environmental Impacts – CompTIA
A+ 220-1102 – 4.53 3: The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10-
12 4: CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key5 5: [Why You Should
Recycle Your Old Laptop Battery] : [How to Recycle Laptop Batteries] : [Laptop Battery Recycling] :
[How to Recycle Laptop Batteries] : The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-
1102), page 10-12 : CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key : [What
is a CRT Monitor?] : [How to Recycle CRT Monitors] : [CRT Monitor Recycling] : [How to Recycle CRT
Monitors]

Question: 462
Which of the following commands can a technician use to get the MAC address of a Linux
distribution?
A. net use
B. ifconfig
C. netstat
D. ping

Answer: B
Explanation:
The ifconfig command is a tool for configuring network interfaces that any Linux system
Exam Dumps 260/269

administrator should know. It is used to bring interfaces up or down, assign and remove addresses
and routes, manage ARP cache, and much more1. One of the information that ifconfig can display is
the MAC address of each network interface, which is a unique identifier of the physical layer of the
network device. The MAC address is usually shown as a hexadecimal string separated by colons, such
as 00:0c:29:3f:5c:1f. To get the MAC address of a Linux distribution, a technician can use the ifconfig
command without any arguments, which will show the details of all the active network interfaces, or
specify the name of a particular interface, such as eth0 or wlan0, to show only the details of that
interface.
Reference:
1: Linux Commands - CompTIA A+ 220-1102 - 1.11 - Professor Messer IT Certification Training
Courses1

Question: 463
A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a
new copy of Windows were recently installed on the PC. Which of the following is the most
appropriate command to use to fix the issue?

A. msconfig
B. chkdsk
C. sfc
D. diskpart
E. mstsc

Answer: C
Explanation:
The sfc command is a tool for scanning and repairing system files that are corrupted or missing on
Windows operating systems12. System files are essential files that are required for the proper
functioning of the operating system, such as the GUI, drivers, services, and applications. If system
files are damaged or deleted, the operating system may fail to start or run properly, causing errors,
crashes, or blue screens.
The sfc command can be used to fix the issue of the PC that is unable to start the GUI, assuming that
the problem is caused by corrupted or missing system files. The sfc command can be run from the
command prompt, which can be accessed by booting the PC from the installation media, choosing
the repair option, and selecting the command prompt option3. The sfc command can be used with
different switches, such as /scannow, /verifyonly, /scanfile, or /offbootdir, depending on the situation
and the desired action4. The most common switch is /scannow, which scans all the system files and
repairs any problems that are found5. The syntax of the sfc command with the /scannow switch is:
sfc /scannow
The sfc command will then scan and repair the system files, and display the results on the screen. If
the sfc command is able to fix the system files, the PC should be able to start the GUI normally after
rebooting. If the sfc command is unable to fix the system files, the PC may need further
troubleshooting or a clean installation of Windows.
Reference:
1: CompTIA A+ Certification Exam Core 2 Objectives, page 10 2: CompTIA A+ Core 2 (220-1102)
Complete Video Course, Lesson 26 Documentation 3: How to use SFC Scannow to repair Windows
system files 4: SFC Command (System File Checker) 5: How to Repair Windows 10 using Command
Prompt
Exam Dumps 261/269

Question: 464
A user recently purchased a second monitor and wants to extend the Windows desktop to the new
screen. Which of the following Control Panel options should a technician adjust to help the user?
A. Color Management
B. System
C. Troubleshooting
D. Device Manager
E. Administrative Tools

Answer: D
Explanation:

Question: 465
A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked.
. The possibility of file corruption is reduced.
· Data recovery is easy.
Which of the following filesystem types best meets these requirements?

A. ext3
B. FAT32
C. exFAT
D. NTFS

Answer: A
Explanation:
The ext3 file system is a Linux native file system that meets the requirements of the question. It has
the following features:
All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to
the file system metadata in a special log called the journal before applying them to the actual file
system. This ensures that the file system can be restored to a consistent state in case of a power
failure or system crash12.
The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility
of file corruption, as it avoids the need for a full file system check after an unclean shutdown. The file
system can be quickly replayed from the journal and any inconsistencies can be fixed12.
Data recovery is easy. The ext3 file system supports undeletion of files using tools such as ext3grep or
extundelete, which can scan the file system for deleted inodes and attempt to recover the data
blocks associated with them34.
Reference:
1: Introduction to Linux File System [Structure and Types] - MiniTool1 2: 7 Ways to Determine the File
System Type in Linux (Ext2, Ext3 or Ext4) - Tecmint3 3: How to Recover Deleted Files in Linux with
ext3grep 4: How to Recover Deleted Files from ext3 Partitions

Question: 466
Which of the following is the best reason for sandbox testing in change management?
A. To evaluate the change before deployment
B. To obtain end-user acceptance
Exam Dumps 262/269

C. To determine the affected systems


D. To select a change owner

Answer: A
Explanation:

Sandbox testing is a method of testing changes in a simulated environment that mimics the real one,
without affecting the actual production system. Sandbox testing is useful for change management
because it allows the testers to evaluate the change before deployment, and ensure that it works as
intended, does not cause any errors or conflicts, and meets the requirements and expectations of the
stakeholders. Sandbox testing also helps to protect the investment in the existing system, as it
reduces the risk of introducing bugs or breaking functionality that could harm the customer
experience or the business operations. Sandbox testing also gives the testers more control over the
customer experience, as they can experiment with different scenarios and configurations, and
optimize the change for the best possible outcome.
Reference:
1: Change Management and Sandbox - Quickbase1 2: Embracing change: Build, test, and adapt in a
sandbox environment - Zendesk3

Question: 467
A user's Windows computer seems to work well at the beginning of the day. However, its
performance degrades throughout the day, and the system freezes when several applications are
open. Which of the following should a technician do to resolve the issue? (Select two).
A. Install the latest GPU drivers.
B. Reinstall the OS.
C. Increase the RAM.
D. Increase the hard drive space.
E. Uninstall unnecessary software.
F. Disable scheduled tasks.

Answer: CE
Explanation:
The most likely causes of the user’s Windows computer performance degradation and freezing are
insufficient RAM and excessive software running in the background. Therefore, the technician should
do the following to resolve the issue:
Increase the RAM. RAM is the memory that the computer uses to store and run applications and
processes. If the RAM is not enough to handle the workload, the computer will use the hard drive as
a virtual memory, which is much slower and can cause performance issues. Increasing the RAM will
allow the computer to run more applications and processes smoothly and avoid freezing. The
technician should check the system requirements of the applications that the user needs to run, and
install additional RAM modules that are compatible with the motherboard and the existing RAM. The
technician should also make sure that the system is managing the page file size automatically, or
adjust it manually to optimize the virtual memory usage12.
Uninstall unnecessary software. Software that the user does not need or use can take up valuable
disk space and system resources, and can interfere with the performance of other applications. Some
Exam Dumps 263/269

software may also run in the background or start automatically when the computer boots up, which
can slow down the system and cause freezing. The technician should help the user to identify and
uninstall unnecessary software from the control panel or the settings app, and disable unnecessary
startup programs from the task manager or the system configuration tool. The technician should also
check for and remove viruses and malware that may affect the system performance134.
Reference:
1: Tips to improve PC performance in Windows - Microsoft Support1 2: How to Upgrade or Install
RAM on Your Windows PC - Lifewire5 3: How to Uninstall Programs on Windows 10 - PCMag6 4: How
to Fix a Windows Computer that Hangs or Freezes - wikiHow

Question: 468

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows
10 Action Center. The notifications indicate the advertisements are coming from a web browser.
Which of the following is the best solution for a technician to implement?
A. Disable the browser from sending notifications to the Action Center.
B. Run a full antivirus scan on the computer.
C. Disable all Action Center notifications.
D. Move specific site notifications from Allowed to Block.

Answer: A
Explanation:
The best solution for a technician to implement is to disable the browser from sending notifications
to the Action Center. This will prevent the random advertisement notifications from appearing in the
Windows 10 Action Center, which can be annoying and distracting for the user. The technician can
follow these steps to disable the browser notifications1:
Open the browser that is sending the notifications, such as Microsoft Edge, Google Chrome, or
Mozilla Firefox.
Go to the browser settings or options menu, and look for the privacy and security section.
Find the option to manage site permissions or notifications, and click on it.
You will see a list of sites that are allowed or blocked from sending notifications to the browser and
the Action Center. You can either block all sites from sending notifications, or select specific sites that
you want to block or allow.
Save the changes and close the browser settings.
This solution is better than the other options because:
Running a full antivirus scan on the computer (B) is not necessary, as the advertisement notifications
are not malicious or harmful, and they are not caused by a virus or malware infection. Running a scan
will not stop the notifications from appearing, and it will consume system resources and time.
Disabling all Action Center notifications © is not advisable, as the Action Center is a useful feature
that shows notifications and alerts from various apps and system events, such as email, calendar,
security, updates, etc. Disabling all notifications will make the user miss important information and
reminders, and reduce the functionality of the Action Center.
Moving specific site notifications from Allowed to Block (D) is not the best solution, as it will only
stop the notifications from some sites, but not from others. The user may still receive advertisement
notifications from other sites that are not blocked, or from new sites that are added to the Allowed
list. This solution will also require the user to manually manage the list of sites, which can be tedious
and time-consuming.
Reference:
Exam Dumps 264/269

1: How to Disable Annoying Browser Notifications - PCMag

Question: 469
A branch office suspects a machine contains ransomware. Which of the following mitigation steps
should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system.

Answer: D
Explanation:
The first mitigation step that a technician should take when a machine is suspected to contain
ransomware is to quarantine the system. This means isolating the infected machine from the
network and other devices, to prevent the ransomware from spreading and encrypting more dat
a. The technician can quarantine the system by disconnecting the network cable, turning off the
wireless adapter, or using firewall rules to block the traffic from and to the machine12.
This step is more important than the other options because:
Disabling System Restore (A) is not a priority, as it will not stop the ransomware from running or
spreading. System Restore is a feature that allows users to restore their system to a previous state,
but it may not work if the ransomware has encrypted or deleted the restore points. Moreover,
disabling System Restore may prevent the user from recovering some data or settings in the
future13.
Remediating the system (B) is the ultimate goal, but it cannot be done before quarantining the
system. Remediating the system means removing the ransomware, restoring the data, and fixing the
vulnerabilities that allowed the attack. However, this process requires careful analysis, planning, and
execution, and it may not be possible if the ransomware is still active and communicating with the
attackers. Therefore, the technician should first isolate the system and then proceed with the
remediation steps12.
Educating the system user © is a preventive measure, but it is not a mitigation step. Educating the
system user means raising awareness and providing training on how to avoid ransomware attacks,
such as by recognizing phishing emails, avoiding suspicious links or attachments, and updating and
patching the system regularly. However, this step will not help if the system is already infected, and it
may not be effective if the user is not willing or able to follow the best practices. Therefore, the
technician should focus on resolving the current incident and then educate the user as part of the
recovery plan14.
Reference:
1: How to Mitigate Ransomware Attacks in 10 Steps - Heimdal Security1 2: 3 steps to prevent and
recover from ransomware | Microsoft Security Blog3 3: How to use System Restore on Windows 10 |
Windows Central5 4: Ransomware Mitigation | Prevention and Mitigation Strategies - Delinea4

Question: 470
A technician is hardening a company file server and needs to prevent unauthorized LAN devices from
accessing stored files. Which of the following should the technician use?
A. Software firewall
B. Password complexity
Exam Dumps 265/269

C. Antivirus application
D. Anti-malware scans

Answer: A
Explanation:

A software firewall is a program that monitors and controls the incoming and outgoing network
traffic on a computer or a server. A software firewall can help prevent unauthorized LAN devices from
accessing stored files on a company file server by applying rules and policies that filter the network
packets based on their source, destination, protocol, port, or content. A software firewall can also
block or allow specific applications or services from communicating with the network, and alert the
administrator of any suspicious or malicious activity12.
A software firewall is a better option than the other choices because:
Password complexity (B) is a good practice to protect the file server from unauthorized access, but it
is not sufficient by itself. Password complexity refers to the use of strong passwords that are hard to
guess or crack by attackers, and that are changed frequently and securely. Password complexity can
prevent brute force attacks or credential theft, but it cannot stop network attacks that exploit
vulnerabilities in the file server software or hardware, or that bypass the authentication process34.
Antivirus application © and anti-malware scans (D) are important tools to protect the file server from
viruses and malware that can infect, damage, or encrypt the stored files. However, they are not
effective in preventing unauthorized LAN devices from accessing the files in the first place. Antivirus
and anti-malware tools can only detect and remove known threats, and they may not be able to stop
zero-day attacks or advanced persistent threats that can evade or disable them. Moreover, antivirus
and anti-malware tools cannot control the network traffic or the file server permissions, and they
may not be compatible with all file server platforms or configurations56.
Reference:
1: What is a Firewall and How Does it Work? - Cisco1 2: How to Harden Your Windows Server -
ServerMania2 3: Password Security: Complexity vs. Length - Norton7 4: Password Hardening: 5 Ways
to Protect Your Passwords - Infosec 5: What is Antivirus Software and How Does it Work? -
Kaspersky 6: What is Anti-Malware? - Malwarebytes

Question: 471
A large organization is researching proprietary software with vendor support for a multiuser
environment. Which of the following EULA types should be selected?
A. Corporate
B. Perpetual
C. Open-source
D. Personal

Answer: A
Explanation:
A corporate EULA is a type of end-user license agreement that is designed for a large organization
that needs to use proprietary software with vendor support for a multiuser environment. A corporate
EULA typically grants the organization a volume license that allows it to install and use the software
Exam Dumps 266/269

on multiple devices or servers, and to distribute the software to its employees or affiliates. A
corporate EULA also usually provides the organization with technical support, maintenance, updates,
and warranty from the software vendor, as well as some customization options and discounts. A
corporate EULA may also include terms and conditions that specify the rights and obligations of both
parties, such as confidentiality, liability, indemnification, termination, and dispute resolution12.
A corporate EULA is a better option than the other choices because:
A perpetual EULA (B) is a type of end-user license agreement that grants the user a permanent and
irrevocable license to use the software, without any time limit or expiration date. However, a
perpetual EULA does not necessarily include vendor support, updates, or warranty, and it may not
allow the user to install the software on multiple devices or servers, or to distribute the software to
other users. A perpetual EULA may also be more expensive than a corporate EULA, as it requires a
one-time payment upfront, rather than a recurring subscription fee34.
An open-source EULA © is a type of end-user license agreement that grants the user a license to use,
modify, and redistribute the software, which is publicly available and free of charge. However, an
open-source EULA does not provide any vendor support, maintenance, updates, or warranty, and it
may impose some restrictions or obligations on the user, such as disclosing the source code,
attributing the original author, or using a compatible license for derivative works. An open-source
EULA may not be suitable for a large organization that needs proprietary software with vendor
support for a multiuser environment56.
A personal EULA (D) is a type of end-user license agreement that grants the user a license to use the
software for personal, non-commercial purposes only. A personal EULA may limit the number of
devices or servers that the user can install the software on, and prohibit the user from distributing,
copying, or reselling the software to other users. A personal EULA may also provide limited or no
vendor support, maintenance, updates, or warranty, and it may have a fixed or renewable term. A
personal EULA may not meet the needs of a large organization that needs proprietary software with
vendor support for a multiuser environment7 .
Reference:
1: What is a Corporate License Agreement? - Definition from Techopedia1 2: Corporate License
Agreement - Template - Word & PDF2 3: What is a Perpetual License? - Definition from
Techopedia3 4: Perpetual vs. Subscription Software Licensing: Which Is Best for You?4 5: What is an
Open Source License? - Definition from Techopedia5 6: Open Source Licenses: Which One Should You
Use?6 7: What is a Personal License Agreement? - Definition from Techopedia7 : Personal License
Agreement - Template - Word & PDF

Question: 472
A user is unable to access a remote server from a corporate desktop computer using the appropriate
terminal emulation program. The user contacts the help desk to report the issue. Which of the
following clarifying questions would be most effective for the help desk technician to ask the user in
A. order to understand the issue?
B. What is the error message?
C. Does the program work on another computer?
D. Did the program ever work?
E. Is anyone else having this issue?

Answer: A
Explanation:
The most effective clarifying question for the help desk technician to ask the user in order to
Exam Dumps 267/269

understand the issue is


A) What is the error message? This question will help the technician to identify the possible cause
and solution of the problem, as the error message will provide specific information about the nature
and location of the error, such as the server name, the port number, the protocol, the authentication
method, or the network status. The error message will also help the technician to troubleshoot the
issue by following the suggested steps or searching for the error code online .
This question is more effective than the other choices because:
B) Does the program work on another computer? is not a very helpful question, as it will not reveal
the source of the error or how to fix it. The program may work on another computer for various
reasons, such as different network settings, firewall rules, permissions, or software versions.
However, this question will not tell the technician what is wrong with the user’s computer or the
remote server, or what needs to be changed or updated to make the program work.
C) Did the program ever work? is not a very relevant question, as it will not address the current issue
or how to resolve it. The program may have worked in the past, but it may have stopped working due
to changes in the network configuration, the server status, the software updates, or the user
credentials. However, this question will not tell the technician what has changed or how to restore
the program functionality.
D) Is anyone else having this issue? is not a very useful question, as it will not explain the reason or
the solution for the error. The issue may affect only the user, or multiple users, depending on the
scope and the impact of the error. However, this question will not tell the technician what is causing
the error or how to fix it for the user or the others.
Reference:
: How to Troubleshoot Terminal Emulation Problems - Techwalla : How to Read and Understand
Windows Error Messages - Lifewire : How to Troubleshoot Network Connectivity Problems - How-To
Geek : How to Troubleshoot Software Problems - dummies : How to Troubleshoot Common PC Issues
For Users - MakeUseOf

Question: 473
A technician requires graphical remote access to various Windows, Linux, and macOS desktops on
the company LAN. The security administrator asks the technician to utilize a single software solution
that does not require an external internet connection. Which of the following remote access tools is
the technician most likely to install?
A. VNC
B. RMM
C. RDP
D. SSH

Answer: A
Explanation:

VNC (Virtual Network Computing) is a remote access tool that allows the technician to access and
control various Windows, Linux, and macOS desktops on the company LAN using a graphical user
interface. VNC does not require an external internet connection, as it works over a local network or a
VPN. VNC uses a client-server model, where the server runs on the remote desktop and the client
connects to it from another device. VNC can transmit the keyboard and mouse events from the client
to the server, and the screen updates from the server to the client, enabling the technician to
interact with the remote desktop as if it were local12.
Exam Dumps 268/269

VNC is a better option than the other choices because:


RMM (Remote Monitoring and Management) (B) is not a single software solution, but a category of
software solutions that enable IT professionals to remotely monitor, manage, and troubleshoot
multiple devices and networks. RMM software may include remote access tools, but also other
features such as patch management, backup and recovery, security, reporting, and
automation. RMM software may require an external internet connection, as it often relies on cloud-
based services or web-based consoles34.
RDP (Remote Desktop Protocol) © is a remote access tool that allows the technician to access and
control Windows desktops on the company LAN using a graphical user interface. However, RDP is not
compatible with Linux or macOS desktops, unless they have third-party software installed that can
emulate or translate the RDP protocol. RDP also has some security and performance issues, such as
encryption vulnerabilities, bandwidth consumption, and latency problems56.
SSH (Secure Shell) (D) is a remote access tool that allows the technician to access and control various
Windows, Linux, and macOS desktops on the company LAN using a command-line interface. SSH
does not require an external internet connection, as it works over a local network or a VPN. SSH uses
encryption and authentication to secure the communication between the client and the
server. However, SSH does not provide a graphical user interface, which may limit the functionality
and usability of the remote desktop7 .
Reference:
1: What is VNC? - Definition from Techopedia1 2: How VNC Works - RealVNC2 3: What is Remote
Monitoring and Management (RMM)? - Definition from Techopedia3 4: What is RMM Software? -
NinjaRMM4 5: What is Remote Desktop Protocol (RDP)? - Definition from Techopedia5 6: Remote
Desktop Protocol: What it is and how to secure it - CSO Online6 7: What is Secure Shell (SSH)? -
Definition from Techopedia7 : How to Use SSH to Access a Remote Server in Linux or Windows -
Hostinger Tutorials
Exam Dumps 269/269

Thank You for Being Our Valued Customer


We Hope You Enjoy Your Purchase
CompTIA 220-1102 Exam Question & Answers
CompTIA A+ Core 2 Exam

You might also like