CompTIA A+ Certification Exam: Core 2 v1.0 (220-1002)

Page:    1 / 39   
Total 582 questions

Ann, a user, has purchased a new Android phone and is attempting to access a public hotspot. When she opens a browser, she gets a message indicating the page cannot be displayed. She notices there is a ג€?ג€ in the radio icon in the toolbar. She has verified Bluetooth is active, airplane mode is off, and tethering is turned on. She uses the cell phone to call a technician for assistance.
Which of the following is the MOST likely issue Ann is experiencing?

  • A. There is unauthenticated wireless connectivity
  • B. She has exceeded the data allowance
  • C. The phone is only 3G capable
  • D. It is an unrooted phone
  • E. The SIM card was not activated
  • F. A data plan was not purchased


Answer : A

A junior Linux systems administrator needs to update system software.
Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

  • A. sudo
  • B. chmod
  • C. grep
  • D. pwd


Answer : A

A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.
If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

  • A. Default SSID
  • B. MAC filtering
  • C. Power levels
  • D. Content filtering
  • E. Firewall


Answer : C

A userג€™s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.
Which of the following should the technician attempt NEXT?

  • A. Reboot into safe mode and roll back the updates
  • B. Repair the Windows Registry
  • C. Configure boot options in the BIOS
  • D. Disable Windows services and applications


Answer : A

A userג€™s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective. A technician inspects the device and sees the following:


Which of the following should be changed to resolve this issue?

  • A. Privacy ג€" Maps
  • B. Display ג€" Brightness
  • C. Storage ג€" Photos
  • D. Mail ג€" Work


Answer : A

A Windows user is attempting to install a local printer and is unsuccessful based on permissions.
Which of the following user types BEST describes this user?

  • A. Guest
  • B. Power User
  • C. Administrator
  • D. Standard User


Answer : A

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the
Internet.
Which of the following actions should the user take?

  • A. Update antivirus definitions
  • B. Install anti-malware software
  • C. Enable the pop-up blocker
  • D. Reboot the PC


Answer : B

A desktop technician is attempting to upgrade several machines to Windows 10. After realizing there is only one disc for the installation, the technician decides to upgrade over the network.
Which of the following boot methods initiates such an upgrade?

  • A. SSD
  • B. Optical drive
  • C. Flash drive
  • D. PXE


Answer : D

A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis.
Which of the following is an important part of the change request process for which the administrator still must plan?

  • A. Inform management regarding the anticipated amount of downtime
  • B. Document a backout plan to roll back changes to the router
  • C. Configure a redundant data path to eliminate downtime
  • D. Make the downtime window larger than actually anticipated


Answer : B

A company brings in contractors several times a year to perform inventory, and the contractors use company-supplied laptops. The companyג€™s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.
Which of the following BEST enforces this policy?

  • A. Delete the user accounts
  • B. Disable the user accounts
  • C. Restrict the user accounts
  • D. Reset the user accounts


Answer : B

A wireless access point is going to be configured in a small office located in a crowded building.
Which of the following should the installation technician perform to increase the security of the wireless network? (Choose two.)

  • A. Reduce the transmit power
  • B. Reduce the channel availably
  • C. Disable the DHCP server
  • D. Enable QoS management
  • E. Disable the SSID broadcast
  • F. Implement WPA encryption


Answer : AE

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the machine are:
✑ Two 1GHz CPUs
✑ 2GB of memory
✑ 15GB hard drive
800 ֳ— 600 screen resolution


Which of the following should the technician do to resolve the problem?

  • A. Increase the number of CPUs
  • B. Increase the amount of memory
  • C. Increase the amount of hard drive space
  • D. Increase the screen resolution


Answer : C

A technician is working on a userג€™s workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?

  • A. Rootkit
  • B. Keylogger
  • C. Trojan
  • D. Ransomware


Answer : C

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

  • A. Driver detection
  • B. Metro interface
  • C. Account control
  • D. PXE installation


Answer : A

Which of the following is considered government-regulated data?

  • A. PHI
  • B. End-user license agreement
  • C. Digital Millennium Copyright Act
  • D. DRM


Answer : A

Page:    1 / 39   
Total 582 questions