Last Updated on July 1, 2021 by InfraExam
220-1002 : CompTIA A+ Certification Exam: Core 2 : Part 03
A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.
Which of the following documents did the network administrator MOST likely give to the technician?
- Process diagram
- Physical network diagram
- Fiber backbone diagram
- Logical topology diagram
After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only. When testing the policy, a removable drive is plugged in but can still be accessed.
Which of the following command-line tools should the technician use to apply the new policy?
- net use
A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.
With which of the following types of infections are the PCs MOST likely infected? (Choose two.)
Ann, a user, is attempting to log in to her email service form a third-party email client on her phone. When Ann enters her usual username and password, she receives an error message saying the credentials are invalid. Ann then decides to reset her email password, but after the reset, the new credentials still do not work in the third-party email client.
Which of the following settings or features is responsible for the problems Ann is experiencing?
- Full device encryption
- Account lock
- Multifactor authentication
- Strong password requirements
Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.
Which of the following should the technician have covered previously as part of the original repair?
- End-user education
- Pre-installation environment cleaning
- Disabling of System Restore
- Infected system quarantine
In which of the following file extension types would a user expect to see the command. “net use T:\\server\files”?
A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.
Which of the following should the technician replace to prevent these issues in the future?
- System memory
- Surge protector
- Hard drives
- Battery backup
Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?
- Put on an ESD strap.
- Place components on an ESD mat
- Disconnect the power before servicing the PC
- Place the PC on a grounded work bench
Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is not recognized.
Which of the following messages will be displayed?
- NTLDR not found
- No boot device available
- Operating system not found
- BIOS ROM checksum error
Ann, a user, calls the help desk regarding an issue on her laptop. While working remotely, she appears to be connecting to WiFi but is unable to retrieve her corporate email. The wireless name is listed as “ConnectMe” and appears as unsecure.
Which of the following should the help desk perform to fix the issue?
- Remote into Ann’s system and restart the wireless adapter
- Ask Ann to open a browser and watch for a redirect page
- Advice Ann to plug an Ethernet cable into her laptop
- Direct Ann to run an antivirus program on her laptop
A project team is organized to implement a new wireless solution for a school. The team has already done the network diagrams and knows the locations that will need to be addressed in the project. The team is in the process of creating an SOW for the project as a whole and needs to add the critical pieces to the SOW to complete it and move to the next stage.
Which of the following would the project team MOST likely add to the SOW?
- Risk analysis
- Plan to change
- Backout plan
- Change board approvals
A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.
Which of the following would MOST likely fix the issue?
- Roll back updates
- Disable the Windows Update service
- Check for updates
- Restore hidden updates
An end user’s PC is taking a long time to boot.
Which of the following operations would be the BEST to resolve this issue with minimal expense? (Choose two.)
- Remove applications from startup
- Defragment the hard drive
- Install additional RAM
- Install a faster hard drive
- End the processes in Task Manager
- Run the Disk Cleanup utility
A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.
Which of the following protocols and authentication methods should the technician implement? (Choose two.)
A technician is PXE booting a computer.
Which of the following is the technician MOST likely performing on the computer?
- Image deployment
- Multiboot configuration
- In-place upgrade
- System repair
Ann, an employee at a company, calls the help desk to report issues logging on to a vendor’s website. Joe, the technician, is able to log in successfully with his credentials before going to Ann’s office. However, when he attempts to log in from Ann’s office, Joe experiences the same issue. Ann asks Joe questions about the new software installed on the laptop from the pop-up notification.
Which of the following are the NEXT steps Joe should take to resolve the issue? (Choose two.)
- Ask Ann for her credentials to verify and log on to the vendor’s website from Ann’s laptop
- Verify Ann’s laptop has the correct browser settings
- Check all browser cached files on Ann’s laptop and log on to another vendor’s website
- Attempt to log on to another vendor’s website from Ann’s laptop
- Ask Ann about the notification and review the installed programs
- Reinstall the browser, reboot the laptop, and check the vendor’s website again
Which of the following is the maximum RAM limit of a Windows 32-bit version?
- no limit
A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.
Which of the following steps should be taken FIRST to determine the cause of the issue?
- Uninstall the camera application
- Check the application permissions
- Reset the phone to factory settings
- Update all of the applications on the phone
- Run any pending OS updates
Joe, an end user, has been prompted to provide his username and password to access the payroll system.
Which of the following authentication methods is being requested?
Which of the following devices provides protection against brownouts?
- battery backup
- surge suppressor
- rack grounding
- line conditioner