220-1002 : CompTIA A+ Certification Exam: Core 2 : Part 11

  1. A network support technician takes a call from an office manager who wants to change the wireless security key on the access point in that particular office. The office manager explains that a label on the access point indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect securely to the access point to make the change?

    • RDP to 10.0.100.2
    • SSH to 10.0.100.2
    • HTTP to 10.0.100.2
    • Telnet to 10.0.100.2
  2. A technician is troubleshooting a computer that may have some corrupt operating system files. Which of the following command line tools should the technician use to check these files?

    • dism
    • chkdsk
    • diskpart
    • sfc
  3. What a user is allowed to do on a computer network would be addressed in:

    • a user acceptance policy
    • regulatory and compliance policy
    • a password policy
    • an acceptable use policy
  4. A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

    • File attributes
    • Share permissions
    • Local share
    • Inheritance
  5. A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which of the following should the user check to troubleshoot the cause of the issue?

    • The existing wireless network connection
    • The signal strength from the ISP regional satellite
    • The data speeds from the user’s ISP
    • The user’s default gateway settings
  6. Six months after a new version of an OS was released to the market, end users began to lose access to application updates. Which of the following was MOST likely the reason for this issue?

    • Update limitations
    • Limited access
    • End-of-life
    • Network connection
  7. A technician is deploying a PXE installation of a new OS onto a small group of company workstations. Which of the following should the technician monitor during the installation?

    • Impact to the workstations
    • Impact to the users
    • Impact to the network
    • Impact to the DHCP pool
  8. A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

    • Antistatic bags
    • Needle-nose pliers
    • Safety goggles
    • ESD straps
  9. An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend?

    • Add more redundancy to the power cabling
    • Purchase more battery backups for individual users
    • Implement desktop virtualization
    • Increase the capacity of the backup generator
  10. Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

    • Download antivirus updates
    • Update the device drivers
    • Quarantine the affected systems
    • Perform hardware diagnostics
  11. A technician is installing a new system in a facility that requires zero downtime. The facility uses a backup generator in case of power loss. Into which of the following power sources should the technician plug the system to offer optimal uptime?

    • Only a surge protector is needed due to the backup generator
    • Plug directly into the emergency power source
    • Plug a surge protector directly into the UPS
    • Connect to a UPS that utilizes the emergency power source
  12. Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?

    • GDPR
    • PII
    • PCI
    • PHI
  13. A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

    • Task Scheduler
    • MSINFO32
    • System Restore
    • MSConfig
  14. Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

    • Shoulder surfing
    • Phishing
    • Tailgating
    • Dumpster diving
  15. Which of the following key and mouse combinations can be used to run an application as a different user?

    • FN + Right-click
    • Shift + Right-click
    • Alt + Right-click
    • Ctrl + Right-click
  16. The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

    • Spear phishing
    • Impersonation
    • Dumpster diving
    • Whaling
  17. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists. Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

    • Run a virus scan with updated signature files
    • Uninstall any unknown browser extensions or add-ons
    • Install the latest version of the Internet browser
    • Enable SSL 3.0 in the browser settings
    • Delete all unknown registry keys and reboot
  18. Which of the following variable types should be used to store the data “Chicago” within a script or code?

    • Integer
    • String
    • Boolean
    • Float
  19. A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

    • Incompatibility
    • Impact to the network
    • Impact to the user
    • Impact to the device
  20. A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure. Which of the following should the technician perform FIRST?

    • Change the default SSID
    • Enable MAC filtering
    • Update the firmware
    • Set encryption