220-1002 : CompTIA A+ Certification Exam: Core 2 : Part 12

  1. A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

    • Change management policy
    • EULA
    • BYOD policy
    • Business continuity plan
    • MDM policy
    • Time-based login policies
  2. Which of the following is used for building entry and computer access?

    • Smart card
    • Personal identity verification card
    • Hardware tokens
    • Key fobs
  3. A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues? (Choose two.)

    • Slow performance
    • Slow data speeds
    • No wireless connectivity
    • Baseband
    • Application hang
    • Overheating
  4. A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

    • Image deployment
    • Multiboot
    • PXE
    • Unattended installation
    • USB
    • Wake-on-LAN
  5. A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings. Which of the following Control Panel utilities should the technician use to accomplish this task?

    • Network and Sharing Center
    • Sync Center
    • Credential Manager
    • User Accounts
  6. A technician recently updated a printer driver on all the computers in an office. Shortly after the update, several users’ accounts and passwords were compromised. Which of the following MOST likely explains the compromised accounts?

    • Botnet
    • Ransomware
    • Antivirus definitions
    • Keylogger
  7. A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage behaviors being unchanged from previous periods. Which of the following troubleshooting steps should the user take FIRST?

    • Check network access permissions on recently loaded applications.
    • Limit data usage to WiFi networks only.
    • Wipe the device and restore to the factory default.
    • Change the lock screen password.
  8. A company wants to move the contents of its users’ My Documents folders from their local hard drives to a file server so they are backed up every night. Which of the following security concepts does this describe?

    • Organizational units
    • Folder redirection
    • Group Policy
    • Login script
  9. Which of the following Microsoft operating systems defaults to a tiled menu instead of the desktop?

    1. Windows 7
    2. Windows 8
    3. Windows 8.1
    4. Windows 10
  10. A contract technician is working on a network printer when a print job starts and completes. The technician notices it is a spreadsheet that appears to be an annual salary report. Which of the following actions should the technician take?

    • Continue to work on the assigned task
    • Take the print job to the office manager
    • Remove the print job from the output tray
    • Disconnect the printer from the network to prevent further print jobs
  11. A customer built a computer with the following specifications:
    – Single hexa-core processor
    – 8GB DDR4 memory
    – 256GB SSD drive
    – Built-in graphics card
    – 32-bit Windows OS
    – Audio editing software

    The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following would correct the issue?

    • 16GB DDR4 memory
    • 64-bit Windows OS
    • Dual hexa-core processors
    • 512GB SSD drive
  12. A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date. Which of the following filesystem types would the customer’s drive require?

    • NTFS
    • Ext4
    • HFS
    • FAT32
  13. A technician receives the Chief Executive Officer’s (CEO’s) Windows 10 laptop, which has been infected with malware. The technician wants to make sure best practices are followed for troubleshooting and remediating the malware. Which of the following best practices should the technician perform FIRST in this scenario? (Choose three.)

    • Disconnect the device from the network
    • Identify and research the symptoms
    • Restore the computer to the previous checkpoint
    • Scan and use removal techniques
    • Create a restore point
    • Educate the end user
    • Schedule scans and run updates
  14. While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

    • Reimage the machine from a network share
    • Change the boot order and boot to an external drive
    • Remove and then replace the CMOS battery
    • Use the BIOS user password to reset the supervisor password
  15. Which of the following wireless security protocols supports the use of a 40-bit encryption key?

    • TKIP
    • WEP
    • WPA
    • WPA2
  16. A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

    • Reboot into safe mode
    • Clear the application data
    • Contact the application’s developer
    • Reinstall the application
    • Do a force stop
    • Clear the application cache
  17. A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

    • Inventory management policy
    • Knowledge base articles
    • End-user acceptance document
    • Acceptable use policy
    • Incident documentation
    • Network diagrams
  18. An administrator is investigating intermittent, slow performance of a web server. The administrator performs a virus scan on the server but finds there is no infection present. Which of the following should the administrator do NEXT to mitigate the issue?

    • Increase the amount of RAM
    • Reboot the server
    • Check the system logs
    • Perform disk defragmentation
  19. A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening. Which of the following commands should the technician use?

    • netstat
    • net use
    • nslookup
    • ping
  20. Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

    • LCD monitor
    • Power supply
    • Laptop screen
    • CRT monitor
    • Motherboard
    • Tablet