Choosing the Right Path for Your 220-1102 Exam Preparation
Welcome to PassExamHub's comprehensive study guide for the CompTIA A+ Certification Core 2 Exam exam. Our 220-1102 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 220-1102 certification exam.
What Our CompTIA 220-1102 Study Material Offers
PassExamHub's 220-1102 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:
In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 220-1102 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.
Why Choose PassExamHub?
Expertise: Our 220-1102 exam questions answers are developed by experienced CompTIA certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 220-1102 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 220-1102 certifications and advance their careers.
Start Your Journey Today!
Embark on your journey to CompTIA A+ Certification Core 2 Exam success with PassExamHub. Our study material is your trusted companion in preparing for the 220-1102 exam and unlocking exciting career opportunities.
An administrator has received approval for a change request for an upcoming server
deployment. Which of the following steps should be completed NEXT?
A. Perform a risk analysis. B. Implement the deployment. C. Verify end user acceptance D. Document the lessons learned.
Answer: A Explanation:
Before making any changes to the system, it is important to assess the risks associated
with the change and determine whether it is worth implementing. Risk analysis involves
identifying potential risks, assessing their likelihood and impact, and determining what
steps can be taken to mitigate them. It is important to perform this step before making any
changes, as this allows the administrator to make an informed decision about whether or not the change should be implemented. Once the risks have been assessed and the
administrator has decided to go ahead with the change, the next step is to implement the
deployment.
Question # 2
A technician is setting up a new laptop. The company's security policy states that users
cannot install virtual machines. Which of the following should the technician implement to
prevent users from enabling virtual technology on their laptops?
A. UEFI password B. Secure boot C. Account lockout D. Restricted user permissions
Answer: B Explanation: A technician setting up a new laptop must ensure that users cannot install
virtual machines as the company's security policy states One way to prevent users from
enabling virtual technology is by implementing Secure Boot. Secure Boot is a feature of
UEFI firmware that ensures the system only boots using firmware that is trusted by the
manufacturer. It verifies the signature of all bootloaders, operating systems, and drivers
before running them, preventing any unauthorized modifications to the boot process. This
will help prevent users from installing virtual machines on the laptop without authorization.
Question # 3
A user is attempting to browse the internet using Internet Explorer. When trying to load a
familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of
the following would MOST likely solve the issue?
A. Updating the operating system B. Changing proxy settings C. Reinstalling the browser D. Enabling port forwarding
Answer: C Explanation: Reinstalling the browser would most likely solve the issue. This would
remove any malicious software or add-ons that may be causing the issue and restore the
browser to its default settings.
Question # 4
Sensitive data was leaked from a user's smartphone. A technician discovered an
unapproved application was installed, and the user has full access to the device's
command shell. Which of the following is the NEXT step the technician should take to find
the cause of the leaked data?
A. Restore the device to factory settings. B. Uninstall the unapproved application. C. Disable the ability to install applications from unknown sources. D. Ensure the device is connected to the corporate WiFi network.
Answer: B Explanation:
The technician should disable the user’s access to the device’s command shell. This will
prevent the user from accessing sensitive data and will help to prevent further data leaks.
The technician should then investigate the unapproved application to determine if it is the
cause of the data leak. If the application is found to be the cause of the leak, the technician
should uninstall the application and restore the device to factory settings. If the application
is not the cause of the leak, the technician should investigate further to determine the
cause of the leak. Disabling the ability to install applications from unknown sources can
help to prevent future data leaks, but it is not the next step the technician should take in this
scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to
this scenario1
Question # 5
A user receives a notification indicating the data plan on the user's corporate phone has
reached its limit. The user has also noted the performance of the phone is abnormally slow.
A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
A. The GPS application is installing software updates. B. The GPS application contains malware. C. The GPS application is updating its geospatial map data. D. The GPS application is conflicting with the built-in GPS.
Answer: B Explanation: The GPS application contains malware. The third-party GPS application is
likely the cause of the slow performance of the phone. The application may contain
malware that is using up system resources and slowing down the phone. The user should
uninstall the application and run a malware scan on the phone1
Question # 6
A user's system is infected with malware. A technician updates the anti-malware software
and runs a scan that removes the malware. After the user reboots the system, it once again
becomes infected with malware. Which of the following will MOST likely help to
permanently remove the malware?
A. Enabling System Restore B. Educating the user C. Booting into safe mode D. Scheduling a scan
Answer: B Explanation:
Although updating the anti-malware software and running scans are important steps in
removing malware, they may not be sufficient to permanently remove the malware if the
user keeps engaging in behaviors that leave the system vulnerable, such as downloading
unknown files or visiting malicious websites. Therefore, educating the user on safe
computing practices is the best way to prevent future infections and permanently remove
the malware.
Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most
efficient ways to permanently remove the malware. Enabling System Restore and Booting
into safe mode may help in some cases, but they may not be sufficient to permanently
remove the malware. Scheduling a scan is also important for detecting and removing
malware, but it may not be sufficient to prevent future infections. https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-examobjectives-(3-0)
Question # 7
A small business owner wants to install newly purchased software on all networked PCs.
The network is not configured as a domain, and the owner wants to use the easiest method
possible. Which of the following is the MOST deficient way lor the owner to install the
application?
A. Use a network share to share the installation files. B. Save software to an external hard drive to install. C. Create an imaging USB for each PC. D. Install the software from the vendor's website
Answer: B Explanation:
Saving software to an external hard drive and installing it on each individual PC is the most
inefficient method for the small business owner. This method requires manual intervention
on each PC, and there is a higher risk of error or inconsistencies between PCs.
Additionally, if the software needs to be updated or reinstalled in the future, this process
would need to be repeated on each PC.
Question # 8
An IT services company that supports a large government contract replaced the Ethernet
cards on several hundred desktop machines to comply With regulatory requirements.
Which of the following disposal methods for the non-compliant cards is the MOST
environmentally friendly?
A. incineration B. Resale C. Physical destruction D. Dumpster for recycling plastics
Answer: D Explanation: When disposing of non-compliant Ethernet cards, the most environmentally
friendly option is to use a dumpster for recycling plastics. This method is the most effective
way to reduce the amount of waste that is sent to landfills, and it also helps to reduce the
amount of energy used in the production of new materials. Additionally, recycling plastics
helps to reduce the amount of toxic chemicals that can be released into the environment.
According to CompTIA A+ Core 2 documents, "The most environmentally friendly disposal
method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This
method is the most effective way to reduce the amount of waste that is sent to landfills, and
it also helps to reduce the amount of energy used in the production of new materials."
https://sustainability.yale.edu/blog/how-sustainably-dispose-your-technological-waste
Question # 9
A technician is tasked with configuring a computer for a visually impaired user. Which of
the following utilities should the technician use?
A. Device Manager B. System C. Ease of Access Center D. Programs and Features
Answer: C Explanation:
The Ease of Access Center is a built-in utility in Windows that provides tools and options
for making a computer easier to use for individuals with disabilities, including the visually
impaired. In the Ease of Access Center, the technician can turn on options like high
contrast display, screen magnification, and screen reader software to help the user better
interact with the computer.
Question # 10
Which of the following is a consequence of end-of-lite operating systems?
A. Operating systems void the hardware warranty. B. Operating systems cease to function. C. Operating systems no longer receive updates. D. Operating systems are unable to migrate data to the new operating system.
Answer: C Explanation:
End-of-life operating systems are those which have reached the end of their life cycle and
are no longer supported by the software developer. This means that the operating system
will no longer receive updates, security patches, or other new features. This can leave
users vulnerable to security threats, as the system will no longer be protected against the
latest threats. Additionally, this can make it difficult to migrate data to a newer operating
system, as the old system is no longer supported.
Question # 11
Which of the following is the STRONGEST wireless configuration?
A. WPS B. WPA3 C. WEP D. WMN
Answer: B Explanation:
The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless
encryption protocol and is the most secure choice. It replaces PSK with SAE, a more
secure way to do the initial key exchange. At the same time, the session key size of WPA3
increases to 128-bit in WPA3-Personal mode and 192-bit in WPA3-Enterprise, which
makes the password harder to crack than the previous Wi-Fi security standards
https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/
Question # 12
A new spam gateway was recently deployed at a small business However; users still
occasionally receive spam. The management team is concerned that users will open the
messages and potentially
infect the network systems. Which of the following is the MOST effective method for
dealing with this Issue?
A. Adjusting the spam gateway B. Updating firmware for the spam appliance C. Adjusting AV settings D. Providing user training
Answer: D Explanation: The most effective method for dealing with spam messages in a small
business is to provide user training1. Users should be trained to recognize spam messages
and avoid opening them1. They should also be trained to report spam messages to the IT
department so that appropriate action can be taken1. In addition, users should be trained to
avoid clicking on links or downloading attachments from unknown sources1. By providing
user training, the management team can reduce the risk of users opening spam messages
and potentially infecting the network systems1.
Question # 13
A systems administrator is tasked with configuring desktop systems to use a new proxy
server that the organization has added to provide content filtering. Which of the following
Windows utilities IS the BEST choice for accessing the necessary configuration to
complete this goal?
A. Security and Maintenance B. Network and Sharing Center C. Windows Defender Firewall D. Internet Options
Answer: D Explanation: The best choice for accessing the necessary configuration to configure the
desktop systems to use a new proxy server is the Internet Options utility. This utility can be
found in the Control Panel and allows you to configure the proxy settings for your network
connection. As stated in the CompTIA A+ Core 2 exam objectives, technicians should be
familiar with the Internet Options utility and how to configure proxy settings.
Question # 14
A technician has verified that a user's computer has a virus, and the antivirus software is
out Of date. Which of the following steps should the technician take NEXT?
A. Quarantine the computer. B. use a previous restore point, C. Educate the end user about viruses D. Download the latest virus definitions
Answer: D Explanation:
This will ensure that the antivirus software is up-to-date, and can detect any new viruses
that may have been released since the last virus definition update. The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.3
Explain the importance of security awareness and 2.2 Given a scenario, use secure data management and disaster recovery principles.
Question # 15
A user has a license for an application that is in use on a personal home laptop. The user
approaches a systems administrator about using the same license on
multiple computers on the corporate network. Which of the following BEST describes what
the systems administrator should tell the user?
A. Use the application only on the home laptop because it contains the initial license. B. Use the application at home and contact the vendor regarding a corporate license. C. Use the application on any computer since the user has a license. D. Use the application only on corporate computers.
Answer: B Explanation:
Use the application at home and contact the vendor regarding a corporate license. The
user should use the application only on the home laptop because it contains the initial
license. The user should contact the vendor regarding a corporate license if they want to
use the application on multiple computers on the corporate network1
Question # 16
Following a recent power outage, several computers have been receiving errors when
booting. The technician suspects file corruption has occurred. Which of the following steps
should the technician try FIRST to correct the issue?
A. Rebuild the Windows profiles. B. Restore the computers from backup. C. Reimage the computers. D. Run the System File Checker.
Answer: D Explanation: The technician should run the System File Checker (SFC) first to correct file
corruption errors on computers after a power outage. SFC is a command-line utility that
scans for and repairs corrupted system files. It can be run from the command prompt or
from the Windows Recovery Environment. Rebuilding the Windows profiles, restoring the
computers from backup, and reimaging the computers are more drastic measures that
should be taken only if SFC fails to correct the issue1
Question # 17
A technician has an external SSD. The technician needs to read and write to an external
SSD on both Macs and Windows PCs. Which of the following filesystems is supported by
both OS types?
A. NTFS B. APFS C. ext4 D. exFAT
Answer: D Explanation: The filesystem that is supported by both Macs and Windows PCs is D.
exFAT. exFAT is a file system that is designed to be used on flash drives like USB sticks
and SD cards. It is supported by both Macs and Windows PCs, and it can handle large files
and volumes https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html
Question # 18
A help desk technician runs the following script: Inventory.py. The technician receives the
following error message:
How do you want to Open this file? Which of the following is the MOST likely reason this script is unable to run?
A. Scripts are not permitted to run. B. The script was not built for Windows. C. The script requires administrator privileges, D. The runtime environment is not installed.
Answer: D Explanation:
The error message is indicating that the script is not associated with any program on the
computer that can open and run it. This means that the script requires a runtime
environment, such as Python, to be installed in order for it to execute properly. Without the
appropriate runtime environment, the script will not be able to run.
Question # 19
After a company installed a new SOHO router customers were unable to access the
company-hosted public website. Which of the following will MOST likely allow customers to
access the website?
A. Port forwarding B. Firmware updates C. IP filtering D. Content filtering
Answer: B Explanation:
If customers are unable to access the company-hosted public website after installing a
new SOHO router, the company should check for firmware updates1. Firmware updates
can fix bugs and compatibility issues that may be preventing customers from accessing the
website1. The company should also ensure that the router is properly configured to allow
traffic to the website1. If the router is blocking traffic to the website, the company should
configure the router to allow traffic to the website1.
Question # 20
A technician is attempting to mitigate micro power outages, which occur frequently within
the area of operation. The outages are usually short, with the longest occurrence lasting
five minutes. Which of the following should the technician use to mitigate this issue?
A. Surge suppressor B. Battery backup C. CMOS battery D. Generator backup
Answer: B
Explanation: A battery backup, also known as an uninterruptible power supply (UPS), is a
device that provides backup power during a power outage. When the power goes out, the
battery backup provides a short amount of time (usually a few minutes up to an hour,
depending on the capacity of the device) to save any work and safely shut down the
equipment.
Question # 21
A user is unable to access a website, which is widely used across the organization, and
receives the following error message:
The security certificate presented by this website has expired or is not yet valid.
The technician confirms the website works when accessing it from another computer but
not from the user's computer. Which of the following should the technician perform NEXT
to troubleshoot the issue?
A. Reboot the computer. B. Reinstall the OS. C. Configure a static 12 D. Check the computer's date and time.
Answer: D Explanation:
The error message indicates that the security certificate presented by the website has
either expired or is not yet valid. This can happen if the computer's clock has the wrong
date or time, as SSL/TLS certificates have a specific validity period. If the clock is off by too
much, it may cause the certificate to fail to validate. Therefore, the technician should check
the computer's date and time and ensure that they are correct.
Question # 22
Each time a user tries to go to the selected web search provider, a different website opens.
Which of the following should the technician check FIRST?
A. System time B. IP address C. DNS servers D. Windows updates
Answer: C
Explanation: When a user experiences unexpected or erratic behavior while browsing the
internet, it could be caused by the DNS servers. DNS translates human-readable domain
names (like google.com) into IP addresses, which computers can use to communicate with
web servers. If the DNS servers are not functioning correctly or have been compromised, it can result in the browser being redirected to unintended websites.
Question # 23
A laptop user is visually impaired and requires a different cursor color. Which of the
following OS utilities is used to change the color of the cursor?
A. Keyboard B. Touch pad C. Ease of Access Center D. Display settings
Answer: C Explanation:
The OS utility used to change the color of the cursor in Windows is Ease of Access Center
12
The user can change the cursor color by opening the Settings app,
selecting Accessibility in the left sidebar, selecting Mouse pointer and touch under Vision,
and choosing one of the cursor options. The user can select Custom to pick a color and
use the Size slider to make the cursor larger or smaller12
The Ease of Access Center in the Windows OS provides accessibility options for users with
disabilities or impairments. One of these options allows the user to change the color and
size of the cursor, making it more visible and easier to locate on the screen. The Keyboard
and Touchpad settings do not offer the option to change cursor color, and Display Settings
are used to adjust the resolution and other properties of the display. Therefore, C is the
best answer. This information is covered in the Comptia A+ Core2 documents/guide under
the Accessibility section.
Question # 24
An administrator has submitted a change request for an upcoming server deployment.
Which of the following must be completed before the change can be approved?
A. Risk analysis B. Sandbox testing C. End user acceptance D. Lessons learned
Answer: A Explanation: A risk analysis must be completed before a change request for an upcoming
server deployment can be approved 1
Risk analysis is an important step in the change management process because it helps
identify and mitigate potential risks before changes are implemented. Once the risks have
been analyzed and the appropriate measures have been taken to minimize them, the
change can be approved and implemented.
Question # 25
Which of the following data is MOST likely to be regulated?
A. Name in a Phone book B. Name on a medical diagnosis C. Name on a job application D. Name on a employer's website
Answer: B Explanation:
A name on a medical diagnosis (B) is most likely to be regulated. This is because it falls
under the category of protected health information (PHI), which is subject to regulations
such as the Health Insurance Portability and Accountability Act (HIPAA) in the United
States. These regulations aim to protect the privacy and security of individuals’ health
information.
Question # 26
A user connected a laptop to a wireless network and was tricked into providing login
credentials for a website. Which of the following threats was used to carry out the attack?
A. Zero day B. Vishing C. DDoS D. Evil twin
Answer: B Explanation:
Vishing, also known as voice phishing, is a type of social engineering attack where the
attacker tricks the victim into divulging sensitive information over the phone. In this case,
the attacker tricked the user into providing login credentials for a website.
Question # 27
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the
following should the technician perform NEXT?
A. resmon_exe B. dfrgui_exe C. msinf032exe D. msconfig_exe
Answer: A
Explanation: If a technician suspects high disk I/O, the technician should use the
Resource Monitor (resmon.exe) to identify the process that is causing the high disk I/O1
. Resource Monitor provides detailed information about the system’s resource usage,
including disk I/O1. The technician can use this information to identify the process that is
causing the high disk I/O and take appropriate action1.
Question # 28
Which of the following file extensions are commonly used to install applications on a
macOS machine? (Select THREE).
A. .mac B. .Pkg C. .deb D. .dmg E. .msi F. .appx G. .app H. .apk
Answer: B,D,G Explanation: https://support.microsoft.com/en-us/windows/common-file-name-extensionsin-windows-da4a4430-8e76-89c5...
. pkg and .dmg are files used to distribute and install applications on macOS. .pkg files are
installer packages that may contain multiple files and executable code, while .dmg files are
disk images that can contain a single bundled application or multiple applications. .app files
are typically the main executable files for macOS applications. The other options listed are
file extensions for applications or installers on other platforms (such as .deb for Debianbased Linux systems, .msi for Windows, and .apk for Android). This information is covered
in the Comptia A+ Core2 documents/guide under the Mac OS section.
Question # 29
A user reports a workstation has been performing strangely after a suspicious email was
opened on it earlier in the week. Which of the following should the technician perform
FIRST?
A. Escalate the ticket to Tier 2. B. Run a virus scan. C. Utilize a Windows restore point. D. Reimage the computer.
Answer: B Explanation:https://partners.comptia.org/docs/default-source/resources/comptia-a-220-
1102-exam-objectives-(3-0)
When a user reports that their workstation is behaving strangely after opening a suspicious
email, the first step a technician should take is to run a virus scan on the computer. This is
because opening a suspicious email is a common way for viruses and malware to infect a
computer. Running a virus scan can help identify and remove any infections that may be
causing the computer to behave strangely.
Question # 30
A macOS user reports seeing a spinning round cursor on a program that appears to be
frozen. Which of the following methods does the technician use to force the program to
close in macOS?
A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the
frozen
application in the list, and clicks Force Quit. B. The technician clicks on the frozen application and presses and holds the Esc key on
the keyboard for 10 seconds Which causes the application to force quit. C. The technician opens Finder, navigates to the Applications folder, locates the application
that is frozen in the list, right-clicks on the application, and selects the Force Quit option. D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen
application in the
list, and clicks Force Quit.
Answer: D Explanation:
The technician opens the Apple icon menu, selects Force Quit, selects the frozen
application in the list, and clicks Force Quit. This is the most common method of force
quitting a program in macOS. This can be done by clicking on the Apple icon in the top left
of the screen, selecting Force Quit, selecting the frozen application in the list, and then
clicking Force Quit. This will force the application to quit and the spinning round cursor will
disappear.
Question # 31
A technician receives a call from a user who is on vacation. The user provides the
necessary credentials and asks the technician to log in to the
users account and read a critical email that the user has been expecting. The technician
refuses because this is a violation of the:
A. acceptable use policy. B. regulatory compliance requirements. C. non-disclosure agreement D. incident response procedures
Answer: A
Explanation:
Logging into a user's account without their explicit permission is a violation of the
acceptable use policy, which outlines the rules and regulations by which a user must abide
while using a computer system. By logging into the user's account without their permission,
the technician would be violating this policy. Additionally, this action could be seen as a
breach of confidentiality, as the technician would have access to information that should
remain confidential.
Question # 32
A technician downloaded software from the Internet that required the technician to scroll
through a text box and at the end of the text box, click a
button labeled Accept Which of the following agreements IS MOST likely in use?
A. DRM B. NDA C. EULA D. MOU
Answer: C Explanation:
The most likely agreement in use here is a EULA (End User License Agreement). This is a
legally binding agreement between the user and the software developer, outlining the terms
and conditions that the user must agree to in order to use the software. It is important that
the user understands and agrees to the EULA before they can proceed with downloading
and installing the software. As stated in the CompTIA A+ Core 2 exam objectives, users
should be aware of the EULA before downloading any software.
Question # 33
Which of the following is the MOST basic version of Windows that includes BitLocker?
A. Home B. pro C. Enterprise D. Pro for Workstations
Answer: D Explanation: The most basic version of Windows that includes BitLocker is Windows Pro.
BitLocker is a feature of Windows Pro that provides full disk encryption for all data on a
storage drive [1]. It helps protect data from unauthorized access or theft and can help
secure data from malicious attacks. Pro for Workstations includes this feature, as well as
other features such as support for up to 6 TB of RAM and ReFS.
Question # 34
In which of the following scenarios would remote wipe capabilities MOST likely be used?
(Select TWO).
A. A new IT policy requires users to set up a lock screen PIN. B. A user is overseas and wants to use a compatible international SIM Card. C. A user left the phone at home and wants to prevent children from gaining access to the
phone. D. A user traded in the company phone for a cell carrier upgrade by mistake. E. A user cannot locate the phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the company to return the device.
Answer: E,F Explanation: Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in situations where a device is lost or stolen, or when sensitive data needs to be
removed from a device. Remote wipe capabilities are most likely to be used in the following
scenarios:
E. A user cannot locate the phone after attending a play at a theater. F. A user forgot the
phone in a taxi, and the driver called the company to return the device1
In scenario E, remote wipe capabilities would be used to prevent unauthorized access to
the device and to protect sensitive data. In scenario F, remote wipe capabilities would be
used to erase all data on the device before it is returned to the user.
Question # 35
A user is setting up a computer for the first time and would like to create a secondary login
with permissions that are different than the primary login. The secondary login will need to
be protected from certain content such as games and websites. Which of the following
Windows settings should the user utilize to create the secondary login?
A. Privacy B. Accounts C. Personalization D. Shared resources
Answer: B Explanation: To create a secondary login with different permissions in Windows 10, the user should
utilize the Accounts setting. Here are the steps to create a new user account with different
permissions:
Right-click the Windows Start menu button.
Select Control Panel.
Select User Accounts.
Select Manage another account.
Select Add a new user in PC settings.
Use the Accounts dialog box to configure a new account.1
Question # 36
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to
Windows 10 Pro, The technician must ensure files and user preferences are retained, must
perform the operation locally, and should migrate one station at a time. Which of the
following methods would be MOST efficient?
A. Golden image B. Remote network install C. In-place upgrade D. Clean install
Answer: C Explanation:
An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to
Windows 10 Pro, as it will retain all user files and preferences, can be done locally, and can
be done one station at a time. An in-place upgrade involves installing the new version of
Windows over the existing version, and can be done quickly and easily.
Question # 37
A technician is reimaging a desktop PC. The technician connects the PC to the network
and powers it on. The technician attempts to boot the computer via the NIC to image the
computer, but this method does not work. Which of the following is the MOST likely reason
the computer is unable to boot into the imaging system via the network?
A. The computer's CMOS battery failed. B. The computer's NIC is faulty. C. The PXE boot option has not been enabled D. The Ethernet cable the technician is using to connect the desktop to the network is
faulty.
Answer: C Explanation:
The most likely reason the computer is unable to boot into the imaging system via the
network is that the PXE boot option has not been enabled. PXE (Preboot Execution
Environment) is an environment that allows computers to boot up over the network, instead
of from a local disk. In order for this to work, the PXE boot option must be enabled in the
computer's BIOS settings. As stated in the CompTIA A+ Core 2 exam objectives,
technicians should know how to enable PXE in BIOS to enable network booting on a
computer.
Question # 38
The web browsing speed on a customer's mobile phone slows down every few weeks and
then returns to normal after three or four days. Restarting the device does not usually
restore performance. Which of the following should a technician check FIRST to
troubleshoot this issue?
A. Data usage limits B. Wi-Fi connection speed C. Status of airplane mode D. System uptime
Answer: B Explanation:
The technician should check the Wi-Fi connection speed first to troubleshoot this issue.
Slow web browsing speed on a mobile phone can be caused by a slow Wi-Fi connection.
The technician should check the Wi-Fi connection speed to ensure that it is fast enough to
support web browsing. If the Wi-Fi connection speed is slow, the technician should
troubleshoot the Wi-Fi network to identify and resolve the issue.
Question # 39
A Windows user reported that a pop-up indicated a security issue. During inspection, an
antivirus system identified malware from a recent download, but it was unable to remove
the malware. Which of the following actions would be BEST to remove the malware while
also preserving the user's files?
A. Run the virus scanner in an administrative mode. B. Reinstall the operating system. C. Reboot the system in safe mode and rescan. D. Manually delete the infected files.
Answer: C Explanation:
Rebooting the system in safe mode will limit the number of programs and processes
running, allowing the antivirus system to more effectively identify and remove the malware.
Rescanning the system will allow the antivirus system to identify and remove the malware
while preserving the user's files.
Question # 40
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer
to a Windows computer. Which of the following filesystems will the technician MOST likely
use?
A. FAT32 B. ext4 C. NTFS D. exFAT
Answer: D
Explanation: exFAT is a file system that is supported by both Linux and Windows and can
handle large files1.
Question # 41
A technician connects an additional monitor to a PC using a USB port. The original HDMI
monitor is mounted to the left of the new monitor. When moving the mouse to the right from
the original monitor to the new monitor, the mouse stops at the end of the screen on the
original monitor. Which
of the following will allow the mouse to correctly move to the new monitor?
A. Rearranging the monitor's position in display settings B. Swapping the cables for the monitors C. Using the Ctrl+AIt+> to correct the display orientation D. Updating the display drivers for the video card
Answer: B Explanation:
The correct answer is B. Swapping the cables for the monitors. When the second monitor
is connected with the HDMI port, it is necessary to swap the cables for the monitors so that
the mouse can move from the original monitor to the new monitor. This is because the
HDMI port is designed to only support one monitor, and the mouse will not be able to move
from one to the other without the cables being swapped.
According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a
system, the cables used to connect the displays must be swapped between the displays. For example, if a monitor is connected to a system using a VGA cable, the VGA cable must
be moved to the next display to allow the mouse to move between the two displays."
Question # 42
An analyst needs GUI access to server software running on a macOS server. Which of the
following options provides the BEST way for the analyst to access the macOS server from
the Windows workstation?
A. RDP through RD Gateway B. Apple Remote Desktop C. SSH access with SSH keys D. VNC with username and password
Answer: B
Explanation:
Apple Remote Desktop is a remote access solution that allows a user to access and control
another macOS computer from their Windows workstation. It provides a graphical user
interface so that the analyst can easily access the server software running on the macOS
server. Apple Remote Desktop also supports file transfers, so the analyst can easily
transfer files between the two computers. Additionally, Apple Remote Desktop supports
encryption, so data is secure during transmission.
Question # 43
A suite of security applications was installed a few days ago on a user's home computer.
The user reports that the
computer has been running slowly since the installation. The user notices the hard drive
activity light is constantly solid. Which of the following should be checked FIRST?
A. Services in Control Panel to check for overutilization B. Performance Monitor to check for resource utilization C. System File Checker to check for modified Windows files D. Event Viewer to identify errors
Answer: C Explanation:
System File Checker to check for modified Windows files. System File Checker (SFC) is a
Windows utility that can be used to scan for and restore corrupt Windows system files. SFC
can be used to detect and fix any modified or corrupted system files on a computer, and
thus should be checked first when a user reports that their computer has been running
slowly since the installation of security applications [1][2]. By checking SFC, any modified
or corrupted system files can be identified and fixed, potentially improving the overall
performance of the computer.
Question # 44
A systems administrator needs to reset a users password because the user forgot it. The
systems administrator creates the new password and wants to further protect the user's
account Which of the following should the systems administrator do?
A. Require the user to change the password at the next log-in. B. Disallow tie user from changing the password. C. Disable the account D. Choose a password that never expires.
Answer: A Explanation: This will ensure that the user is the only one who knows their password, and
that the new password is secure.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a
scenario, use appropriate data destruction and disposal methods.
Question # 45
A technician is setting up a new laptop for an employee who travels, Which of the following
is the BEST security practice for this scenario?
A. PIN-based login B. Quarterly password changes C. Hard drive encryption D. A physical laptop lock
Answer: C Explanation:
Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is
secure, even if the laptop is lost or stolen. Encryption ensures that the data cannot be
accessed by anyone without the correct encryption key. This is an important security
measure for any laptop used by an employee who travels, as it helps to protect the data
stored on the laptop from unauthorized access.
Question # 46
Which of the following change management documents includes how to uninstall a patch?
A. Purpose of change B. Rollback plan C. Scope of change D. Risk analysis
Answer: B Explanation: The change management document that includes how to uninstall a patch is called the
“rollback plan”. The rollback plan is a document that outlines the steps that should be taken
to undo a change that has been made to a system. In the case of a patch, the rollback plan
would include instructions on how to uninstall the patch if it causes problems or conflicts with other software12
Question # 47
A technician received a call stating that all files in a user's documents folder appear to be
Changed, and each of the files now has a look file
extension Which pf the following actions is the FIRST step the technician should take?
A. Runa live disk clone. B. Run a full antivirus scan. C. Use a batch file to rename the files D. Disconnect the machine from the network
Answer: D Explanation: The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2
Given a scenario, use appropriate resources to support users and 1.3 Explain the
importance of security awareness.
Question # 48
A manager reports that staff members often forget the passwords to their mobile devices
and applications. Which of the following should the systems administrator do to reduce the
number of help desk tickets submitted?
A. Enable multifactor authentication. B. Increase the failed log-in threshold. C. Remove complex password requirements. D. Implement a single sign-on with biometrics.
Answer: A Explanation:
Multifactor authentication (MFA) is a security measure that requires users to provide
multiple pieces of evidence when logging in to an account or system. This can include a
combination of something the user knows (e.g. a password or PIN), something the user
has (e.g. a security token or smartphone) and something the user is (e.g. biometrics such
as a fingerprint or face scan). By enabling MFA, the systems administrator can ensure that
users are required to provide multiple pieces of evidence when logging in, making it more
difficult for unauthorized users to gain access to the system. This can help reduce the
number of help desk tickets submitted due to forgotten passwords.
Question # 49
A user is attempting to make a purchase at a store using a phone. The user places the
phone on the payment pad, but the device does not recognize the phone. The user
attempts to restart the phone but still has the same results. Which of the following should
the user do to resolve the issue?
A. Turn off airplane mode while at the register. B. Verify that NFC is enabled. C. Connect to the store's Wi-Fi network. D. Enable Bluetooth on the phone.
Answer: B Explanation: The user should verify that NFC is enabled on their phone. NFC is a technology that allows
two devices to communicate with each other when they are in close proximity2.
NFC (Near Field Communication) technology allows a phone to wirelessly communicate
with a payment terminal or other compatible device. In order to use NFC to make a
payment or transfer information, the feature must be enabled on the phone. Therefore, the
user should verify that NFC is enabled on their phone before attempting to make a
payment with it. The other options, such as turning off airplane mode, connecting to Wi-Fi,
or enabling Bluetooth, do not pertain to the NFC feature and are unlikely to resolve the
issue. This information is covered in the Comptia A+ Core2 documents/guide under the
Mobile Devices section.
Question # 50
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is
high. The company wants to reduce this risk with minimal impact to users who want to use
their laptops when not on the network. Which of the following would BEST reduce this risk
for Windows laptop users?
A. Requiring strong passwords B. Disabling cached credentials C. Requiring MFA to sign on D. Enabling BitLocker on all hard drives
Answer: D Explanation: BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows
laptop. This will protect the data stored on the drive in the event that the laptop is lost or
stolen, and will help to reduce the risk of data loss. Additionally, BitLocker can be
configured to require a PIN or other authentication in order to unlock the drive, providing an
additional layer of security.
Question # 51
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP
application, The PC uses a USB microphone connected to a powered hub. The technician
verifies the microphone works on the PC using Voice Recorder. Which of the following
should the technician do to solve the issue?
A. Remove the microphone from the USB hub and plug it directly into a USB port on the
PC. B. Enable the microphone under Windows Privacy settings to allow desktop applications to
access it. C. Delete the microphone from Device Manager and scan for new hardware, D. Replace the USB microphone with one that uses a traditional 3.5mm plug.
Answer: B Explanation: In Windows 10, there are privacy settings that control access to certain devices, such as
microphones, cameras, and other input devices. If the microphone is not enabled under
these privacy settings, the VoIP application may not have access to it, causing a lack of
outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and
under App permissions, select Microphone. The technician should then turn on the toggle
switch for the VoIP application to allow it to access the microphone.
Removing the microphone from the USB hub and plugging it directly into a USB port on the
PC may or may not solve the issue, as the issue could be related to the privacy settings.
Deleting the microphone from Device Manager and scanning for new hardware may also
not solve the issue, as the issue could be related to the privacy settings. Replacing the
USB microphone with one that uses a traditional 3.5mm plug is not recommended, as it
would require purchasing a new microphone and may not solve the issue.
Question # 52
Which of the following is MOST likely contained in an EULA?
A. Chain of custody B. Backup of software code C. Personally identifiable information D. Restrictions of use
Answer: D Explanation: An EULA (End-User License Agreement) is a legally binding contract between a software
supplier and a customer or end-user, generally made available to the customer via a
retailer acting as an intermediary. A EULA specifies in detail the rights and restrictions
which apply to the use of the software. Some of the main terms included in an EULA are
the terms and scope of the license, any licensing fees, warranties and disclaimers,
limitation of liability, revocation or termination of the license, and intellectual property
information and restrictions on using the license (e.g. modification and copying)1
https://www.termsfeed.com/blog/eula-vs-terms-conditions/
Question # 53
A field technician applied a Group Policy setting to all the workstations in the network. This
setting forced the workstations to use a specific SNTP server. Users are unable to log in
now. Which of the following is the MOST likely cause of this issue?
A. The SNTP server is offline. B. A user changed the time zone on a local machine. C. The Group Policy setting has disrupted domain authentication on the system, D. The workstations and the authentication server have a system clock difference.
Answer: D Explanation: The workstations and the authentication server have a system clock difference. If a Group
Policy setting is applied that forces the workstations to use a specific SNTP server, but the
system clock on the workstations and the authentication server are out of sync, then this
can cause authentication issues and users will be unable to log in. In this case, the most
likely cause of the issue is a difference in system clocks and the technician should ensure
that the clocks on the workstations and the authentication server are in sync.
Question # 54
A user installed a new application that automatically starts each time the user logs in to a
Windows 10 system. The user does not want this to happen and has asked for this setting
to be changed. Which of the following tools would the technician MOST likely use to safely
make this change?
A. Registry Editor B. Task Manager C. Event Viewer D. Local Users and Groups
Answer: B Explanation: The technician would most likely use the Task Manager tool to safely make
this change12
The Task Manager tool can be used to disable applications from starting automatically on
Windows 10 The tool that a technician would most likely use to stop an application from automatically
starting when a user logs in to a Windows 10 system is the Task Manager. The Task
Manager can be used to view and manage processes, including those that are set to
automatically start when a user logs in to the system.
Question # 55
A company has just refreshed several desktop PCs. The hard drives contain PII. Which of
the following is the BEST method to dispose of the drives?
A. Drilling B. Degaussing C. Low-level formatting D. Erasing/wiping
Answer: D Explanation: Erasing/wiping the hard drives is the best method to dispose of the drives containing PII
Question # 56
A user received the following error upon visiting a banking website:
The security presented by website was issued a different website' s address .
A technician should instruct the user to:
A. clear the browser cache and contact the bank. B. close out of the site and contact the bank. C. continue to the site and contact the bank. D. update the browser and contact the bank.
Answer: A Explanation: The technician should instruct the user to clear the browser cache and
contact the bank (option A). This error indicates that the website the user is visiting is not
the correct website and is likely due to a cached version of the website being stored in the
user's browser. Clearing the browser cache should remove any stored versions of the
website and allow the user to access the correct website. The user should also contact the
bank to confirm that they are visiting the correct website and to report the error.
Question # 57
A user in a corporate office reports the inability to connect to any network drives. No other
users have reported this issue. Which of the following is the MOST likely reason the user is
having this issue?
A. The user is not connected to the VPN. B. The file server is offline. C. A low battery is preventing the connection. D. The log-in script failed.
Answer: A
Question # 58
A junior administrator is responsible for deploying software to a large group of computers in
an organization. The administrator finds a script on a popular coding website to automate
this distribution but does not understand the scripting language. Which of the following
BEST describes the risks in running this script?
A. The instructions from the software company are not being followed. B. Security controls will treat automated deployments as malware. C. The deployment script is performing unknown actions. D. Copying scripts off the internet is considered plagiarism.
Answer: C Explanation:
The risks in running this script are that the deployment script is performing unknown
actions. Running the script blindly could cause unintended actions, such as deploying
malware or deleting important files, which could negatively impact the organization’s
network and data1.
Question # 59
A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will
need access to the corporate domain to access email and shared drives. Which of the
following versions of Windows would a technician MOST likely deploy for the user?
A. Windows Enterprise Edition B. Windows Professional Edition C. Windows Server Standard Edition D. Windows Home Edition
Answer: B Explanation: The Windows Professional Edition is the most likely version that a technician would deploy
for a user at a target corporation. This version of Windows is designed for business use
and provides the necessary features and capabilities that a user would need to access the
corporate domain, such as email and shared drives.
Question # 60
A technician has been asked to set up a new wireless router with the best possible
security. Which of the following should the technician implement?
A. WPS B. TKIP C. WPA3 D. WEP
Answer: C Explanation: WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi
security and offers the highest level of protection available. It is designed to protect against
brute force password attempts and protect against eavesdropping and man-in-the-middle
attacks. WPA3 also supports the use of stronger encryption algorithms, such as the
Advanced Encryption Standard (AES), which provides additional protection for wireless
networks. WPA3 should be implemented in order to ensure the best possible security for
the new wireless router.
Question # 61
A new service desk is having a difficult time managing the volume of requests. Which of the
following is the BEST solution for the department?
A. Implementing a support portal B. Creating a ticketing system C. Commissioning an automated callback system D. Submitting tickets through email
Answer: A Explanation: A support portal is an online system that allows customers to access customer service
tools, submit requests and view status updates, as well as access information such as
how-to guides, FAQs, and other self-service resources. This would be the best solution for
the service desk, as it would allow them to easily manage the volume of requests by
allowing customers to submit their own requests and view the status of their requests.
Additionally, the portal would provide customers with self-service resources that can help
them resolve their own issues, reducing the amount of tickets that need to be handled by
the service desk.
Question # 62
An organization's Chief Financial Officer (CFO) is concerned about losing access to very
sensitive, legacy unmaintained PII on a workstation if a
ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for
many years. Which of the following backup methods
would BEST meet the requirements?
A. A daily, incremental backup that is saved to the corporate file server B. An additional, secondary hard drive in a mirrored RAID configuration C. A full backup of the data that is stored of site in cold storage D. Weekly, differential backups that are stored in a cloud-hosting provider
Answer: C Explanation:
According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the
greatest protection against data loss in the event of a ransomware attack or other data
disaster. By storing the backup in a separate physical location, it is less likely to be affected
by the same event that could cause data loss on the original system. Cold storage is a term
used for data archiving, which typically refers to a long-term storage solution that is used
for retaining data that is infrequently accessed, but still needs to be kept for regulatory or
compliance reasons.
Question # 63
While browsing a website, a staff member received a message that the website could not
be trusted. Shortly afterward, several other colleagues reported the same issue across
numerous other websites. Remote users who were not connected to corporate resources
did not have any issues. Which of the following is MOST likely the cause of this issue?
A. A bad antivirus signature update was installed. B. A router was misconfigured and was blocking traffic. C. An upstream internet service provider was flapping. D. The time or date was not in sync with the website.
Answer: B
Question # 64
An Android user contacts the help desk because a company smartphone failed to complete
a tethered OS update A technician determines there are no error messages on the device
Which of the following should the technician do NEXT?
A. Verify all third-party applications are disabled B. Determine if the device has adequate storage available. C. Check if the battery is sufficiently charged D. Confirm a strong internet connection is available using Wi-Fi or cellular data