CompTIA 220-1102 CompTIA A+ Core 2 Exam Practice Test

Page: 1 / 14
Total 750 questions
Question 1

A technician needs to implement password requirements that apply to all domain-joined computers. Which of the following commands should the technician most likely run?



Answer : A

Detailed

The correct command is gpupdate (Option A), which refreshes Group Policy settings. To implement password requirements across domain-joined computers, the policy would be set via Group Policy, and then running the gpupdate command ensures that the new settings are applied to all systems.

devmgmt (Option B) opens Device Manager, which is unrelated to Group Policy.

regedit (Option C) opens the Windows Registry Editor, which is not used for group-wide password policy settings.

resmon (Option D) opens Resource Monitor, which helps monitor system resources, not Group Policy.

CompTIA A+ Core 2 Reference:

1.5 - Using appropriate Windows settings, including password policies via Group Policy.


Question 2

A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?



Answer : A

Detailed

The technician should disconnect the computer from the network (Option A) first to prevent any further spread of the infection or data loss. Once the machine is isolated from the network, the technician can safely investigate the malware without risking infection to other systems.

Running an antivirus scan (Option B) comes after isolating the system.

Rebooting the computer (Option C) could lead to the loss of critical information or make it harder to diagnose the issue.

Educating the user (Option D) is important but should happen after resolving the immediate issue.

CompTIA A+ Core 2 Reference:

3.3 - Best practices for malware removal, including isolating the system first.


Question 3

A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?



Answer : B

Detailed

RADIUS (Remote Authentication Dial-In User Service) (Option B) is a network protocol that allows users to authenticate using their network credentials, such as usernames and passwords, typically stored in a central directory like Active Directory. It ensures that users can log in to the Wi-Fi using their existing network credentials.

AES (Option A) is an encryption standard but does not handle authentication.

TKIP (Option C) is a deprecated encryption protocol and not related to network login management.

WPA3 (Option D) is the latest Wi-Fi security standard but does not specifically handle centralized login management like RADIUS does.

CompTIA A+ Core 2 Reference:

2.2 - Compare and contrast wireless security protocols and authentication methods, including RADIUS.


Question 4

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?



Answer : A

Detailed

The first step is to disconnect external storage (Option A). Sometimes, the system may be attempting to boot from an external drive or USB device instead of the internal hard drive. By removing the external storage, the system will attempt to boot from the correct drive.

Flashing the BIOS (Option B) is more complex and typically unnecessary for this issue.

Replacing the SATA cable (Option C) may help if there's a hardware issue, but it's not the first troubleshooting step.

Turning on the device in safe mode (Option D) would not work if no operating system is detected.

CompTIA A+ Core 2 Reference:

5.1 - Apply troubleshooting methodologies, including steps for resolving boot issues.


Question 5

A technician is reusing several hard drives to increase local storage on company workstations. The drives contain PII that is no longer needed. Which of the following should the technician do to prevent unauthorized access to the data?



Answer : C

Detailed

The appropriate method to prevent unauthorized access to sensitive data is to wipe the drives (Option C). Wiping ensures that all data is securely erased, preventing any possibility of recovery. This is essential when handling drives containing Personally Identifiable Information (PII).

Degaussing (Option A) erases data but is more commonly used for magnetic tapes.

Drilling through the drives (Option B) physically destroys the drives, which may not be necessary if they are being reused.

Reimaging (Option D) would overwrite the current data with new data but may not guarantee complete data destruction.

CompTIA A+ Core 2 Reference:

2.8 - Use common data destruction and disposal methods, including securely wiping drives.


Question 6

Which of the following applications allows a user to create backups in macOS?



Answer : A

Detailed

Time Machine (Option A) is macOS's built-in backup application. It allows users to automatically back up their entire system, including apps, music, photos, emails, and system files. Time Machine provides an easy way to restore files from a previous state or recover from a system failure.

FileVault (Option B) is used for encrypting data, not for backups.

Keychain (Option C) is a password management tool.

Mission Control (Option D) manages open windows and desktops but has no backup functionality.

CompTIA A+ Core 2 Reference:

1.10 - Features and tools of macOS, including backup options like Time Machine.


Question 7

A user's mobile phone battery does not last long and navigation is very slow. Which of the following should the technician do first to resolve the issue?



Answer : B

Detailed

The first step is to check running applications (Option B). Applications running in the background could consume a lot of battery and processing power, causing slow performance and battery drain. By identifying and closing or uninstalling these apps, the technician can resolve the issue more effectively.

Uninstalling unused programs (Option A) might help, but checking active applications is more immediate.

Updating the mobile OS (Option C) can improve performance but is not the first step in this scenario.

Disabling network services (Option D) might help reduce battery drain but does not address potential app-related issues.

CompTIA A+ Core 2 Reference:

3.4 - Troubleshoot common mobile OS and application issues, including battery and performance concerns.


Page:    1 / 14   
Total 750 questions