CompTIA 220-1102 CompTIA A+ Core 2 Exam Practice Test

Page: 1 / 14
Total 622 questions
Question 1

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?



Answer : D

Turning off inheritance on the specific folder requested by the manager and setting the requested permissions, followed by turning on inheritance under the child folders, ensures that only the immediate team has access to the confidential material while maintaining the broader permissions structure for other folders and files. This action isolates the folder's permissions from the top-level inheritance, providing a focused security measure for sensitive content.


Question 2

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?



Answer : D

The 'tracert' command is used to view the path that network traffic takes from a PC to a specified destination. It is helpful in identifying where along the path the traffic may be failing or experiencing delays. In the scenario where a customer service representative can't send jobs to a remote printer but can print locally, 'tracert' can help diagnose if there's a network routing issue affecting the connection to the remote branch office.


Question 3

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).



Answer : A, B

The Hardware Compatibility List (HCL) is a list that indicates hardware components that are compatible with a specific software or operating system. If software installation fails due to incompliance with the HCL, it's most likely due to core hardware components like the Network Interface Card (NIC) or the Central Processing Unit (CPU) not being supported or not meeting the software's minimum hardware requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as defined by the HCL.


Question 4

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?



Answer : A

When an Android device experiences slow boot times and application crashes after installing apps from a third-party website, scanning the system for malware is a critical first step. Third-party sources can often host malicious software that can compromise device performance and security. A malware scan can identify and remove such threats, potentially resolving the performance issues and application instability. Clearing the web browser cache, enrolling the device in an MDM system, and confirming app compatibility are useful steps but do not address the immediate concern of potential malware introduced by third-party app installations.


Question 5

Which of the following features can be used to ensure a user can access multiple versions of files?



Answer : C

Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.


Question 6

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?



Answer : A

Booting in safe mode is the initial step to diagnose a computer experiencing a blue screen of death (BSOD) following a failed Windows 10 update. Safe mode starts the computer with a minimal set of drivers and services, allowing troubleshooting and identification of the problematic software or driver causing the BSOD. This mode provides a safer environment to uninstall recent updates or drivers, perform system scans, and restore the system if necessary. Other options like System Restore wizard, last known-good configuration, and resetting BIOS settings may be subsequent steps but do not directly diagnose the issue as effectively as booting in safe mode.


Question 7

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?



Answer : D

Using a password manager is the best way to mitigate the issue of users recording their login information in accessible areas. Password managers securely store and encrypt passwords and login details, reducing the need for users to write down or remember multiple complex passwords. This approach enhances security by encouraging the use of strong, unique passwords for different accounts without the risk of forgetting them or the unsafe practice of writing them down. Trusted sources, valid certificates, and user training are important security measures but do not directly address the problem of managing multiple secure passwords as effectively as a password manager does.


Page:    1 / 14   
Total 622 questions