A user calls the help desk to report an issue with their smartphone. After the user returns from a business trip, the user is no longer able to access email or visit websites without a Wi-Fi connection on the smartphone. Which of the following could the user do to most likely resolve the issue?
Answer : A
The most likely solution to this issue is to enable cellular data. After a business trip, the user may have disabled cellular data to avoid roaming charges, or the phone may have been set to Wi-Fi only for internet access. Enabling cellular data would restore internet access outside of Wi-Fi networks.
Users are reporting that an unsecured network is broadcasting with the same name as the normal wireless network. They are able to access the internet but cannot connect to the file share servers. Which of the following best describes this issue?
Answer : D
Comprehensive and Detailed In-Depth
A rogue wireless access point is an unauthorized wireless network set up by an attacker or mistakenly by an employee. If the rogue AP has the same SSID as the legitimate network, users may unknowingly connect to it, causing security risks and preventing access to internal network resources.
A . Unreachable DNS server -- Incorrect. A DNS issue would prevent access to websites, not just file share servers.
B . Virtual local area network (VLAN) misconfiguration -- Incorrect. VLAN misconfiguration could restrict network access, but it would not involve an unsecured network with the same name.
C . Incorrect IP address -- Incorrect. An incorrect IP could prevent network access but would not explain the presence of an unsecured network.
CompTIA A+ 220-1102, Objective 2.5 -- Wireless and Network Security Threats
Which of the following should be used to configure automatic backups on macOS?
Answer : B
Time Machine is the built-in backup feature for macOS that allows users to back up their system automatically. It continuously backs up everything on the Mac, including files, applications, system files, and settings, allowing users to restore their system to a previous state if needed. Time Machine operates by creating hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months. Other options like 'Mission Control' help in organizing windows, while 'System Restore' is a feature more common in Windows operating systems, not macOS.
Apple Support: Use Time Machine to back up or restore your Mac
CompTIA A+ Study Guide - Backup and Recovery Concepts in macOS (Whizlabs)
A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?
Answer : B
The user should verify that NFC is enabled on their phone.NFC is a technology that allows two devices to communicate with each other when they are in close proximity2.
NFC (Near Field Communication) technology allows a phone to wirelessly communicate with a payment terminal or other compatible device. In order to use NFC to make a payment or transfer information, the feature must be enabled on the phone. Therefore, the user should verify that NFC is enabled on their phone before attempting to make a payment with it. The other options, such as turning off airplane mode, connecting to Wi-Fi, or enabling Bluetooth, do not pertain to the NFC feature and are unlikely to resolve the issue. This information is covered in the Comptia A+ Core2 documents/guide under the Mobile Devices section.
When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?
Answer : A
Comprehensive and Detailed In-Depth
This is a scareware scam that attempts to trick users into installing malicious applications. The best action is to close the website and ignore the pop-up.
B . Replace the smartphone -- Incorrect. The phone is likely not compromised; it is just displaying a fake warning.
C . Download and install the application to resolve the issue -- Incorrect. Doing so could infect the device with malware.
D . Analyze the smartphone to find the source of the breach -- Unnecessary, as there is no real breach.
Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?
Answer : C
devmgmt.msc is the MMC snap-in that opens the Device Manager, a tool that allows the technician to view and manage the hardware devices and their drivers on the computer1. If the applications are not updating properly, it could be due to outdated, corrupted, or incompatible drivers that prevent the hardware from functioning normally.The technician can use the Device Manager to update, uninstall, rollback, or disable the drivers, as well as scan for hardware changes, troubleshoot problems, and view device properties2.
gpedit.msc is the MMC snap-in that opens the Group Policy Editor, a tool that allows the technician to configure the local or domain group policy settings for the computer or a group of computers3. Group policy settings can affect the security, performance, and functionality of the system, but they are not directly related to the application updates or the hardware drivers.
perfmon.msc is the MMC snap-in that opens the Performance Monitor, a tool that allows the technician to monitor and analyze the performance of the system and its components, such as processor, memory, disk, network, etc4.Performance Monitor can display real-time data or collect log data for later analysis, as well as generate reports and alerts based on the performance counters5. Performance Monitor can help the technician identify and diagnose performance issues, but it does not provide a way to manage the hardware drivers.
The Official CompTIA A+ Core 2 Study Guide6, page 223, 225, 227, 228.
A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?
Answer : D
The customer's web browser is likely infected by a browser hijacker, which is a type of malware that changes the browser's settings and redirects the user to malicious websites. A browser hijacker can also steal the user's personal data, display unwanted ads, and install more malware on the device. To remove a browser hijacker, the user should first uninstall the browser from the Control Panel, then scan the device with an antivirus or anti-malware program, and finally install a trusted browser from a legitimate source.Deleting the browser cookies and history, resetting the browser settings, or changing the browser default search engine may not be enough to get rid of the browser hijacker, as it may have embedded itself into the system or other browser components.