CompTIA 220-1202 CompTIA A+ Certification Exam: Core 2 Exam Practice Test

Page: 1 / 14
Total 75 questions
Question 1

MFA for a custom web application on a user's smartphone is no longer working. The last time the user remembered it working was before taking a vacation to another country. Which of the following should the technician do first?



Answer : A

Time-based one-time password (TOTP) MFA apps rely on accurate clock synchronization. Traveling can desynchronize the device's clock, causing generated codes to be invalid. Ensuring the smartphone's date/time (and time zone) are correct will typically restore MFA functionality immediately.


Question 2

A customer is unable to open some files on their system. Each time the customer attempts to open a file, the customer receives a message that the file is encrypted. Which of the following best describes this issue?



Answer : B

Ransomware is malware that encrypts a user's files and then demands payment (a ransom) in exchange for the decryption key. The user's inability to open the files and the message indicating they're encrypted are classic signs of a ransomware attack.


Question 3

A technician uses AI to draft a proposal about the benefits of new software. When reading the draft, the technician notices that the draft contains factually incorrect information. Which of the following best describes this scenario?



Answer : B

When an AI model generates plausible-sounding but factually inaccurate or fabricated information, it's referred to as a ''hallucination.'' Identifying and correcting these errors is essential to ensure the accuracy and reliability of AI-assisted content.


Question 4

Every time a user loads a specific spreadsheet, their computer is temporarily unresponsive. The user also notices that the title bar indicates the applications are not responding. Which of the following would a technician most likely inspect?



Answer : D

A very large or complex spreadsheet can consume excessive RAM and CPU cycles, causing the application to hang or become unresponsive. By checking the file's size and monitoring how much memory Excel (or the spreadsheet program) uses when opening it, the technician can confirm whether resource exhaustion is the culprit and take steps - like simplifying the file or adding RAM - to resolve the issue.


Question 5

An administrator received an email stating that the OS they are currently supporting will no longer be issued security updates and patches. Which of the following is most likely the reason the administrator received this message?



Answer : B

When an operating system reaches end of life (EOL), the vendor ceases issuing security updates and patches. Administrators are notified so they can plan upgrades or migrations before support ends.


Question 6

A company wants to use a single operating system for its workstation and servers and avoid licensing fees. Which of the following operating systems would the company most likely select?



Answer : A

Linux distributions are open-source and generally free of licensing fees, making them suitable for both desktop workstations and servers. Organizations can use the same Linux OS across all their systems without incurring per-seat or per-server costs, unlike proprietary systems such as Windows or macOS.


Question 7

Which of the following is a Linux command that is used for administrative purposes?



Answer : D

The su (substitute user) command is a standard Linux utility that allows an administrator to assume another user's identity - most commonly switching to the root account for elevated privileges. It's an essential tool for administrative tasks on Unix and Linux systems.


Page:    1 / 14   
Total 75 questions