Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves around. Which of the following should a technician perform to troubleshoot the issue?

Options:

A.

Verify the Wi-Fi connection status.

B.

Enable the NFC setting on the device.

C.

Bring the device within Bluetooth range.

D.

Turn on device tethering.

Buy Now
Questions 5

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

Options:

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item

Buy Now
Questions 6

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 7

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

Options:

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Buy Now
Questions 8

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Buy Now
Questions 9

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Buy Now
Questions 10

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

Options:

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Buy Now
Questions 11

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

Options:

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Buy Now
Questions 12

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Buy Now
Questions 13

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Buy Now
Questions 14

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).

Options:

A.

File Explorer

B.

User Account Control

C.

Windows Backup and Restore

D.

Windows Firewall

E.

Windows Defender

F.

Network Packet Analyzer

Buy Now
Questions 15

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

Options:

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Buy Now
Questions 16

A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?

Options:

A.

The user is not connected to the VPN.

B.

The file server is offline.

C.

A low battery is preventing the connection.

D.

The log-in script failed.

Buy Now
Questions 17

A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the

users account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:

Options:

A.

acceptable use policy.

B.

regulatory compliance requirements.

C.

non-disclosure agreement

D.

incident response procedures

Buy Now
Questions 18

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Buy Now
Questions 19

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Buy Now
Questions 20

A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is used to change the color of the cursor?

Options:

A.

Keyboard

B.

Touch pad

C.

Ease of Access Center

D.

Display settings

Buy Now
Questions 21

Which of the following should be done NEXT?

Options:

A.

Send an email to Telecom to inform them of the issue and prevent reoccurrence.

B.

Close the ticket out.

C.

Tell the user to take time to fix it themselves next time.

D.

Educate the user on the solution that was performed.

Buy Now
Questions 22

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 23

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

Options:

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Buy Now
Questions 24

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Buy Now
Questions 25

Which of the following data is MOST likely to be regulated?

Options:

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Buy Now
Questions 26

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Buy Now
Questions 27

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Buy Now
Questions 28

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Buy Now
Questions 29

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Options:

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Buy Now
Questions 30

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Buy Now
Questions 31

A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on. The technician attempts to boot the computer via the NIC to image the computer, but this method does not work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging system via the network?

Options:

A.

The computer's CMOS battery failed.

B.

The computer's NIC is faulty.

C.

The PXE boot option has not been enabled

D.

The Ethernet cable the technician is using to connect the desktop to the network is faulty.

Buy Now
Questions 32

An IT services company that supports a large government contract replaced the Ethernet cards on several hundred desktop machines to comply With regulatory requirements. Which of the following disposal methods for the non-compliant cards is the MOST environmentally friendly?

Options:

A.

incineration

B.

Resale

C.

Physical destruction

D.

Dumpster for recycling plastics

Buy Now
Questions 33

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 34

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Buy Now
Questions 35

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Buy Now
Questions 36

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Buy Now
Questions 37

A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?

Options:

A.

Windows Enterprise Edition

B.

Windows Professional Edition

C.

Windows Server Standard Edition

D.

Windows Home Edition

Buy Now
Questions 38

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

Options:

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Buy Now
Questions 39

The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to normal after three or four days. Restarting the device does not usually restore performance. Which of the following should a technician check FIRST to troubleshoot this issue?

Options:

A.

Data usage limits

B.

Wi-Fi connection speed

C.

Status of airplane mode

D.

System uptime

Buy Now
Questions 40

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Buy Now
Questions 41

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

Buy Now
Questions 42

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Buy Now
Questions 43

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

Options:

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Buy Now
Questions 44

Which of the following is a data security standard for protecting credit cards?

Options:

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Buy Now
Questions 45

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Buy Now
Questions 46

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 47

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 48

A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on startup but causing excessive boot times. Which of the following should the technician do to selectively prevent programs from loading?

Options:

A.

Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move items one by one to the Recycle Bin

B.

Remark out entries listed HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run

C.

Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at startup

D.

Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for issue resolution at each startup.

Buy Now
Questions 49

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

Options:

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Buy Now
Questions 50

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Buy Now
Questions 51

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

Options:

A.

Install and run Linux and the required application in a PaaS cloud environment

B.

Install and run Linux and the required application as a virtual machine installed under the Windows OS

C.

Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed

D.

Set up a dual boot system by selecting the option to install Linux alongside Windows

Buy Now
Questions 52

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

Options:

Buy Now
Questions 53

A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email. The user is also able to send and receive text messages and phone calls when the smartphone is not connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet on the smartphone when it is not connected to Wi-Fi?

Options:

A.

The smartphone's line was not provisioned with a data plan

B.

The smartphone's SIM card has failed

C.

The smartphone's Bluetooth radio is disabled.

D.

The smartphone has too many applications open

Buy Now
Questions 54

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Buy Now
Questions 55

A user contacted the help desk to report pop-ups on a company workstation indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Select TWO)

Options:

A.

Scan the computer with the company-provided antivirus software

B.

Install a new hard drive and clone the user's drive to it

C.

Deploy an ad-blocking extension to the browser.

D.

Uninstall the company-provided antivirus software

E.

Click the link in the messages to pay for virus removal

F.

Perform a reset on the user's web browser

Buy Now
Questions 56

A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which of the following log-in options meets these requirements?

Options:

A.

PIN

B.

Username and password

C.

SSO

D.

Fingerprint

Buy Now
Questions 57

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Buy Now
Questions 58

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Options:

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Buy Now
Questions 59

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Buy Now
Questions 60

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

Options:

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Buy Now
Questions 61

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Options:

A.

Run a startup script that removes files by name.

B.

Provide a sample to the antivirus vendor.

C.

Manually check each machine.

D.

Monitor outbound network traffic.

Buy Now
Questions 62

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Buy Now
Questions 63

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Buy Now
Questions 64

A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?

Options:

A.

Privacy

B.

Indexing Options

C.

System

D.

Device Manager

Buy Now
Questions 65

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Buy Now
Questions 66

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Options:

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Buy Now
Questions 67

A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?

Options:

A.

resmon exe

B.

msconfig.extf

C.

dfrgui exe

D.

msmfo32.exe

Buy Now
Questions 68

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

Options:

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Buy Now
Questions 69

Which of the following is the MOST important environmental concern inside a data center?

Options:

A.

Battery disposal

B.

Electrostatic discharge mats

C.

Toner disposal

D.

Humidity levels

Buy Now
Questions 70

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Options:

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Buy Now
Questions 71

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Buy Now
Questions 72

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Buy Now
Questions 73

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

Options:

A.

Install alternate open-source software in place of the applications with issues

B.

Run both CPU and memory tests to ensure that all hardware functionality is normal

C.

Check for any installed patches and roll them back one at a time until the issue is resolved

D.

Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

Buy Now
Questions 74

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

Options:

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Buy Now
Questions 75

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

Options:

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Buy Now
Questions 76

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Options:

A.

Full

B.

Differential

C.

Off-site

D.

Grandfather-father-son

Buy Now
Questions 77

A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?

Options:

A.

Lock all devices in a closet.

B.

Ensure all devices are from the same manufacturer.

C.

Change the default administrative password.

D.

Install the latest operating system and patches

Buy Now
Questions 78

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 79

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

Options:

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Buy Now
Questions 80

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Buy Now
Questions 81

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

Options:

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

Buy Now
Questions 82

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

Options:

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Buy Now
Questions 83

Which of the following operating systems would most likely be used to run the inventory management system at a factory?

Options:

A.

Windows

B.

Chrome OS

C.

Android

D.

iOS

Buy Now
Questions 84

Which of the following is the most likely reason a filtration system is critical for data centers?

Options:

A.

Plastics degrade over time.

B.

High humidity levels can rust metal.

C.

Insects can invade the data center.

D.

Dust particles can clog the machines.

Buy Now
Questions 85

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Options:

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Buy Now
Questions 86

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Buy Now
Questions 87

Which of the following involves sending arbitrary characters in a web page request?

Options:

A.

SMS

B.

SSL

C.

XSS

D.

VPN

Buy Now
Questions 88

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Buy Now
Questions 89

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Buy Now
Questions 90

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

Options:

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Buy Now
Questions 91

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

Options:

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Buy Now
Questions 92

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Buy Now
Questions 93

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

Options:

A.

FAT32

B.

exFAT

C.

NTFS

Buy Now
Questions 94

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

Options:

A.

Network share

B.

Group Policy

C.

BitLocker

D.

Static IP

Buy Now
Questions 95

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

Options:

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Buy Now
Questions 96

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

    Devices and Printers

Options:

A.

Ease of Access

B.

Programs and Features

C.

Device Manager

Buy Now
Questions 97

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Buy Now
Questions 98

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 99

Which of the following would allow physical access to a restricted area while maintaining a record of events?

Options:

A.

Hard token

B.

Access control vestibule

C.

Key fob

D.

Door Lock

Buy Now
Questions 100

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

D.

Run an antivirus and enable encryption.

Buy Now
Questions 101

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Buy Now
Questions 102

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Buy Now
Questions 103

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Buy Now
Questions 104

A client wants a technician to set up a proxy server in a branch office to manage internet access. This involves configuring the workstations to use the new proxy server. Which of the following Internet Options tabs in Control Panel would be most appropriate for the technician to use to configure the settings?

Options:

A.

Privacy

B.

Advanced

C.

Content

D.

Connections

E.

Security

Buy Now
Questions 105

A customer calls desktop support and begins yelling at a technician. The customer claims to have submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of the following describes how the technician should respond?

    Place the customer on hold until the customer calms down.

Options:

A.

Disconnect the call to avoid a confrontation.

B.

Wait until the customer is done speaking and offer assistance.

C.

Escalate the issue to a supervisor.

Buy Now
Questions 106

Which of the following commands can a technician use to get the MAC address of a Linux distribution?

    net use

Options:

A.

ifconfig

B.

netstat

C.

ping

Buy Now
Questions 107

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

Options:

A.

gpedit.msc

B.

perfmon.msc

C.

devmgmt.msc

Buy Now
Questions 108

Which of the following would typically require the most computing resources from the host computer?

    Chrome OS

Options:

A.

Windows

B.

Android

C.

macOS

D.

Linux

Buy Now
Questions 109

A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new copy of Windows were recently installed on the PC. Which of the following is the most appropriate command to use to fix the issue?

    msconfig

Options:

A.

chkdsk

B.

sfc

C.

diskpart

D.

mstsc

Buy Now
Questions 110

Which of the following are mobile operating systems used on smartphones? (Select two).

Options:

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Buy Now
Questions 111

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

    SSID

Options:

A.

DHCP

B.

Firewall

C.

SSD

Buy Now
Questions 112

Which of the following does MFA provide?

Options:

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Buy Now
Questions 113

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

Options:

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Buy Now
Questions 114

Which of the following is command options is used to display hidden files and directories?

Options:

A.

-a

B.

-s

C.

-lh

D.

-t

Buy Now
Questions 115

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?

Options:

A.

msinfo32.exe

B.

dxdiag.exe

C.

msconfig.exe

D.

regedit.exe

Buy Now
Questions 116

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

Options:

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Buy Now
Questions 117

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Buy Now
Questions 118

A corporate smartphone was stored for five months after setup. During this time, the company did not have any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which of the following should a technician do next?

    Restart the phone.

Options:

A.

Reimage the OS.

B.

Reinstall the application.

C.

Clear the cache.

Buy Now
Questions 119

Which of the following operating systems is most commonly installed on home IoT devices?

Options:

A.

Windows

B.

macOS

C.

Linux

D.

Chrome OS

Buy Now
Questions 120

A workstation's hard drive is making loud noises, applications are running slowly, and the workstation is rebooting unexpectedly. Which of the following should the technician do first to begin troubleshooting the issue?

Options:

A.

Perform a System Restore.

B.

Open Disk Cleanup.

C.

Replace the hard drive.

D.

Run CHKDSK.

Buy Now
Questions 121

A user reported that Windows has crashed several times during the day. A technician needs to check error messages to determine whether the issue pertains to the hardware or an application. Which of the following tools should the technician use?

Options:

A.

Event Viewer

B.

Resource Monitor

C.

Performance Monitor

D.

Device Manager

Buy Now
Questions 122

While accessing a website, a user clicks on a menu option and nothing happens. Which of the following actions should the user take to most likely resolve this issue?

Options:

A.

Enable TLS 1.0 in the browser.

B.

Enable private-browsing mode.

C.

Disable pop-up blocker.

D.

Clear the cache.

Buy Now
Questions 123

Which of the following best describes XFS?

Options:

A.

A filesystem used by the Linux OS

B.

A filesystem used by iOS

C.

A filesystem used by the Windows OS

D.

A filesystem used by macOS

Buy Now
Questions 124

A technician discovers a user’s PC has a "No OS found" error message. Which of the following steps should the technician take next?

Options:

A.

Remove external storage and reboot the PC.

B.

Replace the SSD and run disk defragmenter.

C.

Start up in safe mode and roll back the latest security updates.

D.

Back up personal data and rebuild the user profile.

Buy Now
Questions 125

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

Options:

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Buy Now
Questions 126

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

Options:

A.

Shut down and cold start the smartphone

B.

Delete the email containing the attachment

C.

Wipe the device and reset it to factory defaults

D.

Uninstall and reinstall the mobile browser

Buy Now
Questions 127

Which of the following should be used to configure automatic backups on macOS?

Options:

A.

Mission Control

B.

Time Machine

C.

Disaster Recovery

D.

System Restore

Buy Now
Questions 128

Which of the following macOS file types requires mounting before installation?

Options:

A.

.pkg

B.

.zip

C.

.app

D.

.dmg

Buy Now
Questions 129

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

Options:

A.

Port forwarding

B.

Unused ports

C.

SSID broadcast

D.

Allow list

Buy Now
Questions 130

Which of the following is a reason why PII is regulated?

Options:

A.

To establish a chain-of-custody

B.

To increase efficiency of databases

C.

To stop information leaks

D.

To protect privacy rights

E.

To discourage anonymity

Buy Now
Questions 131

A technician needs to configure a backup solution that will have the least additional expenses and impact on users. Which of the following steps should the technician complete? (Select two.)

Options:

A.

Configure the backup to run when the user logs in

B.

Configure the backup to run after peak hours

C.

Use third-party licensed backup software

D.

Use the built-in OS backup utility

E.

Configure the backup job to run every hour

F.

Use an external storage device for the backup

Buy Now
Questions 132

A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?

Options:

A.

netstat

B.

tracert

C.

net use

D.

net user

E.

nslookup

Buy Now
Questions 133

h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Buy Now
Questions 134

A technician is troubleshooting a user's PC that is displaying pop-up windows advertising free software downloads. When the technician tries to open a document, the system displays an error message: "Not enough memory to perform this operation." Which of the following should be the technician's next step to resolve this issue?

Options:

A.

Install antispyware

B.

Relmage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Buy Now
Questions 135

Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

Options:

A.

DoS

B.

Spoofing

C.

XSS

D.

SQL injection

Buy Now
Questions 136

A technician is troubleshooting a connectivity issue and wants to verify that traffic is flowing to the correct upstream locations. Which of the following commands should the technician use?

Options:

A.

net use

B.

nslookup

C.

traceroute

D.

netstat

Buy Now
Questions 137

Which of the following commands should be used to display current processor activity on a Linux workstation?

Options:

A.

top

B.

ls

C.

procmon

D.

taskmgr

Buy Now
Questions 138

The camera and microphone on an iPhone user's device are activating without any user input. The user’s friend recently modified the device to allow applications to be installed outside the normal App Store. Which of the following is the issue?

Options:

A.

The user connected a counterfeit Lightning cable to the iPhone.

B.

The device is unenrolled from Mobile Device Management.

C.

The device was jailbroken to remove internal security protections.

D.

The iPhone has an out-of-date operating system.

Buy Now
Questions 139

A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?

Options:

A.

Enabling Windows Firewall

B.

Activating the email spam filter

C.

Using a secure VPN connection

D.

Running vulnerability scans on a schedule

Buy Now
Questions 140

After access to a server room was breached, a technician needs to implement a secure method to prevent unauthorized access. Which of the following is the most secure solution?

Options:

A.

Smart cards

B.

Key fobs

C.

Biometrics

D.

Security guard

Buy Now
Questions 141

An administrator needs to copy files to a Linux server at another office location so multiple users can access the files. Which of the following is the best for the administrator to use?

Options:

A.

SFTP

B.

RDP

C.

DHCP

D.

RMM

Buy Now
Questions 142

A customer needs to verify an executable file that the customer downloaded from a website. Which of the following should the customer use to verify the file?

Options:

A.

Password manager

B.

BitLocker

C.

FileVault

D.

Checksum

E.

Secure site

Buy Now
Questions 143

A technician is troubleshooting an issue on a PC that has low disk space. Which of the following Control Panel utilities should the technician most likely use to investigate and remediate the issue?

Options:

A.

Internet Options

B.

System

C.

Programs and Features

D.

Device Manager

Buy Now
Questions 144

A client recently upgraded their Windows 10 machine to Windows 11. The client reports the following message displays when turning the computer on: "Error loading operating system." Which of the following should a technician do first to troubleshoot this issue?

Options:

A.

Disable the Secure Boot feature.

B.

Use the automated startup recovery.

C.

Format the drive.

D.

Resize the boot partition.

Buy Now
Questions 145

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Buy Now
Questions 146

A company needs to securely and remotely access network devices. Which of the following will allow the company to access these devices?

Options:

A.

Telnet

B.

TKIP

C.

RDP

D.

SSH

Buy Now
Questions 147

Which of the following features allows a user to install software from a DVD even when the laptop running macOS does not have an optical drive?

Options:

A.

Disk Utility

B.

Remote Disc

C.

Multiple Desktops

D.

Target Disk

Buy Now
Questions 148

A systems administrator receives notification about unauthorized access to company resources outside normal business hours. Which of the following security measures should the systems administrator implement to prevent further unauthorized use?

Options:

A.

Perimeter firewalls

B.

SSL-enabled DNS

C.

Anonymizing VPNs

D.

Multifactor authentication

Buy Now
Questions 149

A user receives a message on a PC stating it has been infected by malware. A technician runs a full scan on the user's machine and detects no malware. Later that day, the same message reappears. Which of the following steps should the technician take to restore the system to regular functionality?

Options:

A.

Check for Windows updates.

B.

Reimage the computer.

C.

Enable Windows Firewall.

D.

Run System File Checker.

Buy Now
Questions 150

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Buy Now
Questions 151

Which of the following operating systems uses the ext4 filesystem type?

Options:

A.

macOS

B.

iOS

C.

Linux

D.

Windows

Buy Now
Questions 152

Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?

Options:

A.

Providing user awareness education

B.

Introducing a BYOD policy

C.

Setting up SMTP filtering rules

D.

Restricting emails from personal email addresses

Buy Now
Questions 153

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?

Options:

A.

Write scripts to rerun backups that fail.

B.

Store copies of the backups off site.

C.

Perform incremental backups instead.

D.

Set up alerts to be notified when backups fail.

Buy Now
Questions 154

A user is unable to see the devices that are present on the network after changing some network settings in the Control Panel. Which of the following settings did the user change on the Windows 10 computer?

Options:

A.

The network type from private to public

B.

The Windows Firewall from on to off

C.

The UAC level to its highest level

D.

The file-sharing permissions

Buy Now
Questions 155

Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of law?

Options:

A.

Data integrity form

B.

Valid operating system license

C.

Documentation of an incident

D.

Chain of custody

Buy Now
Questions 156

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Buy Now
Questions 157

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 158

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

Options:

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Buy Now
Questions 159

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

Options:

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Buy Now
Questions 160

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

Options:

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Buy Now
Questions 161

A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Select two).

Options:

A.

Install a host-based IDS.

B.

Restrict log-in times.

C.

Enable a BIOS password.

D.

Update the password complexity.

E.

Disable AutoRun.

F.

Update the antivirus definitions.

G.

Restrict user permissions.

Buy Now
Questions 162

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

Options:

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Buy Now
Questions 163

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 164

Which of the following operating systems is considered closed source?

Options:

A.

Ubuntu

B.

Android

C.

CentOS

D.

OSX

Buy Now
Questions 165

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Buy Now
Questions 166

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

Options:

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Buy Now
Questions 167

Which of the following macOS utilities uses AES-128 to encrypt the startup disk?

Options:

A.

fdisk

B.

Diskpart

C.

Disk Utility

D.

FileVault

Buy Now
Questions 168

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

Options:

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Buy Now
Questions 169

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 170

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.

Restart the mobile device.

B.

Turn on airplane mode.

C.

Check that the accessory is ready to pair.

D.

Clear all devices from the phone's Bluetooth settings.

Buy Now
Questions 171

A new employee is having difficulties using a laptop with a docking station The laptop is connected to the docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop goes to sleep. Which of the following options should the technician configure in order to fix the Issue?

Options:

A.

Hibernate

B.

Sleep/suspend

C.

Choose what closing the lid does

D.

Turn on fast startup

Buy Now
Questions 172

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

Options:

A.

SMS

B.

MFA

C.

ACL

D.

MDM

Buy Now
Questions 173

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

Options:

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Buy Now
Questions 174

An administrator is designing and implementing a server backup system that minimizes the capacity of storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full backups?

Options:

A.

Differential

B.

Open file

C.

Archive

D.

Incremental

Buy Now
Questions 175

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Buy Now
Questions 176

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

Options:

A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options

Buy Now
Questions 177

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Buy Now
Questions 178

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Options:

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Buy Now
Questions 179

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Buy Now
Questions 180

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

Options:

A.

Disable Wi-Fi autoconnect.

B.

Stay offline when in public places.

C.

Uninstall all recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device

F.

Update the OS

Buy Now
Questions 181

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 182

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Buy Now
Questions 183

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Buy Now
Questions 184

A help desk technician determines a motherboard has failed. Which of the following is the most logical next step in the remediation process?

Options:

A.

Escalating the issue to Tier 2

B.

Verifying warranty status with the vendor

C.

Replacing the motherboard

D.

Purchasing another PC

Buy Now
Questions 185

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer; thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

Options:

A.

Document the date and time of the change.

B.

Submit a change request form.

C.

Determine the risk level of this change.

D.

Request an unused IP address.

Buy Now
Questions 186

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Options:

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Buy Now
Questions 187

The battery life on an employee's new phone seems to be drastically less than expected, and the screen stays on for a very long time after the employee sets the phone down. Which of the following should the technician check first to troubleshoot this issue? (Select two).

Options:

A.

Screen resolution

B.

Screen zoom

C.

Screen timeout

D.

Screen brightness

E.

Screen damage

F.

Screen motion smoothness

Buy Now
Questions 188

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Buy Now
Questions 189

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Buy Now
Questions 190

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Options:

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Buy Now
Questions 191

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Buy Now
Questions 192

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected. Which of the following BEST describes why the system still has malware?

Options:

A.

A system patch disabled the antivirus protection and host firewall.

B.

The system updates did not include the latest anti-malware definitions.

C.

The system restore process was compromised by the malware.

D.

The malware was installed before the system restore point was created.

Buy Now
Questions 193

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Buy Now
Questions 194

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

Options:

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Buy Now
Questions 195

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Buy Now
Questions 196

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?

Options:

A.

Access control list

B.

Acceptable use policy

C.

Incident report

D.

Standard operating procedure

Buy Now
Questions 197

A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do after changing the network configuration to prevent the neighbor from being able to connect again?

Options:

A.

Disable the SSID broadcast.

B.

Disable encryption settings.

C.

Disable DHCP reservations.

D.

Disable logging.

Buy Now
Questions 198

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

Options:

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Buy Now
Questions 199

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

Options:

A.

Adjust the content filtering.

B.

Unmap port forwarding.

C.

Disable unused ports.

D.

Reduce the encryption strength

Buy Now
Questions 200

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

Options:

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Buy Now
Questions 201

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Buy Now
Questions 202

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

Options:

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Buy Now
Questions 203

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Buy Now
Questions 204

While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?

Options:

A.

Evil twin

B.

Impersonation

C.

Insider threat

D.

Whaling

Buy Now
Questions 205

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Buy Now
Questions 206

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

Options:

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Buy Now
Questions 207

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Buy Now
Questions 208

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Buy Now
Questions 209

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

Options:

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Buy Now
Questions 210

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

Options:

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Buy Now
Questions 211

A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely configure on the PC?

Options:

A.

VDI

B.

Mapped drives

C.

Wireless WAN

D.

Domain

Buy Now
Questions 212

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Buy Now
Questions 213

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 214

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Buy Now
Questions 215

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Buy Now
Questions 216

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Buy Now
Questions 217

A company was recently attacked by ransomware. The IT department has remediated the threat and determined that the attack method used was email. Which of the following is the most effective way to prevent this issue from reoccurring?

Options:

A.

Spam filtering

B.

Malware preventionsoftware

C.

End user education

D.

Stateful firewall inspection

Buy Now
Questions 218

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Buy Now
Questions 219

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

Options:

A.

ipr

B.

Ispool

C.

Ipstat

D.

Ipoptions

Buy Now
Questions 220

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

Options:

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Buy Now
Questions 221

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Buy Now
Questions 222

A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These issues have impacted the user's productivity and may have caused the user's files to be altered. Which of the following should a technician do to address these issues with minimal impact to the user?

Options:

A.

Use System Restore to recover the OS files.

B.

Wipe the computer and install a new copy of the OS.

C.

Identify whether the disk partition table has been reduced in size.

D.

Perform a full-system, antivirus scan and check browser notifications.

Buy Now
Questions 223

A malicious user was able to export an entire website's user database by entering specific commands into a field on the company's website. Which of the following did the malicious user most likely exploit to extract the data?

Options:

A.

Cross-site scripting

B.

SQL injection

C.

Brute-force attack

D.

DDoS attack

Buy Now
Questions 224

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Buy Now
Questions 225

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

Options:

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Buy Now
Questions 226

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Buy Now
Questions 227

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Buy Now
Questions 228

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

Options:

A.

Device

B.

Business

C.

Network

D.

Operation

Buy Now
Questions 229

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Buy Now
Questions 230

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 231

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Buy Now
Questions 232

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

Options:

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Buy Now
Questions 233

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 234

A technician needs to implement a system to handle both authentication and authorization. Which of the following meets this requirement?

Options:

A.

WPA3

B.

MFA

C.

TACACS+

D.

RADIUS

Buy Now
Questions 235

Which of the following features can a technician use to ensure users are following password length requirements?

Options:

A.

Group Policy

B.

Log-on script

C.

Access controllist

D.

Security groups

Buy Now
Questions 236

Which of the following language types enables the automation of tasks?

Options:

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Buy Now
Questions 237

A user received an alert from a Windows computer indicating low storage space. Which of the following will best resolve this issue?

Options:

A.

Reviewing System Information

B.

Running Disk Cleanup

C.

Editing the Registry

D.

Checking the Performance Monitor

E.

Increasing the memory

Buy Now
Questions 238

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Buy Now
Questions 239

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

Options:

Buy Now
Questions 240

A company using Active Directory wants to change the location of all users' "Documents" to a file server on the network. Which of the following should the company set up to accomplish this task?

Options:

A.

Security groups

B.

Folder redirection

C.

Organizational unit structure

D.

Access control list

Buy Now
Questions 241

Which of the following Linux commands would help to identify which directory the user is currently operating in?

Options:

A.

pwd

B.

dig

C.

find

D.

cat

Buy Now
Questions 242

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 243

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Buy Now
Questions 244

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Buy Now
Questions 245

A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:

Protocol/PortActionDirection

1 AllowOut

445 BlockOut

53 BlockOut

123 BlockOut

80 BlockOut

Which of the following ports should be opened to allow for DNS recursion?

Options:

A.

1

B.

53

C.

80

D.

123

E.

445

Buy Now
Questions 246

Which of the following macOS features provides the user with a high-level view of all open windows?

Options:

A.

Mission Control

B.

Finder

C.

Multiple Desktops

D.

Spotlight

Buy Now
Questions 247

A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish this task utilizing the workstation's built-in protocols?

Options:

A.

VPN

B.

SMB

C.

RMM

D.

MSRA

Buy Now
Questions 248

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 249

A company acquired a local office, and a technician is attempting to join the machines at the office to the local domain. The technician notes that the domain join option appears to be missing. Which of the following editions of Windows is MOST likely installed on the machines?

Options:

A.

Windows Professional

B.

Windows Education

C.

Windows Enterprise

D.

Windows Home

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Sep 3, 2025
Questions: 832
220-1102 pdf

220-1102 PDF

$29.75  $84.99
220-1102 Engine

220-1102 Testing Engine

$35  $99.99
220-1102 PDF + Engine

220-1102 PDF + Testing Engine

$47.25  $134.99