DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Achieve Success in the CompTIA A+ Exam with 220-1102 Practice Tests

Preparing for the CompTIA A+ Core 2 exam? Look no further than our comprehensive collection of exam questions and answers. Our study materials are meticulously crafted by industry experts, ensuring you have access to the most relevant and up-to-date exam resources. With our mock exams, you can simulate the real testing environment, familiarizing yourself with the question formats and time constraints. Our questions cover a wide range of topics, including operating systems, security, mobile devices, and troubleshooting, ensuring you're well-prepared for any scenario the exam may present. Don't leave your success to chance. Invest in our proven exam preparation resources and gain the confidence you need to pass the CompTIA A+ Core 2 (220-1102) exam on your first attempt. Join the ranks of certified professionals and unlock new career opportunities in the IT industry. Remember, success is within reach with our comprehensive study materials and practice tests. Start your journey today and take the first step towards becoming a CompTIA A+ certified professional.
Take other online exams

Question #1
A malicious file was executed automatically when a flash drive was plugged in. Which of the following features would prevent this type of incident?
A. isabling UAC
B. estricting local administrators
C. nabling UPnP
D. urning off AutoPlay
View answer
Correct Answer: A

View The Updated 220-1102 Exam Questions

SPOTO Provides 100% Real 220-1102 Exam Questions for You to Pass Your 220-1102 Exam!

Question #2
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?
A. he technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen application in the list, and clicks Force Quit
B. he technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds which causes the application to force quit
C. he technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option
D. he technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and clicks Force Quit
View answer
Correct Answer: D
Question #3
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the BEST choice for accessing the necessary configuration to complete this goal?
A. ecurity and Maintenance
B. etwork and Sharing Center
C. indows Defender Firewall
D. nternet Options
View answer
Correct Answer: D
Question #4
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several times to roll back the state, but the malware persists.Which of the following would MOST likely resolve the issue?
A. uarantining system files
B. eimaging the workstation
C. ncrypting the hard drive
D. isabling TLS 1
View answer
Correct Answer: B
Question #5
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?
A. un the virus scanner in an administrative mode
B. einstall the operating system
C. eboot the system in safe mode and rescan
D. anually delete the infected files
View answer
Correct Answer: C
Question #6
A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Choose two.)
A. nterprise
B. ro for Workstation
C. ome
D. ro
View answer
Correct Answer: AB
Question #7
A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a button labelled Accept. Which of the following agreements is MOST likely in use?
A. RM
B. DA
C. ULA
D. OU
View answer
Correct Answer: C
Question #8
A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?
A. f airplane mode is enabled
B. f Bluetooth is disabled
C. f NFC is enabled
D. f Wi-Fi is enabled
E. f location services are disabled
View answer
Correct Answer: C
Question #9
While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?
A. bad antivirus signature update was installed
B. router was misconfigured and was blocking traffic
C. n upstream internet service provider was flapping
D. he time or date was not in sync with the website
View answer
Correct Answer: D
Question #10
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?
A. cceptable use
B. hain of custody
C. ecurity policy
D. nformation management
View answer
Correct Answer: B
Question #11
A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?
A. rilling
B. egaussing
C. ow-level formatting
D. rasing/wiping
View answer
Correct Answer: B
Question #12
Which of the following is a proprietary Cisco AAA protocol?
A. KIP
B. ES
C. ADIUS
D. ACACS+
View answer
Correct Answer: D
Question #13
A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?
A. eploy a secondary hard drive with encryption on the appropriate workstation
B. onfigure a hardened SFTP portal for file transfers between file servers
C. equire files to be individually password protected with unique passwords
D. nable BitLocker To Go with a password that meets corporate requirements
View answer
Correct Answer: D
Question #14
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?
A. evice Manager
B. ndexing Options
C. ile Explorer
D. dministrative Tools
View answer
Correct Answer: C
Question #15
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?
A. void distractions
B. eal appropriately with customer's confidential material
C. dhere to user privacy policy
D. et and meet timelines
View answer
Correct Answer: A
Question #16
An application user received an email indicating the version of the application currently in use will no longer be sold. Users with this version of the application will no longer receive patches or updates either. Which of the following indicates a vendor no longer supports a product?
A. UP
B. ULA
C. OL
D. AC
View answer
Correct Answer: C
Question #17
Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?
A. wners can be notified a change is being made and can monitor it for performance impact
B. risk assessment can be performed to determine if the software is needed
C. nd users can be aware of the scope of the change
D. rollback plan can be implemented in case the software breaks an application
View answer
Correct Answer: A
Question #18
A user in a corporate office reports the inability to connect to any network drives. No other users have reported this issue. Which of the following is the MOST likely reason the user is having this issue?
A. he user is not connected to the VPN
B. he file server is offline
C. low battery is preventing the connection
D. he log-in script failed
View answer
Correct Answer: A
Question #19
A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?
A. PN
B. SRA
C. SH
D. DP
View answer
Correct Answer: D
Question #20
An analyst needs GUI access to server software running on a macOS server. Which of the following options provides the BEST way for the analyst to access the macOS server from the Windows workstation?
A. DP through RD Gateway
B. pple Remote Desktop
C. SH access with SSH keys
D. NC with username and password
View answer
Correct Answer: D
Question #21
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
A. can and remove the malware
B. chedule automated malware scans
C. uarantine the system
D. isable System Restore
View answer
Correct Answer: B
Question #22
A technician downloads a validated security tool and notes the vendor hash of a11e11a1. When the download is complete, the technician again validates the hash, but the value returns as 2a222a2b2. Which of the following is the MOST likely cause of the issue?
A. rivate-browsing mode
B. nvalid certificate
C. odified file
D. rowser cache
View answer
Correct Answer: C
Question #23
Which of the following command-line tools will delete a directory?
A. d
B. el
C. ir
D. d
E. d
View answer
Correct Answer: D
Question #24
A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?
A. nstaller_x64
B. nstaller_Files
C. nstaller_32
D. nstaller_x86
E. nstaller_Win10Enterprise
View answer
Correct Answer: D
Question #25
A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?
A. pam filter installation
B. nvalid registry settings
C. alware infection
D. perating system update
View answer
Correct Answer: D
Question #26
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application. The PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
A. emove the microphone from the USB hub and plug it directly into a USB port on the PC
B. nable the microphone under Windows Privacy settings to allow desktop applications to access it
C. elete the microphone from Device Manager and scan for new hardware
D. eplace the USB microphone with one that uses a traditional 3
View answer
Correct Answer: B
Question #27
A user reports that a PC seems to be running more slowly than usual. A technician checks system resources, but disk, CPU, and memory usage seem to be fine.The technician sees that GPU temperature is extremely high. Which of the following types of malware is MOST likely to blame?
A. pyware
B. ryptominer
C. ansomware
D. oot sector virus
View answer
Correct Answer: B
Question #28
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Choose two.)
A. HI
B. IST
C. CI
D. DPR
View answer
Correct Answer: AB
Question #29
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?
A. ave the user provide a callback phone number to be added to the ticket
B. ssign the ticket to the department's power user
C. egister the ticket with a unique user identifier
D. rovide the user with a unique ticket number that can be referenced on subsequent calls
View answer
Correct Answer: D
Question #30
A technician receives a ticket indicating the user cannot resolve external web pages. However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?
A. efault gateway
B. ost address
C. ame server
D. ubnet mask
View answer
Correct Answer: C
Question #31
A user contacted the help desk to report pop-ups on a company workstation, indicating the computer has been infected with 137 viruses and payment is needed to remove them. The user thought the company-provided antivirus software would prevent this issue. The help desk ticket states that the user only receives these messages when first opening the web browser. Which of the following steps would MOST likely resolve the issue? (Choose two.)
A.
B.
C.
D.
View answer
Correct Answer: AF
Question #32
A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website. Which of the following threats was used to carry out the attack?
A. ero day
B. ishing
C. DoS
D. vil twin
View answer
Correct Answer: D
Question #33
An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?
A. DP
B. NC
C. SH
D. PN
View answer
Correct Answer: B
Question #34
A BSOD appears on a user’s workstation monitor. The user immediately presses the power button to shut down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the user contacts the help desk. Which of the following should the technician use to determine the cause?
A. top code
B. vent Viewer
C. ervices
D. ystem Configuration
View answer
Correct Answer: A
Question #35
A technician receives a call from a user who is on vacation. The user provides the necessary credentials and asks the technician to log in to the user's account and read a critical email that the user has been expecting. The technician refuses because this is a violation of the:
A. cceptable use policy
B. egulatory compliance requirements
C. on-disclosure agreement
D. ncident response procedures
View answer
Correct Answer: A
Question #36
DRAG DROP (Drag and Drop is not supported)A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer.Once the UPS stopped beeping, all functioning devices also turned off.In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer with
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #37
A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?
A. nd user acceptance
B. erform risk analysis
C. ommunicate to stakeholders
D. andbox testing
View answer
Correct Answer: B
Question #38
After a company installed a new SOHO router, customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?
A. ort forwarding
B. irmware updates
C. P filtering
D. ontent filtering
View answer
Correct Answer: A
Question #39
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A. pen Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper
B. pen Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper
C. pen Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper
D. pen Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper
View answer
Correct Answer: C
Question #40
A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?
A. elete the application's cache
B. heck for application updates
C. oll back the OS update
D. ninstall and reinstall the application
View answer
Correct Answer: B
Question #41
As part of a CYOD policy, a systems administrator needs to configure each user's Windows device to require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead the administrator to the correct settings?
A. se Settings to access Screensaver settings
B. se Settings to access Screen Timeout settings
C. se Settings to access General
D. se Settings to access Display
View answer
Correct Answer: A
Question #42
A user has been unable to access a website and has submitted a help desk ticket. The website has been verified to be online. Which of the following troubleshooting steps will MOST likely resolve the issue?
A. eleting the browser history
B. learing the cache
C. nabling private mode browsing
D. nabling ad blocking
View answer
Correct Answer: B
Question #43
A technician is investigating unauthorized Wi-Fi access on a customer's home network. Individuals are able to access the customer's Wi-Fi network without a password. Which of the following is the MOST likely reason this situation is occurring?
A. hannel utilization is oversubscribed
B. PA2 exploits are being leveraged
C. he Wi-Fi password is posted on the router
D. he customer has a guest network enabled
View answer
Correct Answer: D
Question #44
A technician is configuring a new Windows laptop. Corporate policy requires that mobile devices make use of full disk encryption at all times. Which of the following encryption solutions should the technician choose?
A. se a network share to share the installation files
B. ave software to an external hard drive to install
C. reate an imaging USB for each P
D. nstall the software from the vendor's website
View answer
Correct Answer: C
Question #45
A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the MMC console. Which of the following is the NEXT step the technician should take to resolve the issue?
A. un the antivirus scan
B. dd the required snap-in
C. estore the system backup
D. se the administrator console
View answer
Correct Answer: B
Question #46
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?
A. can and remove the malware
B. chedule automated malware scans
C. uarantine the system
D. isable System Restore
View answer
Correct Answer: C
Question #47
A department has the following technical requirements for a new application:Quad Core processor -250GB of hard drive space6GB of RAMTouch screens -The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the company be able to fully take advantage of after the upgrade?
A. CPU
B. Hard drive
C. RAM
D. Touch screen
View answer
Correct Answer: C
Question #48
HOTSPOT (Drag and Drop is not supported)An executive has contacted you through the help-desk chat support about an issue with a mobile device.Assist the executive to help resolve the issue.INSTRUCTIONSSelect the MOST appropriate statement for each response.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #49
Which of the following could be used to implement secure physical access to a data center?
A. eofence
B. larm system
C. adge reader
D. otion sensor
View answer
Correct Answer: C
Question #50
A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
A. ata-in-transit encryption
B. ile encryption
C. SB drive encryption
D. isk encryption
View answer
Correct Answer: D
Question #51
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?
A. Console
B. Disk Utility
C. Time Machine
D. FileVault
View answer
Correct Answer: B
Question #52
A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?
A. SS verification
B. ES-256 verification
C. ash verification
D. igital signature verification
View answer
Correct Answer: D
Question #53
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?
A. equiring strong passwords
B. isabling cached credentials
C. equiring MFA to sign on
D. nabling BitLocker on all hard drives
View answer
Correct Answer: C
Question #54
A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?
A. onsole
B. isk Utility
C. ime Machine
D. ileVault
View answer
Correct Answer: B
Question #55
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer (CEO). The CEO needs the device returned as soon as possible. Which of the following step should the technician take NEXT?
A. ontinue researching the issue
B. epeat the iterative processes
C. nform the CEO the repair will take a couple of weeks
D. scalate the ticket
View answer
Correct Answer: D
Question #56
Which of the following provide the BEST way to secure physical access to a data center server room? (Choose two.)
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
E. Locking rack
F. Access control vestibule
View answer
Correct Answer: AB
Question #57
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of the following methods should the technician use to refresh the laptop?
A. nternet-based upgrade
B. epair installation
C. lean install
D. SB repair
E. n-place upgrade
View answer
Correct Answer: C
Question #58
After returning from vacation, a user is unable to connect to the network at the corporate office. Windows allows the user to log in; however, no internal or external websites are accessible when running a browser. The user's expected network shares are unreachable, and all websites attempted return the message, `Hmm, we can't reach this page.` Which of the following is the MOST likely cause of this issue?
A. he user's password expired while on vacation
B. he user clicked on a malicious email
C. he user connected to a captive portal while traveling
D. he user enabled airplane mode
View answer
Correct Answer: D
Question #59
A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in to the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?
A. Time drift
B. Dual in-line memory module failure
C. Application crash
D. Filesystem errors
View answer
Correct Answer: A
Question #60
An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?
A. erform a risk analysis
B. mplement the deployment
C. erify end user acceptance
D. ocument the lessons learned
View answer
Correct Answer: B
Question #61
Which of the following is an example of MFA?
A. ingerprint scan and retina scan
B. assword and PIN
C. sername and password
D. mart card and password
View answer
Correct Answer: D
Question #62
A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?
A. perating system updates
B. emote wipe
C. ntivirus
D. irewall
View answer
Correct Answer: C
Question #63
A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?
A. opy the c:\\Windows\\windows
B. edeem the included activation key card for a product key
C. nsert a Windows USB hardware dongle and initiate activation
D. ctivate with the digital license included with the device hardware
View answer
Correct Answer: B
Question #64
Which of the following should be done NEXT?
A. ducate the user on the solution that was performed
B. ell the user to take time to fix it themselves next time
C. lose the ticket out
D. end an email to Telecom to inform them of the issue and prevent reoccurrence
View answer
Correct Answer: A
Question #65
Which of the following is the proper way for a technician to dispose of used printer consumables?
A. roceed with the custom manufacturer's procedure
B. roceed with the disposal of consumables in standard trash receptacles
C. mpty any residual Ink or toner from consumables before disposing of them in a standard recycling bin
D. roceed with the disposal of consumables in standard recycling bins
View answer
Correct Answer: A
Question #66
A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?
A. nable multifactor authentication
B. ncrease the failed log-in threshold
C. emove complex password requirements
D. mplement a single sign-on with biometrics
View answer
Correct Answer: D
Question #67
An organization is centralizing support functions and requires the ability to support a remote user's desktop. Which of the following technologies will allow a technician to see the issue along with the user?
A. RDP
B. VNC
C. SSH
D. VPN
View answer
Correct Answer: B
Question #68
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?
A. ultifactor authentication will be forced for Wi-Fi
B. ll Wi-Fi traffic will be encrypted in transit
C. avesdropping attempts will be prevented
D. ogue access points will not connect
View answer
Correct Answer: A
Question #69
A help desk technician runs the following script: Inventory.py. The technician receives the following error message:How do you want to open this file?Which of the following is the MOST likely reason this script is unable to run?
A. cripts are not permitted to run
B. he script was not built for Windows
C. he script requires administrator privileges
D. he runtime environment is not installed
View answer
Correct Answer: D
Question #70
A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?
A. ero day
B. QL injection
C. ross-site scripting
D. istributed denial of service
View answer
Correct Answer: D
Question #71
A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Choose two.)
A. isable unused ports
B. emove the guest network
C. dd a password to the guest network
D. hange the network channel
View answer
Correct Answer: BC
Question #72
Once weekly, a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?
A. nstall and run Linux and the required application in a PaaS cloud environment
B. nstall and run Linux and the required application as a virtual machine installed under the Windows OS
C. se a swappable drive bay for the boot drive and install each OS with applications on its own drive
D. et up a dual boot system by selecting the option to install Linux alongside Windows
View answer
Correct Answer: B
Question #73
During a recent flight, an executive unexpectedly received several dog and cat pictures while trying to watch a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like these and has not seen these pictures before. To BEST resolve this issue, the executive should:
A. et AirDrop so that transfers are only accepted from known contacts
B. ompletely disable all wireless systems during the flight
C. iscontinue using iMessage and only use secure communication applications
D. nly allow messages and calls from saved contacts
View answer
Correct Answer: A
Question #74
A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?
A. nd user acceptance
B. erform risk analysis
C. ommunicate to stakeholders
D. andbox testing
View answer
Correct Answer: A
Question #75
Following the latest Windows update, PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?
A. etwork and Sharing Center
B. rograms and Features
C. efault Apps
D. dd or Remove Programs
View answer
Correct Answer: C
Question #76
SIMULATIONWelcome to your first day as a Fictional Company, LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.INSTRUCTIONSClick on individual tickets to see the ticket details. View attachments to determine the problem.Select the appropriate issue from the ‘Issue’ drop-down menu. Then, select the MOST efficient resolution from the ‘Resolution’ drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the ‘Verify/Resolve’
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #77
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?
A. FTP
B. SH
C. NC
D. SRA
View answer
Correct Answer: B
Question #78
Which of the following is MOST likely contained in an EULA?
A. hain of custody
B. ackup of software code
C. ersonally identifiable information
D. estrictions of use
View answer
Correct Answer: D
Question #79
A Microsoft Windows PC needs to be set up for a user at a large corporation. The user will need access to the corporate domain to access email and shared drives. Which of the following versions of Windows would a technician MOST likely deploy for the user?
A. indows Enterprise Edition
B. indows Professional Edition
C. indows Server Standard Edition
D. indows Home Edition
View answer
Correct Answer: A
Question #80
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS update. A technician determines there are no error messages on the device. Which of the following should the technician do NEXT?
A. erify all third-party applications are disabled
B. etermine if the device has adequate storage available
C. heck if the battery is sufficiently charged
D. onfirm a strong internet connection is available using Wi-Fi or cellular data
View answer
Correct Answer: D
Question #81
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?
A. esmon
B. sconfig
C. frgui
D. sinfo32
View answer
Correct Answer: C
Question #82
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?
A. onfigure the network as private
B. nable a proxy server
C. rant the network administrator role to the user
D. reate a shortcut to public documents
View answer
Correct Answer: A
Question #83
An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?
A. ncrypt the files
B. lone any impacted hard drives
C. ontact the cyber insurance company
D. nform law enforcement
View answer
Correct Answer: B
Question #84
Which of the following Wi-Fi protocols is the MOST secure?
A. PU
B. ard drive
C. AM
D. ouch screen
View answer
Correct Answer: A
Question #85
A technician is configuring a SOHO device. Company policy dictates that static IP addresses cannot be used. The company wants the server to maintain the sameIP address at all times. Which of the following should the technician use?
A. HCP reservation
B. ort forwarding
C. NS A record
D. AT
View answer
Correct Answer: A
Question #86
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?
A. ll updated software must be tested with all system types and accessories
B. xtra technician hours must be budgeted during installation of updates
C. etwork utilization will be significantly increased due to the size of CAD files
D. arge update and installation files will overload the local hard drives
View answer
Correct Answer: C
Question #87
A company is issuing smartphone to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?
A. nti-malware
B. emote wipe
C. ocator applications
D. creen lock
View answer
Correct Answer: B
Question #88
A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which of the following tools should the technician use?
A. esmon
B. sconfig
C. frgui
D. sinfo32
View answer
Correct Answer: C
Question #89
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?
A. ridge the LAN connection between the laptop and the desktop
B. et the laptop configuration to DHCP to prevent conflicts
C. emove the static IP configuration from the desktop
D. eplace the network card in the laptop, as it may be defective
View answer
Correct Answer: B
Question #90
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?
A. ut on an ESD strap
B. isconnect the power before servicing the PC
C. lace the PC on a grounded work bench
D. lace components on an ESD mat
View answer
Correct Answer: B
Question #91
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page, the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely solve the issue?
A. pdating the operating system
B. hanging proxy settings
C. einstalling the browser
D. nabling port forwarding
View answer
Correct Answer: B
Question #92
A user is unable to access files on a work PC after opening a text document. The text document was labeled “URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read”. Which of the following should a support technician do FIRST?
A. uarantine the host in the antivirus system
B. un antivirus scan for malicious software
C. nvestigate how malicious software was installed
D. eimage the computer
View answer
Correct Answer: B
Question #93
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is
A. un a startup script that removes files by name
B. rovide a sample to the antivirus vendor
C. anually check each machine
D. onitor outbound network traffic
View answer
Correct Answer: C
Question #94
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?
A. pplication updates
B. nti-malware software
C. S reinstallation
D. ile restore
View answer
Correct Answer: B
Question #95
A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?
A. se the application only on the home laptop because it contains the initial license
B. se the application at home and contact the vendor regarding a corporate license
C. se the application on any computer since the user has a license
D. se the application only on corporate computers
View answer
Correct Answer: B
Question #96
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access. A technician verifies the user's PC is infected with ransomware. Which of the following should the technician do FIRST?
A. nti-malware
B. emote wipe
C. ocator applications
D. creen lock
View answer
Correct Answer: C
Question #97
A user reports that a workstation is operating sluggishly. Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?
A. ncrease the paging file size
B. un the chkdsk command
C. ebuild the user's profile
D. dd more system memory
E. efragment the hard drive
View answer
Correct Answer: C
Question #98
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?
A. emote wipe
B. nti-malware
C. evice encryption
D. ailed login restrictions
View answer
Correct Answer: D
Question #99
Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect to the wireless network. Other users have reported that their personal devices are connecting without issues. She has asked you to assist with getting the device online without adjusting her home WiFi configuration.INSTRUCTIONSReview the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.If at any time you would like to bring back the initial st
A. ee the explanation section for answer,
View answer
Correct Answer: A
Question #100
Which of the following editions of Windows 10 requires reactivation every 180 days?
A. TFS
B. PFS
C. xt4
D. xFAT
View answer
Correct Answer: B
Question #101
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which of the following utilities should be used?
A. rivacy
B. ndexing Options
C. ystem
D. evice Manager
View answer
Correct Answer: B
Question #102
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?
A. Configure the network as private
B. Enable a proxy server
C. Grant the network administrator role to the user
D. Create a shortcut to public documents
View answer
Correct Answer: A
Question #103
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. Which of the following will MOST likely resolve the issue?
A. ecalibrating the magnetometer
B. ecalibrating the compass
C. ecalibrating the digitizer
D. ecalibrating the accelerometer
View answer
Correct Answer: D
Question #104
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro. The technician must ensure files and user preferences are retained, must perform the operation locally, and should migrate one station at a time. Which of the following methods would be MOST efficient?
A. olden image
B. emote network install
C. n-place upgrade
D. lean install
View answer
Correct Answer: C
Question #105
Which of the following is a data security standard for protecting credit cards?
A. uarantine the computer
B. se a previous restore point
C. ducate the end user about viruses
D. ownload the latest virus definitions
View answer
Correct Answer: C
Question #106
A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Choose two.)
A. esource Monitor > CPU > Services
B. ask Manager > Processes > Apps
C. vent Viewer > Windows Logs > Application
D. evice Manager > Computer
View answer
Correct Answer: AE
Question #107
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting presenters are unable to play a video with sound. The following error is received:The Audio Driver is not running.Which of the following will MOST likely resolve the issue?
A. ompmgmt
B. egedit
C. xplorer
D. askmgr
E. pmc
View answer
Correct Answer: F
Question #108
A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?
A. nstall alternate open-source software in place of the applications with issues
B. un both CPU and memory tests to ensure that all hardware functionality is normal
C. heck for any installed patches and roll them back one at a time until the issue is resolved
D. eformat the hard drive, and then reinstall the newest Windows 10 release and all applications
View answer
Correct Answer: D
Question #109
Which of the following Linux commands would be used to install an application?
A. um
B. rep
C. s
D. udo
View answer
Correct Answer: A
Question #110
A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?
A. pen Settings, select Devices, select Display, and change the display resolution to a lower resolution option
B. pen Settings, select System, select Display, and change the display resolution to a lower resolution option
C. pen Settings, select System, select Display, and change the Scale and layout setting to a higher percentage
D. pen Settings, select Personalization, select Display, and change the Scale and layout setting to a higher percentage
View answer
Correct Answer: C

View The Updated CompTIA Exam Questions

SPOTO Provides 100% Real CompTIA Exam Questions for You to Pass Your CompTIA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: