A user's mobile phone battery does not last long and navigation is very slow. Which of the following should the technician do first to resolve the issue?
Answer : B
Detailed
The first step is to check running applications (Option B). Applications running in the background could consume a lot of battery and processing power, causing slow performance and battery drain. By identifying and closing or uninstalling these apps, the technician can resolve the issue more effectively.
Uninstalling unused programs (Option A) might help, but checking active applications is more immediate.
Updating the mobile OS (Option C) can improve performance but is not the first step in this scenario.
Disabling network services (Option D) might help reduce battery drain but does not address potential app-related issues.
CompTIA A+ Core 2 Reference:
3.4 - Troubleshoot common mobile OS and application issues, including battery and performance concerns.
A technician is installing an operating system on a new computer. Which of the following is the first step of the process?
Answer : A
Detailed
The first step in installing an operating system on a new computer is Setting the boot order (Option A). This ensures that the computer can boot from the installation media (USB, DVD, etc.). Once the boot order is configured, the system can start from the installation source, and the rest of the OS installation process can proceed.
Formatting the hard drive (Option B) comes later in the process, after the installation media is booted.
Entering the product key (Option C) and Selecting the filesystem (Option D) are subsequent steps during the installation process.
CompTIA A+ Core 2 Reference:
1.9 - Perform OS installations and upgrades, including setting boot methods and boot order.
A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?
Answer : D
Disk encryption is the best method for securing a workstation used in financial transactions, such as point-of-sale systems. It ensures that if the workstation is stolen, all data on the disk is encrypted and cannot be accessed without proper credentials. File encryption (B) only encrypts individual files, and USB drive encryption (C) only applies to removable storage. Data-in-transit encryption (A) is not relevant for physical security.
After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?
Answer : C
In this case, abnormal behavior after opening a suspicious email suggests malware might have infected the device. A full factory reset is recommended to remove any persistent malware, especially when a restart does not resolve the issue. Deleting the email or reinstalling the browser will not remove the malware already on the device.
A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?
Answer : B
The file type ISO is a disk image format that contains everything from a CD, DVD, or Blu-ray disc in a single file. When an ISO file is accessed, the system prompts the user to mount it as a virtual drive, which is why the technician received a 'mount a drive' prompt. MSI (A) is for installing software, ZIP (C) is a compressed file, and EXE (D) is an executable file.
Which of the following best describes XFS?
Answer : A
XFS is a high-performance filesystem created by Silicon Graphics in 1994 and is commonly used by Linux operating systems. It supports large files and directories and is known for its robustness and scalability. Other filesystems like NTFS (Windows), APFS (macOS), and HFS (macOS) are used on different platforms.
Which of the following is the most practical method to reduce the number of clicks on phishing emails for a public-facing organization?
Answer : A
User awareness education is the most effective method for reducing phishing attacks. Training users to recognize suspicious emails, links, and attachments can prevent them from falling for phishing attempts. Technical solutions like SMTP filtering (C) and restricting emails (D) can help but are not as effective without user vigilance. A BYOD policy (B) does not directly address phishing email threats.