CompTIA 220-1102 CompTIA A+ Core 2 Exam Practice Test

Page: 1 / 14
Total 750 questions
Question 1

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?



Answer : D

Detailed

The net use (Option D) command is used to manage network drives in Windows. It can be used to display and disconnect mapped network drives, making it the correct choice for removing unused network drives.

format (Option A) is used to format disks, not for managing network drives.

netstat (Option B) displays network connections but doesn't manage network drives.

diskpart (Option C) is used for disk partitioning, not network drive management.

rmdir (Option E) is used to remove directories, not network drives.

CompTIA A+ Core 2 Reference:

1.2 - Use the appropriate Microsoft command-line tool, including net use for managing network drives .


Question 2

Which of the following languages would a technician most likely use to automate the setup of various services on multiple systems?



Answer : C

Detailed

PowerShell (Option C) is a powerful scripting language used in Windows environments for automating tasks, including the configuration of services across multiple systems. It is widely used by system administrators for scripting and automating administrative tasks.

SQL (Option A) is used for managing databases, not for scripting system configurations.

HTML (Option B) is a markup language for web development, not for automating services.

C# (Option D) is a general-purpose programming language but is not primarily used for administrative automation tasks.

CompTIA A+ Core 2 Reference:

4.8 - Basics of scripting, including PowerShell for automation


Question 3

Which of the following types of malware is designed to enable administrative access to a computer?



Answer : A

Detailed

A rootkit (Option A) is a type of malware designed to gain administrative (root) access to a system while hiding its presence. Rootkits can manipulate system processes and files to remain undetected, making them particularly dangerous.

Trojan (Option B) is malware disguised as legitimate software but doesn't necessarily provide administrative access.

Worm (Option C) spreads across networks but doesn't grant administrative access.

Ransomware (Option D) encrypts data and demands a ransom but doesn't typically provide ongoing administrative access.

CompTIA A+ Core 2 Reference:

2.3 - Explain malware types, including rootkits and their purpose .


Question 4

Internet speeds on a user's Windows 10 device are slow, but other devices on the same network are running at normal speeds. A technician thinks the issue may be related to the proxy settings. Which of the following should the technician check to verify the proxy configuration?



Answer : B

Detailed

The correct place to check proxy settings in Windows 10 is under Internet Options (Option B), specifically in the 'Connections' tab. Proxy configurations can affect internet speeds if misconfigured or if a proxy is being used unnecessarily.

Network and Sharing Center (Option A) provides information on network connections but doesn't handle proxy settings.

Firewall settings (Option C) manage network traffic rules but don't directly affect proxy settings.

System settings (Option D) contain general system configurations, not specific to proxy settings.

CompTIA A+ Core 2 Reference:

1.6 - Configure networking features in Windows, including proxy settings


Question 5

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?



Answer : D

Detailed

Device data encryption (Option D) ensures that even if the device is lost or stolen, its data cannot be accessed without proper credentials, even while offline. Encryption protects the data at rest, making it unreadable without the decryption key.

Remote wipe (Option A) requires the device to be online to receive the wipe command.

Mandatory screen locks (Option B) provide a layer of security but can be bypassed with physical access in some cases.

Location applications (Option C) help track the device but don't protect data.

CompTIA A+ Core 2 Reference:

2.7 - Explain methods for securing mobile devices, including encryption


Question 6

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?



Answer : A

Disabling guest accounts on domain-joined machines is done through Group Policy. Group Policy allows centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. By using the Group Policy Editor (gpedit.msc), administrators can enforce policies such as disabling the guest account across all machines within the domain. The other options (Firewall, Microsoft Management Console, MSConfig) do not provide functionality specific to managing user accounts in this context.


Question 7

Which of the following is a preventive physical security control?



Answer : B

Detailed Explanation with Core 2 Reference:

Bollards are physical barriers that prevent unauthorized vehicle access to certain areas, providing a preventive measure against unauthorized entry and potential threats. Bollards are classified as a preventive control because they act to deter or block physical access to secured locations, as opposed to video surveillance or alarm systems, which are typically used for detection and monitoring. Core 2 highlights the importance of implementing various physical security controls to protect assets and infrastructure (Core 2 Objective 2.1).


Page:    1 / 14   
Total 750 questions