CompTIA 220-1102 CompTIA A+ Core 2 Exam Practice Test

Page: 1 / 14
Total 789 questions
Question 1

A user calls the help desk and reports a workstation is infected with malicious software. Which of the following tools should the help desk technician use to remove the malicious software? (Select TWO).



Answer : A, E

The correct answers are E. Windows Defender and A. File Explorer. Windows Defender is a built-in antivirus program that can detect and remove malicious software from a workstation.File Explorer can be used to locate and delete files associated with the malicious software1


Question 2

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?



Answer : B

Vishing, also known as voice phishing, is a type of social engineering attack where the attacker tricks the victim into divulging sensitive information over the phone. In this case, the attacker tricked the user into providing login credentials for a website.


Question 3

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?



Answer : B

Use the application at home and contact the vendor regarding a corporate license. The user should use the application only on the home laptop because it contains the initial license.The user should contact the vendor regarding a corporate license if they want to use the application on multiple computers on the corporate network1


Question 4

A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?



Answer : B

Private-browsing mode is the best option to mitigate the risk of customer data being accidentally saved to the kiosk. Private-browsing mode prevents the browser from storing cookies, history, passwords, and other data that could reveal the customer's identity or preferences. Manually clearing browsing data is not a reliable option, as it depends on the customer's awareness and willingness to do so. Browser data synchronization and password manager are features that could actually increase the risk of customer data being exposed, as they could sync or autofill sensitive information across devices or accounts.Reference:

Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 12

Certification Study Guides and Books | CompTIA IT Certifications, CompTIA A+ Core 1 220-1101 Certification Study Guide, page 234


Question 5

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?



Answer : C

The technician would most likely use Settings > Accounts > Family and Other Users to add an individual as a local administrator on a Windows home PC. Settings > Accounts > Family and Other Users allows users to add and manage other user accounts on their Windows PC. The technician can add an individual as a local administrator by selecting Add someone else to this PC under Other users and following the steps to create a new user account with administrator privileges. Settings > Personalization allows users to customize the appearance and behavior of their desktop, such as themes, colors, backgrounds, lock screen and screensaver. Settings > Personalization is not related to adding an individual as a local administrator on a Windows home PC but to configuring desktop settings and preferences. Control Panel > Credential Manager allows users to view and manage their web credentials and Windows credentials stored on their Windows PC. Control Panel > Credential Manager is not related to adding


Question 6

Which of the following is also known as something you know, something you have, and something you are?

ACL



Answer : B

MFA stands for Multi-Factor Authentication, which is a method of verifying a user's identity using two or more different factors of authentication. The three factors of authentication are something you know, something you have, and something you are. These factors correspond to different types of information or evidence that only the legitimate user should possess or provide. For example:

Something you know: a password, a PIN, a security question, etc.

Something you have: a smart card, a token, a mobile device, etc.

Something you are: a fingerprint, a face, an iris, etc.

MFA provides a higher level of security than single-factor authentication, which only uses one factor, such as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an attacker would need to compromise more than one factor to impersonate a user.MFA is commonly used for online banking, email accounts, cloud services, and other sensitive applications


Question 7

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

Color Management



Answer : B


Page:    1 / 14   
Total 789 questions