220-1102 Practice Test Questions

739 Questions


Topic 5: Exam Pool E

A user's company phone was stolen. Which of the following should a technician do next?


A. Perform a low-level format.


B. Remotely wipe the device.


C. Degauss the device.


D. Provide the GPS location of the device.





B.
  Remotely wipe the device.

Explanation: Remotely wiping the device is the best option to prevent unauthorized access to the company data stored on the phone. A low-level format, degaussing, or providing the GPS location of the device are not feasible or effective actions to take in this scenario. References: The Official CompTIA A+ Core 2 Study Guide1, page 315.

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two). Install the latest GPU drivers.


A. Reinstall the OS.


B. Increase the RAM.


C. Increase the hard drive space.


D. Uninstall unnecessary software.


E. Disable scheduled tasks.





C.
  Increase the hard drive space.

E.
  Disable scheduled tasks.

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?


A. Run one scan and schedule future scans.


B. Back up the uninfected files and reimage the computer.


C. Restore the clean backup copies of the infected files.


D. Run repeated remediation scans until the malware is removed.





D.
  Run repeated remediation scans until the malware is removed.

Explanation: Malware is malicious software that can cause damage or harm to a computer system or network4. A technician has verified a computer is infected with malware by observing unusual behavior, such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the anti-malware software to prevent further infection or spread of the malware. The next step is to run repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and removes malware from the system. Running one scan may not be enough to remove all traces of malware, as some malware may hide or regenerate itself.

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?


A. To determine which party had the machine and when.


B. To remotely wipe sensitive data from the machine.


C. To gather the information needed to replace the machine.


D. To alert the owner that the password needs to be changed.





A.
  To determine which party had the machine and when.

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?


A. Network share


B. Group Policy


C. BitLocker


D. Static IP





C.
  BitLocker

Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices1. BitLocker helps mitigate unauthorized data access by enhancing file and system protections, rendering data inaccessible when BitLocker- protected devices are decommissioned or recycled1. Network share, Group Policy, and Static IP are not features that can prevent unauthorized data access if a computer is lost or stolen. References: BitLocker overview - Windows Security | Microsoft Learn1 The Official CompTIA A+ Core 2 Study Guide2, page 315.

Which of the following languages is used for scripting the creation of Active Directory accounts?


A. Bash


B. SQL


C. PHP


D. PowerShell





D.
  PowerShell

Explanation: PowerShell is a scripting language that can interact with Active Directory and other Windows components. It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell can also use the Active Directory module to access other AD-related functions and attributes. Other languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and would require additional tools or libraries to do so.

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?


A. Educate the end user on best practices for security.


B. Quarantine the host in the antivirus system.


C. Investigate how the system was infected with malware.


D. Create a system restore point.





A.
  Educate the end user on best practices for security.

Explanation: Educating the end user on best practices for security is the next step that the technician should take after successfully removing malicious software from an infected computer. Educating the end user on best practices for security is an important part of preventing future infections and mitigating risks. The technician should explain to the end user how to avoid common sources of malware, such as phishing emails, malicious websites, or removable media. The technician should also advise the end user to use strong passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently. Educating the end user on best practices for security can help the end user become more aware and responsible for their own security and reduce the likelihood of recurrence of malware infections. Quarantining the host in the antivirus system, investigating how the system was infected with malware, and creating a system restore point are not the next steps that the technician should take after successfully removing malicious software from an infected computer. Quarantining the host in the antivirus system is a step that the technician should take before removing malicious software from an infected computer. Quarantining the host in the antivirus system means isolating the infected computer from the network or other devices to prevent the spread of malware. Investigating how the system was infected with malware is a step that the technician should take during or after removing malicious software from an infected computer. Investigating how the system was infected with malware means identifying the source, type, and impact of malware on the system and documenting the findings and actions taken. Creating a system restore point is a step that the technician should take before removing malicious software from an infected computer. Creating a system restore point means saving a snapshot of the system’s configuration and settings at a certain point in time, which can be used to restore the system in case of failure or corruption.

A technician cannot uninstall a system driver because the driver is currently in use. Which of the following tools should the technician use to help uninstall the driver?


A. msinfo32.exe


B. dxdiag.exe


C. msconfig.exe


D. regedit.exe





C.
  msconfig.exe

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?


A. User accounts


B. Access control lists


C. Authenticator applications





A.
  User accounts

A technician is familiar with most personnel at a customer's location and has clearance to work unsupervised. Which of the following describes how the technician should handle personal communication while on site?


A. Respond to calls and text messages while on site but not when working directly with personnel.


B. Respond to calls and text messages only from family.


C. Respond to calls and text messages only when an emergency situation requires a response.


D. Respond to calls and text messages discreetly while on site.





C.
  Respond to calls and text messages only when an emergency situation requires a response.

Explanation: A technician should handle personal communication while on site in a professional and respectful manner. According to the CompTIA A+ Core 2 (220-1102) exam objectives, one of the best practices for communication skills is to “avoid distractions and interruptions” when working with customers1. This means that the technician should not respond to calls and text messages that are not related to the work or the customer, unless there is an emergency situation that requires a response. Responding to personal communication while on site can be seen as rude, unprofessional, and disrespectful to the customer and their time. It can also affect the quality and efficiency of the technician’s work and cause errors or delays. Therefore, the technician should only respond to calls and text messages when an emergency situation requires a response, and inform the customer about the situation and apologize for the interruption. The other options are not appropriate for handling personal communication while on site. Responding to calls and text messages while on site but not when working directly with personnel (A) is still distracting and unprofessional, as it can interfere with the technician’s focus and productivity. Responding to calls and text messages only from family (B) is not a valid criterion, as the technician may receive calls and text messages from other sources that are not related to the work or the customer. Responding to calls and text messages discreetly while on site (D) is not a good practice, as it can still be noticed by the customer or other personnel and create a negative impression.

A Linux technician needs a filesystem type that meets the following requirements:
. All changes are tracked. . The possibility of file corruption is reduced. · Data recovery is easy.
Which of the following filesystem types best meets these requirements?
ext3


A. FAT32


B. exFAT


C. NTFS





A.
  FAT32

Explanation: The ext3 file system is a Linux native file system that meets the requirements of the question. It has the following features: All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to the file system metadata in a special log called the journal before applying them to the actual file system. This ensures that the file system can be restored to a consistent state in case of a power failure or system crash12. The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility of file corruption, as it avoids the need for a full file system check after an unclean shutdown. The file system can be quickly replayed from the journal and any inconsistencies can be fixed12. Data recovery is easy. The ext3 file system supports undeletion of files using tools such as ext3grep or extundelete, which can scan the file system for deleted inodes and attempt to recover the data blocks associated with them34.

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?


A. Degaussing


B. Standard formatting


C. Low-level wiping


D. Deleting





C.
  Low-level wiping

Explanation: Low-level wiping is the best data destruction method for recycling old hard drives for reuse. Low-level wiping is a process that overwrites every bit of data on a hard drive with zeros or random patterns, making it impossible to recover any data from the drive. Low-level wiping also restores the drive to its factory state, removing any bad sectors or errors that may have accumulated over time. Low-level wiping can be done using specialized software tools or hardware devices that connect to the drive. Degaussing, standard formatting, and deleting are not suitable data destruction methods for recycling old hard drives for reuse. Degaussing is a process that exposes a hard drive to a strong magnetic field, destroying both the data and the drive itself. Degaussing renders the drive unusable for reuse. Standard formatting is a process that erases the data on a hard drive by removing the file system structure, but it does not overwrite the data itself. Standard formatting leaves some data recoverable using forensic tools or software utilities. Deleting is a process that removes the data from a hard drive by marking it as free space, but it does not erase or overwrite the data itself. Deleting leaves most data recoverable using undelete tools or software utilities.


Page 1 out of 62 Pages