Topic 1: Exam Pool A
A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?
A. Operating system updates
B. Remote wipe
C. Antivirus
D. Firewall
Explanation:
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. In this scenario, the user is concerned about
an installed application transmitting data in the background, so a firewall would be the best
solution to address their concern. By installing and configuring a firewall, the user can block
unauthorized connections to and from the device, and receive alerts whenever an
application tries to access the internet.
A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?
A. The user is in a poor signal area.
B. The user has too many processes running.
C. The smartphone has malware on it.
D. The smartphone has been jailbroken.
A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?
A. Services
B. Processes
C. Performance
D. Startup
Explanation:
Processes tab in Task Manager would contain the information a technician would use to
identify the cause of this issue. The Processes tab in Task Manager displays all the
processes running on the computer, including the CPU and memory usage of each
process. The technician can use this tab to identify the process that is causing the hard
drive activity light to remain lit and the performance degradation1.
A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system.
When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
Explanation: A certificate warning is a message that appears when a web browser cannot verify the identity or security of a website. It usually means that there is a problem with the website’s SSL certificate, such as expiration, invalidity, or mismatch. A certificate warning can indicate that the website is unsafe or compromised, and that the user’s connection is not private123.
An executive has contacted you through the help-desk chat support about an issue with a
mobile device.
Assist the executive to help resolve the issue.
Which of the following should be done NEXT?
A. Educate the user on the solution that was performed.
B. Tell the user to take time to fix it themselves next time.
C. Close the ticket out
D. Send an email to Telecom to inform them of the Issue and prevent reoccurrence
A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?
A. Fingerprint and pattern
B. Facial recognition and PIN code
C. Primary account and password
D. Recovery contact and recovery key
Explanation: If a user’s iPhone is permanently locked after several failed log-in attempts, the user will need to use the recovery contact and recovery key to restore access, applications, and data to the device. The recovery contact is a trusted person who can receive a verification code from Apple and share it with the user. The recovery key is a 28-character code that the user created when setting up two-factor authentication for their Apple ID. The user will need to enter both the verification code and the recovery key on another device or computer to unlock their iPhone. This method will erase the iPhone and restore it from the iCloud backup
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?
A. Removed all jewelry
B. Completed an inventory of tools before use
C. Practiced electrical fire safety
D. Connected a proper ESD strap
Explanation:
The technician should have connected a proper ESD strap to prevent damage to the
motherboard. ESD (electrostatic discharge) can cause damage to electronic components,
and an ESD strap helps to prevent this by grounding the technician and preventing the
buildup of static electricity. Removing all jewelry is also a good practice, but it is not the
most likely solution to this problem.
A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues? End user training
A. Progress notes
B. Knowledge base
C. Acceptable use policy document
Explanation: A knowledge base is a centralized repository of information that can be used by technicians to find solutions to common problems, best practices, troubleshooting guides, and other useful resources12. Updating the knowledge base with the details of the issue and the resolution can help other technicians who encounter similar issues in the future. It can also reduce the number of tickets and improve customer satisfaction3. References1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10- 11 2: CompTIA A+ Certification Exam Core 2 Objectives, page 13 3: CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 10-12
An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts? SSID
A. DHCP
B. Firewall
C. SSD
Which of the following combinations meets the requirements for mobile device multifactor authentication?
A. Password and PIN
B. Password and swipe
C. Fingerprint and password
D. Swipe and PIN
Explanation: Mobile device multifactor authentication (MFA) is a method of verifying a user’s identity by requiring two or more factors, such as something the user knows (e.g., password, PIN, security question), something the user has (e.g., smartphone, OTP app, security key), or something the user is (e.g., fingerprint, face, iris)12. The combination of fingerprint and password meets the requirements for mobile device MFA because it uses two different factors: something the user is (fingerprint) and something the user knows (password). The other combinations do not meet the requirements because they use only one factor: something the user knows (password or PIN) or something the user does (swipe). References1: Set up the Microsoft Authenticator app as your verification method2: What is Multi-Factor Authentication (MFA)? | OneLogin
A technician is investigating an employee's smartphone that has the following symptoms
A. Turn on autorotation
B. Activate airplane mode.
C. Close unnecessary applications
D. Perform a factory reset
E. Update the device's operating system
F. Reinstall the applications that have crashed.
Explanation: The technician can close unnecessary applications and turn on autorotation to resolve these issues with minimal impact. Autorotation can help the device to switch between portrait and landscape modes automatically. Closing unnecessary applications can help to free up the device’s memory and reduce the device’s temperature1.
Page 12 out of 62 Pages |
Previous |