Topic 1: Exam Pool A
A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?
A. Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never
B. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never
C. Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never
D. Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing
Explanation:
The laptop has an additional option under power and sleep settings that desktops do not
have. Switching to do nothing prevents the screen from turning off when closed.
A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall output:
Protocol/PortActionDirection 1 AllowOut
445 BlockOut
53 BlockOut
123 BlockOut
80 BlockOut
Which of the following ports should be opened to allow for DNS recursion?
A. 1
B. 53
C. 80
D. 123
E. 445
Which of the following Wi-Fi protocols is the MOST secure?
A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP
Which of the following language types enables the automation of tasks?
A. Compiled
B. Scripting
C. Web
D. Database
Explanation: Scripting languages are designed for automating tasks by writing scripts that can execute a series of commands. They are typically easier to write and understand compared to compiled languages and are widely used for automating repetitive tasks, making them the best option for task automation.
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?
A. Scan and remove the malware
B. Schedule automated malware scans
C. Quarantine the system
D. Disable System Restore
Explanation:
The technician should quarantine the system first.
Reference:
CompTIA A+ Certification Exam: Core 2 Objectives Version 4.0. Retrieved from
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-examobjectives-(
3-0)
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?
A. FAT32
B. ext4
C. NTFS
D. exFAT
Explanation:
exFAT is a file system that is supported by both Linux and Windows and can handle large
files1.
An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).
A. Degauss
B. Delete
C. Incinerate
D. Recycle
E. Format
F. Shred
Which of the following features can be used to ensure a user can access multiple versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault
Explanation: Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of the following can BEST resolve the interference?
A. Changing channels
B. Modifying the wireless security
C. Disabling the SSIO broadcast
D. Changing the access point name
Explanation:
Changing channels can best resolve interference from other nearby SSIDs. Wireless
networks operate on different channels, and changing the channel can help to avoid
interference from other nearby networks.
A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?
A. Request physical media
B. Mount the ISO file.
C. Install a third-party software.
D. Download an appropriate 32-bit/64-bit OS file.
Explanation: If a technician is unable to run an OS installation file and receives a message indicating no software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured against external threats on the Internet. Which of the following actions should the technician do FIRST?
A. Lock all devices in a closet
B. Ensure all devices are from the same manufacturer.
C. Change the default administrative password
D. Install the latest operating system and patches
Explanation:
The technician should change the default administrative password FIRST to ensure the
network equipment is secured against external threats on the Internet. Changing the
default administrative password is a basic security measure that can help prevent
unauthorized access to the network equipment. Locking all devices in a closet is a physical
security measure that can help prevent theft or damage to the devices, but it does not
address external threats on the Internet. Ensuring all devices are from the same
manufacturer is not a security measure and does not address external threats on the
Internet. Installing the latest operating system and patches is important for maintaining the
security of the network equipment, but it is not the first action the technician should take.
A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?
A. Move the application to the desktop and press delete
B. Identify the application in Finder and drag it to the trash can.
C. Use Spotlight to search for the application, and then run the application.
D. Use Time Machine to go back to the date before the installation.
Explanation: On macOS, uninstalling an application typically involves locating the app in Finder and dragging it to the Trash. This method is straightforward and commonly used for removing unwanted applications. The other options do not directly relate to the standard process of uninstalling applications on a Mac.
Page 18 out of 62 Pages |
Previous |