CompTIA A+ 1002 Practice Test 2025
A company has experienced a power outage, but activation of an alternative source has
kicked in. What is this alternative source called? - CORRECT ANSWER-UPS
Malware encyclopedias are a resource that antivirus vendors often make available to IT
professionals. What is their value for IT practitioners? (Select all that apply.) -
CORRECT ANSWER-They are documentation of known malware
They provide information about the type, symptoms, purpose, and removal of malware.
A client uses this software that allows access to a given computer. What is this
software? - CORRECT ANSWER-Screen-sharing
Which of the following can prevent, detect, and remove software threats that consist of
ransomware, Trojans, spyware, and rootkits? - CORRECT ANSWER-Anti-malware
A company is conducting live meetings between two or more applicants at different
sites. What is this called? - CORRECT ANSWER-Videoconferencing
A software development team is unaware of a developing vulnerability in the system.
What is this type of vulnerability? - CORRECT ANSWER-Zero-day attack
A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the
slow performance. Which of the following issues could be causing the problem? (Select
all that apply.) - CORRECT ANSWER-OS update
Too many apps open
Low battery charge
When making major adjustments to a project, a security technician will have to assess
the business and technical merits as well as the risks of the adjustment plan. What
documentation will need to be submitted? - CORRECT ANSWER-Change board
approval
A helpdesk manager assesses older Windows 7 computers their company owns and
tries to determine available upgrade paths. Which of the following can NOT be
upgraded? - CORRECT ANSWER-Windows 7 Home to Windows 10 Enterprise
,A user performs a technique that allows them to connect their PlayStation to their
network. What is this technique? - CORRECT ANSWER-UPnP
A technician sets up a company's network and uses a method that lets employees know
which network is the company's network. What is this called? - CORRECT ANSWER-
SSID
A technician detected and reported an incident, resulting in the appropriate unit being
notified and tasked with acting as first responders, taking charge of the situation, and
formulating the appropriate response. What is this unit called? - CORRECT ANSWER-
CSIRT
A pet store owner receives an email from their bank with a special financing offer. The
owner clicks on the attachment, but it does not open. Later that day, when the owner
returns to their computer, it is running very slowly and will not connect to the internet. By
the time the IT consultant arrives, the computer has locked up. Which of the following is
the best action for the IT consultant given the existing conditions? - CORRECT
ANSWER-Run an antivirus scan.
A Linux server administrator notices a service they do not recognize, although the
environment is quite big. They look at the help file for the ksh process, but the
documentation seems poor. It does seem to indicate that it provides interactivity,
however. What type of program is this? - CORRECT ANSWER-Terminal
A systems administrator for client machines has managed Windows machines for some
time. The company is now adding Apple computers. The security team wants to
implement an equivalent to Bitlocker. Which of the following should the administrator
enable and configure? - CORRECT ANSWER-FileVault
When a project team is constructing a change request document, a part that needs to
be included is the number of devices, users, or customers that will be affected by the
change. What is this part of the document? - CORRECT ANSWER-Scope of the
change
An IT professional helps to fix their friend's computer. The computer is running
extremely slow. The IT professional notices the operating system is running Home
edition. Which of the following is the only service available for the Home edition? -
CORRECT ANSWER-RDP
An administrator assists the human resources department in testing access to their new
cloud-based training site. Unfortunately, the site cannot be accessed due to the
organizational security policy. Which of the following should the administrator use to
assist them? - CORRECT ANSWER-certmgr.msc
,A technician creates full backups by having the chain start with an initial full backup as
normal and afterward makes a series of incremental backups. Which of the following
backups is this? - CORRECT ANSWER-Synthetic
A company has hundreds of employees who use the same software on their computers,
so they offer a company product key to access the software. What is this product? -
CORRECT ANSWER-Corporate-use license
A server administrator migrates their environment from physical servers to a virtualized
environment. The administrator wants to install new virtual machine operating systems.
What is the best approach to use regarding deploying virtualized OSs? - CORRECT
ANSWER-ISOs
After starting the computer and signing in, a user notices the desktop takes a long time
to load. Evaluate the following Windows operating system problems to determine the
one that best diagnoses what could be causing the slowness. - CORRECT ANSWER-
Corrupted user profile
To ensure the authenticity and authorization of a mobile app, a service provider issues a
certificate to valid developers. Developers can use this certificate to sign their app, and
to establish trust. Which of the following attributes of an app would likely disqualify as
trustworthy? - CORRECT ANSWER-Duplicates the function of core OS apps.
A user needs to install a desktop application and use an application store that is
reputable. What type of vendor is this store? - CORRECT ANSWER-Trusted source
An IT manager is setting up an image for dispatching airplanes at a major airport. They
are trying to lock down the image to run only the dispatch service. One of the layers of
security is to block unneeded service ports from communicating, such as email. Where
should the manager start? - CORRECT ANSWER-Windows Firewall
Two friends want to share photos with each other from their iPhones. The first friend
selects their photos and uses AirDrop to share with the second friend. However, the first
friend gets a message that there is no one nearby to share with. Why would that
message appear? - CORRECT ANSWER-The second friend has Bluetooth disabled.
A user is on a website using an HTTPS URL; the browser displays the information
about the certificate in the address bar. What does this certificate validate? - CORRECT
ANSWER-Secure connection
A technician suspects a computer system is infected with malware. Which of the
following activities is the correct next step? - CORRECT ANSWER-Sandboxing
A forensic investigator is told that a server's processor that does not normally run high
has been over-utilized lately, and they suspect possible malware. The investigator
, wants to start by investigating processes. Which command can they use to start the
investigation? (Select all that apply.) - CORRECT ANSWER-ps
top
A server administrator notices a file server starting to run low on space. The
administrator wants to create extra space before all space is used up and even worse
issues arise. What should the administrator use? - CORRECT ANSWER-cleanmgr.exe
A 3D animations expert is searching for a new computer. What should they ensure it
has to handle their demanding software? - CORRECT ANSWER-Dedicated graphics
card
Users are curious about what is run on startup, so they dig into the startup script. The
users find the command "net use M: \\sharedrive\data /persistent:yes". What is the
startup script invoking? - CORRECT ANSWER-Mapped drive
Which of the following accounts can users set up profile settings to synchronize
between devices via the online portal? - CORRECT ANSWER-Microsoft account
Which of the following log-in options require a user to touch a device that takes a digital
print? - CORRECT ANSWER-Fingerprint scanner
A user just installed a new application on their workstation, but the application has
issues even starting up. The user has been working on the machine regularly up to this
point without any prior issues. Which of the following is most likely the issue? -
CORRECT ANSWER-Firewall
Which of the following contains information about ingredients, health hazards,
precautions, and first aid information and what to do if the material is spilled or leaks? -
CORRECT ANSWER-MSDS
Which of the following extensions combines a scripting language with hundreds of
prebuilt modules called cmdlets that can access and change most components and
features of Windows and Active Directory components and features? - CORRECT
ANSWER-.ps1
An employee uses an option to ask for help from a technician with an invitation file
protected by a passcode. What is this option? - CORRECT ANSWER-MSRA
An attacker uses a technique against a wireless network that allows them to flood
access points with too many packets. What is this called? - CORRECT ANSWER-DoS
A user implements a method that requires a one-time code within a given time frame to
get access to their email account. What is this method? - CORRECT ANSWER-Soft
token
A company has experienced a power outage, but activation of an alternative source has
kicked in. What is this alternative source called? - CORRECT ANSWER-UPS
Malware encyclopedias are a resource that antivirus vendors often make available to IT
professionals. What is their value for IT practitioners? (Select all that apply.) -
CORRECT ANSWER-They are documentation of known malware
They provide information about the type, symptoms, purpose, and removal of malware.
A client uses this software that allows access to a given computer. What is this
software? - CORRECT ANSWER-Screen-sharing
Which of the following can prevent, detect, and remove software threats that consist of
ransomware, Trojans, spyware, and rootkits? - CORRECT ANSWER-Anti-malware
A company is conducting live meetings between two or more applicants at different
sites. What is this called? - CORRECT ANSWER-Videoconferencing
A software development team is unaware of a developing vulnerability in the system.
What is this type of vulnerability? - CORRECT ANSWER-Zero-day attack
A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the
slow performance. Which of the following issues could be causing the problem? (Select
all that apply.) - CORRECT ANSWER-OS update
Too many apps open
Low battery charge
When making major adjustments to a project, a security technician will have to assess
the business and technical merits as well as the risks of the adjustment plan. What
documentation will need to be submitted? - CORRECT ANSWER-Change board
approval
A helpdesk manager assesses older Windows 7 computers their company owns and
tries to determine available upgrade paths. Which of the following can NOT be
upgraded? - CORRECT ANSWER-Windows 7 Home to Windows 10 Enterprise
,A user performs a technique that allows them to connect their PlayStation to their
network. What is this technique? - CORRECT ANSWER-UPnP
A technician sets up a company's network and uses a method that lets employees know
which network is the company's network. What is this called? - CORRECT ANSWER-
SSID
A technician detected and reported an incident, resulting in the appropriate unit being
notified and tasked with acting as first responders, taking charge of the situation, and
formulating the appropriate response. What is this unit called? - CORRECT ANSWER-
CSIRT
A pet store owner receives an email from their bank with a special financing offer. The
owner clicks on the attachment, but it does not open. Later that day, when the owner
returns to their computer, it is running very slowly and will not connect to the internet. By
the time the IT consultant arrives, the computer has locked up. Which of the following is
the best action for the IT consultant given the existing conditions? - CORRECT
ANSWER-Run an antivirus scan.
A Linux server administrator notices a service they do not recognize, although the
environment is quite big. They look at the help file for the ksh process, but the
documentation seems poor. It does seem to indicate that it provides interactivity,
however. What type of program is this? - CORRECT ANSWER-Terminal
A systems administrator for client machines has managed Windows machines for some
time. The company is now adding Apple computers. The security team wants to
implement an equivalent to Bitlocker. Which of the following should the administrator
enable and configure? - CORRECT ANSWER-FileVault
When a project team is constructing a change request document, a part that needs to
be included is the number of devices, users, or customers that will be affected by the
change. What is this part of the document? - CORRECT ANSWER-Scope of the
change
An IT professional helps to fix their friend's computer. The computer is running
extremely slow. The IT professional notices the operating system is running Home
edition. Which of the following is the only service available for the Home edition? -
CORRECT ANSWER-RDP
An administrator assists the human resources department in testing access to their new
cloud-based training site. Unfortunately, the site cannot be accessed due to the
organizational security policy. Which of the following should the administrator use to
assist them? - CORRECT ANSWER-certmgr.msc
,A technician creates full backups by having the chain start with an initial full backup as
normal and afterward makes a series of incremental backups. Which of the following
backups is this? - CORRECT ANSWER-Synthetic
A company has hundreds of employees who use the same software on their computers,
so they offer a company product key to access the software. What is this product? -
CORRECT ANSWER-Corporate-use license
A server administrator migrates their environment from physical servers to a virtualized
environment. The administrator wants to install new virtual machine operating systems.
What is the best approach to use regarding deploying virtualized OSs? - CORRECT
ANSWER-ISOs
After starting the computer and signing in, a user notices the desktop takes a long time
to load. Evaluate the following Windows operating system problems to determine the
one that best diagnoses what could be causing the slowness. - CORRECT ANSWER-
Corrupted user profile
To ensure the authenticity and authorization of a mobile app, a service provider issues a
certificate to valid developers. Developers can use this certificate to sign their app, and
to establish trust. Which of the following attributes of an app would likely disqualify as
trustworthy? - CORRECT ANSWER-Duplicates the function of core OS apps.
A user needs to install a desktop application and use an application store that is
reputable. What type of vendor is this store? - CORRECT ANSWER-Trusted source
An IT manager is setting up an image for dispatching airplanes at a major airport. They
are trying to lock down the image to run only the dispatch service. One of the layers of
security is to block unneeded service ports from communicating, such as email. Where
should the manager start? - CORRECT ANSWER-Windows Firewall
Two friends want to share photos with each other from their iPhones. The first friend
selects their photos and uses AirDrop to share with the second friend. However, the first
friend gets a message that there is no one nearby to share with. Why would that
message appear? - CORRECT ANSWER-The second friend has Bluetooth disabled.
A user is on a website using an HTTPS URL; the browser displays the information
about the certificate in the address bar. What does this certificate validate? - CORRECT
ANSWER-Secure connection
A technician suspects a computer system is infected with malware. Which of the
following activities is the correct next step? - CORRECT ANSWER-Sandboxing
A forensic investigator is told that a server's processor that does not normally run high
has been over-utilized lately, and they suspect possible malware. The investigator
, wants to start by investigating processes. Which command can they use to start the
investigation? (Select all that apply.) - CORRECT ANSWER-ps
top
A server administrator notices a file server starting to run low on space. The
administrator wants to create extra space before all space is used up and even worse
issues arise. What should the administrator use? - CORRECT ANSWER-cleanmgr.exe
A 3D animations expert is searching for a new computer. What should they ensure it
has to handle their demanding software? - CORRECT ANSWER-Dedicated graphics
card
Users are curious about what is run on startup, so they dig into the startup script. The
users find the command "net use M: \\sharedrive\data /persistent:yes". What is the
startup script invoking? - CORRECT ANSWER-Mapped drive
Which of the following accounts can users set up profile settings to synchronize
between devices via the online portal? - CORRECT ANSWER-Microsoft account
Which of the following log-in options require a user to touch a device that takes a digital
print? - CORRECT ANSWER-Fingerprint scanner
A user just installed a new application on their workstation, but the application has
issues even starting up. The user has been working on the machine regularly up to this
point without any prior issues. Which of the following is most likely the issue? -
CORRECT ANSWER-Firewall
Which of the following contains information about ingredients, health hazards,
precautions, and first aid information and what to do if the material is spilled or leaks? -
CORRECT ANSWER-MSDS
Which of the following extensions combines a scripting language with hundreds of
prebuilt modules called cmdlets that can access and change most components and
features of Windows and Active Directory components and features? - CORRECT
ANSWER-.ps1
An employee uses an option to ask for help from a technician with an invitation file
protected by a passcode. What is this option? - CORRECT ANSWER-MSRA
An attacker uses a technique against a wireless network that allows them to flood
access points with too many packets. What is this called? - CORRECT ANSWER-DoS
A user implements a method that requires a one-time code within a given time frame to
get access to their email account. What is this method? - CORRECT ANSWER-Soft
token