100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

NVLRR

Rating
-
Sold
-
Pages
37
Uploaded on
25-11-2024
Written in
2024/2025

Exam of 37 pages for the course CompTIA A+ Core2 at CompTIA A+ Core2 (NVLRR)

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
November 25, 2024
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

CompTIA A+ Core2 Final Assessment
Question And Answers
A user builds a new computer for gaming purposes. The ability to upgrade
the performance graphics processing unit (GPU) over time is desired. What
GPU type does the user invest in?
A. Integrated graphics
B. Video RAM
C. Dedicated graphics
D. System RAM - -Dedicated Graphics
A dedicated graphics card will have its own random access memory (RAM).
This allows the card to focus on rendering graphics without using system
RAM.


-A user suspects that a USB drive on their system has been tampered with.
The user begins using the drive by saving a few reports and deleting
unwanted files while waiting for an IT technician to investigate. What does
the user compromise?
A. Incident documentation
B. Latent evidence
C. Data integrity
D. Chain of custody - -Data Integrity


-A user experiences a blue screen of death (BSoD) while using a Windows
computer. What does a support technician determine to be a good first
troubleshooting step?
A. Check the system for malware.
B. Reinstall the operating system.
C. Remove any newly installed hardware.
D. Clean any dust from the system. - -Remove any newly installed hardware.

,-A user claims that they cannot browse the internet but can access a local
shared network server by name with no issue. After evaluating the
computer's IP settings and pinging an internet host by IP address with no
problem, what does a support technician determine as the cause?
A. Missing IP address
B. Missing gateway address
C. Missing DNS address
D. Missing subnet address - -Missing DNS address
All hosts on a network require the use of a domain name server IP address
for network communications using host names. This is currently the problem.


-A user with a problematic Windows system tries to use a previously created
system image. How does the user access the image? (Select all that apply.)
A. Start Menu
B. Repair disk
C. Reset this PC
D. Advanced boot - -Repair Disk
Advanced boot
Windows includes many operating system recovery and repair options. To
restore a system with an image created in Backup and Restore, a repair disk
can be used.
To recover a system using a backup image, use the Advanced Boot Option or
the System Image Recovery option off a repair disk or recovery environment.


-Malware infects a user's computer. A support technician determines that the
malware is executed without requiring any authorization using system
privileges. What type of malware currently infects the system?
A. Ransomware
B. Keylogger
C. Rootkit
D. Trojan - -Rootkit Malware may be able to execute without requiring any
authorization using system privileges and it may escalate privileges after

,installation. Malware running with this level of privilege is referred to as a
rootkit.


-An organization looks to make a server available to internet traffic without
bringing harm to its private network. An onsite engineer configures a
separate network for the server. Which approach does the engineer utilize?
A. Port forwarding
B. Port triggering
C. Inbound filtering
D. Screened subnet - -Screened subnet
In an enterprise network, a screened subnet is a means of establishing a
more secure configuration. The idea of a screened subnet is that some hosts
are placed in a separate network segment.


-A user enables privacy settings on a Windows 10 computer. Which settings
pertain to app permissions? (Select all that apply.)
A. Location service
B. Language settings
C. Use of speech
D. Camera and microphone - -Location service
Camera and microphone
App permissions allow or deny access to devices such as the location
service, and to user data such as contacts, calendar items, email, and files.
There are multiple settings toggles to determine what app permissions are
allowed. Camera and microphone settings are set under app permissions.


-A technician configures a backup routine on an important workstation.
Which type does the routine use when only backing changes since the last
full backup?
A. Synthetic
B. Full

, C. Incremental
D. Differential - -Full


-After a recent driver update on a Windows system, the display adapter does
not function properly. A technician tries to roll back the driver by using which
management console?
A. devmgmt.msc
B. diskmgmt.msc
C. dfrgui.exe
D. lusrmgr.msc - -devmgmt.msc
The Device Manager (devmgmt.msc) console allows administrators to view,
edit, and troubleshoot the properties of installed hardware, update drivers,
and remove or disable devices.


-A security engineer suggests the use of proximity technology to track the
movement of portable equipment. What solution does the engineer
recommend?
A. Passive infrared
B. Microwave radio
C. Radio frequency
D. Concealed sensor - -Radio Frequency
With proximity sensors, radio frequency ID (RFID) tags and readers can be
used to track the movement of tagged objects within an area.


-A systems administrator looks to have a daily backup of a server located
across a wide area network (WAN) link. As the link is not fast, the
administrator creates a backup scheme that uses little to no bandwidth and
acquires an entire backup of the system. Which scheme does the
administrator implement?
A. Full
B. Synthetic
C. Incremental
$12.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
juddykingori

Get to know the seller

Seller avatar
juddykingori EXAMS
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
33
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions