100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA A+ 1002 Practice Test 2025

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
19-07-2025
Written in
2024/2025

CompTIA A+ 1002 Practice Test 2025

Institution
CompTIA A+ 1002
Course
CompTIA A+ 1002











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA A+ 1002
Course
CompTIA A+ 1002

Document information

Uploaded on
July 19, 2025
Number of pages
34
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA A+ 1002 Practice Test 2025




A company has experienced a power outage, but activation of an alternative source has
kicked in. What is this alternative source called? - CORRECT ANSWER-UPS

Malware encyclopedias are a resource that antivirus vendors often make available to IT
professionals. What is their value for IT practitioners? (Select all that apply.) -
CORRECT ANSWER-They are documentation of known malware
They provide information about the type, symptoms, purpose, and removal of malware.

A client uses this software that allows access to a given computer. What is this
software? - CORRECT ANSWER-Screen-sharing

Which of the following can prevent, detect, and remove software threats that consist of
ransomware, Trojans, spyware, and rootkits? - CORRECT ANSWER-Anti-malware

A company is conducting live meetings between two or more applicants at different
sites. What is this called? - CORRECT ANSWER-Videoconferencing

A software development team is unaware of a developing vulnerability in the system.
What is this type of vulnerability? - CORRECT ANSWER-Zero-day attack

A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the
slow performance. Which of the following issues could be causing the problem? (Select
all that apply.) - CORRECT ANSWER-OS update
Too many apps open
Low battery charge

When making major adjustments to a project, a security technician will have to assess
the business and technical merits as well as the risks of the adjustment plan. What
documentation will need to be submitted? - CORRECT ANSWER-Change board
approval

A helpdesk manager assesses older Windows 7 computers their company owns and
tries to determine available upgrade paths. Which of the following can NOT be
upgraded? - CORRECT ANSWER-Windows 7 Home to Windows 10 Enterprise

,A user performs a technique that allows them to connect their PlayStation to their
network. What is this technique? - CORRECT ANSWER-UPnP

A technician sets up a company's network and uses a method that lets employees know
which network is the company's network. What is this called? - CORRECT ANSWER-
SSID

A technician detected and reported an incident, resulting in the appropriate unit being
notified and tasked with acting as first responders, taking charge of the situation, and
formulating the appropriate response. What is this unit called? - CORRECT ANSWER-
CSIRT

A pet store owner receives an email from their bank with a special financing offer. The
owner clicks on the attachment, but it does not open. Later that day, when the owner
returns to their computer, it is running very slowly and will not connect to the internet. By
the time the IT consultant arrives, the computer has locked up. Which of the following is
the best action for the IT consultant given the existing conditions? - CORRECT
ANSWER-Run an antivirus scan.

A Linux server administrator notices a service they do not recognize, although the
environment is quite big. They look at the help file for the ksh process, but the
documentation seems poor. It does seem to indicate that it provides interactivity,
however. What type of program is this? - CORRECT ANSWER-Terminal

A systems administrator for client machines has managed Windows machines for some
time. The company is now adding Apple computers. The security team wants to
implement an equivalent to Bitlocker. Which of the following should the administrator
enable and configure? - CORRECT ANSWER-FileVault

When a project team is constructing a change request document, a part that needs to
be included is the number of devices, users, or customers that will be affected by the
change. What is this part of the document? - CORRECT ANSWER-Scope of the
change

An IT professional helps to fix their friend's computer. The computer is running
extremely slow. The IT professional notices the operating system is running Home
edition. Which of the following is the only service available for the Home edition? -
CORRECT ANSWER-RDP

An administrator assists the human resources department in testing access to their new
cloud-based training site. Unfortunately, the site cannot be accessed due to the
organizational security policy. Which of the following should the administrator use to
assist them? - CORRECT ANSWER-certmgr.msc

,A technician creates full backups by having the chain start with an initial full backup as
normal and afterward makes a series of incremental backups. Which of the following
backups is this? - CORRECT ANSWER-Synthetic

A company has hundreds of employees who use the same software on their computers,
so they offer a company product key to access the software. What is this product? -
CORRECT ANSWER-Corporate-use license

A server administrator migrates their environment from physical servers to a virtualized
environment. The administrator wants to install new virtual machine operating systems.
What is the best approach to use regarding deploying virtualized OSs? - CORRECT
ANSWER-ISOs

After starting the computer and signing in, a user notices the desktop takes a long time
to load. Evaluate the following Windows operating system problems to determine the
one that best diagnoses what could be causing the slowness. - CORRECT ANSWER-
Corrupted user profile

To ensure the authenticity and authorization of a mobile app, a service provider issues a
certificate to valid developers. Developers can use this certificate to sign their app, and
to establish trust. Which of the following attributes of an app would likely disqualify as
trustworthy? - CORRECT ANSWER-Duplicates the function of core OS apps.

A user needs to install a desktop application and use an application store that is
reputable. What type of vendor is this store? - CORRECT ANSWER-Trusted source

An IT manager is setting up an image for dispatching airplanes at a major airport. They
are trying to lock down the image to run only the dispatch service. One of the layers of
security is to block unneeded service ports from communicating, such as email. Where
should the manager start? - CORRECT ANSWER-Windows Firewall

Two friends want to share photos with each other from their iPhones. The first friend
selects their photos and uses AirDrop to share with the second friend. However, the first
friend gets a message that there is no one nearby to share with. Why would that
message appear? - CORRECT ANSWER-The second friend has Bluetooth disabled.

A user is on a website using an HTTPS URL; the browser displays the information
about the certificate in the address bar. What does this certificate validate? - CORRECT
ANSWER-Secure connection

A technician suspects a computer system is infected with malware. Which of the
following activities is the correct next step? - CORRECT ANSWER-Sandboxing

A forensic investigator is told that a server's processor that does not normally run high
has been over-utilized lately, and they suspect possible malware. The investigator

, wants to start by investigating processes. Which command can they use to start the
investigation? (Select all that apply.) - CORRECT ANSWER-ps
top

A server administrator notices a file server starting to run low on space. The
administrator wants to create extra space before all space is used up and even worse
issues arise. What should the administrator use? - CORRECT ANSWER-cleanmgr.exe

A 3D animations expert is searching for a new computer. What should they ensure it
has to handle their demanding software? - CORRECT ANSWER-Dedicated graphics
card

Users are curious about what is run on startup, so they dig into the startup script. The
users find the command "net use M: \\sharedrive\data /persistent:yes". What is the
startup script invoking? - CORRECT ANSWER-Mapped drive

Which of the following accounts can users set up profile settings to synchronize
between devices via the online portal? - CORRECT ANSWER-Microsoft account

Which of the following log-in options require a user to touch a device that takes a digital
print? - CORRECT ANSWER-Fingerprint scanner

A user just installed a new application on their workstation, but the application has
issues even starting up. The user has been working on the machine regularly up to this
point without any prior issues. Which of the following is most likely the issue? -
CORRECT ANSWER-Firewall

Which of the following contains information about ingredients, health hazards,
precautions, and first aid information and what to do if the material is spilled or leaks? -
CORRECT ANSWER-MSDS

Which of the following extensions combines a scripting language with hundreds of
prebuilt modules called cmdlets that can access and change most components and
features of Windows and Active Directory components and features? - CORRECT
ANSWER-.ps1

An employee uses an option to ask for help from a technician with an invitation file
protected by a passcode. What is this option? - CORRECT ANSWER-MSRA

An attacker uses a technique against a wireless network that allows them to flood
access points with too many packets. What is this called? - CORRECT ANSWER-DoS

A user implements a method that requires a one-time code within a given time frame to
get access to their email account. What is this method? - CORRECT ANSWER-Soft
token
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
constantinelyketsos

Get to know the seller

Seller avatar
constantinelyketsos Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
5 months
Number of followers
9
Documents
1240
Last sold
2 weeks ago
Nursing study hub

welcome to my store high quality study notes ,summeries ,and guides to hep student understand faster and achieave better grades.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions