100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA A+ 220-1002 Core 2 Certification Test Question and Answers [100% Correct] 2025 Latest Version!

Rating
-
Sold
-
Pages
45
Grade
A+
Uploaded on
02-09-2025
Written in
2025/2026

CompTIA A+ 220-1002 Core 2 Certification Test Question and Answers [100% Correct] 2025 Latest Version! What is the difference between a full backup and an incremental backup? A full backup copies all data, while an incremental backup only copies data that has changed since the last backup. Incremental backups are faster and require less storage space but may take longer to restore. What steps should be taken when a computer is infected with ransomware? Disconnect the computer from the network to prevent further spread. Do not pay the ransom. Restore files from backups, run antivirus scans, and use decryption tools if available. In some cases, a system restore may be necessary. How would you recover a system after a hard drive failure? To recover from a hard drive failure, replace the failed hard drive, restore from a backup image or system image, or reinstall the operating system and recover files from a backup if needed. What is the function of the Windows System File Checker (sfc)? System File Checker scans and repairs corrupted or missing system files in Windows, helping to resolve stability or performance issues caused by damaged files. How do you access the Control Panel in Windows 10? You can access the Control Panel by searching for it in the Start menu or by typing "control" in the Run dialog (Win + R). What is the purpose of the Windows ReadyBoost feature? ReadyBoost uses a USB flash drive to improve system performance by providing additional cache storage for the operating system, which can speed up systems with limited RAM. 1 How would you configure the firewall to block a specific program in Windows 10? To block a program through the Windows Firewall, open the firewall settings, select "Advanced settings," create a new inbound or outbound rule, and specify the program you want to block. How can you disable unnecessary startup programs in Windows 10? Open Task Manager, navigate to the "Startup" tab, and disable programs that you do not need to run on startup to improve system boot time and performance. What steps would you take to troubleshoot a computer that cannot connect to the internet? Check the physical connections, ensure the network adapter is enabled, verify the Wi-Fi or Ethernet settings, restart the router, and troubleshoot the network with Windows Network Troubleshooter. How does a proxy server work in a network environment? A proxy server acts as an intermediary between a user’s device and the internet. It filters requests, improves security by hiding the user’s IP address, and can cache content to speed up web browsing. What is the purpose of a Group Policy in Windows? Group Policy is a tool used to manage and configure user and computer settings across a network, such as enforcing password policies, managing software installations, and controlling system security. What is an optical drive, and how does it function in a computer system? An optical drive uses laser technology to read and write data on optical media, such as CDs, DVDs, or Blu-ray discs. It is typically used for media playback or software installation. How can you update device drivers in Windows 10? Device drivers can be updated via Device Manager by right-clicking a device, selecting "Update driver," and choosing to search automatically for updated driver software or manually browsing for a driver file. 2 What is a system image restore, and when would you use it? A system image restore involves restoring the entire system from a previously created image backup. It is used when the system experiences significant failure, such as a corrupted OS or a hard drive crash. What is the role of a network switch in a local area network (LAN)? A network switch connects multiple devices within a LAN and forwards data between them based on MAC addresses. Unlike a hub, it sends data only to the intended recipient, which improves network efficiency. How can you check the performance of your system’s CPU and memory usage in Windows 10? You can check the performance of the CPU and memory by opening Task Manager and navigating to the "Performance" tab, where you can see real-time graphs of CPU, memory, disk, and network usage. What is the function of the Task Scheduler in Windows, and how is it used? Task Scheduler allows users to automate tasks by setting triggers and actions. It can be used to run scripts, programs, or backups at specified times or events. How can you prevent malware infections on a Windows 10 computer? Use Windows Defender or a third-party antivirus program, avoid opening suspicious attachments or links, keep the system and software updated, and practice safe browsing habits. How would you troubleshoot a computer that is not turning on? Check if the power supply is plugged in, verify that the power button is working, test the power cord and outlet, and check the power supply unit (PSU) and motherboard for issues. How can you monitor network traffic on a Windows computer? You can use the "Resource Monitor" tool in Windows, which provides real-time data on network activity, including which applications are using network resources. What is the function of the Windows Event Viewer? 3 The Event Viewer logs system events, including errors, warnings, and informational messages. It helps administrators troubleshoot issues by providing detailed logs of what happened on the system. How can you secure a Windows 10 computer against unauthorized access? Use strong passwords, enable two-factor authentication, encrypt sensitive data, regularly update the system, and ensure a firewall is active to prevent unauthorized access to the computer. What is the role of the Windows Management Instrumentation (WMI)? WMI provides a standardized way to access and manage hardware and software information on Windows systems. It is used for system administration tasks, including querying system status and automating management processes. What is an IP address, and how does it function in networking? An IP (Internet Protocol) address uniquely identifies a device on a network and facilitates communication between devices. It can be either IPv4 (e.g., 192.168.0.1) or IPv6 (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). What is the purpose of Windows Safe Mode with Networking? Safe Mode with Networking loads minimal drivers along with networking support, allowing you to troubleshoot issues while still being able to access the internet for updates or driver installations. What is the difference between a virus and a worm in terms of cybersecurity threats? A virus attaches itself to a program or file and requires user action to spread, while a worm is a standalone malicious program that can self-replicate and spread across networks without user intervention. What is the purpose of a system image, and how can it be used in disaster recovery? A system image is a complete snapshot of the entire system, including the operating system, installed programs, and files. It can be used to restore a system to its exact state in the event of hardware failure or other catastrophic problems. How can you check for Windows updates from the command line? 4 You can check for Windows updates from the command line by running the "wuauclt /detectnow" command, which forces Windows Update to check for available updates immediately. What is a router, and how does it work in a home network? A router connects multiple devices within a local network and provides internet access by routing traffic between the local network and external networks (such as the internet). It also assigns local IP addresses to devices. How does the Windows registry affect system performance, and how can it be cleaned or repaired? The registry stores system and application settings, and issues in the registry can slow down performance. You can clean or repair the registry using third-party tools, but it’s important to back up the registry before making changes to avoid potential issues. What steps would you take to troubleshoot a computer with no display? Check the monitor connection, verify the monitor’s power, test the video cable and GPU, ensure the correct input source is selected, and test with another known working monitor. What is the difference between a 32-bit and a 64-bit processor architecture? A 64-bit processor can handle more memory (over 4GB) and perform tasks faster than a 32-bit processor, which is limited to 4GB of RAM. A 64-bit system also supports more advanced features and can run 64-bit applications. How would you enable or disable a network adapter in Windows? You can enable or disable a network adapter by going to the "Network Connections" section in the Control Panel, right-clicking the adapter, and selecting "Disable" or "Enable." What is the function of a system diagnostic tool, and how can it assist in troubleshooting computer issues? A system diagnostic tool checks the hardware and software components of a computer to identify potential issues. It can be used to test the CPU, RAM, disk drives, and other components to pinpoint the source of a problem. How would you secure a wireless network using WPA2 encryption? 5 To secure a wireless network with WPA2 encryption, log into the router’s settings, enable WPA2 under the security options, and set a strong password. This ensures that the network is encrypted and only authorized devices can connect. How do you access the command prompt in Windows 10? You can access the command prompt by right-clicking the Start button and selecting "Command Prompt" or by searching for "cmd" in the Start menu search bar. What is the role of a firewall in network security? A firewall controls incoming and outgoing network traffic, acting as a barrier to protect systems from unauthorized access and malicious activity while allowing legitimate traffic to pass. How would you upgrade the RAM in a desktop computer? To upgrade the RAM, power off the computer, open the case, locate the RAM slots, remove the old modules if necessary, and install the new RAM modules, ensuring they are properly seated. What is an IP conflict, and how can it be resolved? An IP conflict occurs when two devices on the same network are assigned the same IP address. It can be resolved by either manually assigning a different IP address or configuring the devices to obtain an IP address automatically through DHCP. How can you check the status of a hard drive in Windows 10? You can check the status of a hard drive by opening "This PC," right-clicking the drive, selecting "Properties," and under the "Tools" tab, clicking "Check" to scan for errors. What is a VPN, and how does it work to protect data? A VPN (Virtual Private Network) creates an encrypted tunnel between a device and the internet, allowing secure and private communication over public networks, protecting sensitive data from being intercepted. How would you troubleshoot a printer that is not printing? 6 7 Check if the printer is powered on, ensure it is connected to the computer or network, check for any paper jams or low ink, verify the printer’s status in the "Devices and Printers" settings, and restart the printer and computer. What is the function of the Windows Disk Cleanup tool? The Disk Cleanup tool helps free up space on a hard drive by removing temporary files, system files, and other unnecessary data, improving system performance. What steps would you take to resolve slow computer performance? Identify any resource-heavy applications using Task Manager, check for malware, disable unnecessary startup programs, defragment the hard drive, and ensure the system has sufficient RAM and storage space available. What is the purpose of system restore points in Windows? System restore points capture the state of the system at a specific time, allowing you to revert the system back to that point if there are issues, helping in troubleshooting and recovery from errors or changes. What is the purpose of a dynamic IP address? A dynamic IP address is assigned automatically by a DHCP server and can change over time, unlike a static IP address, which remains the same. Dynamic IP addresses are typically used for home networks and most internet service providers. How can you adjust screen resolution settings in Windows 10? Right-click on the desktop, select "Display settings," and use the "Display resolution" dropdown to select the appropriate resolution for your monitor. What is the purpose of the Windows Taskbar? The Taskbar allows quick access to programs and apps, displays running applications, and provides access to system notifications, the Start menu, and system tray icons. How can you verify that Windows 10 is activated? 8 To verify Windows 10 activation, go to Settings > Update & Security > Activation, where you can see the activation status and troubleshoot if necessary. How would you change the default web browser in Windows 10? Open Settings, navigate to "Apps," select "Default apps," and under the "Web browser" section, choose the browser you want to set as the default. What is the purpose of the Windows Action Center? The Action Center provides notifications about system alerts, including updates, security issues, and application messages. It also provides quick access to system settings like Wi-Fi and Bluetooth. How would you perform a clean installation of Windows 10? To perform a clean installation, boot from a Windows 10 installation USB or DVD, select "Install Now," delete any existing partitions if needed, and follow the prompts to install a fresh copy of the OS. What is the purpose of the Windows Backup and Restore feature? The Backup and Restore feature allows you to create a backup of your system files and personal data. It can restore files in case of data loss or system failure. How do you manage user accounts in Windows 10? You can manage user accounts by opening the "Control Panel," selecting "User Accounts," and choosing options to create, modify, or delete accounts, or change account types. What is the role of an operating system in computer functionality? An operating system manages hardware resources, provides a user interface, supports applications, and enables communication between software and hardware components. How would you troubleshoot a slow internet connection? Check the network cables or Wi-Fi signal strength, restart the router, test the speed with an online tool, and ensure no other devices are using up bandwidth. Which of the following operating systems is a free download with no evaluation period limitations? A. Windows 10 Home B. Ubuntu 18.04 C. macOS D. iOS B. Ubuntu 18.04 What is the name of the folder where windows 10 stores 64-bit system files? A. Systemroot B. System32 C. SysWOW64 D. Program Files (x86) B. System32 Which of the following is used on iPads? A. Chrome OS B. Windows 10 C. iOS D. Android C. iOS Scenario: It's the summer of 2023. Your company has many types of technologies running-many of which interact with each other. Of the following OSes and devices that are used in your company's infrastructure, which are security concerns? (Select the best answers.) A. Windows 7 B. Windows 10 C. MacBook Pro 2012 D. Android 6.0 9 E. Windows 8.1 A. Windows 7 B. Windows 10 C. MacBook Pro 2012 D. Android 6.0 E. Windows 8.1 Which of the following statements is true? A. Android is an example of closed-source software. B. 32-bit CPUs can only address a maximum of 256 GB of RAM. C. Chrome OS is designed by Apple to use mostly desktop applications. D. 64-bit versions of Windows can run 32-bit apps as well as 64-bit apps. Windows can run 32-bit apps as well as 64-bit apps. Which editions of Windows 10 offer Hyper-V? (Select the three best answers.) A. Windows 10 Home B. Windows 10 Pro C. Windows 10 Education D. Windows 10 Enterprise C. Windows Education' D. Windows 10 Enterprise B. Windows 10 Pro What is the minimum hard drive requirement for Windows 10 64-bit? A. 2 GB of RAM B. 2 GHz C. 32 GB of hard drive space D. 200 GB of hard drive C. 32 GB of hard drive space D. 64-bit versions of 10 Where should you go to find out what applications are running in the background of Windows 10? A. Taskbar B. Start menu C. Quick launch D. Notification Area E. Cortana D. Notification Area Which of the following installation types would require PXE compliance? A. Local B. Network' C. Internal D. USB flash drive B. Network To avoid SID conflicts when driving imaging, which program should you use in Windows? A. Sysprep B. Diskpart C. SIM D. Windows Deployment Services A. Sysprep You are tasked with installing Windows with the standard configuration. The file system needs to be able to access an 8-TB partition. Which of the following should you configure the system to use? A. GPT B. NTFS C. FAT32 11 D. MBR E. ext4 B. NTFS Which of the following uses an answer file to provide responses with no user intervention required? A. Factory recovery partition B. Clean installation C. Unattended installation D. Reset your PC C. Unattended installation Which command can copy multiple files and entire directory trees? A. copy B. cut C. paste D. robocopy D. robocopy Which command will determine if protected system files have been overwritten and replace those files with the original version? A. chkdsk B. msconfig C. SFC D. xcopy C. SFC Which command will show the path of routers between your computer and a web server? A. ping B. ipconfig 12 C. tracert D. nbstat C. tracert You need to map a network drive to a share named data1 on a computer named Jupiter-Server. You want to use the J: drive letter. Which syntax should you use if you were to do this in the Command Prompt? A. net use J: Jupiter-Serverdata 1 B. net use J Jupiter-Serverdata 1 C. net use Jupiter-ServerJdata 1 D. net use J: Jupiter-Serverdata 1 A. net use J: Jupiter-Serverdata 1 You have been tasked with bringing the policies of a Windows 10 computer up to date. You won't be able to log off and back on, and you must use the Command Prompt. Which of the following tools should you use? A. Shutdown' B. DISM C. gpupdate D. Local Security Policy E. nslookup C. gpupdate A user's WINWORD.EXE application is completely frozen. How can you determine the application's processes ID and then terminate the frozen application process? (Select the two best answers.) A. Use the net user command to identify the current PID of the application. B. Use the net user /delete command to terminate the frozen process ID. C. Run tasklist and record the process ID (PID) D. Run taskkill /PID number D. Run taskkill /PID number C. Run tasklist and record the process ID (PID) 13 Which of the following should be typed in the Run prompt to open the Device Manager? A. MMC B. C.CMD D. D. Which of the following would you use to track what percentage of resources are being used? A. B. C. D. D. Where can a user go to start and stop services in Windows? (Select all that apply). A. MSConfig B. Task Manager C. Computer Management' D. Command Prompt C. Computer Management' D. Command Prompt B. Task Manager Which log file in the Event Viewer contains information concerning auditing? A. System B. Application C. Local Users and Groups 14 D. Security D. Security You are preparing to troubleshoot a system that is having some driver issues. Which of the following tools should you use to configure the system to boot safely? A. Event Viewer B. Performance Monitor C. Local Users and Groups D. System Configuration' E. MMC D. System Configuration' Which tool can run particular programs at a time designated by the user? A. Services B. Task Scheduler C. Event Viewer D. Windows Memory Diagnostics B. Task Scheduler You have been tasked with repairing a magnetic-based hard drive that is running sluggishly. Which of the following tools should you use to fix the problem? (Select the best answer.) A. Disk management B. Optimize Drives C. Storage Spaces D. Mount point B. Optimize Drives What is HKEY__LOCAL__MACHINE considered to be? A. A registry entry 15 B. A subkey C. A string value D. A hive D. A hive Which of the following system utilities should be used to create a text file with no formatting? A. Notepad B. Explorer C. msinfo32 D. Registry A. Notepad A customer is having a problem connecting to mapped network drives but can connect to the Internet just fine. You are tasked with fixing that system. Which tool should you use to take charge of the system and analyze it? A. dxdiag B. mstsc C. msinfo32 D. dfrgui E. diskpart F. System Restore B. mstsc What must you do first to a basic disk to create spanned, stripped, mirrored, or RAID-5 Volumes in Disk Management? A. Extend it B. Shrink it C. Split it D. Initialize it E. Convert it to dynamic E. Convert it to dynamic 16 You have been tasked with verifying the certificates that are in use on a computer that is configured to use Microsoft Edge. Which tab of the Internet Properties dialog box should you access? A. General B. Security C. Privacy D. Content E. Connections F. Programs G. Advanced D. Content Which window would you navigate to in order to modify the virtual memory settings in Windows? (Select the best answer) A. Device Manager B. Performance Options C. System D. Folder Options E. System Properties B. Performance Options Which power management mode stores f=data on the hard drive? A. Sleep B. Hibernate C. Standby D. P B. Hibernate What should you modify if you need to change the number of pixels that are displayed horizontally and vertically on the screen? 17 A. Color depth B. Refresh rate C. Resolution' D. Scaling C. Resolution You are about to start troubleshooting a Windows system. You need to be able to view the bootmgr file in the C: root of the hard drive. Which of the following should you configure to make this file visible? (Select the two best answers.) A. Hidden files and folders B. Extensions for known file types C. Encrypted or compressed NTFS files in color D. Protected operating system files D. Protected operating system files A. Hidden files and folders A customer's computer has many logins to websites saved within Windows. Some of these are security risks. Where can you go to remove those login usernames and passwords? (Select the two best answers) A. Programs and Features B. Credential Manager C. Devices and Printers D. MSDT E. Store User Names and Passwords F. Sync Center B. Credential Manager E. Store User Names and Passwords Which of the following are administrative share names? (Select the two best answers.) A. C$ 18 B. C:Windows C. ADMIN$ D. System32 E. $print C. ADMIN$ A. C$ Which of the following requires a Windows-created password to gain access to it? A. Workgroup B. Client/server C. HomeGroup D. Domain C. HomeGroup You want to connect to a share on server1data-share. Which of the following should be used to accomplish this? A. HomeGroup B. Right-click the folder and select Share with C. ipconfig D. net use D. net use You have been tasked with setting up a client Windows computer. It needs to gain access to the Internet, but all web traffic is cached and filtered by a go-between server on the LAN. What should you configure to enable Internet access for the Windows client? A. Alternate IP address B. Proxy server C. Duplex D. WSD B. Proxy server 19 Which of the following are important considerations when planning the installation of a new application? (Select the three best answers.) A. CPU speed B. Windows location C. Program Files location D. User permissions E. Warranty A. CPU speed C. Program Files location D. User permissions In Windows 10, which network location profile settings should you choose if you are not sure what computers will be on the network or if you can trust them? A. Private B. Home C. Work D. Public D. Public Which of the following is the built-in web browser for macOS? A. Safari B. Chrome C. Firefox D. Internet Explorer A. Safari Which program should you use to access Utilities in macOS? (Select the two best answers.) A. Mission Control 20 B. Finder C. Spotlight D. Safari C. Spotlight B. Finder Which of the following should be enabled when you want a user at another Mac to take control of your computer? A. Remote Desktop B. Remote Assistance C. Screen Sharing D. Screen Mirroring C. Screen Sharing Which utility allows a MAC user to dual-boot macOS and Windows? A. Ubuntu B. apt-get C. bootrec D. Boot Camp D. Boot Camp You want to save the state of the Mac running macOS. Which tool should be used? A. System Restore B. Time Machine C. Force Quite D. Disk Utility B. Time Machine Which program handles a printer's driver automatically in macOS? (Select the best answer) 21 A. Bonjour B. Magic Mouse C. AirPrint D. iCloud C. AirPrint A customer reports that a spinning wheel appears on her screen whenever she tries to run a specific application. What does this represent? (Select the best answer.) A. A failing CPU B. An Apple macOS proprietary crash screen C. A Microsoft Windows proprietary crash screen D. A Linux proprietary crash screen B. An Apple macOS proprietary crash screen Which command in Linux will show the directory contents? A. ls B. pwd C. cd D. mv A. ls Which command should be used to change the permissions of a file? A. ps B. chown C. NTFS D. chmod D. chmod Which command will show the configuration details of a wireless connection in Linux? 22 A. ifconfig B. ipconfig C. iwconfig D. grep C. iwconfig Which of the following is the science of recognizing humans based on physical characteristics? A. Mantraps B. Biometrics C. Tailgating D. CAC B. Biometrics You have been tasked with preventing unwanted removal of a webcam. Which of the following tools should you implement?? A. Smart card B. USB fingerprint scanner C. USB lock D. Privacy filter C. USB lock When is a Windows 10 computer completely secured? A. When you have updated to the latest version B. When you have locked down the Local Security Policy C. When Microsoft releases the latest update D. Never D. Never Which of the following is a built-in security component of Windows 10? 23 A. UAC B. Firefox C. Active Directory D. MFA A. UAC You have been tasked with configuring a user account so that its folder and settings will follow the user to whatever computer the user logs on to within the domain. Which of the following should you configure? A. OU B. Roaming profile C. Logon script D. Home folder mapped to a network drive B. Roaming profile You need to block users from installing programs in Windows 10. Of the following, what tool should you select? A. B. IKEv2 C. WIP D. E. D. Which of the following is the strongest form of wireless encryption? A. WPA B. WEP C. AES D. TKIP C. AES 24 You have been tasked with connecting wireless clients to a server that supports SSO and 802.1X. Which of the following technologies should you implement? A. WPA2-PSK B. WPA2-ENT C. WEP D. TKIP' E. RADIUS E. RADIUS B. WPA2-ENT Which of the following types of malware self-replicates? A. Virus B. Worm C. Trojan D. Rootkit B. Worm Which of the following types of malware is designed to gain administrative-level control of a system? A. Ransomware B. Keylogger C. Rootkit D. Spyware C. Rootkit You have been tasked with implementing a virus prevention plan on a group of Windows client computers. Which of the following should you carry out? (Select all that apply) A. Update AV software B. Configure File History 25 C. Update Microsoft Office D. Install a rootkit scanner E. Verify that a firewall is installed B. Configure File History E. Verify that a firewall is installed A. Update AV software Which of the following describes an attempt to guess a password by using a combination of letters and numbers? A. Brute-force B. Social engineering C. Dictionary D. Zero-day A. Brute-force A user clicked a link in an e-mail that appeared to be from his bank. The like led him to a page that requested he charge his password to access his bank account. it turns out that the webpage was fraudulent. What is this an example of? A. Impersonation B. Dumpster diving C. Phishing D. Shoulder surfing C. Phishing Several hundred infected computers simultaneously attacked your organization's server, rendering it useless to legitimate users. What kind of attack is this an example of? A. Botnet B. MITM C. Tailgating D. DDoS 26 E. Rainbow table D. DDoS You have been tasked with setting up encryption for a Windows computer. You are required to encrypt several shared folders within partition, so that they can't be need by other users. What tool should you use? A. BitLocker B. TPM C. Administrative share D. EFS D. EFS One of the users on your network is trying to access files shared on a remote computer. The file's share permissions allow the user Full Control but the NTFS permissions allow the user Read access. Which of the following will be the resulting access for the user? A. Full Control B. Modify C. Read D. Write C. Read You are the administrator for your network and you set up an administrative share called Data$. Which of the following is necessary in order for another user to access this share? (Select the two best answers.) A. The user must be part of a HomeGroup. B. The user must have permissions to access the share. C. The user must know the decryption key. D. The user must know the exact network path to the share. E. The user must enable File Sharing in the Network and Sharing Center permissions to access the share. D. The user must know the exact network path to the share. B. The user must have 27 Which Windows account would you create for someone who needs to regularly install software, change settings, and take ownership? A. Power User B. Standard User C. Guest D. Root E. Administrator E. Administrator You want to prevent a user from accessing your phone while you step away from your desk. What should you do? A. Implement remote backup B. Set up a remote wipe program C. Configure a screen lock D. Install a locator application C. Configure a screen lock Which of the following can be described as removing limitations on iOS? A. Rooting' B. Jailbreaking C. Gegtracking D. AV software B. Jailbreaking Your organization is concerned about a potential scenario where a mobile device with confidential data is stolen. Which of the following should be recommended first? (Select the best answer) A. Remote backup application B. Remote wipe program 28 C. Password locks D. Locator application B. Remote wipe program You are concerned about the possibility of jailbreaks on your organization's iPhones and viruses on the Android-based devices. Which of the following should you implement? (Select the two best answers.) A. AV software B. Firewall C. Mobile device management D. Device reset A. AV software C. Mobile device management There are Android-based smartphones in your organization that are part of the BYOD infrastructure. They need to be able to connect to the LAN remotely using a VPN, Which of the following should you incorporate into the MDM profile for the smartphones to connect to the VPN securely? (Select the best answer.) A. AV software B. Certificate C. Remote wipe D. Authentication app E. Microsoft Intune B. Certificate A hard drive needs to be disposed of in such a way that no one can access the data. Which method should be used? A. Degaussing B. Clearing C. diskpart D. Destruction D. Destruction 29 A drive is to be repurposed within your company. You have been tasked with zeroing out the drive three t imes from within Windows. Which of the following methods will accomplish this? A. Degaussing B. format C: /fs:fat32/p:3 C. diskpart > select disk 1 > clean all D. dd if=/dev/zero of=/dev/sda1 B. format C: /fs:fat32/p:3 You have been tasked with purging a hard drive so that it can be recycled to a sister company. Which of the following should you perform before sending the hard drive out? A. Clear the drive B. Degauss the drive C. Run Secure Erase D. Pulverize the drive C. Run Secure Erase Which of the following helps to secure a SOHO router? (Select the three best answers.) A. Change default passwords B. Enable SSID C. Enable MAC filtering D. Enable WPS E. Enable WPA2 C. Enable MAC filtering E. Enable WPA2 A. Change default passwords You want to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network. How can you accomplish this? (Select the two best answers.) 30 A. Enable MAC filtering B. Create a DMZ C. Configure a complex SSID D. Disable physical ports D. Disable physical ports A. Enable MAC filtering You want to prevent certain users from accessing particular websites. What should you configure on the SOHO router? A. MAC filtering B. Disable unused ports C. Port forwarding D. Parental controls E. Power levels D. Parental controls Which option starts the operating system with a minimal set of drivers? A. Windows RE B. System Restore C. Safe Mode D. Debugging Mode C. Safe Mode Which tool should be used if you want to do Startup Repair in Windows? A. File History B. Windows RE C. System Restore D. Safe Mode B. Windows RE 31 Which command repairs the bootmgr file in Windows? (Select the best answer.) A. msconfig B. bootrec /fixboot C. bootrec /rebuildbcd D. bootbcd C. bootrec /rebuildbcd One of your customers updated the software for a wireless adapter on a PC. After rebooting the user logged in and the computer displayed a blue screen. What should you do? A. Install the device on a known good computer. B. Reboot the computer and access debugging mode. C. Purchase a new wireless adapter. D. Roll back the device drivers in Safe Mode D. Roll back the device drivers in Safe Mode You are running Windows 8.1 and want to save personal files and remove all programs installed to the desktop while resetting PC settings. Which of the following should you select? A. Reset your PC B. Refresh your PC C. System Recovery Options D. Command Prompt B. Refresh your PC A stop error could manifest itself as what? A. A BSOD B. An Event Viewer error C. An Action Center notification D. An Internet Explorer error A. A BSOD 32 Which tools can be used to restore a computer? (Select all that apply) A. File History B. System Restore C. System Image Recovery D. Msconfig B. System Restore C. System Image Recovery Which of the following might cause a blue screen? A. A faulty DVD-ROM B. A CPU without a fan C. Bad drivers D. A program compatibility issue C. Bad drivers An application is frozen and cannot be closed. However, the rest of the operating system works fine. Which tool can be used to close the application? A. tasklist B. taskkill C. shutdown D. convert B. taskkill You are tasked with repairing an issue with a Windows client computer that is attempting to log on to a domain. The user informs you that it takes 5 minutes to log on to domain, but logging in to the local machine only takes 15 seconds. What steps should you take to fix the problem? (Select the two best answers.) A. Clean up temp files. 33 B. Disable unnecessary services in msconfig. C. Update the BIOS boot order. D. Synchronize the Windows client's time to the domain. E. Run ipconfig/release and ipconfig /renew A. Clean up temp files. D. Synchronize the Windows client's time to the domain. Which of the following are symptoms of viruses? (Select the three best answers.) A. A computer runs slowly. B. A computer locks up. C. Excessive pop-up windows appear. D. A strange website is displayed whenever a search is done.. E. Unusual error messages are displayed B. A computer locks up. E. Unusual error messages are displayed A. A computer runs slowly. Which of the following is the best mode to use when scanning for viruses? A. Safe Mode B. Reset the PC C. Command Prompt only D. Boot into Windows normally A. Safe Mode You have been tasked with repairing a computer that is exhibiting the following symptoms: -Excessive pop-up windows appear: -A particular website comes up every time the user searches. What is this most likely cause? 34 A. Spam B. Virus C. Social engineering D. Trojan E. Spyware E. Spyware A co-worker technician is using to analyze a problem with a computer. Which of the following issues is the technician most likely troubleshooting? A. Trusted root CA B. Hijacked e-mail C. Spam D. Browser redirection A. Trusted root CA Several computers were infected with malware because the end users clicked unknown links embedded in e-mails. You have successfully applied the first six steps of the best practice procedures for malware removable. What should you do next? A. Schedule scans and run updates. B. Enable System Restore and create a restore point. C. Document findings, actions, and outcomes. D. Educate the corporate users. D. Educate the corporate users. An application won't close on an Android smartphone. You've tried to force stop it, to no avail. What should you do? A. Hard reset the device B. Stop the underlying service in Running Services C. Soft reset the device. 35 D. Take the device to an authorized service center. C. Soft reset the device. Which of the following are valid Wi-Fi troubleshooting methods? (Select the two best answers.) A. Power cycle the device. B. Restart Bluetooth C. Use a static IP. D. Make sure the device is within range. E. Rename the SSID A. Power cycle the device. D. Make sure the device is within range. You are troubleshooting a mobile device's e-mail connection. Your company requires the latest in security when it comes to e-mail sessions. The e-mail client is a separate app that is not browse based. How should the mobile device's e-mail client program be configured? (Select the two best answers.) A. SSL on port 25 B. TLS on port 443 C. POP3 with TLS using port 995 D. SMTP using port 995 E. IMAP using SSL on port 110 F. SMTP using TLS on port 587 F. SMTP using TLS on port 587 C. POP3 with TLS using port 995 You suspect that a mobile device has been compromised and is now part of a botnet. What are some of the indicators that has happened? (Select the two best answers.) A. High resource usage B. Notification of camera/webcam usage C. Apps were forced stopped D. Power drain 36 E. Log files are unavailable F. The user's account was locked out D. Power drain A. High resource usage You have been tasked with fixing a problem on a Windows Server. You need to find out which switch it connects to and how it connects. Which of the following types of documentation should you consult? A. Microsoft Knowledge Base B. Network topology diagram C. Incident documentation D. Compliance policy E. Inventory management B. Network topology diagram You work for an enterprise-level organization that is certified as ISO 27002:2013. You have been tasked with adding a group of Windows client computers with a new image configuration to the IT asset inventory database, and this task has a standard procedure. You must furnish a document to be signed off by two people. Who should you approach for signatures? (Select the two best answers.) A. Your manager B. Compliance officer C. IT directory D. Owner of the company E. CISO C. IT directory A. Your manager What do inventory management systems and software use to keep track of assets? (Select the two best answers.) A. Regulatory policies B. AUPs 37 C. Asset tags D. Barcodes D. Barcodes C. Asset tags In a change management board meeting you are discussing any vulnerabilities that can be mitigated as part of a recommended change and anything that could potentially occur due to that change. What best describes what you are discussing? A. Purpose of change B. Scope the change C. Backout plan D. Document changes E. Risk analysis E. Risk analysis You have been tasked with backing up new user profiles in an enterprise environment. You propose to back up these user accounts to a new tape backup device. Which of the following procedures should you follow? A. Change management B. End-user acceptance C. File History D. Incremental backup E. Backup testing E. Backup testing A. Change management You have been contracted to perform some work at a small office. There is a problem with a Windows 10 computer and the user accounts folder has been corrupted. "Luckily" the company has a backup. Where should you restore the accounts to? (Select the two best answers.) A. C:Users B. Ntdsutil 38 C. Active Directory Users and Computers D. Local Users and Groups E. ISO-compliant array D. Local Users and Groups A. C:Users If a power supply fails, what should you do? A. Replace it B. Repair it C. Use a different computer D. Switch it to a different voltage setting. A. Replace it Which of the following are ways to avoid ESD? (Select three,) A. Use an antistatic wrist strap B. Use a vacuum cleaner C. Use an antistatic mat D. Touch the chassis of the computer C. Use an antistatic mat D. Touch the chassis of the computer A. Use an antistatic wrist strap You walk into the server room and see a person lying on the floor with a live electrical wire draped over. What should you do first? A. Run out and call 911. B. Grab the wire and fling it off the person. C. Grab the person and drag him out from under the wire. D. Grab a piece of wood and use it to move the wire off the person. use it to move the wire off the person. D. Grab a piece of wood and 39 What document can aid you if a chemical spill occurs? A. HEPA B. MSDS C. OSHA D. EPA B. MSDS A co-worker complains that after the cleaning crew has come through, the key-board irritates his hand and leaves some green residue. What should you do? A. Call the department. B. Contact the facilities department. C. Contact the manufacturer of the keyboard. D. Call OSHA and complain. B. Contact the facilities department. You are concerned with the power outages that occur infrequently and for short periods of time. You don't want to suffer from potentially harmful restarts. What device should you install for the users' computers? A. Surge protector B. Line conditioner C. MSDS D. UPS D. UPS You want a cost-effective solution to the common surges that can affect your computer. Which device offers the best solution? A. UPS B. Surge suppressor 40 C. Power strip D. Line conditioner B. Surge suppressor You find illegal materials on a customer's computer. Your boss commands you to preserve computer evidence until he gets to the scene. What is your boss asking you to begin? A. Documentation B. Chain of custody C. First response D. GDPR compliance B. Chain of custody Which of the following is not one of the steps of the incident response process? A. Eradication B. Recovery C. Containment D. Non-repudiation D. Non-repudiation You are the security administrator for your organization. You have just identified a malware incident. Of the following, what should be your first response? A. Containment B. Removal C. Recovery D. Monitoring A. Containment Which type of regulated data is specifically protected under the HIPAA Privacy Rule? A. PII 41 B. PCI C. GDPR D. PHI D. PHI How will speaking with a lot of jargon make a technician sound? A. Competent B. Insecure C. Smart D. Powerful B. Insecure . A customer experiences a server crash. When you arrive, the manager is upset about this problem. What do you need to remember in this scenario? A. Stay calm and do the job as efficiently as possible. B. Imagine the customer in his underwear. C. Avoid the customer and get the job done quickly. D. Refer the customer to your supervisor. A. Stay calm and do the job as efficiently as possible. Which of the following are good ideas when dealing with customers? A. Speak clearly. B. Ignore them. C. Avoid distractions. D. Explain to them what they did wrong. C. Avoid distractions A. Speak clearly. You are a field technician working at a customer's site. One of the workers asks you to load a copy of an organization's purchased software on a personal laptop. What should you do first? 42 A. Verify that the installation is allowed under the company's licensing agreement. B. Act as though you are distracted and ignore the user. C. Leave the premises and inform the policy. D. Tell the worker that installing unlicensed software is illegal. E. Notify the worker's manager of a security breach. the company's licensing agreement. A. Verify that the installation is allowed under You have been asked by a customer at a hospital to perform routine maintenance on a laser printer. Before you begin, you notice PHI has printed out. What should you do first? A. Ensure the paper tray is full so that everything can print. B. Place the printed output in a secure recycle bin and begin maintenance. C. Kindly warn the customer that printing PHI at work is a HIPPA violation. D. Ask the customer to move the printed output to another area printed output to another area. What should you type to comment out syntax in JavaScript? A. $ B. # C. // D. <!-- --> C. // Which of the following is an integer? (Select the two best answers.) A. 16 B. cat C. string D. A. 16 D. Ask the customer to move the 43 D. You want to list a variable number 16 times but don't want to type 16 lines of code. Which of the following techniques should you use? A. If-Then B. Looping C. Environmental variables D. Comment syntax B. Looping A technician just finished scripting sequence of code and saved the file as a .sh. What system is the technician working in? A. PowerShell B. Linux C. JavaScript D. Python E. Batch file B. Linux Which program enables a user to invite a technician to help repair their computer remotely? A. Remote Desktop Connection B. Remote Assistance C. RDP D. Remote connectivity B. Remote Assistance You have been tasked with making a command-line-based, remote connection to an Ubuntu Linux computer located on your LAN, so that you can run two scripts on it as an administrator. What protocol should you use? (Select the best answer.) 44 A. RDP B. mstsc C. SSH D. VPN C. SSH You are in charge of setting up the administrators' connections to remote Windows 10 computers located at satellite offices using RDP. What are some of the ways to make the connections more secure? (Select the three best answers.) A. Use strong passwords B. Use OpenSSH C. Use Network Level Authentication D. Use PuTTY E. Use L2TP and IKEv2 A. Use strong passwords C. Use Network Level Authentication E. Use L2TP and IKEv2 45

Show more Read less
Institution
CompTIA
Course
CompTIA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
September 2, 2025
Number of pages
45
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA A+ 220-1002 Core 2 Certification
Test Question and Answers [100% Correct]
2025 Latest Version!
What is the difference between a full backup and an incremental backup?

A full backup copies all data, while an incremental backup only copies data that has changed
since the last backup. Incremental backups are faster and require less storage space but may take longer
to restore.



What steps should be taken when a computer is infected with ransomware?

Disconnect the computer from the network to prevent further spread. Do not pay the ransom.
Restore files from backups, run antivirus scans, and use decryption tools if available. In some cases, a
system restore may be necessary.



How would you recover a system after a hard drive failure?

To recover from a hard drive failure, replace the failed hard drive, restore from a backup image or
system image, or reinstall the operating system and recover files from a backup if needed.



What is the function of the Windows System File Checker (sfc)?

System File Checker scans and repairs corrupted or missing system files in Windows, helping to
resolve stability or performance issues caused by damaged files.



How do you access the Control Panel in Windows 10?

You can access the Control Panel by searching for it in the Start menu or by typing "control" in the
Run dialog (Win + R).



What is the purpose of the Windows ReadyBoost feature?

ReadyBoost uses a USB flash drive to improve system performance by providing additional cache
storage for the operating system, which can speed up systems with limited RAM.




1

,How would you configure the firewall to block a specific program in Windows 10?

To block a program through the Windows Firewall, open the firewall settings, select "Advanced
settings," create a new inbound or outbound rule, and specify the program you want to block.



How can you disable unnecessary startup programs in Windows 10?

Open Task Manager, navigate to the "Startup" tab, and disable programs that you do not need to
run on startup to improve system boot time and performance.



What steps would you take to troubleshoot a computer that cannot connect to the internet?

Check the physical connections, ensure the network adapter is enabled, verify the Wi-Fi or
Ethernet settings, restart the router, and troubleshoot the network with Windows Network
Troubleshooter.



How does a proxy server work in a network environment?

A proxy server acts as an intermediary between a user’s device and the internet. It filters
requests, improves security by hiding the user’s IP address, and can cache content to speed up web
browsing.



What is the purpose of a Group Policy in Windows?

Group Policy is a tool used to manage and configure user and computer settings across a
network, such as enforcing password policies, managing software installations, and controlling system
security.



What is an optical drive, and how does it function in a computer system?

An optical drive uses laser technology to read and write data on optical media, such as CDs,
DVDs, or Blu-ray discs. It is typically used for media playback or software installation.



How can you update device drivers in Windows 10?

Device drivers can be updated via Device Manager by right-clicking a device, selecting "Update
driver," and choosing to search automatically for updated driver software or manually browsing for a
driver file.




2

,What is a system image restore, and when would you use it?

A system image restore involves restoring the entire system from a previously created image
backup. It is used when the system experiences significant failure, such as a corrupted OS or a hard drive
crash.



What is the role of a network switch in a local area network (LAN)?

A network switch connects multiple devices within a LAN and forwards data between them based
on MAC addresses. Unlike a hub, it sends data only to the intended recipient, which improves network
efficiency.



How can you check the performance of your system’s CPU and memory usage in Windows 10?

You can check the performance of the CPU and memory by opening Task Manager and navigating
to the "Performance" tab, where you can see real-time graphs of CPU, memory, disk, and network usage.



What is the function of the Task Scheduler in Windows, and how is it used?

Task Scheduler allows users to automate tasks by setting triggers and actions. It can be used to
run scripts, programs, or backups at specified times or events.



How can you prevent malware infections on a Windows 10 computer?

Use Windows Defender or a third-party antivirus program, avoid opening suspicious attachments
or links, keep the system and software updated, and practice safe browsing habits.



How would you troubleshoot a computer that is not turning on?

Check if the power supply is plugged in, verify that the power button is working, test the power
cord and outlet, and check the power supply unit (PSU) and motherboard for issues.



How can you monitor network traffic on a Windows computer?

You can use the "Resource Monitor" tool in Windows, which provides real-time data on network
activity, including which applications are using network resources.



What is the function of the Windows Event Viewer?


3

, The Event Viewer logs system events, including errors, warnings, and informational messages. It
helps administrators troubleshoot issues by providing detailed logs of what happened on the system.



How can you secure a Windows 10 computer against unauthorized access?

Use strong passwords, enable two-factor authentication, encrypt sensitive data, regularly update
the system, and ensure a firewall is active to prevent unauthorized access to the computer.



What is the role of the Windows Management Instrumentation (WMI)?

WMI provides a standardized way to access and manage hardware and software information on
Windows systems. It is used for system administration tasks, including querying system status and
automating management processes.



What is an IP address, and how does it function in networking?

An IP (Internet Protocol) address uniquely identifies a device on a network and facilitates
communication between devices. It can be either IPv4 (e.g., 192.168.0.1) or IPv6 (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).



What is the purpose of Windows Safe Mode with Networking?

Safe Mode with Networking loads minimal drivers along with networking support, allowing you
to troubleshoot issues while still being able to access the internet for updates or driver installations.



What is the difference between a virus and a worm in terms of cybersecurity threats?

A virus attaches itself to a program or file and requires user action to spread, while a worm is a
standalone malicious program that can self-replicate and spread across networks without user
intervention.



What is the purpose of a system image, and how can it be used in disaster recovery?

A system image is a complete snapshot of the entire system, including the operating system,
installed programs, and files. It can be used to restore a system to its exact state in the event of hardware
failure or other catastrophic problems.



How can you check for Windows updates from the command line?


4
$9.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
AcademicPlug

Get to know the seller

Seller avatar
AcademicPlug Yale School Of Medicine
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
7 months
Number of followers
0
Documents
327
Last sold
2 months ago
⚡ACADEMIC PLUG- Your Ultimate Exam Resource Center⚡

Welcome to Academic Plug, your one-stop shop for all things academic success! We specialize in providing high-quality, curated exam resources to help students, professionals, and lifelong learners excel in their studies and certification goals. Whether you're preparing for high school finals, university exams, or global certifications like IELTS, CPA, or SATs — Academic Plug connects you with the documents that matter most: ✅ Past papers ✅ Model answers ✅ Marking schemes ✅ Study guides ✅ Revision notes ✅ Certification prep kits We believe in smarter study, not harder. That’s why Academic Plug is more than a store — it’s your academic ally. With verified documents, organized by subject and exam board, you’ll save time and stay ahead. Plug in. Power up. Pass with confidence.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions