CompTIA A+ Core2 Final Assessment
Question And Answers
A user builds a new computer for gaming purposes. The ability to upgrade
the performance graphics processing unit (GPU) over time is desired. What
GPU type does the user invest in?
A. Integrated graphics
B. Video RAM
C. Dedicated graphics
D. System RAM - -Dedicated Graphics
A dedicated graphics card will have its own random access memory (RAM).
This allows the card to focus on rendering graphics without using system
RAM.
-A user suspects that a USB drive on their system has been tampered with.
The user begins using the drive by saving a few reports and deleting
unwanted files while waiting for an IT technician to investigate. What does
the user compromise?
A. Incident documentation
B. Latent evidence
C. Data integrity
D. Chain of custody - -Data Integrity
-A user experiences a blue screen of death (BSoD) while using a Windows
computer. What does a support technician determine to be a good first
troubleshooting step?
A. Check the system for malware.
B. Reinstall the operating system.
C. Remove any newly installed hardware.
D. Clean any dust from the system. - -Remove any newly installed hardware.
,-A user claims that they cannot browse the internet but can access a local
shared network server by name with no issue. After evaluating the
computer's IP settings and pinging an internet host by IP address with no
problem, what does a support technician determine as the cause?
A. Missing IP address
B. Missing gateway address
C. Missing DNS address
D. Missing subnet address - -Missing DNS address
All hosts on a network require the use of a domain name server IP address
for network communications using host names. This is currently the problem.
-A user with a problematic Windows system tries to use a previously created
system image. How does the user access the image? (Select all that apply.)
A. Start Menu
B. Repair disk
C. Reset this PC
D. Advanced boot - -Repair Disk
Advanced boot
Windows includes many operating system recovery and repair options. To
restore a system with an image created in Backup and Restore, a repair disk
can be used.
To recover a system using a backup image, use the Advanced Boot Option or
the System Image Recovery option off a repair disk or recovery environment.
-Malware infects a user's computer. A support technician determines that the
malware is executed without requiring any authorization using system
privileges. What type of malware currently infects the system?
A. Ransomware
B. Keylogger
C. Rootkit
D. Trojan - -Rootkit Malware may be able to execute without requiring any
authorization using system privileges and it may escalate privileges after
,installation. Malware running with this level of privilege is referred to as a
rootkit.
-An organization looks to make a server available to internet traffic without
bringing harm to its private network. An onsite engineer configures a
separate network for the server. Which approach does the engineer utilize?
A. Port forwarding
B. Port triggering
C. Inbound filtering
D. Screened subnet - -Screened subnet
In an enterprise network, a screened subnet is a means of establishing a
more secure configuration. The idea of a screened subnet is that some hosts
are placed in a separate network segment.
-A user enables privacy settings on a Windows 10 computer. Which settings
pertain to app permissions? (Select all that apply.)
A. Location service
B. Language settings
C. Use of speech
D. Camera and microphone - -Location service
Camera and microphone
App permissions allow or deny access to devices such as the location
service, and to user data such as contacts, calendar items, email, and files.
There are multiple settings toggles to determine what app permissions are
allowed. Camera and microphone settings are set under app permissions.
-A technician configures a backup routine on an important workstation.
Which type does the routine use when only backing changes since the last
full backup?
A. Synthetic
B. Full
, C. Incremental
D. Differential - -Full
-After a recent driver update on a Windows system, the display adapter does
not function properly. A technician tries to roll back the driver by using which
management console?
A. devmgmt.msc
B. diskmgmt.msc
C. dfrgui.exe
D. lusrmgr.msc - -devmgmt.msc
The Device Manager (devmgmt.msc) console allows administrators to view,
edit, and troubleshoot the properties of installed hardware, update drivers,
and remove or disable devices.
-A security engineer suggests the use of proximity technology to track the
movement of portable equipment. What solution does the engineer
recommend?
A. Passive infrared
B. Microwave radio
C. Radio frequency
D. Concealed sensor - -Radio Frequency
With proximity sensors, radio frequency ID (RFID) tags and readers can be
used to track the movement of tagged objects within an area.
-A systems administrator looks to have a daily backup of a server located
across a wide area network (WAN) link. As the link is not fast, the
administrator creates a backup scheme that uses little to no bandwidth and
acquires an entire backup of the system. Which scheme does the
administrator implement?
A. Full
B. Synthetic
C. Incremental
Question And Answers
A user builds a new computer for gaming purposes. The ability to upgrade
the performance graphics processing unit (GPU) over time is desired. What
GPU type does the user invest in?
A. Integrated graphics
B. Video RAM
C. Dedicated graphics
D. System RAM - -Dedicated Graphics
A dedicated graphics card will have its own random access memory (RAM).
This allows the card to focus on rendering graphics without using system
RAM.
-A user suspects that a USB drive on their system has been tampered with.
The user begins using the drive by saving a few reports and deleting
unwanted files while waiting for an IT technician to investigate. What does
the user compromise?
A. Incident documentation
B. Latent evidence
C. Data integrity
D. Chain of custody - -Data Integrity
-A user experiences a blue screen of death (BSoD) while using a Windows
computer. What does a support technician determine to be a good first
troubleshooting step?
A. Check the system for malware.
B. Reinstall the operating system.
C. Remove any newly installed hardware.
D. Clean any dust from the system. - -Remove any newly installed hardware.
,-A user claims that they cannot browse the internet but can access a local
shared network server by name with no issue. After evaluating the
computer's IP settings and pinging an internet host by IP address with no
problem, what does a support technician determine as the cause?
A. Missing IP address
B. Missing gateway address
C. Missing DNS address
D. Missing subnet address - -Missing DNS address
All hosts on a network require the use of a domain name server IP address
for network communications using host names. This is currently the problem.
-A user with a problematic Windows system tries to use a previously created
system image. How does the user access the image? (Select all that apply.)
A. Start Menu
B. Repair disk
C. Reset this PC
D. Advanced boot - -Repair Disk
Advanced boot
Windows includes many operating system recovery and repair options. To
restore a system with an image created in Backup and Restore, a repair disk
can be used.
To recover a system using a backup image, use the Advanced Boot Option or
the System Image Recovery option off a repair disk or recovery environment.
-Malware infects a user's computer. A support technician determines that the
malware is executed without requiring any authorization using system
privileges. What type of malware currently infects the system?
A. Ransomware
B. Keylogger
C. Rootkit
D. Trojan - -Rootkit Malware may be able to execute without requiring any
authorization using system privileges and it may escalate privileges after
,installation. Malware running with this level of privilege is referred to as a
rootkit.
-An organization looks to make a server available to internet traffic without
bringing harm to its private network. An onsite engineer configures a
separate network for the server. Which approach does the engineer utilize?
A. Port forwarding
B. Port triggering
C. Inbound filtering
D. Screened subnet - -Screened subnet
In an enterprise network, a screened subnet is a means of establishing a
more secure configuration. The idea of a screened subnet is that some hosts
are placed in a separate network segment.
-A user enables privacy settings on a Windows 10 computer. Which settings
pertain to app permissions? (Select all that apply.)
A. Location service
B. Language settings
C. Use of speech
D. Camera and microphone - -Location service
Camera and microphone
App permissions allow or deny access to devices such as the location
service, and to user data such as contacts, calendar items, email, and files.
There are multiple settings toggles to determine what app permissions are
allowed. Camera and microphone settings are set under app permissions.
-A technician configures a backup routine on an important workstation.
Which type does the routine use when only backing changes since the last
full backup?
A. Synthetic
B. Full
, C. Incremental
D. Differential - -Full
-After a recent driver update on a Windows system, the display adapter does
not function properly. A technician tries to roll back the driver by using which
management console?
A. devmgmt.msc
B. diskmgmt.msc
C. dfrgui.exe
D. lusrmgr.msc - -devmgmt.msc
The Device Manager (devmgmt.msc) console allows administrators to view,
edit, and troubleshoot the properties of installed hardware, update drivers,
and remove or disable devices.
-A security engineer suggests the use of proximity technology to track the
movement of portable equipment. What solution does the engineer
recommend?
A. Passive infrared
B. Microwave radio
C. Radio frequency
D. Concealed sensor - -Radio Frequency
With proximity sensors, radio frequency ID (RFID) tags and readers can be
used to track the movement of tagged objects within an area.
-A systems administrator looks to have a daily backup of a server located
across a wide area network (WAN) link. As the link is not fast, the
administrator creates a backup scheme that uses little to no bandwidth and
acquires an entire backup of the system. Which scheme does the
administrator implement?
A. Full
B. Synthetic
C. Incremental