Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

COMPTIA A+ CORE 2 FINAL ASSESSMENT

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
09-03-2025
Escrito en
2024/2025

COMPTIA A+ CORE 2 FINAL ASSESSMENT

Institución
COMPTIA A+ CORE 2
Grado
COMPTIA A+ CORE 2

Vista previa del contenido

COMPTIA A+ CORE 2 FINAL ASSESSMENT

A Windows user runs the Performance Monitor tool to check disk activity. What counter
is the best option the user can evaluate to understand how busy the disk is at any given
time? - Answers :% disk time

A new support technician interfaces with a user that has a computer problem. While
discussing the problem, the technician gives undivided attention to the user and asks
questions where the person creates their own response. When discussing the problem,
what does the technician practice? (Select all that apply.) - Answers :Open-ended
questions
Active listening

A company disposes of old computer systems. While doing so, all hard drives are
removed and scheduled for physical destruction. Which method will NOT work with a
solid state drive (SSD)? - Answers :Degaussing

An iOS smart device user notices that AirDrop is not working properly as files are not
being received. What should the user check while troubleshooting? (Select all that
apply.) - Answers :Bluetooth
Wi-Fi

Which proprietary file system does a Mac workstation use? - Answers :APFS

A company establishes a mobile device deployment model. The policy states that a
corporate-owned phone may be used for personal reasons. Which deployment is in
use? - Answers :COPE

A computer security team investigates a high-level computer breach at a large
company. While investigating one of the computers in question, a USB drive is found
inserted into the back of the shared user desktop tower. What concerns the team from
this action? (Select all that apply.) - Answers :Chain of custody
Data integrity

A user installs an application on a Linux system by using which method in the operating
system? - Answers :Package manager

An administrator reviews an audit log and notices strange logins when the business is
closed. Which policy does the administrator use to deter this activity? - Answers
:Restrict login times

A Windows user is not able to resolve server names on a local network. After updating
the system's hosts file, which command does the user issue? - Answers :ipconfig
/flushdns

,A user wishes to enable multiple desktops within macOS for different work
environments. What feature makes this possible? - Answers :Mission Control

A user contacts an IT helpdesk. The complaint is that the computer is very sluggish.
Support personnel notices high graphics processing unit (GPU) use. What does the
helpdesk determine to be the issue? - Answers :Cryptominer

A company tightens system security in several ways. One approach implements on-
access scanning of files for malware. Shortly after implementation, users complain to
the help desk. What is the complaint? - Answers :Systems are slow.

A technician would like to set every Windows computer at an organization to have a
company logo as a desktop wallpaper. What does the technician determine as the best
method for deploying the setting? - Answers :Domain group policy

A user boots and installs a legacy Windows operating system on a computer. The user
notices that after installation, the system requires many drivers and updates to bring it to
a healthy and up-to-date state. The user finds that it is not possible to add updates to
which installation media type? - Answers :Non-Writeable Optical Disk

Which type of malware replicates between processes rather than infecting a file? -
Answers :Worm

A user with tech knowledge is browsing the network to identify any available shares on
all servers. While browsing, the user found a share known to contain payroll information.
However, the user is unable to access the information within the share. Assuming that
the user is not authorized to access the payroll information, what is the most likely
reason why the user cannot view the information within the share? - Answers :The user
does not have permissions to access the share.

A user installs an app on a smart device. The device's official app store does not list the
app as it is a proprietary app for an organization. What type of installation does the user
complete? - Answers :Sideload

A systems administrator looks to have a daily backup of a server located across a wide
area network (WAN) link. As the link is not fast, the administrator creates a backup
scheme that uses little to no bandwidth and acquires an entire backup of the system.
Which scheme does the administrator implement? - Answers :Synthetic

Due to a recent breach, a cyber architect is tasked with drafting a company-wide
memorandum on social engineering attacks and how they can be mitigated. Which
statement does NOT support the organization in defeating social engineering attacks? -
Answers :Train employees to release information based on personally-preferred
procedures.

, A company looks to dispose of old computers and related equipment. Which items
require special care? (Select all that apply.) - Answers :Batteries
Toner
Motherboard

A user needs to restore a problematic Windows system to its original factory state. What
approach does the user utilize to achieve the restoration? - Answers :Recovery partition

While implementing security on a small network, an administrator ensures that any data
modification is legitimate. What security property pertains to this principle? - Answers
:Integrity

A user interacts with a Linux distribution that has no desktop graphical user interface
(GUI). As the user types, which stream handles the interaction? - Answers :stdin

A novice user wants to use a feature where they do not have to manually clear their
cache after conducting browsing activity. Which feature fulfills this need? - Answers
:Incognito mode

A company implements several types of security mechanisms around a high-risk data
center. One of the mechanisms allows for a panic button to be pressed. Which security
type does this button represent? - Answers :Duress

A Windows user needs to transfer and retain an entire directory structure from one disk
to another. There is also a need to retain New Technology File System (NTFS)
attributes. Which command does the user determine will fulfill the need? - Answers
:robocopy

A security engineer suggests the use of proximity technology to track the movement of
portable equipment. What solution does the engineer recommend? - Answers :Radio
frequency

A data analyst is creating new disaster recovery and prevention method guidelines after
exposure to a recent data breach. What factors should be considered when developing
a disaster recovery plan? (Select all that apply.) - Answers :Identify scenarios for natural
and man-made disasters.
Identify tasks, resources, and responsibilities for responding to a disaster.

A user claims that they cannot browse the local shared network by name. After
evaluating the computer's IP settings and pinging the local share by IP address with no
problem, what does a support technician determine as the cause? - Answers :Missing
DNS address

A systems administrator configures a hardware firewall to allow remote desktop
connections to various Windows computers. This involves port forwarding. Which port

Escuela, estudio y materia

Institución
COMPTIA A+ CORE 2
Grado
COMPTIA A+ CORE 2

Información del documento

Subido en
9 de marzo de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$12.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2061
Miembro desde
4 año
Número de seguidores
1446
Documentos
51676
Última venta
11 horas hace

3.8

355 reseñas

5
177
4
61
3
47
2
17
1
53

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes