220-1102V21.5 - Core 2
220-1102V21.5 - Core 2
Exam 220-1102
CompTIA A+ Certification Exam: Core 2
Version: 21.5
1. - (Topic 1)
The network was breached over the weekend System logs indicate that a single user's account was
successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST
A. Encryption at rest
B. Account lockout
D. Antivirus
Answer: B
Explanation: Account lockout would best mitigate the threat of a dictionary attack1
2. - (Topic 1)
A. WPA3
B. WPA-AES
C. WEP
D. WPA-TKIP
Answer: A
Explanation:
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)
3. - (Topic 1)
An Android user reports that when attempting to open the company's proprietary mobile application it
immediately doses. The user states that the issue persists, even after rebooting the phone. The application
contains critical information that cannot be lost. Which of the following steps should a systems administrator
attempt FIRST?
1
Certify For Sure with IT Exam Dumps
D. Clear the application cache.
Answer: A
Explanation:
If clearing the application cache does not work, the systems administrator should uninstall and reinstall the
application12
Installing an alternative application with similar functionality is not necessary at this point12
4. - (Topic 1)
An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest
version that forces storage of backups of all CAD files on the software's cloud server. Which of the following
A. All updated software must be tested with alt system types and accessories
C. Network utilization will be significantly increased due to the size of CAD files
D. Large update and installation files will overload the local hard drives.
Answer: C
Explanation: The IT manager is most likely to be concerned about network utilization being significantly
increased due to the size of CAD files. Backing up all CAD files to the software’s cloud server can result in a
large amount of data being transferred over the network, which can cause network congestion and slow
5. - (Topic 1)
A user reports that antivirus software indicates a computer is infected with viruses. The user thinks this
happened white browsing the internet. The technician does not recognize the interface with which the
antivirus message is presented. Which of the following is the NEXT step the technician should take?
A. Shut down the infected computer and swap it with another computer
C. Proceed with initiating a full scan and removal of the viruses using the presented
2
Certify For Sure with IT Exam Dumps
interface
D. Call the phone number displayed in the interface of the antivirus removal tool
Answer: C
Explanation: The technician should not proceed with initiating a full scan and removal of the viruses using
the presented interface or call the phone number displayed in the interface of the antivirus removal tool12
Shutting down the infected computer and swapping it with another computer is not necessary at this
point12
The technician should not immediately assume that the message is legitimate or perform any actions
without knowing what the interface is and what triggered it to pop up. It is important to investigate the issue
further, including checking the legitimacy of the antivirus program and the message it is displaying.
6. - (Topic 1)
A desktop specialist needs to prepare a laptop running Windows 10 for a newly hired employee. Which of
the following methods should the technician use to refresh the laptop?
A. Internet-based upgrade
B. Repair installation
C. Clean install
D. USB repair
E. In place upgrade
Answer: C
Explanation: The desktop specialist should use a clean install to refresh the laptop. A clean install will
remove all data and applications from the laptop and install a fresh copy of Windows 10, ensuring that the
7. - (Topic 1)
A change advisory board did not approve a requested change due to the lack of alternative actions if
implementation failed. Which of the following should be updated before requesting approval again?
A. Scope of change
B. Risk level
C. Rollback plan
3
Certify For Sure with IT Exam Dumps
D. End user acceptance
Answer: C
Explanation: The rollback plan should be updated before requesting approval again. A rollback plan is a
plan for undoing a change if it causes problems, and it is an important part of any change management
process. If the change advisory board did not approve the requested change due to the lack of alternative
actions if implementation failed, then updating the rollback plan would be the best way to address this
concern.
8. - (Topic 1)
Which of the following is the MOST important environmental concern inside a data center?
A. Battery disposal
C. Toner disposal
D. Humidity levels
Answer: D
Explanation: One of the most important environmental concerns inside a data center is the level of humidity.
High levels of humidity can cause condensation, which can result in corrosion of components and other
equipment. Low levels of humidity can cause static electricity to build up, potentially leading to electrostatic
discharge (ESD) and damage to components. Therefore, it is crucial to maintain a relative humidity range of
40-60% in a data center to protect the equipment and ensure proper operation.
9. - (Topic 1)
A change advisory board just approved a change request. Which of the following is the MOST likely next
C. Communicate to stakeholders
D. Sandbox testing
Answer: C
Explanation: The risk analysis should be performed before it's taken to the board. The step after the board
4
Certify For Sure with IT Exam Dumps
approves the change is End User Agreenment Reference:
https://www.youtube.com/watch?v=Ru77iZxuElA&list=PLG49S3nxzAnna96gzhJrzkii4hH_mgW4b&index=
59
10. - (Topic 1)
An incident handler needs to preserve evidence for possible litigation. Which of the following will the
Answer: B
Explanation: The incident handler should clone any impacted hard drives to preserve evidence for possible
litigation1
11. - (Topic 1)
After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:
The CFO then reported the incident to a technician. The link is purportedly to the organization's bank.
5
Certify For Sure with IT Exam Dumps
C. Contact the ISP to report the CFCs concern
Answer: A
Explanation: The technician should update the browser’s CRLs first. The error message indicates that the
certificate revocation list (CRL) is not up to date. Updating the CRLs will ensure that the browser can verify
12. - (Topic 1)
Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90cBcc97fa7c211b767aB
A. XSS verification
B. AES-256 verification
C. Hash verification
Answer: C
Explanation: Hash verification is a process that verifies the integrity of a file by comparing the hash value of
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your
Click on individual tickers to see the ticket details. View attachments to determine the problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution
from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or
confirm your fix of the issue from the Verify Resolve drop-down menu.
6
Certify For Sure with IT Exam Dumps
7
Certify For Sure with IT Exam Dumps
Answer:
8
Certify For Sure with IT Exam Dumps
Explanation:
9
Certify For Sure with IT Exam Dumps
14. - (Topic 1)
A technician is installing new network equipment in a SOHO and wants to ensure the equipment is secured
against external threats on the Internet. Which of the following actions should the technician do FIRST?
Answer: C
Explanation: The technician should change the default administrative password FIRST to ensure the
network equipment is secured against external threats on the Internet. Changing the default
administrative password is a basic security measure that can help prevent unauthorized access to the
network equipment. Locking all devices in a closet is a physical security measure that can help prevent theft
or damage to the devices, but it does not address external threats on the Internet. Ensuring all devices are
from the same manufacturer is not a security measure and does not address external threats on the
Internet. Installing the latest operating system and patches is important for maintaining the security of the
10
Certify For Sure with IT Exam Dumps
network equipment, but it is not the first action the technician should take1
15. - (Topic 1)
A user wants to set up speech recognition on a PC. In which of the following Windows Settings tools can
A. Language
B. System
C. Personalization
D. Ease of Access
Answer: D
Explanation: The user can enable speech recognition on a PC in the Ease of Access settings tool. To set up
Speech Recognition on a Windows PC, the user should open Control Panel, click on Ease of Access, click
on Speech Recognition, and click the Start Speech Recognition link. Language settings can be used to
change the language of the speech recognition feature, but they will not enable the feature. System settings
can be used to configure the hardware and software of the PC, but they will not enable the speech
recognition feature. Personalization settings can be used to customize the appearance and behavior of the
PC, but they will not enable the speech recognition feature1
Open up ease of access, click on speech, then there is an on and off button for speech recognition.
16. - (Topic 1)
A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped
with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in
the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the
user?
A. Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change
Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint
B. Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select
Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until
11
Certify For Sure with IT Exam Dumps
C. Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows
Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader
D. Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in
the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader
Answer: B
Explanation: Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in
options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader
repeatedly until Windows indicates setup is complete. Windows Hello Fingerprint can be set up by
navigating to the Windows 10 Settings menu, selecting the Accounts submenu, selecting Sign in options,
and then selecting Windows Hello Fingerprint. The user will then be asked to place a fingerprint on the
fingerprint reader repeatedly until Windows indicates that setup is complete. Windows Hello Fingerprint
allows the user to log into the laptop using just their fingerprint, providing an additional layer of security.
17. - (Topic 1)
A user receives a notification indicating the antivirus protection on a company laptop is out of date. A
technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the
latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus
engine and definitions are current. Which of the following has MOST likely occurred?
A. Ransomware
B. Failed OS updates
C. Adware
Answer: B
Explanation: The most likely reason for the antivirus protection on a company laptop being out of date is
failed OS updates1. Antivirus software relies on the operating system to function properly. If the operating
system is not up-to-date, the antivirus software may not function properly and may not be able to receive
the latest virus definitions and updates2. Therefore, it is important to keep the operating system up-to-date
12
Certify For Sure with IT Exam Dumps
18. - (Topic 1)
A user is having phone issues after installing a new application that claims to optimize performance. The
user downloaded the application directly from the vendor's website and is now experiencing high network
utilization and is receiving repeated security warnings. Which of the following should the technician perform
Answer: B
Explanation: Installing applications directly from a vendor's website can be risky, as the application may be
malicious or fraudulent. Uninstalling the application can help mitigate the issue by removing the source of
the problem.
19. - (Topic 1)
A technician needs to transfer a large number of files over an unreliable connection. The technician should
be able to resume the process if the connection is interrupted. Which of the following tools can be used?
A. afc
B. ehkdsk
C. git clone
D. zobocopy
Answer: A
Explanation: The technician should use afc to transfer a large number of files over an unreliable connection
20. - (Topic 1)
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows
computer. Which of the following filesystems will the technician MOST likely use?
A. FAT32
13
Certify For Sure with IT Exam Dumps
B. ext4
C. NTFS
D. exFAT
Answer: C
Explanation: Since Windows systems support FAT32 and NTFS "out of the box" and Linux supports a
whole range of them including FAT32 and NTFS, it is highly recommended to format the partition or disk
you want to share in either FAT32 or NTFS, but since FAT32 has a file size limit of 4.2 GB, if you happen to
21. - (Topic 1)
Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a
piece of evidence?
A. Acceptable use
B. Chain of custody
C. Security policy
D. Information management
Answer: B
Explanation: The aspect of forensic evidence life cycle that must be maintained when dealing with a piece
of evidence is chain of custody. This is because chain of custody is the documentation of the movement of
evidence from the time it is collected to the time it is presented in court, and it is important to maintain the
22. - (Topic 1)
An executive has contacted you through the help-desk chat support about an issue with a mobile device.
14
Certify For Sure with IT Exam Dumps
D. Send an email to Telecom to inform them of the Issue and prevent reoccurrence.
Answer: A
23. - (Topic 1)
A company wants to remove information from past users' hard drives in order to reuse the hard drives Witch
A. Reinstalling Windows
15
Certify For Sure with IT Exam Dumps
C. Using disk-wiping software
Answer: C
Explanation: Using disk-wiping software is the most secure method for removing information from past
users’ hard drives in order to reuse the hard drives. Disk-wiping software can help to ensure that all data on
24. - (Topic 1)
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the
following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A. Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the
B. Open Settings, select Personalization, click Browse, and then locate and open the image the user wants
C. Open Settings, select System, select Display, click Browse, and then locate and open the image the user
D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image
Answer: B
Explanation: To change the desktop wallpaper on a Windows 10 computer using a Windows 10 Settings
click Browse, and then locate and open the image the user wants to use as the wallpape1r
https://www.lifewire.com/change-desktop-background-windows-11-5190733
25. - (Topic 1)
Which of the following provide the BEST way to secure physical access to a data cento server room?
(Select TWO).
A. Biometric lock
B. Badge reader
C. USB token
16
Certify For Sure with IT Exam Dumps
D. Video surveillance
E. Locking rack
Answer: A,B
Explanation: A biometric lock requires an authorized user to provide a unique biometric identifier, such as a
fingerprint, in order to gain access to the server room. A badge reader requires an authorized user to swipe
an access card in order to gain access. Both of these methods ensure that only authorized personnel are
able to access the server room. Additionally, video surveillance and access control vestibules can be used
to further secure the server room. Finally, a locking rack can be used to physically secure the servers, so
26. - (Topic 1)
A user calls the help desk to report potential malware on a computer. The anomalous activity began after
the user clicked a link to a free gift card in a recent email The technician asks the user to describe any
unusual activity, such as slow performance, excessive pop- ups, and browser redirections. Which of the
A. Advise the user to run a complete system scan using the OS anti-malware application
B. Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still
present
C. Have the user check for recently installed applications and outline those installed since the link in the
D. Instruct the user to disconnect the Ethernet connection to the corporate network.
Answer: D
Explanation: First thing you want to do is quarantine/disconnect the affected system from the network so
27. - (Topic 1)
A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same
network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure
17
Certify For Sure with IT Exam Dumps
following is the MOST likely cause of the issue?
A. Time drift
C. Application crash
D. Filesystem errors
Answer: A
Explanation: The most likely cause of the issue is a “time drift”. Time drift occurs when the clock on a
computer is not synchronized with the clock on the domain controller. This can cause authentication
problems when a user tries to log in to the domain. The fact that the technician is unable to browse to the
secure intranet site to get troubleshooting tools suggests that there may be a problem with the network
28. - (Topic 1)
A user reports a computer is running slow. Which of the following tools will help a technician identify the
issue?
A. Disk Cleanup
C. Disk Management
D. Resource Monitor
Answer: D
Explanation: Resource Monitor is a Windows utility that can be used to monitor and analyze the system
resources and processes running on a computer. It can be used to identify and troubleshoot any issues that
might be causing the computer to run slowly, such as CPU usage, memory usage, disk I/O, and network
usage.
29. - (Topic 1)
A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive
Encryption menu item in Control Panel. Which of the following explains why the technician unable to find
18
Certify For Sure with IT Exam Dumps
B. BitLocker was renamed for Windows 10.
Answer: C
Explanation: BitLocker is only available on Windows 10 Pro, Enterprise, and Education editions1. Therefore,
the technician is unable to find the BitLocker Drive Encryption menu item in Control Panel because it is not
30. - (Topic 1)
A user reports that a PC seems to be running more slowly than usual. A technician checks system
resources, but disk, CPU, and memory usage seem to be fine. The technician sees that GPU temperature
is extremely high. Which of the following types of malware is MOST likely to blame?
A. Spyware
B. Cryptominer
C. Ransormvare
Answer: B
Explanation: The type of malware that is most likely to blame for a PC running more slowly than usual and
having an extremely high GPU temperature is a “cryptominer”. Cryptominers are a type of malware that use
the resources of a computer to mine cryptocurrency. This can cause the computer to run more slowly than
usual and can cause the GPU temperature to rise. Spyware is a type of malware that is used to spy on a
user’s activities, but it does not typically cause high GPU temperatures. Ransomware is a type of malware
that encrypts a user’s files and demands payment to unlock them, but it does not typically cause high GPU
temperatures. Boot sector viruses are a type of malware that infects the boot sector of a hard drive, but they
31. - (Topic 1)
A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least
privilege environment. The user will need to access advanced features and configuration settings for
19
Certify For Sure with IT Exam Dumps
account access level the user will need?
B. Standard account
C. Guest account
D. Administrator account
Answer: B
Explanation: The account access level the user will need to access advanced features and configuration
settings for several applications while adhering to corporate policy requiring a least privilege environment is
a standard account. This is because a standard account allows the user to access advanced features and
configuration settings for several applications while adhering to corporate policy requiring a least privilege
environment1.
32. - (Topic 1)
A user attempts to open some files, but a message appears stating that the files are encrypted. The user
was able to access these files before without receiving this message and no changes have been made
within the company. Which of the following has infected the computer?
A. Cryptominer
B. Phishing
C. Ransomware
D. Keylogger
Answer: C
Explanation: Ransomware is malicious software that encrypts files on a computer, making them
inaccessible until a ransom is paid. In this case, the user was able to access the files before without issue,
and no changes have been made within the company, so it is likely that the computer was infected with
ransomware.
33. - (Topic 1)
A user's mobile phone has become sluggish A systems administrator discovered several malicious
applications on the device and reset the phone. The administrator installed MDM software. Which of the
following should the administrator do to help secure the device against this threat in the future? (Select
20
Certify For Sure with IT Exam Dumps
TWO).
Answer: C,E
Explanation: To help secure the device against this threat in the future, the administrator should require a
PIN on the unlock screen and block a third-party application installation. Requiring a PIN on the unlock
screen can help to prevent unauthorized access to the device, while blocking third-party application
installation can help to prevent malicious applications from being installed on the device.
34. - (Topic 1)
A technician needs to document who had possession of evidence at every step of the process. Which of the
A. Rights management
B. Audit trail
C. Chain of custody
D. Data integrity
Answer: C
Explanation: The process of documenting who had possession of evidence at every step of the process is
35. - (Topic 1)
A technician has been tasked with installing a workstation that will be used tor point-of-sale transactions.
The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption
A. Data-in-transit encryption
B. File encryption
21
Certify For Sure with IT Exam Dumps
C. USB drive encryption
D. Disk encryption
Answer: D
Explanation: Disk encryption should be used to secure the workstation in case of theft. Disk encryption can
help to protect data on the hard drive by encrypting it so that it cannot be accessed without the correct
encryption key.
36. - (Topic 1)
• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.
Which of the following can the technician do to MOST likely resolve these issues with minimal impact?
(Select TWO).
A. Turn on autorotation
Answer: A,C
Explanation: The technician can close unnecessary applications and turn on autorotation to resolve these
issues with minimal impact. Autorotation can help the device to switch between portrait and landscape
modes automatically. Closing unnecessary applications can help to free up the device’s memory and
Reference:
CompTIA A+ Certification Exam: Core 2 (220-1102) Exam Objectives Version 4.0. Retrieved from
https://partners.comptia.org/docs/default-source/resources/comptia-a-220- 1102-exam-objectives-(3-0)
37. - (Topic 1)
22
Certify For Sure with IT Exam Dumps
A user purchased a netbook that has a web-based, proprietary operating system. Which of the following
A. macOS
B. Linux
C. Chrome OS
D. Windows
Answer: C
A netbook with a web-based, proprietary operating system is most likely running Chrome OS. Chrome OS
is a web-based operating system developed by Google that is designed to work with web applications and
cloud storage. It is optimized for netbooks and other low- power devices and is designed to be fast, secure,
38. - (Topic 1)
A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would
like the most secure wireless network possible. Which of the following should the technician configure?
C. WPA3withAES-256
Answer: B
Explanation: This is because WPA2 with AES is the most secure wireless network configuration that is
39. - (Topic 1)
A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an
organization The certificate will be used in conjunction with the user's existing username and password
Which of the following BEST describes the security benefits realized after this deployment?
23
Certify For Sure with IT Exam Dumps
B. All Wi-Fi traffic will be encrypted in transit
Answer: A
Explanation: Multifactor authentication will be forced for Wi-Fi after deploying a client certificate to be used
References:
https://www.comptia.org/training/resources/comptia-security-practice-tests
40. - (Topic 1)
A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP
addresses are working. Which of the following does the technician MOST likely need to change on the
A. Default gateway
B. Host address
C. Name server
D. Subnet mask
Answer: A
Explanation: The technician most likely needs to change the default gateway on the workstation to resolve
the issue. The default gateway is the IP address of the router that connects the workstation to the internet,
and it is responsible for routing traffic between the workstation and the internet. If the default gateway is
incorrect, the workstation will not be able to access external web pages.
41. - (Topic 1)
A. yum
B. grep
C. Is
D. sudo
24
Certify For Sure with IT Exam Dumps
Answer: D
Explanation: The Linux command used to install an application is sudo. The sudo command allows users to
run programs with the security privileges of another user, such as the root user. This is necessary to install
42. - (Topic 1)
A technician is troubleshooting an issue involving programs on a Windows 10 machine that are loading on
startup but causing excessive boot times. Which of the following should the technician do to selectively
A. Right-click the Windows button, then select Run entering shell startup and clicking OK, and then move
HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>CurrentVersion>Run
C. Manually disable all startup tasks currently listed as enabled and reboot checking for issue resolution at
startup
D. Open the Startup tab and methodically disable items currently listed as enabled and reboot, checking for
Answer: D
Explanation: This is the most effective way to selectively prevent programs from loading on a Windows 10
machine. The Startup tab can be accessed by opening Task Manager and then selecting the Startup tab.
From there, the technician can methodically disable items that are currently listed as enabled, reboot the
machine, and check for issue resolution at each startup. If the issue persists, the technician can then move
43. - (Topic 1)
A technician has been tasked with using the fastest and most secure method of logging in to laptops. Which
A. PIN
C. SSO
25
Certify For Sure with IT Exam Dumps
D. Fingerprint
Answer: A
Explanation: This is because a PIN is a fast and secure method of logging in to laptops, and it is more
44. - (Topic 1)
As part of a CYOD policy a systems administrator needs to configure each user's Windows device to
require a password when resuming from a period of sleep or inactivity. Which of the following paths will lead
Answer: A
Explanation: The systems administrator should use Settings to access Screensaver settings to configure
each user’s Windows device to require a password when resuming from a period of sleep or inactivity1
45. - (Topic 1)
A. TKIP
B. AES
C. RADIUS
D. TACACS+
Answer: D
46. - (Topic 1)
26
Certify For Sure with IT Exam Dumps
The company plans to upgrade from a 32-bit Windows OS to a 64-bit OS. Which of the following will the
A. CPU
B. Hard drive
C. RAM
D. Touch screen
Answer: C
Explanation: https://www.makeuseof.com/tag/difference-32-bit-64-bit-windows/
After upgrading from a 32-bit Windows OS to a 64-bit OS, the company will be able to fully take advantage
of the RAM of the computer. This is because a 64-bit operating system is able to use larger amounts of
RAM compared to a 32-bit operating system, which may benefit the system’s overall performance if it has
47. - (Topic 1)
A company installed a new backup and recovery system. Which of the following types of backups should be
completed FIRST?
A. Full
B. Non-parity
C. Differential
D. Incremental
Answer: A
Explanation: The type of backup that should be completed FIRST after installing a new backup and
recovery system is a full backup. This is because a full backup is a complete backup of all data and is the
foundation for all other backups. After a full backup is completed, other types of backups, such as
48. - (Topic 1)
27
Certify For Sure with IT Exam Dumps
Which of the following could be used to implement secure physical access to a data center?
A. Geofence
B. Alarm system
C. Badge reader
D. Motion sensor
Answer: C
Explanation: Badge readers are used to implement secure physical access to a data center. They are used
to read the identification information on an employee’s badge and grant access to the data center if the
employee is authorized2.
This system requires individuals to have an access badge that contains their identification information or a
unique code that can be scanned by a reader. After the badge is scanned, the system compares the
information on the badge with the authorized personnel database to authenticate if the individual has the
required clearance to enter that area. The other options listed, such as a geofence, alarm system, or motion
sensor are security measures that may be used in conjunction with badge readers, but do not provide
49. - (Topic 1)
A technician has spent hours trying to resolve a computer issue for the company's Chief Executive Officer
(CEO). The CEO needs the device returned as soon as possible. Which of the following steps should the
Answer: D
Explanation: The technician should escalate the ticket to ensure that the CEO’s device is returned as soon
as possible1
50. - (Topic 1)
A call center technician receives a call from a user asking how to update Windows Which of the following
28
Certify For Sure with IT Exam Dumps
describes what the technician should do?
A. Have the user consider using an iPad if the user is unable to complete updates
C. Ask the user to click in the Search field, type Check for Updates, and then press the Enter key
Answer: C
Explanation: The technician should guide the user to update Windows through the built-in "Check for
Updates" feature. This can be done by having the user click in the Search field, type "Check for Updates",
and then press the Enter key. This will bring up the Windows Update function, which will search for any
available updates and give the user the option to install them.
51. - (Topic 1)
A user reports a computer is running slow. Which of the following tools will help a technician identity the
issued
A. Disk Cleanup
C. Disk Management
D. Resource Monitor
Answer: D
Explanation: Resource Monitor will help a technician identify the issue when a user reports a computer is
running slow1
52. - (Topic 1)
The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be
expected?
A. The contents of the text comptia.txt will be replaced with a new blank document
D. The contents of the text comptia. txt would be copied to another comptia. txt file
Answer: B
29
Certify For Sure with IT Exam Dumps
Explanation: The command cac cor.ptia. txt was issued on a Linux terminal. This command would display
53. - (Topic 1)
A user corrects a laptop that is running Windows 10 to a docking station with external monitors when
working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to
sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to
A. Within the Power Options of the Control Panel utility click the Change Plan Settings button for the
enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never
B. Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the
enabled power plan and select Put the Computer to Sleep under the On Battery category to Never
C. Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the
Display and select Turn Off the Display under the Plugged In category to Never
D. Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid
Does and select When I Close the Lid under the Plugged in category to Do Nothing
Answer: D
Explanation: The laptop has an additional option under power and sleep settings that desktops do not have.
Switching to do nothing prevents the screen from turning off when closed.
54. - (Topic 1)
During a recent flight an executive unexpectedly received several dog and cat pictures while trying to watch
a movie via in-flight Wi-Fi on an iPhone. The executive has no records of any contacts sending pictures like
these and has not seen these pictures before. To BEST resolve this issue, the executive should:
A. set AirDrop so that transfers are only accepted from known contacts
Answer: A
Explanation: To best resolve this issue, the executive should set AirDrop so that transfers are only
30
Certify For Sure with IT Exam Dumps
accepted from known contacts (option A). AirDrop is a feature on iOS devices that allows users to share
files, photos, and other data between Apple devices. By setting AirDrop so that it only accepts transfers
from known contacts, the executive can ensure that unwanted files and photos are not sent to their device.
Additionally, the executive should ensure that the AirDrop setting is only enabled when it is necessary, as
this will protect their device from any unwanted files and photos.
55. - (Topic 1)
A user reports that a workstation is operating sluggishly Several other users operate on the same
workstation and have reported that the workstation is operating normally. The systems administrator has
validated that the workstation functions normally. Which of the following steps should the systems
Answer: C
Explanation: Since the systems administrator has validated that the workstation functions normally and
other users operate on the same workstation without any issues, the next step should be to rebuild the
user’s profile. This will ensure that any corrupted files or settings are removed and the user’s profile is
56. - (Topic 1)
A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone
could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of
A. Remote wipe
B. Anti-maIware
C. Device encryption
31
Certify For Sure with IT Exam Dumps
Answer: A
Explanation: The feature that BEST addresses the user’s concern is remote wipe. This is because remote
wipe allows the user to erase all data on the mobile device if it is lost or stolen, which will prevent
57. - (Topic 1)
Once weekly a user needs Linux to run a specific open-source application that is not available for the
currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the
following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and
Windows applications?
A. Install and run Linux and the required application in a PaaS cloud environment
B. Install and run Linux and the required application as a virtual machine installed under the Windows OS
C. Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap
D. Set up a dual boot system by selecting the option to install Linux alongside Windows
Answer: B
Explanation: The user should install and run Linux and the required application as a virtual machine
installed under the Windows OS. This solution would allow for parallel execution of the Linux application
The MOST efficient solution that allows for parallel execution of the Linux application and Windows
applications is to install and run Linux and the required application as a virtual machine installed under the
Windows OS. This is because it allows you to run both Linux and Windows together without the need to
58. - (Topic 1)
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a
patch is not available yet. Which of the following attacks MOST likely occurred?
A. Brute force
B. Zero day
C. Denial of service
32
Certify For Sure with IT Exam Dumps
D. On-path
Answer: B
Explanation: A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer
application, meaning that the attack occurs on “day zero” of awareness of the vulnerability
https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-0/security/configuration/guide/sc40crsb
ook_chapter1.html
59. - (Topic 1)
A user reports that text on the screen is too small. The user would like to make the text larger and easier to
see. Which of the following is the BEST way for the user to increase the size of text, applications, and other
A. Open Settings select Devices, select Display, and change the display resolution to a lower resolution
option
B. Open Settings, select System, select Display, and change the display resolution to a lower resolution
option.
C. Open Settings Select System, select Display, and change the Scale and layout setting to a higher
percentage.
D. Open Settings select Personalization, select Display and change the Scale and layout setting to a higher
percentage
Answer: C
Explanation: Open Settings, select System, select Display, and change the Scale and layout setting to a
higher percentage123
Reference: 4. How to Increase the Text Size on Your Computer. Retrieved from
https://support.microsoft.com/en-us/windows/change-the-size-of-text-in-windows-
1d5830c3-eee3-8eaa-836b-abcc37d99b9a
33
Certify For Sure with IT Exam Dumps
60. - (Topic 1)
A technician is asked to resize a partition on the internal storage drive of a computer running macOS.
Which of the followings tools should the technician use to accomplish this task?
A. Consoltf
B. Disk Utility
C. Time Machine
D. FileVault
Answer: B
Explanation: The technician should use Disk Utility to resize a partition on the internal storage drive of a
computer running macOS. Disk Utility is a built-in utility that allows users to manage disks, partitions, and
volumes on a Mac. It can be used to resize, create, and delete partitions, as well as to format disks and
volumes.
61. - (Topic 1)
A user's smartphone data usage is well above average. The user suspects an installed application is
transmitting data in the background. The user would like to be alerted when an application attempts to
communicate with the internet. Which of the following BEST addresses the user's concern?
B. Remote wipe
C. Antivirus
D. Firewall
Answer: D
Explanation: A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules. In this scenario, the user is concerned about an installed application
transmitting data in the background, so a firewall would be the best solution to address their concern. By
installing and configuring a firewall, the user can block unauthorized connections to and from the device,
62. - (Topic 1)
A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a
34
Certify For Sure with IT Exam Dumps
few files are regularly modified, however, storage space is a concern. Which of the following backup
A. Full
B. Differential
C. Off-site
D. Grandfather-father-son
Answer: B
Explanation: The differential backup method would best address these concerns. Differential backups only
back up files that have changed since the last full backup, which means that only a few files would be
backed up each time. This would help to mitigate the risk of ransomware attacks, as only a few files would
be affected if an attack occurred. Additionally, differential backups require less storage space than full
backups.
63. - (Topic 1)
A technician found that an employee is mining cryptocurrency on a work desktop. The company has
decided that this action violates its guidelines. Which of the following should be updated to reflect this new
requirement?
A. MDM
B. EULA
C. IRP
D. AUP
Answer: D
Explanation: AUP (Acceptable Use Policy) should be updated to reflect this new requirement. The AUP is a
document that outlines the acceptable use of technology within an organization. It is a set of rules that
employees must follow when using company resources. The AUP should be updated to include a policy on
64. - (Topic 1)
A user contacted the help desk to report pop-ups on a company workstation indicating the computer has
been infected with 137 viruses and payment is needed to remove them. The user thought the
35
Certify For Sure with IT Exam Dumps
company-provided antivirus software would prevent this issue. The help desk ticket states that the user only
receives these messages when first opening the web browser. Which of the following steps would MOST
Answer: C,F
Explanation:
"The user thought the company-provided antivirus software would prevent this issue." The most likely steps
to resolve the issue are to deploy an ad-blocking extension to the browser and perform a reset on the user’s
web browser. Ad-blocking extensions can help to prevent pop-ups and other unwanted content from
appearing in the browser, and resetting the browser can help to remove any malicious extensions or
65. - (Topic 1)
A technician is setting up a desktop computer in a small office. The user will need to access files on a drive
shared from another desktop on the network. Which of the following configurations should the technician
Answer: A
Explanation: The technician should configure the network as private to allow the user to access files on a
66. - (Topic 1)
36
Certify For Sure with IT Exam Dumps
A wireless network is set up, but it is experiencing some interference from other nearby SSIDs. Which of
A. Changing channels
Answer: A
Explanation: Changing channels can best resolve interference from other nearby SSIDs. Wireless networks
operate on different channels, and changing the channel can help to avoid interference from other nearby
networks.
67. - (Topic 1)
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take
the call and sets the phone to silent. Which of the following BEST describes the technician's actions?
A. Avoid distractions
Answer: A
Explanation: The technician has taken the appropriate action by not taking the call and setting the phone to
silent in order to avoid any distractions and remain focused on the task at hand. This is a good example of
how to maintain focus and productivity when working on a customer's PC, and will help to ensure that the
68. - (Topic 1)
A technician is unable to join a Windows 10 laptop to a domain Which of the following is the MOST likely
reason?
37
Certify For Sure with IT Exam Dumps
D. The Laptop does not have all current Windows updates installed
Answer: C
Explanation:
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)
69. - (Topic 1)
A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows
computer. Which of the following filesystems will the technician MOST likely use?
A. FAT32
B. ext4
C. NTFS
D. exFAT
Answer: D
Explanation: exFAT is a file system that is supported by both Linux and Windows and can handle large
files1.
70. - (Topic 1)
A technician is installing new software on a macOS computer. Which of the following file types will the
A. .deb
B. .vbs
C. .exe
D. .app
Answer: D
Explanation: The file type that the technician will MOST likely use when installing new software on a
macOS computer is .app. This is because .app is the file extension for applications on macOS1.
71. - (Topic 1)
A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the
38
Certify For Sure with IT Exam Dumps
A. Encryption
B. Wi-Fi channel
C. Default passwords
Answer: C
Explanation: the user should change the default passwords first when configuring a new SOHO Wi-Fi
router1
72. - (Topic 1)
A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for
more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager
would contain the information a technician would use to identify the cause of this issue?
A. Services
B. Processes
C. Performance
D. Startup
Answer: B
Explanation: Processes tab in Task Manager would contain the information a technician would use to
identify the cause of this issue. The Processes tab in Task Manager displays all the processes running on
the computer, including the CPU and memory usage of each process. The technician can use this tab to
identify the process that is causing the hard drive activity light to remain lit and the performance
degradation1
73. - (Topic 1)
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard
is not working on the laptop. Which of the following should the technician MOST likely have done to prevent
damage?
39
Certify For Sure with IT Exam Dumps
D. Connected a proper ESD strap
Answer: D
Explanation: The technician should have connected a proper ESD strap to prevent damage to the
motherboard. ESD (electrostatic discharge) can cause damage to electronic components, and an ESD
strap helps to prevent this by grounding the technician and preventing the buildup of static electricity.
Removing all jewelry is also a good practice, but it is not the most likely solution to this problem.
74. - (Topic 1)
A technician suspects a rootkit has been installed and needs to be removed. Which of the following would
A. Application updates
B. Anti-malware software
C. OS reinstallation
D. File restore
Answer: C
Explanation: If a rootkit has caused a deep infection, then the only way to remove the rootkit is to reinstall
the operating system. This is because rootkits are designed to be difficult to detect and remove, and they
can hide in the operating system’s kernel, making it difficult to remove them without reinstalling the
Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it
to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked
INSTRUCTIONS
Review the network diagrams and device configurations to determine the cause of the problem and resolve
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
40
Certify For Sure with IT Exam Dumps
41
Certify For Sure with IT Exam Dumps
42
Certify For Sure with IT Exam Dumps
43
Certify For Sure with IT Exam Dumps
Answer:
Explanation:
44
Certify For Sure with IT Exam Dumps
45
Certify For Sure with IT Exam Dumps
Ann needs to connect to the BYOD SSID, using 2.4GHZ. The selected security method chose should be
76. - (Topic 1)
An Android user contacts the help desk because a company smartphone failed to complete a tethered OS
update A technician determines there are no error messages on the device Which of the following should
46
Certify For Sure with IT Exam Dumps
B. Determine if the device has adequate storage available.
Answer: C
Explanation: Since there are no error messages on the device, the technician should check if the battery is
sufficiently charge1d
If the battery is low, the device may not have enough power to complete the update2
In this scenario, the technician has already determined that there are no error messages on the device. The
next best step would be to check if the battery is sufficiently charged. If the battery is low, it could be
preventing the device from completing the update process. Verifying that third-party applications are
disabled, determining if the device has adequate storage available, and confirming a strong internet
connection are all important steps in troubleshooting issues with mobile devices. However, since the
problem in this scenario is related to a failed OS update, it is important to first check the battery level before
77. - (Topic 1)
Which of the following OS types provides a lightweight option for workstations thai need an easy-to-use
browser-based interface?
A. FreeBSD
B. Chrome OS
C. macOS
D. Windows
Answer: B
Explanation: Chrome OS provides a lightweight option for workstations that need an easy- to-use
browser-based interface1
78. - (Topic 1)
An organization is centralizing support functions and requires the ability to support a remote user's desktop.
Which of the following technologies will allow a technician to see the issue along with the user?
A. RDP
47
Certify For Sure with IT Exam Dumps
B. VNC
C. SSH
D. VPN
Answer: B
Explanation: VNC will allow a technician to see the issue along with the user when an organization is
centralizing support functions and requires the ability to support a remote user’s desktop1
79. - (Topic 1)
When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the
following practices should the technician use to make sure the ticket is associated with the correct user?
A. Have the user provide a callback phone number to be added to the ticket
D. Provide the user with a unique ticket number that can be referenced on subsequent calls.
Answer: D
Explanation: The technician should provide the user with a unique ticket number that can be referenced on
subsequent calls to make sure the ticket is associated with the correct user. This is because registering the
ticket with a unique user identifier, having the user provide a callback phone number to be added to the
ticket, or assigning the ticket to the department’s power user will not ensure that the ticket is associated with
80. - (Topic 1)
A technician is replacing the processor in a desktop computer prior to opening the computer, the technician
wants to ensure the internal components are protected. Which of the following safety procedures would
48
Certify For Sure with IT Exam Dumps
F. Ensuring equipment is grounded
Answer: A,C
Explanation: The two safety procedures that would best protect the components in the PC are:
https://www.professormesser.com/free-a-plus-training/220-902/computer-safety- procedures-2/
https://www.skillsoft.com/course/comptia-a-core-2-safety-procedures-environmental-
impacts-cbdf0f2c-61c0-4f4a-a659-dc98f1f00158
81. - (Topic 1)
A user reports a PC is running slowly. The technician suspects it has a badly fragmented hard drive. Which
A. resmon exe
B. msconfig.extf
C. dfrgui exe
D. msmfo32.exe
Answer: C
Explanation: The technician should use dfrgui.exe to defragment the hard drive1
82. - (Topic 1)
A user is unable to use any internet-related functions on a smartphone when it is not connected to Wi-Fi
When the smartphone is connected to Wi-Fi the user can browse the internet and send and receive email.
The user is also able to send and receive text messages and phone calls when the smartphone is not
connected to Wi-Fi. Which of the following is the MOST likely reason the user is unable to use the internet
Answer: A
49
Certify For Sure with IT Exam Dumps
Explanation: The smartphone’s line was not provisioned with a data plan. The user is unable to use any
internet-related functions on the smartphone when it is not connected to Wi-Fi because the smartphone’s
line was not provisioned with a data plan. The user can send and receive text messages and phone calls
when the smartphone is not connected to Wi-Fi because these functions do not require an internet
connection1
83. - (Topic 1)
A help desk technician is troubleshooting a workstation in a SOHO environment that is running above
normal system baselines. The technician discovers an unknown executable with a random string name
running on the system. The technician terminates the process, and the system returns to normal operation.
The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The
technician is concerned other machines may be infected with this unknown virus. Which of the following is
the MOST effective way to check other machines on the network for this unknown threat?
Answer: C
Explanation: The most effective way to check other machines on the network for this unknown threat is to
manually check each machine. This can help to identify any other machines that may be infected with the
84. - (Topic 1)
A customer reported that a home PC with Windows 10 installed in the default configuration is having issues
loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST
step in troubleshooting?
B. Run both CPU and memory tests to ensure that all hardware functionality is normal
C. Check for any installed patches and roll them back one at a time until the issue is resolved
D. Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.
50
Certify For Sure with IT Exam Dumps
Answer: C
Explanation: The first step in troubleshooting is to check for any installed patches and roll them back one at
a time until the issue is resolved. This can help to identify any patches that may be causing the issue and
85. - (Topic 1)
A technician is configuring a SOHO device Company policy dictates that static IP addresses cannot be
used. The company wants the server to maintain the same IP address at all times. Which of the following
A. DHCP reservation
B. Port forwarding
C. DNS A record
D. NAT
Answer: A
Explanation: The technician should use DHCP reservation to maintain the same IP address for the server
at all times. DHCP reservation allows the server to obtain an IP address dynamically from the DHCP server,
while ensuring that the same IP address is assigned to the server each time it requests an IP address.
86. - (Topic 1)
Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader.
Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?
C. Default Apps
Answer: C
Explanation: Default Apps should be used to ensure all PDF files open in Adobe Reader1
87. - (Topic 1)
A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but
51
Certify For Sure with IT Exam Dumps
the company's proxy is blocking traffic to the update site. Which of the following should the technician
perform?
Answer: C
Explanation: The technician should add the update site to the client’s exceptions list to bypass the proxy.
This can be done through the client’s web browser settings, where the proxy settings can be configured. By
adding the update site to the exceptions list, the client will be able to access the site and download the
software update.
88. - (Topic 1)
A technician is working with a company to determine the best way to transfer sensitive personal information
between offices when conducting business. The company currently uses USB drives and is resistant to
change. The company's compliance officer states that all media at rest must be encrypted. Which of the
B. Configure a hardened SFTP portal for file transfers between file servers
Answer: D
Explanation: The BEST way to secure the current workflow of transferring sensitive personal information
between offices when conducting business is to enable BitLocker To Go with a password that meets
corporate requirements. This is because BitLocker To Go is a full-disk encryption feature that encrypts all
data on a USB drive, which is what the company currently uses, and requires a password to access the
data.
89. - (Topic 1)
A technician needs to interconnect two offices to the main branch while complying with good practices and
52
Certify For Sure with IT Exam Dumps
security standards. Which of the following should the technician implement?
A. MSRA
B. VNC
C. VPN
D. SSH
Answer: C
Explanation: A technician needs to interconnect two offices to the main branch while complying with good
90. - (Topic 1)
A technician needs to exclude an application folder from being cataloged by a Windows 10 search. Which
A. Privacy
B. Indexing Options
C. System
D. Device Manager
Answer: B
Explanation: To exclude an application folder from being cataloged by a Windows 10 search, the technician
91. - (Topic 1)
A user is experiencing frequent malware symptoms on a Windows workstation. The user has tried several
times to roll back the state but the malware persists. Which of the following would MOST likely resolve the
issue?
Answer: C
Explanation: Encrypting the hard drive would most likely resolve the issue1
53
Certify For Sure with IT Exam Dumps
92. - (Topic 1)
A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost
A. Anti-malware
B. Remote wipe
C. Locator applications
D. Screen lock
Answer: B
Explanation: This is because remote wipe allows the data on the smartphone to be erased remotely, which
helps to ensure that sensitive data does not fall into the wrong hands.
Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your
Click on individual tickers to see the ticket details. View attachments to determine the
problem.
Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution
from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or
confirm your fix of the issue from the Verify Resolve drop-down menu.
54
Certify For Sure with IT Exam Dumps
55
Certify For Sure with IT Exam Dumps
Answer:
56
Certify For Sure with IT Exam Dumps
Explanation:
57
Certify For Sure with IT Exam Dumps
94. - (Topic 1)
A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST
A. Degaussing
B. Low-level formatting
C. Recycling
D. Shredding
Answer: D
Explanation: Shredding is the most effective method to securely dispose of data stored on optical discs12
References: 4. How Can I Safely Destroy Sensitive Data CDs/DVDs? - How-To Geek. Retrieved from
https://ukdataservice.ac.uk/learning-hub/research-data-management/store-your- data/disposal/
58
Certify For Sure with IT Exam Dumps
95. - (Topic 1)
A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use
of full disk encryption at all limes Which of the following encryption solutions should the technician choose?
B. FileVault
C. BitLocker
D. Encrypted LVM
Answer: A
Explanation: The encryption solution that the technician should choose when configuring a new Windows
laptop and corporate policy requires that mobile devices make use of full disk encryption at all times is
BitLocker. This is because BitLocker is a full-disk encryption feature that encrypts all data on a hard drive
96. - (Topic 1)
A user calls the help desk to report that none of the files on a PC will open. The user also indicates a
program on the desktop is requesting payment in exchange for file access A technician verifies the user's
PC is infected with ransorrrware. Which of the following should the technician do FIRST?
Answer: C
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam- objectives-(3-0)
97. - (Topic 1)
A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following
should the technician verify in the command prompt to address the issue without making any changes?
59
Certify For Sure with IT Exam Dumps
B. Run clearnmgr on the drive as the administrator
Answer: C
Explanation: The technician should verify bad sectors on the user’s computer by running chkdsk on the
drive as the administrator. Chkdsk (check disk) is a command-line utility that detects and repairs disk errors,
including bad sectors. It runs a scan of the disk and displays any errors that are found
98. - (Topic 1)
Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through
Remote Desktop?
A. Home
C. Enterprise
D. Pro
Answer: B
Explanation: The most cost-effective version of Windows 10 that allows remote access through Remote
Desktop is Windows 10 Pro. Windows 10 Pro includes Remote Desktop, which allows users to connect to a
remote computer and access its desktop, files, and applications. Windows 10 Home does not include
Remote Desktop, while Windows 10 Pro for Workstations and Windows 10 Enterprise are more expensive
99. - (Topic 1)
The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a
remote-access tool that the bank uses for support was also used in this crime. The report stated that
attackers were able to brute force passwords to access systems. Which of the following would BEST limit
60
Certify For Sure with IT Exam Dumps
D. Configure a replacement remote-access tool for support cases.
Answer: A,F
Explanation: The best ways to limit the bank’s risk are to enable multifactor authentication for each support
account and enforce account lockouts after five bad password attempts. Multifactor authentication adds an
extra layer of security to the login process, making it more difficult for attackers to gain access to systems.
Account lockouts after five bad password attempts can help to prevent brute force attacks by locking out
100. - (Topic 1)
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the
A. Pretexting
B. Spoofing
C. Vishing
D. Scareware
Answer: C
Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a
legitimate entity, such as a bank or financial institution, in order to gain access to sensitive information. The
caller will typically use a variety of techniques, such as trying to scare the target or providing false
information, in order to get the target to provide the information they are after. Vishing is often used to gain
access to usernames, passwords, bank account information, and other sensitive data.
101. - (Topic 2)
A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST
A. PIN-based login
61
Certify For Sure with IT Exam Dumps
C. Hard drive encryption
Answer: C
Explanation:
Encrypting the laptop's hard drive will ensure that any sensitive data stored on the laptop is secure, even if
the laptop is lost or stolen. Encryption ensures that the data cannot be accessed by anyone without the
correct encryption key. This is an important security measure for any laptop used by an employee who
travels, as it helps to protect the data stored on the laptop from unauthorized access.
102. - (Topic 2)
Which of the following change management documents includes how to uninstall a patch?
A. Purpose of change
B. Rollback plan
C. Scope of change
D. Risk analysis
Answer: B
Explanation:
The change management document that includes how to uninstall a patch is called the “rollback plan”. The
rollback plan is a document that outlines the steps that should be taken to undo a change that has been
made to a system. In the case of a patch, the rollback plan would include instructions on how to uninstall
103. - (Topic 2)
Which of the following file extensions are commonly used to install applications on a macOS machine?
(Select THREE).
A. .mac
B. .Pkg
C. .deb
D. .dmg
E. .msi
62
Certify For Sure with IT Exam Dumps
F. .appx
G. .app
H. .apk
Answer: B,D,G
Explanation:
https://support.microsoft.com/en-us/windows/common-file-name-extensions-in-windows-da4a4430-8e76-8
9c5-59f7-1cdbbc75cb01
.pkg and .dmg are files used to distribute and install applications on macOS. .pkg files are installer
packages that may contain multiple files and executable code, while .dmg files are disk images that can
contain a single bundled application or multiple applications. .app files are typically the main executable
files for macOS applications. The other options listed are file extensions for applications or installers on
other platforms (such as .deb for Debian- based Linux systems, .msi for Windows, and .apk for Android).
This information is covered in the Comptia A+ Core2 documents/guide under the Mac OS section.
104. - (Topic 2)
A user is unable to access a website, which is widely used across the organization, and receives the
The security certificate presented by this website has expired or is not yet valid.
The technician confirms the website works when accessing it from another computer but not from the user's
computer. Which of the following should the technician perform NEXT to troubleshoot the issue?
C. Configure a static 12
Answer: D
Explanation:
The error message indicates that the security certificate presented by the website has either expired or is
not yet valid. This can happen if the computer's clock has the wrong date or time, as SSL/TLS certificates
have a specific validity period. If the clock is off by too much, it may cause the certificate to fail to validate.
Therefore, the technician should check the computer's date and time and ensure that they are correct.
63
Certify For Sure with IT Exam Dumps
105. - (Topic 2)
A user is setting up a computer for the first time and would like to create a secondary login with permissions
that are different than the primary login. The secondary login will need to be protected from certain content
such as games and websites. Which of the following Windows settings should the user utilize to create the
secondary login?
A. Privacy
B. Accounts
C. Personalization
D. Shared resources
Answer: B
Explanation:
To create a secondary login with different permissions in Windows 10, the user should utilize the Accounts
setting. Here are the steps to create a new user account with different permissions:
106. - (Topic 2)
A user in a corporate office reports the inability to connect to any network drives. No other users have
reported this issue. Which of the following is the MOST likely reason the user is having this issue?
Answer: A
64
Certify For Sure with IT Exam Dumps
107. - (Topic 2)
A junior administrator is responsible for deploying software to a large group of computers in an organization.
The administrator finds a script on a popular coding website to automate this distribution but does not
understand the scripting language. Which of the following BEST describes the risks in running this script?
A. The instructions from the software company are not being followed.
Answer: C
Explanation:
The risks in running this script are that the deployment script is performing unknown actions. Running the
script blindly could cause unintended actions, such as deploying malware or deleting important files, which
108. - (Topic 2)
A user installed a new application that automatically starts each time the user logs in to a Windows 10
system. The user does not want this to happen and has asked for this setting to be changed. Which of the
following tools would the technician MOST likely use to safely make this change?
A. Registry Editor
B. Task Manager
C. Event Viewer
Answer: B
Explanation: The technician would most likely use the Task Manager tool to safely make this change12
The Task Manager tool can be used to disable applications from starting automatically on Windows 10
The tool that a technician would most likely use to stop an application from automatically starting when a
user logs in to a Windows 10 system is the Task Manager. The Task Manager can be used to view and
manage processes, including those that are set to automatically start when a user logs in to the system.
109. - (Topic 2)
65
Certify For Sure with IT Exam Dumps
A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users
will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this
issue?
B. Antivirus
C. SSO
D. MDM
Answer: D
Explanation: MDM stands for Mobile Device Management, and it is a way of remotely managing and
securing mobile devices that are used for work purposes1. MDM can enforce policies and restrictions on
the devices, such as preventing users from installing unauthorized apps, modifying system settings, or
accessing root privileges2. MDM can also monitor device status, wipe data, lock devices, or locate lost or
stolen devices1.
110. - (Topic 2)
A desktop support technician is tasked with migrating several PCs from Windows 7 Pro to Windows 10 Pro,
The technician must ensure files and user preferences are retained, must perform the operation locally, and
should migrate one station at a time. Which of the following methods would be MOST efficient?
A. Golden image
C. In-place upgrade
D. Clean install
Answer: C
Explanation:
An in-place upgrade is the most efficient method for migrating from Windows 7 Pro to Windows 10 Pro, as it
will retain all user files and preferences, can be done locally, and can be done one station at a time. An
in-place upgrade involves installing the new version of Windows over the existing version, and can be done
111. - (Topic 2)
66
Certify For Sure with IT Exam Dumps
An administrator has submitted a change request for an upcoming server deployment. Which of the
A. Risk analysis
B. Sandbox testing
D. Lessons learned
Answer: A
Explanation: A risk analysis must be completed before a change request for an upcoming server
Risk analysis is an important step in the change management process because it helps identify and
mitigate potential risks before changes are implemented. Once the risks have been analyzed and the
appropriate measures have been taken to minimize them, the change can be approved and implemented.
112. - (Topic 2)
A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by
others. Which of the following applications should the technician use to assist the user with hiding the file?
A. Device Manager
B. Indexing Options
C. File Explorer
D. Administrative Tools
Answer: C
Explanation: The technician should use the File Explorer application to assist the user with hiding the file 1.
The user can right-click the file and select Properties. In the Properties dialog box, select the Hidden check
113. - (Topic 2)
67
Certify For Sure with IT Exam Dumps
D. Smart card and password
Answer: A
Explanation: Smart card and password is an example of two-factor authentication (2FA), not multi-factor
authentication (MFA). MFA requires two or more authentication factors. Smart card and password is an
114. - (Topic 2)
A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices
that call center agents often walk away from their workstations, leaving patient data visible for anyone to
see. Which of the following should a network administrator do to BEST prevent data theft within the call
center?
D. Log off the users when their workstations are not in use.
Answer: B
Explanation:
The BEST solution for preventing data theft within the call center in this scenario would be to lock the
workstations after a period of inactivity. This would prevent unauthorized individuals from accessing patient
data if call center agents were to step away from their workstations without logging out.
115. - (Topic 2)
A laptop user is visually impaired and requires a different cursor color. Which of the following OS utilities is
A. Keyboard
B. Touch pad
D. Display settings
Answer: C
Explanation:
68
Certify For Sure with IT Exam Dumps
The OS utility used to change the color of the cursor in Windows is Ease of Access Center 12
The user can change the cursor color by opening the Settings app, selecting Accessibility in the left sidebar,
selecting Mouse pointer and touch under Vision, and choosing one of the cursor options. The user can
select Custom to pick a color and use the Size slider to make the cursor larger or sma1lle2r
The Ease of Access Center in the Windows OS provides accessibility options for users with disabilities or
impairments. One of these options allows the user to change the color and size of the cursor, making it
more visible and easier to locate on the screen. The Keyboard and Touchpad settings do not offer the
option to change cursor color, and Display Settings are used to adjust the resolution and other properties of
the display. Therefore, C is the best answer. This information is covered in the Comptia A+ Core2
116. - (Topic 2)
Answer: B
Explanation:
A name on a medical diagnosis (B) is most likely to be regulated. This is because it falls under the category
of protected health information (PHI), which is subject to regulations such as the Health Insurance
Portability and Accountability Act (HIPAA) in the United States. These regulations aim to protect the privacy
117. - (Topic 2)
A user is attempting to browse the internet using Internet Explorer. When trying to load a familiar web page,
the user is unexpectedly redirected to an unfamiliar website. Which of the following would MOST likely
69
Certify For Sure with IT Exam Dumps
C. Reinstalling the browser
Answer: C
Explanation: Reinstalling the browser would most likely solve the issue. This would remove any malicious
software or add-ons that may be causing the issue and restore the browser to its default settings.
118. - (Topic 2)
A macOS user needs to create another virtual desktop space. Which of the following applications will allow
A. Dock
B. Spotlight
C. Mission Control
D. Launchpad
Answer: C
Explanation: application that will allow a macOS user to create another virtual desktop space is Mission
Control Mission Control lets you create additional desktops, called spaces, to organize the windows of your
apps. You can create a space by entering Mission Control and clicking the Add button in the Spaces bar1.
You can also assign apps to specific spaces and move between them easily1.
119. - (Topic 2)
A technician has verified that a user's computer has a virus, and the antivirus software is out Of date. Which
Answer: D
Explanation:
This will ensure that the antivirus software is up-to-date, and can detect any new viruses that may have
70
Certify For Sure with IT Exam Dumps
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.3 Explain the
importance of security awareness and 2.2 Given a scenario, use secure data management and disaster
recovery principles.
120. - (Topic 2)
A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is
A. Drilling
B. Degaussing
C. Low-level formatting
D. Erasing/wiping
Answer: D
Explanation:
Erasing/wiping the hard drives is the best method to dispose of the drives containing PII
121. - (Topic 2)
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore.
A. Differential backup
B. Off-site backup
C. Incremental backup
D. Full backup
Answer: D
Explanation:
To accomplish this task, the technician should use a Full backup meth1od
A full backup only requires two sets of tapes to restore because it backs up all the data from the workstation.
With a differential backup, the backups need to be taken multiple times over a period of time, so more tapes
122. - (Topic 2)
71
Certify For Sure with IT Exam Dumps
A manager reports that staff members often forget the passwords to their mobile devices and applications.
Which of the following should the systems administrator do to reduce the number of help desk tickets
submitted?
Answer: A
Explanation:
Multifactor authentication (MFA) is a security measure that requires users to provide multiple pieces of
evidence when logging in to an account or system. This can include a combination of something the user
knows (e.g. a password or PIN), something the user has (e.g. a security token or smartphone) and
something the user is (e.g. biometrics such as a fingerprint or face scan). By enabling MFA, the systems
administrator can ensure that users are required to provide multiple pieces of evidence when logging in,
making it more difficult for unauthorized users to gain access to the system. This can help reduce the
123. - (Topic 2)
A technician downloaded software from the Internet that required the technician to scroll through a text box
and at the end of the text box, click a button labeled Accept Which of the following agreements IS MOST
likely in use?
A. DRM
B. NDA
C. EULA
D. MOU
Answer: C
Explanation:
The most likely agreement in use here is a EULA (End User License Agreement). This is a legally binding
agreement between the user and the software developer, outlining the terms and conditions that the user
must agree to in order to use the software. It is important that the user understands and agrees to the EULA
72
Certify For Sure with IT Exam Dumps
before they can proceed with downloading and installing the software. As stated in the CompTIA A+ Core 2
exam objectives, users should be aware of the EULA before downloading any software.
124. - (Topic 2)
Which of the following should be used to control security settings on an Android phone in a domain
environment?
A. MDM
B. MFA
C. ACL
D. SMS
Answer: A
Explanation: The best answer to control security settings on an Android phone in a domain environment is
to use “Mobile Device Management (MDM)”. MDM is a type of software that is used to manage and secure
mobile devices such as smartphones and tablets. MDM can be used to enforce security policies, configure
settings, and remotely wipe data from devices. In a domain environment, MDM can be used to manage
Android phones and enforce security policies such as password requirements, encryption, and remote wipe
capabilities12
125. - (Topic 2)
A technician needs to manually set an IP address on a computer that is running macOS. Which of the
A. ipconfig
B. ifconfig
C. arpa
D. ping
Answer: B
Explanation:
ifconfig is a command-line utility that allows you to configure network interfaces on macOS and other
Unix-like systems1. To set an IP address using ifconfig, you need to know the name of the network
interface you want to configure (such as en0 or en1), and the IP address you want to assign (such as
73
Certify For Sure with IT Exam Dumps
192.168.0.150). You also need to use sudo to run the command with administrative privileges2. The syntax
For example, to set the IP address of en1 to 192.168.0.150, you would type: sudo ifconfig en1
192.168.0.150
You may also need to specify other parameters such as subnet mask, gateway, or DNS servers, depending
on your network configuration3. The other commands are not directly related to setting an IP address on
macOS. ipconfig is a similar command for Windows systems4, arpa is a domain name used for reverse
126. - (Topic 2)
A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The
technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains
Answer: D
Explanation: The newly installed OS is x86. The x86 version of Windows 10 can only use up to 4GB of RAM.
127. - (Topic 2)
A mobile phone user has downloaded a new payment application that allows payments to be made with a
mobile device. The user attempts to use the device at a payment terminal but is unable to do so
successfully. The user contacts a help desk technician to report the issue. Which of the following should the
B. If Bluetooth is disabled
C. If NFC is enabled
74
Certify For Sure with IT Exam Dumps
D. If WiFi is enabled
Answer: C
Explanation: NFC stands for Near Field Communication, and it is a wireless technology that allows your
phone to act as a contactless payment device, among other things2. Payment applications that allow
payments to be made with a mobile device usually rely on NFC to communicate with the payment terminal1.
Therefore, if NFC is disabled on the phone, the payment will not work. To enable NFC on an Android phone,
The other options are not directly related to using a payment application with a mobile device. Airplane
mode is a setting that disables all wireless communication on the phone, including NFC4, but it also affects
calls, texts, and internet access. Bluetooth is a wireless technology that allows you to connect your phone
with other devices such as headphones or speakers, but it is not used for contactless payments. Wi-Fi is a
wireless technology that allows you to access the internet or a local network, but it is also not used for
contactless payments. Location services are a feature that allows your phone to determine your geographic
location using GPS or other methods, but they are not required for contactless payments.
128. - (Topic 2)
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined.
Which of the following should be performed FIRST to prevent further damage to the host and other
systems?
Answer: A
Explanation: Ransomware is a type of malware that encrypts the files on a system and demands a ransom
75
Certify For Sure with IT Exam Dumps
for their decryption1. Ransomware can also spread to other systems on the network or exfiltrate sensitive
data to the attackers2. Therefore, it is important to isolate the infected machine as soon as possible to
contain the infection and prevent further damage3. Powering off the machine is a quick and effective way of
disconnecting it from the network and stopping any malicious processes running on it12. The other options
are not directly related to preventing ransomware damage or may not be effective. Running a full antivirus
scan may not be able to detect or remove the ransomware, especially if it is a new or unknown variant1.
Removing the LAN card may disconnect the machine from the network, but it may not stop any malicious
processes running on it or any data encryption or exfiltration that has already occurred2. Installing a
different endpoint solution may not be possible or helpful if the system is already infected and locked by
ransomware1.
129. - (Topic 2)
A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is
mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the
new monitor, the mouse stops at the end of the screen on the original monitor. Which
of the following will allow the mouse to correctly move to the new monitor?
Answer: B
Explanation:
The correct answer is B. Swapping the cables for the monitors. When the second monitor is connected with
the HDMI port, it is necessary to swap the cables for the monitors so that the mouse can move from the
original monitor to the new monitor. This is because the HDMI port is designed to only support one monitor,
and the mouse will not be able to move from one to the other without the cables being swapped.
According to CompTIA A+ Core 2 documents, "When connecting multiple displays to a system, the cables
used to connect the displays must be swapped between the displays. For example, if a monitor is
connected to a system using a VGA cable, the VGA cable must be moved to the next display to allow the
76
Certify For Sure with IT Exam Dumps
130. - (Topic 2)
A technician is reimaging a desktop PC. The technician connects the PC to the network and powers it on.
The technician attempts to boot the computer via the NIC to image the computer, but this method does not
work. Which of the following is the MOST likely reason the computer is unable to boot into the imaging
D. The Ethernet cable the technician is using to connect the desktop to the network is faulty.
Answer: C
Explanation:
The most likely reason the computer is unable to boot into the imaging system via the network is that the
PXE boot option has not been enabled. PXE (Preboot Execution Environment) is an environment that
allows computers to boot up over the network, instead of from a local disk. In order for this to work, the PXE
boot option must be enabled in the computer's BIOS settings. As stated in the CompTIA A+ Core 2 exam
objectives, technicians should know how to enable PXE in BIOS to enable network booting on a computer.
131. - (Topic 2)
A technician is troubleshooting a lack of outgoing audio on a third-party Windows 10 VoIP application, The
PC uses a USB microphone connected to a powered hub. The technician verifies the microphone works on
the PC using Voice Recorder. Which of the following should the technician do to solve the issue?
A. Remove the microphone from the USB hub and plug it directly into a USB port on the PC.
B. Enable the microphone under Windows Privacy settings to allow desktop applications to access it.
C. Delete the microphone from Device Manager and scan for new hardware,
D. Replace the USB microphone with one that uses a traditional 3.5mm plug.
Answer: B
Explanation:
In Windows 10, there are privacy settings that control access to certain devices, such as microphones,
cameras, and other input devices. If the microphone is not enabled under these privacy settings, the VoIP
77
Certify For Sure with IT Exam Dumps
application may not have access to it, causing a lack of outgoing audio.
The technician can go to the Windows 10 Settings menu, select the Privacy submenu, and under App
permissions, select Microphone. The technician should then turn on the toggle switch for the VoIP
Removing the microphone from the USB hub and plugging it directly into a USB port on the PC may or may
not solve the issue, as the issue could be related to the privacy settings. Deleting the microphone from
Device Manager and scanning for new hardware may also not solve the issue, as the issue could be related
to the privacy settings. Replacing the USB microphone with one that uses a traditional 3.5mm plug is not
recommended, as it would require purchasing a new microphone and may not solve the issue.
132. - (Topic 2)
A help desk technician runs the following script: Inventory.py. The technician receives the following error
message:
Which of the following is the MOST likely reason this script is unable to run?
Answer: D
Explanation:
The error message is indicating that the script is not associated with any program on the computer that can
open and run it. This means that the script requires a runtime environment, such as Python, to be installed
in order for it to execute properly. Without the appropriate runtime environment, the script will not be able to
run.
133. - (Topic 2)
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the
organization has added to provide content filtering. Which of the following Windows utilities IS the BEST
78
Certify For Sure with IT Exam Dumps
A. Security and Maintenance
D. Internet Options
Answer: D
Explanation: The best choice for accessing the necessary configuration to configure the desktop systems to
use a new proxy server is the Internet Options utility. This utility can be found in the Control Panel and
allows you to configure the proxy settings for your network connection. As stated in the CompTIA A+ Core 2
exam objectives, technicians should be familiar with the Internet Options utility and how to configure proxy
settings.
134. - (Topic 2)
A. WPS
B. WPA3
C. WEP
D. WMN
Answer: B
Explanation:
The strongest wireless configuration is B. WPA3. WPA3 is the most up-to-date wireless encryption protocol
and is the most secure choice. It replaces PSK with SAE, a more secure way to do the initial key exchange.
At the same time, the session key size of WPA3 increases to 128-bit in WPA3-Personal mode and 192-bit
in WPA3-Enterprise, which makes the password harder to crack than the previous Wi-Fi security standards
https://www.makeuseof.com/tag/wep-wpa-wpa2-wpa3-explained/
135. - (Topic 2)
A user reports a workstation has been performing strangely after a suspicious email was opened on it
earlier in the week. Which of the following should the technician perform FIRST?
79
Certify For Sure with IT Exam Dumps
C. Utilize a Windows restore point.
Answer: B
Explanation:
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam-objectives-(3-0)
When a user reports that their workstation is behaving strangely after opening a suspicious email, the first
step a technician should take is to run a virus scan on the computer. This is because opening a suspicious
email is a common way for viruses and malware to infect a computer. Running a virus scan can help
identify and remove any infections that may be causing the computer to behave strangely.
136. - (Topic 2)
A technician is installing a new business application on a user's desktop computer. The machine is running
Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute
A. Installer_x64.exe
B. Installer_Files.zip
C. Installer_32.msi
D. Installer_x86.exe
E. Installer_Win10Enterprise.dmg
Answer: D
Explanation:
The 32-bit operating system can only run 32-bit applications, so the technician should execute the 32-bit
installer. The “x86” in the file name refers to the 32-bit architecture.
https://www.digitaltrends.com/computing/32-bit-vs-64-bit-operating-systems/
137. - (Topic 2)
A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate
laptop. Which of the following BEST describes what the technician should do before returning the laptop to
the user?
80
Certify For Sure with IT Exam Dumps
B. Educate the user on how to reinstall the laptop OS.
Answer: D
Explanation: educating the user on common threats and how to avoid them (D) would be a good step
before returning the laptop to the user. This can help prevent similar issues from happening again.
138. - (Topic 2)
A user is being directed by the help desk to look up a Windows PC's network name so the help desk can
use a remote administration tool to assist the user. Which of the following commands would allow the user
A. ipconfig /all
B. hostname
C. netstat /?
D. nslookup localhost
E. arp —a
F. ping:: 1
Answer: B,E
Explanation:
The user can use the following commands to give the technician the correct information: ipconfig /all and
hostname 1. The ipconfig /all command displays the IP address, subnet mask, and default gateway for all
adapters on the computer 1. The hostname command displays the name of the computer 1.
139. - (Topic 2)
An IT services company that supports a large government contract replaced the Ethernet cards on several
hundred desktop machines to comply With regulatory requirements. Which of the following disposal
A. incineration
B. Resale
C. Physical destruction
81
Certify For Sure with IT Exam Dumps
D. Dumpster for recycling plastics
Answer: D
Explanation: When disposing of non-compliant Ethernet cards, the most environmentally friendly option is
to use a dumpster for recycling plastics. This method is the most effective way to reduce the amount of
waste that is sent to landfills, and it also helps to reduce the amount of energy used in the production of new
materials. Additionally, recycling plastics helps to reduce the amount of toxic chemicals that can be
released into the environment. According to CompTIA A+ Core 2 documents, "The most environmentally
friendly disposal method for non-compliant Ethernet cards is to use a dumpster for recycling plastics. This
method is the most effective way to reduce the amount of waste that is sent to landfills, and it also helps to
https://sustainability.yale.edu/blog/how-sustainably-dispose-your-technological-waste
140. - (Topic 2)
A Microsoft Windows PC needs to be set up for a user at a targe corporation. The user will need access to
the corporate domain to access email and shared drives. Which of the following versions of Windows would
Answer: B
Explanation:
The Windows Professional Edition is the most likely version that a technician would deploy for a user at a
target corporation. This version of Windows is designed for business use and provides the necessary
features and capabilities that a user would need to access the corporate domain, such as email and shared
drives.
141. - (Topic 2)
A. Chain of custody
82
Certify For Sure with IT Exam Dumps
B. Backup of software code
D. Restrictions of use
Answer: D
Explanation:
An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a
customer or end-user, generally made available to the customer via a retailer acting as an intermediary. A
EULA specifies in detail the rights and restrictions which apply to the use of the software. Some of the main
terms included in an EULA are the terms and scope of the license, any licensing fees, warranties and
disclaimers, limitation of liability, revocation or termination of the license, and intellectual property
information and restrictions on using the license (e.g. modification and copying1)
https://www.termsfeed.com/blog/eula-vs-terms-conditions/
142. - (Topic 2)
A technician is tasked with configuring a computer for a visually impaired user. Which of the following
A. Device Manager
B. System
Answer: C
Explanation:
The Ease of Access Center is a built-in utility in Windows that provides tools and options for making a
computer easier to use for individuals with disabilities, including the visually impaired. In the Ease of Access
Center, the technician can turn on options like high contrast display, screen magnification, and screen
reader software to help the user better interact with the computer.
143. - (Topic 2)
An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy
unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement
83
Certify For Sure with IT Exam Dumps
to retain this data for many years. Which of the following backup methods
Answer: C
Explanation:
According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection
against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a
separate physical location, it is less likely to be affected by the same event that could cause data loss on
the original system. Cold storage is a term used for data archiving, which typically refers to a long-term
storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for
144. - (Topic 2)
Which of the following is the MOST basic version of Windows that includes BitLocker?
A. Home
B. pro
C. Enterprise
Answer: D
Explanation: The most basic version of Windows that includes BitLocker is Windows Pro. BitLocker is a
feature of Windows Pro that provides full disk encryption for all data on a storage drive [1]. It helps protect
data from unauthorized access or theft and can help secure data from malicious attacks. Pro for
Workstations includes this feature, as well as other features such as support for up to 6 TB of RAM and
ReFS.
145. - (Topic 2)
Security software was accidentally uninstalled from all servers in the environment. After requesting the
84
Certify For Sure with IT Exam Dumps
same version of the software be reinstalled, the security analyst learns that a change request will need to
be filled out. Which of the following is the BEST reason to follow the change management process in this
scenario?
A. Owners can be notified a change is being made and can monitor it for performance impact. Most Voted
Answer: D
Explanation: change management process can help ensure that owners are notified of changes being
made and can monitor them for performance impact (A). This can help prevent unexpected issues from
arising.
146. - (Topic 2)
A bank would like to enhance building security in order to prevent vehicles from driving into the building
while also maintaining easy access for customers. Which of the following BEST addresses this need?
A. Guards
B. Bollards
C. Motion sensors
Answer: B
Explanation: Bollards are the best solution to enhance building security in order to prevent vehicles from
driving into the building while also maintaining easy access for customers4 References: 2. Bollards.
147. - (Topic 2)
A field technician applied a Group Policy setting to all the workstations in the network. This setting forced
the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the
85
Certify For Sure with IT Exam Dumps
C. The Group Policy setting has disrupted domain authentication on the system,
D. The workstations and the authentication server have a system clock difference.
Answer: D
Explanation:
The workstations and the authentication server have a system clock difference. If a Group Policy setting is
applied that forces the workstations to use a specific SNTP server, but the system clock on the workstations
and the authentication server are out of sync, then this can cause authentication issues and users will be
unable to log in. In this case, the most likely cause of the issue is a difference in system clocks and the
technician should ensure that the clocks on the workstations and the authentication server are in sync.
148. - (Topic 2)
A company discovered that numerous computers from multiple geographic locations are sending a very
high number of connection requests which is causing the company’s web server to become unavailable to
A. Zero day
B. SOL injection
C. Cross-site scripting
Answer: D
Explanation: The company is experiencing a distributed denial of service (DDoS) attack. A DDoS attack is a
type of cyber attack in which multiple compromised systems are used to target a single system, causing a
149. - (Topic 2)
A. Send an email to Telecom to inform them of the issue and prevent reoccurrence.
Answer: D
86
Certify For Sure with IT Exam Dumps
Explanation: educating the user on the solution that was performed is a good next step after resolving an
issue. This can help prevent similar issues from happening again and empower users to solve problems on
their own.
150. - (Topic 2)
Each time a user tries to go to the selected web search provider, a different website opens. Which of the
A. System time
B. IP address
C. DNS servers
D. Windows updates
Answer: C
Explanation: When a user experiences unexpected or erratic behavior while browsing the internet, it could
be caused by the DNS servers. DNS translates human-readable domain names (like google.com) into IP
addresses, which computers can use to communicate with web servers. If the DNS servers are not
functioning correctly or have been compromised, it can result in the browser being redirected to unintended
websites.
151. - (Topic 2)
A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the
following methods does the technician use to force the program to close in macOS?
A. The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozen
B. The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10
C. The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in
the list, right-clicks on the application, and selects the Force Quit option.
D. The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the
Answer: D
87
Certify For Sure with IT Exam Dumps
Explanation:
The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in the list, and
clicks Force Quit. This is the most common method of force quitting a program in macOS. This can be done
by clicking on the Apple icon in the top left of the screen, selecting Force Quit, selecting the frozen
application in the list, and then clicking Force Quit. This will force the application to quit and the spinning
152. - (Topic 2)
A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the
A. resmon_exe
B. dfrgui_exe
C. msinf032exe
D. msconfig_exe
Answer: A
Explanation: If a technician suspects high disk I/O, the technician should use the Resource Monitor
(resmon.exe) to identify the process that is causing the high disk I/O1. Resource Monitor provides detailed
information about the system’s resource usage, including disk I/O1. The technician can use this information
to identify the process that is causing the high disk I/O and take appropriate action1.
153. - (Topic 2)
A user is unable to log in to the network. The network uses 802.1X with EAP-TLS to authenticate on the
wired network. The user has been on an extended leave and has not logged in to the computer in several
A. Expired certificate
B. OS update failure
D. Application crash
Answer: A
88
Certify For Sure with IT Exam Dumps
Explanation:
EAP-TLS is a method of authentication that uses certificates to establish a secure tunnel between the client
and the server3. The certificates have a validity period and must be renewed before they expire1. If the
user has been on an extended leave and has not logged in to the computer in several months, it is possible
that the certificate on the client or the server has expired and needs to be renewed2. The other options are
154. - (Topic 2)
Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application
was installed, and the user has full access to the device's command shell. Which of the following is the
NEXT step the technician should take to find the cause of the leaked data?
Answer: B
Explanation:
The technician should disable the user’s access to the device’s command shell. This will prevent the user
from accessing sensitive data and will help to prevent further data leaks. The technician should then
investigate the unapproved application to determine if it is the cause of the data leak. If the application is
found to be the cause of the leak, the technician should uninstall the application and restore the device to
factory settings. If the application is not the cause of the leak, the technician should investigate further to
determine the cause of the leak. Disabling the ability to install applications from unknown sources can help
to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring
the device is connected to the corporate WiFi network is not relevant to this scenario1
155. - (Topic 2)
A new service desk is having a difficult time managing the volume of requests. Which of the following is the
89
Certify For Sure with IT Exam Dumps
B. Creating a ticketing system
Answer: A
Explanation:
A support portal is an online system that allows customers to access customer service tools, submit
requests and view status updates, as well as access information such as how-to guides, FAQs, and other
self-service resources. This would be the best solution for the service desk, as it would allow them to easily
manage the volume of requests by allowing customers to submit their own requests and view the status of
their requests. Additionally, the portal would provide customers with self-service resources that can help
them resolve their own issues, reducing the amount of tickets that need to be handled by the service desk.
156. - (Topic 2)
A user's system is infected with malware. A technician updates the anti-malware software and runs a scan
that removes the malware. After the user reboots the system, it once again becomes infected with malware.
Which of the following will MOST likely help to permanently remove the malware?
D. Scheduling a scan
Answer: B
Explanation:
Although updating the anti-malware software and running scans are important steps in removing malware,
they may not be sufficient to permanently remove the malware if the user keeps engaging in behaviors that
leave the system vulnerable, such as downloading unknown files or visiting malicious websites. Therefore,
educating the user on safe computing practices is the best way to prevent future infections and
Enabling System Restore, Booting into safe mode, and scheduling a scan are not the most efficient ways to
permanently remove the malware. Enabling System Restore and Booting into safe mode may help in some
cases, but they may not be sufficient to permanently remove the malware. Scheduling a scan is also
90
Certify For Sure with IT Exam Dumps
important for detecting and removing malware, but it may not be sufficient to prevent future infections.
https://partners.comptia.org/docs/default-source/resources/comptia-a-220-1102-exam- objectives-(3-0)
157. - (Topic 2)
A small business owner wants to install newly purchased software on all networked PCs. The network is not
configured as a domain, and the owner wants to use the easiest method possible. Which of the following is
the MOST deficient way lor the owner to install the application?
Answer: B
Explanation:
Saving software to an external hard drive and installing it on each individual PC is the most inefficient
method for the small business owner. This method requires manual intervention on each PC, and there is a
higher risk of error or inconsistencies between PCs. Additionally, if the software needs to be updated or
reinstalled in the future, this process would need to be repeated on each PC.
158. - (Topic 2)
A team of support agents will be using their workstations to store credit card data. Which of the following
should the IT department enable on the workstations in order to remain compliant with common regulatory
A. Encryption
B. Antivirus
C. AutoRun
D. Guest accounts
E. Default passwords
F. Backups
Answer: A,F
Explanation:
91
Certify For Sure with IT Exam Dumps
Encryption is a way of protecting cardholder data by transforming it into an unreadable format that can only
be decrypted with a secret key1. Backups are a way of ensuring that cardholder data is not lost or corrupted
in case of a disaster or system failure2. Both encryption and backups are part of the PCI DSS requirements
that apply to any entity that stores, processes, or transmits cardholder data1. The other options are not
159. - (Topic 2)
The web browsing speed on a customer's mobile phone slows down every few weeks and then returns to
normal after three or four days. Restarting the device does not usually restore performance. Which of the
D. System uptime
Answer: B
Explanation:
The technician should check the Wi-Fi connection speed first to troubleshoot this issue.
Slow web browsing speed on a mobile phone can be caused by a slow Wi-Fi connection. The technician
should check the Wi-Fi connection speed to ensure that it is fast enough to support web browsing. If the
Wi-Fi connection speed is slow, the technician should troubleshoot the Wi-Fi network to identify and resolve
the issue.
160. - (Topic 2)
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs
and Windows PCs. Which of the following filesystems is supported by both OS types?
A. NTFS
B. APFS
C. ext4
D. exFAT
Answer: D
92
Certify For Sure with IT Exam Dumps
Explanation: The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a file
system that is designed to be used on flash drives like USB sticks and SD cards. It is supported by both
Macs and Windows PCs, and it can handle large files and volumes
https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html
161. - (Topic 2)
A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are
supported by default?
A. .py
B. .js
C. .vbs
D. .sh
Answer: D
Explanation: https://www.educba.com/shell-scripting-in-linux/
162. - (Topic 2)
Which of the following is a data security standard for protecting credit cards?
A. PHI
B. NIST
C. PCI
D. GDPR
Answer: C
Explanation: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards
designed to ensure that ALL companies that accept, process, store or transmit credit card information
163. - (Topic 2)
A user has a license for an application that is in use on a personal home laptop. The user approaches a
systems administrator about using the same license on multiple computers on the corporate network.
Which of the following BEST describes what the systems administrator should tell the user?
93
Certify For Sure with IT Exam Dumps
A. Use the application only on the home laptop because it contains the initial license.
B. Use the application at home and contact the vendor regarding a corporate license.
C. Use the application on any computer since the user has a license.
Answer: B
Explanation:
Use the application at home and contact the vendor regarding a corporate license. The user should use the
application only on the home laptop because it contains the initial license. The user should contact the
vendor regarding a corporate license if they want to use the application on multiple computers on the
corporate network1
164. - (Topic 2)
A systems administrator needs to reset a users password because the user forgot it. The systems
administrator creates the new password and wants to further protect the user's account Which of the
Answer: A
Explanation: This will ensure that the user is the only one who knows their password, and that the new
password is secure.
The CompTIA A+ Core 2 220-1002 exam covers this topic in the domain 1.4 Given a scenario, use
165. - (Topic 2)
A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore.
A. Differential backup
B. Off-site backup
94
Certify For Sure with IT Exam Dumps
C. Incremental backup
D. Full backup
Answer: D
Explanation: A full backup involves creating a copy of all data on the workstation, including system files and
user-created data, and storing it on a set of tapes. This ensures that all data is backed up, and ensures that
the data can be restored in the event of a system failure or data loss.
166. - (Topic 2)
A. md
B. del
C. dir
D. rd
E. cd
Answer: D
Explanation:
To delete an empty directory, enter rd Directory or rmdir Directory . If the directory is not empty, you can
remove files and subdirectories from it using the /s switch. You can also use the /q switch to suppress
167. - (Topic 2)
A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system
identified malware from a recent download, but it was unable to remove the malware. Which of the following
actions would be BEST to remove the malware while also preserving the user's files?
Answer: C
Explanation:
95
Certify For Sure with IT Exam Dumps
Rebooting the system in safe mode will limit the number of programs and processes running, allowing the
Rescanning the system will allow the antivirus system to identify and remove the malware while preserving
168. - (Topic 2)
A technician is setting up a new laptop. The company's security policy states that users cannot install virtual
machines. Which of the following should the technician implement to prevent users from enabling virtual
A. UEFI password
B. Secure boot
C. Account lockout
Answer: B
Explanation: A technician setting up a new laptop must ensure that users cannot install virtual machines as
the company's security policy states One way to prevent users from enabling virtual technology is by
implementing Secure Boot. Secure Boot is a feature of UEFI firmware that ensures the system only boots
using firmware that is trusted by the manufacturer. It verifies the signature of all bootloaders, operating
systems, and drivers before running them, preventing any unauthorized modifications to the boot process.
This will help prevent users from installing virtual machines on the laptop without authorization.
169. - (Topic 2)
While browsing a website, a staff member received a message that the website could not be trusted.
Shortly afterward, several other colleagues reported the same issue across numerous other websites.
Remote users who were not connected to corporate resources did not have any issues. Which of the
96
Certify For Sure with IT Exam Dumps
Answer: B
Explanation:
The most likely cause of this issue is that a router was misconfigured and was blocking traffic. This would
explain why remote users who were not connected to corporate resources did not have any issues.
170. - (Topic 2)
An analyst needs GUI access to server software running on a macOS server. Which of the following options
provides the BEST way for the analyst to access the macOS server from the Windows workstation?
Answer: B
Explanation:
Apple Remote Desktop is a remote access solution that allows a user to access and control another
macOS computer from their Windows workstation. It provides a graphical user interface so that the analyst
can easily access the server software running on the macOS server. Apple Remote Desktop also supports
file transfers, so the analyst can easily transfer files between the two computers. Additionally, Apple
171. - (Topic 2)
In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).
C. A user left the phone at home and wants to prevent children from gaining access to the phone.
D. A user traded in the company phone for a cell carrier upgrade by mistake.
F. A user forgot the phone in a taxi, and the driver called the company to return the device.
Answer: E,F
Explanation:
97
Certify For Sure with IT Exam Dumps
Remote wipe capabilities are used to erase all data on a mobile device remotely. This can be useful in
situations where a device is lost or stolen, or when sensitive data needs to be removed from a device.
Remote wipe capabilities are most likely to be used in the following scenarios: E. A user cannot locate the
phone after attending a play at a theater. F. A user forgot the phone in a taxi, and the driver called the
In scenario E, remote wipe capabilities would be used to prevent unauthorized access to the device and to
protect sensitive data. In scenario F, remote wipe capabilities would be used to erase all data on the device
172. - (Topic 2)
A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an
apartment complex. The technician discovers that employees and patients are not the only people on the
network. Which of the following should the technician do to BEST minimize this issue?
Answer: C
Explanation: Changing the network channel is the best solution to minimize the issue of employees and
References: 3. Sample CompTIA Security+ exam questions and answers. Retrieved from
https://www.techtarget.com/searchsecurity/quiz/Sample-CompTIA-Security-exam-questions-and-answers
173. - (Topic 2)
A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST
way the officer can secure the workstation quickly when walking away?
C. Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.
98
Certify For Sure with IT Exam Dumps
Answer: A
Explanation: The BEST way to secure the workstation quickly when walking away is to use a key
174. - (Topic 2)
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup
system can retain no more than three versions of full backups before failing. The law firm is not concerned
about restore times but asks the technician to retain more versions when possible. Which of the following
A. Full
B. Mirror
C. Incremental
D. Differential
Answer: C
Explanation:
The law firm wants to retain more versions of the backups when possible, so the best backup method for
the technician to implement in this scenario would be Incremental backup. Incremental backups only save
the changes made since the last backup, which allows for more frequent backups and minimizes the
amount of storage required. This would allow the law firm to retain more than three versions of backups
To retain more versions of backups, the technician should implement an Incremental backup meth1o2d
An incremental backup method only backs up the data that has changed since the last backup, so it
175. - (Topic 2)
Before leaving work, a user wants to see the traffic conditions for the commute home. Which of the
following tools can the user employ to schedule the browser to automatically launch a traffic website at 4:45
p.m.?
A. taskschd.msc
B. perfmon.msc
99
Certify For Sure with IT Exam Dumps
C. lusrmgr.msc
D. Eventvwr.msc
Answer: A
Explanation: The user can use the Task Scheduler (taskschd.msc) to schedule the browser to automatically
launch a traffic website at 4:45 p.m. The Task Scheduler is a tool in Windows that allows users to schedule
176. - (Topic 2)
While assisting a customer with an issue, a support representative realizes the appointment is taking longer
than expected and will cause the next customer meeting to be delayed by five minutes. Which of the
B. Cut the current customer's lime short and rush to the next customer.
Answer: A
Explanation: The support representative should send a quick message regarding the delay to the next
customer. This will help the next customer understand the situation and adjust their schedule accordingly.
A customer recently experienced a power outage at a SOHO. The customer does not think the components
are connected properly. A print job continued running for several minutes after the power failed, but the
customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning
devices also turned off. In case of a future power failure, the customer wants to have the most time
available to save cloud documents and shut down the computer without losing any data.
100
Certify For Sure with IT Exam Dumps
Answer:
Explanation:
UPS > Surge protector = Computer, wifi router, cable modem Surge protector = wallOutlet , printer and
scanner
178. - (Topic 2)
A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an
organization. The certificate will be used in conjunction with the user's existing username and password.
Which of the following BEST describes the security benefits realized after this deployment?
Answer: B
101
Certify For Sure with IT Exam Dumps
Explanation: The security benefits realized after deploying a client certificate to be used for Wi-Fi access for
all devices in an organization are that all Wi-Fi traffic will be encrypted in transit. This means that any data
transmitted over the Wi-Fi network will be protected from eavesdropping attempts. Rogue access points will
not connect to the network because they will not have the client certificate. However, multifactor
authentication will not be forced for Wi-Fi because the client certificate is being used in conjunction with the
179. - (Topic 2)
A user connected a laptop to a wireless network and was tricked into providing login credentials for a
website. Which of the following threats was used to carry out the attack?
A. Zero day
B. Vishing
C. DDoS
D. Evil twin
Answer: B
Explanation:
Vishing, also known as voice phishing, is a type of social engineering attack where the attacker tricks the
victim into divulging sensitive information over the phone. In this case, the attacker tricked the user into
180. - (Topic 2)
A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating
that the address is already in use. The user logs on to the old desktop and receives the same message. A
technician checks the account and sees a comment that the user requires a specifically allocated address
before connecting to the software. Which of the following should the technician do to MOST likely resolve
the issue?
A. Bridge the LAN connection between the laptop and the desktop.
102
Certify For Sure with IT Exam Dumps
Answer: C
Explanation: The new laptop was set up with the static IP it needs to connect to the software. The old
181. - (Topic 2)
A technician received a call stating that all files in a user's documents folder appear to be Changed, and
each of the files now has a look file extension Which pf the following actions is the FIRST step the
Answer: D
Explanation:
The CompTIA A+ Core 2 220-1002 exam covers this topic in the following domains: 1.2 Given a scenario,
use appropriate resources to support users and 1.3 Explain the importance of security awareness.
182. - (Topic 2)
An administrator has received approval for a change request for an upcoming server deployment. Which of
Answer: A
Explanation:
Before making any changes to the system, it is important to assess the risks associated with the change
and determine whether it is worth implementing. Risk analysis involves identifying potential risks, assessing
their likelihood and impact, and determining what steps can be taken to mitigate them. It is important to
perform this step before making any changes, as this allows the administrator to make an informed decision
103
Certify For Sure with IT Exam Dumps
about whether or not the change should be implemented. Once the risks have been assessed and the
administrator has decided to go ahead with the change, the next step is to implement the deployment.
183. - (Topic 2)
The security presented by website was issued a different website' s address . A technician should instruct
Answer: A
Explanation: The technician should instruct the user to clear the browser cache and contact the bank
(option A). This error indicates that the website the user is visiting is not the correct website and is likely due
to a cached version of the website being stored in the user's browser. Clearing the browser cache should
remove any stored versions of the website and allow the user to access the correct website. The user
should also contact the bank to confirm that they are visiting the correct website and to report the error.
184. - (Topic 2)
A user is attempting to make a purchase at a store using a phone. The user places the phone on the
payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still
has the same results. Which of the following should the user do to resolve the issue?
Answer: B
Explanation:
The user should verify that NFC is enabled on their phone. NFC is a technology that allows two devices to
104
Certify For Sure with IT Exam Dumps
NFC (Near Field Communication) technology allows a phone to wirelessly communicate with a payment
terminal or other compatible device. In order to use NFC to make a payment or transfer information, the
feature must be enabled on the phone. Therefore, the user should verify that NFC is enabled on their phone
before attempting to make a payment with it. The other options, such as turning off airplane mode,
connecting to Wi-Fi, or enabling Bluetooth, do not pertain to the NFC feature and are unlikely to resolve the
issue. This information is covered in the Comptia A+ Core2 documents/guide under the Mobile Devices
section.
185. - (Topic 2)
A new spam gateway was recently deployed at a small business However; users still occasionally receive
spam. The management team is concerned that users will open the messages and potentially infect the
network systems. Which of the following is the MOST effective method for dealing with this Issue?
C. Adjusting AV settings
Answer: D
Explanation: The most effective method for dealing with spam messages in a small business is to provide
user training1. Users should be trained to recognize spam messages and avoid opening them1. They
should also be trained to report spam messages to the IT department so that appropriate action can be
taken1. In addition, users should be trained to avoid clicking on links or downloading attachments from
unknown sources1. By providing user training, the management team can reduce the risk of users opening
186. - (Topic 2)
A user is having issues with document-processing software on a Windows workstation. Other users that log
105
Certify For Sure with IT Exam Dumps
C. Update the drivers.
Answer: D
Explanation:
The issue is specific to the user’s profile, so the technician should rebuild the profile. Rebuilding the profile
will create a new profile and transfer the user’s data to the new profile1
187. - (Topic 2)
The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The
company wants to reduce this risk with minimal impact to users who want to use their laptops when not on
the network. Which of the following would BEST reduce this risk for Windows laptop users?
Answer: D
Explanation:
BitLocker is a disk encryption tool that can be used to encrypt the hard drive of a Windows laptop. This will
protect the data stored on the drive in the event that the laptop is lost or stolen, and will help to reduce the
risk of data loss. Additionally, BitLocker can be configured to require a PIN or other authentication in order
188. - (Topic 2)
A help desk team lead contacts a systems administrator because the technicians are unable to log in to a
Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the
server, the administrator sees the GUI is crashing. Which of the following methods can the administrator
A. SFTP
B. SSH
C. VNC
106
Certify For Sure with IT Exam Dumps
D. MSRA
Answer: C
Explanation: The administrator can use Virtual Network Computing (VNC) to troubleshoot the server
effectively. VNC is a graphical desktop sharing system that allows the administrator to remotely control the
189. - (Topic 2)
A technician is troubleshooting a computer with a suspected short in the power supply. Which of the
Answer: B
Explanation:
The first step a technician should take when troubleshooting a computer with a suspected short in the
power supply is B. Disconnect the power before servicing the PC. This is to prevent any electrical shock or
damage to the components. A power supply can be dangerous even when unplugged, as capacitors can
maintain a line voltage charge for a long time1. Therefore, it is important to disconnect the power cord and
press the power button to discharge any residual power before opening the case2. The other steps are also
important for safety and proper diagnosis, but they should be done after disconnecting the power.
190. - (Topic 2)
A user receives a notification indicating the data plan on the user's corporate phone has reached its limit.
The user has also noted the performance of the phone is abnormally slow. A technician discovers a
third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?
107
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: The GPS application contains malware. The third-party GPS application is likely the cause of
the slow performance of the phone. The application may contain malware that is using up system resources
and slowing down the phone. The user should uninstall the application and run a malware scan on the
phone1
191. - (Topic 2)
A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take
the call and sets the phone to silent. Which of the following BEST describes the technician's actions?
A. Avoid distractions
Answer: A
Explanation:
The technician's action of setting the phone to silent while troubleshooting the customer's PC is an example
of avoiding distractions. By setting the phone to silent, the technician is ensuring that they are able to focus
on the task at hand without any distractions that could potentially disrupt their workflow. This is an important
practice when handling customer's confidential material, as it ensures that the technician is able to focus on
the task and not be distracted by any external sources. Furthermore, it also adheres to user privacy policies,
as the technician is not exposing any confidential information to any external sources.
192. - (Topic 2)
A user calls the help desk and reports a workstation is infected with malicious software. Which of the
following tools should the help desk technician use to remove the malicious software? (Select TWO).
A. File Explorer
D. Windows Firewall
E. Windows Defender
108
Certify For Sure with IT Exam Dumps
F. Network Packet Analyzer
Answer: A,E
Explanation: The correct answers are E. Windows Defender and A. File Explorer.
Windows Defender is a built-in antivirus program that can detect and remove malicious software from a
workstation. File Explorer can be used to locate and delete files associated with the malicious software1
193. - (Topic 2)
A technician has been asked to set up a new wireless router with the best possible security. Which of the
A. WPS
B. TKIP
C. WPA3
D. WEP
Answer: C
Explanation: WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the
highest level of protection available. It is designed to protect against brute force password attempts and
protect against eavesdropping and man-in-the-middle attacks. WPA3 also supports the use of stronger
encryption algorithms, such as the Advanced Encryption Standard (AES), which provides additional
protection for wireless networks. WPA3 should be implemented in order to ensure the best possible
194. - (Topic 2)
Following a recent power outage, several computers have been receiving errors when booting. The
technician suspects file corruption has occurred. Which of the following steps should the technician try
Answer: D
109
Certify For Sure with IT Exam Dumps
Explanation: The technician should run the System File Checker (SFC) first to correct file
corruption errors on computers after a power outage. SFC is a command-line utility that scans for and
repairs corrupted system files. It can be run from the command prompt or from the Windows Recovery
Environment. Rebuilding the Windows profiles, restoring the computers from backup, and reimaging the
computers are more drastic measures that should be taken only if SFC fails to correct the issue1
195. - (Topic 2)
A technician receives a call from a user who is on vacation. The user provides the necessary credentials
and asks the technician to log in to the users account and read a critical email that the user has been
C. non-disclosure agreement
Answer: A
Explanation:
Logging into a user's account without their explicit permission is a violation of the acceptable use policy,
which outlines the rules and regulations by which a user must abide while using a computer system. By
logging into the user's account without their permission, the technician would be violating this policy.
Additionally, this action could be seen as a breach of confidentiality, as the technician would have access to
196. - (Topic 2)
After a company installed a new SOHO router customers were unable to access the company-hosted
public website. Which of the following will MOST likely allow customers to
A. Port forwarding
B. Firmware updates
C. IP filtering
D. Content filtering
110
Certify For Sure with IT Exam Dumps
Answer: B
Explanation:
If customers are unable to access the company-hosted public website after installing a new SOHO router,
the company should check for firmware updates1. Firmware updates can fix bugs and compatibility issues
that may be preventing customers from accessing the website1. The company should also ensure that the
router is properly configured to allow traffic to the website1. If the router is blocking traffic to the website, the
197. - (Topic 2)
D. Operating systems are unable to migrate data to the new operating system.
Answer: C
Explanation:
End-of-life operating systems are those which have reached the end of their life cycle and are no longer
supported by the software developer. This means that the operating system will no longer receive updates,
security patches, or other new features. This can leave users vulnerable to security threats, as the system
will no longer be protected against the latest threats. Additionally, this can make it difficult to migrate data to
198. - (Topic 2)
A technician is attempting to mitigate micro power outages, which occur frequently within the area of
operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the
A. Surge suppressor
B. Battery backup
C. CMOS battery
D. Generator backup
111
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: A battery backup, also known as an uninterruptible power supply (UPS), is a device that
provides backup power during a power outage. When the power goes out, the battery backup provides a
short amount of time (usually a few minutes up to an hour, depending on the capacity of the device) to save
199. - (Topic 2)
A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to
locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the
Answer: B
Explanation:
Local Users and Groups is a Microsoft Management Console (MMC) snap-in that allows you to manage
user accounts or groups on your computer1. If you cannot find it in the MMC console, you can add it
✑ Press Windows key + R to open the Run dialog box, or open the Command Prompt.
✑ Type mmc and hit Enter. This will open a blank MMC console.
✑ In the Add or Remove Snap-ins window, select Local Users and Groups from the Available snap-ins list,
✑ In the Select Computer window, choose Local computer or Another computer, depending on which
✑ Click OK to close the Add or Remove Snap-ins window. You should now see Local Users and Groups in
200. - (Topic 2)
112
Certify For Sure with IT Exam Dumps
A suite of security applications was installed a few days ago on a user's home computer.
The user reports that the computer has been running slowly since the installation. The user notices the hard
drive activity light is constantly solid. Which of the following should be checked FIRST?
Answer: C
Explanation:
System File Checker to check for modified Windows files. System File Checker (SFC) is a Windows utility
that can be used to scan for and restore corrupt Windows system files. SFC can be used to detect and fix
any modified or corrupted system files on a computer, and thus should be checked first when a user reports
that their computer has been running slowly since the installation of security applications [1][2]. By checking
SFC, any modified or corrupted system files can be identified and fixed, potentially improving the overall
201. - (Topic 3)
A technician, who is working at a local office, has found multiple copies of home edition software installed
A. EULA
B. Pll
C. DRM
D. Open-source agreement
Answer: A
Explanation:
The installation of home edition software on computers at a local office most likely violates the EULA. EULA
stands for End User License Agreement and is a legal contract that specifies the terms and conditions for
using a software product or service. EULA typically covers topics such as license scope, duration and
limitations, rights and obligations of the parties, warranties and disclaimers, liability and indemnity clauses,
113
Certify For Sure with IT Exam Dumps
and termination procedures. EULA may also restrict the use of home edition software to personal or non-
commercial purposes only, and prohibit the use of home edition software in business or professional
settings. Violating EULA may result in legal actions or penalties from the software vendor or developer. PII
stands for Personally Identifiable Information and is any information that can be used to identify or locate an
individual, such as name, address, phone number, email address, social security number or credit card
number. PII is not related to software installation or licensing but to data protection and privacy. DRM
stands for Digital Rights Management and is a technology that controls or restricts the access and use of
digital content, such as music, movies, books or games. DRM is not related to software installation or
licensing but to content distribution and piracy prevention. Open- source agreement is a type of license that
allows users to access, modify and distribute the source code of a software product or service freely and
openly. Open-source agreement does not restrict the use of software to home edition only but encourages
collaboration and innovation among developers and users. References: CompTIA A+ Core 2 (220-1002)
202. - (Topic 3)
Which of the following editions of Windows 10 requires reactivation every 180 days?
A. Enterprise
C. Home
D. Pro
Answer: A
Explanation: Windows 10 Enterprise is an edition of Windows 10 that is designed for large organizations
that need advanced security and management features. Windows 10 Enterprise can be activated using
different methods, such as Multiple Activation Key (MAK), Active Directory-based Activation (ADBA), or Key
Management Service (KMS)1. KMS is a method of activation that uses a local server to activate multiple
devices on a network. KMS activations are valid for 180 days and need to be renewed periodically by
connecting to the KMS server2. If a device does not renew its activation within 180 days, it will enter a
grace period of 30 days, after which it will display a warning message and lose some functionality until it is
reactivated3. The other editions of Windows 10 do not require reactivation every 180 days. Windows 10 Pro
for Workstation is an edition of Windows 10 that is designed for high-performance devices that need
114
Certify For Sure with IT Exam Dumps
advanced features such as ReFS file system, persistent memory, and faster file sharing. Windows 10 Pro
for Workstation can be activated using a digital license or a product key. Windows 10 Home is an edition of
Windows 10 that is designed for personal or home use. Windows 10 Home can be
activated using a digital license or a product key. Windows 10 Pro is an edition of Windows 10 that is
designed for business or professional use. Windows 10 Pro can be activated using a digital license or a
product key. None of these editions require reactivation every 180 days unless there are significant
203. - (Topic 3)
A technician needs to access a Windows 10 desktop on the network in a SOHO using RDP. Although the
connection is unsuccessful, the technician is able to ping the computer successfully. Which of the following
Answer: A
Explanation: The Windows 10 desktop has Windows 10 Home installed, which does not support RDP
(Remote Desktop Protocol) as a host. Only Windows 10 Pro, Enterprise, and Education editions can act as
RDP hosts and allow remote access to their desktops1. The Windows 10 desktop does not have DHCP
configured, is connected via Wi-Fi, or is hibernating are not likely to prevent the RDP connection if the
204. - (Topic 3)
Which of the following default system tools can be used in macOS to allow the technician to view the screen
A. Remote Assistance
C. Screen Sharing
115
Certify For Sure with IT Exam Dumps
Answer: C
Explanation:
Screen Sharing is the default system tool that can be used in macOS to allow the technician to view the
screen simultaneously with the user. Screen Sharing is a built-in app that lets users share their Mac screen
with another Mac on the network. The user can enable screen sharing in the System Preferences > Sharing
pane, and then allow other users to request or enter a password to access their screen1. The technician
can launch the Screen Sharing app from the Spotlight search or the Finder sidebar, and then enter the
user’s name, address, or Apple ID to connect to their screen2. Remote Assistance is a Windows feature
that allows users to invite someone to help them with a problem on their PC3. Remote Desktop Protocol
(RDP) is a protocol that allows users to connect to a remote computer over a network4. Virtual Network
Computing (VNC) is a technology that allows users to share their screen with other devices using a VNC
viewer app1. These are not default system tools in macOS, although they can be used with third-party
software or settings.
References: 1: https://support.apple.com/guide/mac-help/share-the-screen-of-another-mac-mh14066/mac
2: https://www.howtogeek.com/449239/how-to-share-your-macs-screen-with-another-mac/ 3:
https://support.microsoft.com/en-us/windows/solve-pc-problems-over-a-remote-connection-b077e31a-16f4
-2529-1a47-21f6a9040bf3 4:
https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-
protocol
205. - (Topic 3)
A technician is upgrading the backup system for documents at a high-volume law firm. The current backup
system can retain no more than three versions of full backups before failing. The law firm is not concerned
about restore times but asks the technician to retain more versions when possible. Which of the following
A. Full
B. Mirror
C. Incremental
D. Differential
Answer: C
116
Certify For Sure with IT Exam Dumps
Explanation: Incremental backup is a backup method that only backs up the files that have changed since
the last backup, whether it was a full or an incremental backup. Incremental backup can save storage
space and bandwidth, as it does not copy the same files over and over again. Incremental backup can also
retain more versions of backups, as it only stores the changes made to the files. However, incremental
backup can have longer restore times, as it requires restoring the last full backup and all the subsequent
incremental backups in order to recover the data. The law firm is not concerned about restore times but
asks the technician to retain more versions when possible, so incremental backup would be a suitable
206. - (Topic 3)
A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which
programs are starting with the OS but receives a message that it can no longer be used to view startup
items. Which of the following programs can the technician use to view startup items?
A. msinfo32
B. perfmon
C. regedit
D. taskmgr
Answer: D
Explanation:
When troubleshooting boot times for a user, a technician may want to check which programs are starting
with the operating system to identify any that may be slowing down the boot process. MSConfig is a tool
that can be used to view startup items on a Windows system, but it may not always be available or
functional.
In this scenario, the technician receives a message that MSConfig cannot be used to view startup items. As
an alternative, the technician can use Task Manager (taskmgr), which can also display the programs that
run at startup. To access the list of startup items in Task Manager, the technician can follow these steps:
117
Certify For Sure with IT Exam Dumps
207. - (Topic 3)
A user has been unable to receive emails or browse the internet from a smartphone while traveling.
However, text messages and phone calls are working without issue. Which of the following should a
B. Mobile OS version
Answer: C
Explanation:
The first thing that a support technician should check to resolve the issue of not being able to receive emails
or browse the internet from a smartphone while traveling is the data plan coverage. The data plan coverage
determines how much data and where the user can use on the smartphone’s cellular network. The data
plan coverage may vary depending on the user’s location, carrier and subscription. The data plan coverage
may not include or support certain areas or countries that the user is traveling to, or may charge extra fees
or limit the speed or amount of data that the user can use. The data plan coverage does not affect text
messages and phone calls, which use different network services and protocols. User account status is not
likely to cause the issue of not being able to receive emails or browse the internet from a smartphone while
traveling, unless the user account has been suspended or terminated by the carrier or the email provider.
Mobile OS version is not likely to cause the issue of not being able to receive emails or browse the internet
from a smartphone while traveling, unless the mobile OS has a major bug or compatibility problem with the
network or the email app. Network traffic outages may cause the issue of not being able to receive emails
or browse the internet from a smartphone while traveling, but they are less likely and less common than
data plan coverage issues, and they should also affect text messages and phone calls. References:
CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.5
208. - (Topic 3)
A technician needs to provide recommendations about how to upgrade backup solutions for a site in an
area that has frequent hurricanes and an unstable power grid. Which of the following should the technician
recommend implementing?
118
Certify For Sure with IT Exam Dumps
A. High availability
C. On-site backups
D. Incremental backups
Answer: B
Explanation: Regionally diverse backups are backups that are stored in different geographic locations,
preferably far away from the primary site1. This way, if a disaster such as a hurricane or a power outage
affects one location, the backups in another location will still be available and accessible2. Regionally
diverse backups can help ensure business continuity and data recovery in case of a disaster3. The other
options are not the best backup solutions for a site in an area that has frequent hurricanes and an unstable
power grid. High availability is a feature that allows a system to remain operational and accessible even if
one or more components fail, but it does not protect against data loss or corruption4. On-site backups are
backups that are stored in the same location as the primary site, which means they are vulnerable to the
same disasters that can affect the primary site. Incremental backups are backups that only store the
changes made since the last backup, which means they require less storage space and bandwidth, but
they also depend on previous backups to restore data and may not be sufficient for disaster recovery.
209. - (Topic 3)
A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the
following steps should the technician complete BEFORE removing the virus?
Answer: A
Explanation: Before removing a Trojan virus from a workstation, a technician should disable System
Restore. System Restore is a feature that allows users to restore their system to a previous state in case of
problems or errors. However, System Restore can also restore infected files or registry entries that were
removed by antivirus software or manual actions. By disabling System Restore, a technician can ensure
that the Trojan virus is completely removed and does not reappear after a system restore operation.
119
Certify For Sure with IT Exam Dumps
Scheduling a malware scan may help detect and remove some malware but may not be effective against all
types of Trojan viruses. Educating the end user may help prevent future infections but does not address the
current issue of removing the Trojan virus. Running Windows Update may help patch some security
vulnerabilities but does not guarantee that the Trojan virus will be removed. References: CompTIA A+ Core
210. - (Topic 3)
A user notices a small USB drive is attached to the user's computer after a new vendor visited the office.
The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST
likely occurring?
A. Trojan
B. Rootkit
C. Cryptominer
D. Keylogger
Answer: D
Explanation: A keylogger is a type of malware that records the keystrokes of a user and sends them to a
remote attacker. A keylogger can be used to steal passwords, credit card numbers, personal information,
and other sensitive data. A keylogger can be delivered through a USB drive that contains a malicious
executable file, such as grabber.exe, and an output file that stores the captured keystrokes, such as
output.txt. The other options are not likely to use this method of attack. References: :
https://www.comptia.org/training/resources/exam-objectives/comptia-a-core-2-exam- objectives :
https://www.kaspersky.com/resource-center/definitions/keylogger
211. - (Topic 3)
A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the
following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?
A. Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the
B. Open Settings, select Personalization, click Browse, and then locate and open the image the user wants
120
Certify For Sure with IT Exam Dumps
C. Open Settings, select System, select Display, click Browse, and then locate and open the image the user
D. Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image
Answer: B
Explanation: The user can change the wallpaper using a Windows 10 Settings tool by following these
steps12:
✑ Open Settings by pressing the Windows key and typing Settings, or by clicking the gear icon in the Start
menu.
✑ In the Background settings, click the drop-down menu and select Picture as the background type.
✑ Click Browse and then locate and open the image the user wants to use as the wallpaper.
The other options are incorrect because they do not lead to the Background settings or they do not allow
the user to browse for an image. Accounts, System, and Apps are not related to personalization settings.
Your info, Display, and Apps & features are not related to wallpaper settings.
References: 1:
https://support.microsoft.com/en-us/windows/change-your-desktop-background-image-175618be-4cf1-c15
9-2785-ec2238b433a8 2: https://www.computerhope.com/issues/ch000592.htm
212. - (Topic 3)
A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the
download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which
A. Private-browsing mode
B. Invalid certificate
C. Modified file
D. Browser cache
Answer: C
Explanation:
121
Certify For Sure with IT Exam Dumps
The most likely cause of the issue of having different hash values for a downloaded security tool is a
modified file. A hash value is a unique and fixed-length string that is generated from an algorithm that
processes data or files. A hash value can be used to verify the integrity and authenticity of data or files by
comparing it with a known or expected value. If the hash values do not match, it means that the data or file
has been altered or corrupted in some way. A modified file may result from intentional or unintentional
feature that allows users to browse the web without storing any browsing history, cookies or cache on their
browser. Private-browsing mode does not affect the hash value of a downloaded file but only how the
browser handles user data. Invalid certificate is an error that occurs when a website or a server does not
have a valid or trusted digital certificate that proves its identity and secures its communication. Invalid
certificate does not affect the hash value of a downloaded file but only how the browser verifies the website
or server’s credibility. Browser cache is a temporary storage that stores copies of web pages, images and
213. - (Topic 3)
A computer on a corporate network has a malware infection. Which of the following would be the BEST
A. Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service
B. Flashing the BIOS, reformatting the drive, and then reinstalling the OS
C. Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS
D. Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus
Answer: B
Explanation:
Flashing the BIOS, reformatting the drive, and then reinstalling the OS is the best method for returning a
computer with a malware infection to service. Flashing the BIOS updates the firmware of the motherboard
and can remove any malware that may have infected it. Reformatting the drive erases all data on it and can
remove any malware that may have infected it. Reinstalling the OS restores the system files and settings to
their original state and can remove any malware that may have modified them. Scanning the system with a
Linux live disc may not detect or remove all malware infections. Degaussing the hard drive is an extreme
method of destroying data that may damage the drive beyond repair. Reinstalling the OS before flashing
122
Certify For Sure with IT Exam Dumps
the BIOS or scanning with antivirus may not remove malware infections that persist in the BIOS or other
files.
A user reports that after a recent software deployment to upgrade applications, the user can no longer use
INSTRUCTIONS
Review the information in each tab to verify the results of the deployment and resolve any issues
BSOD
Commands:
123
Certify For Sure with IT Exam Dumps
Event Viewer:
System Error:
124
Certify For Sure with IT Exam Dumps
Answer:
Explanation:
The user is experiencing a system error that prevents them from using the Testing program. The error
message indicates that the file MSVCP100.dll is missing from the computer. This file is part of the Microsoft
Visual C++ 2010 Redistributable Package, which is required by some applications to run properly. The error
To resolve this issue, the user needs to restore the missing file and register it in the system. One possible
way to do this is to copy the file from another computer that has the Testing program installed and working,
and then use the regsvr32 command to register it. The steps are as follows:
✑ On another computer (User-PC02) that has the Testing program installed and
✑ Share the folder C:\Windows\System32 on User-PC02 by right-clicking on it, selecting Properties, then
Sharing, then Advanced Sharing, then checking Share this folder, then clicking OK.
✑ On the user’s computer (User-PC01), open a command prompt as an administrator by clicking Start,
✑ In the command prompt, type the following command to copy the file MSVCP100.dll from User-PC02 to
✑ After the file is copied, type the following command to register it in the system: regsvr32 msvcp100.dll
✑ Restart the user’s computer and try to run the Testing program again. Therefore, based on the
instructions given by the user, the correct answers are: Select Event Viewer Issue: 2187
PC02\C$\Windows\System32"
125
Certify For Sure with IT Exam Dumps
215. - (Topic 3)
A technician is setting up a conference room computer with a script that boots the application on login.
Which of the following would the technician use to accomplish this task? (Select TWO).
A. File Explorer
B. Startup Folder
C. System Information
E. Task Scheduler
F. Device Manager
Answer: B,E
Explanation:
✑ B. Startup Folder1: The Startup folder is a special folder that contains shortcuts to programs or scripts
that will run automatically when a user logs on. The technician can create a shortcut to the script and place
it in the Startup folder for the conference room computer or for all users.
✑ E. Task Scheduler23: The Task Scheduler is a tool that allows you to create tasks that run at specified
times or events. The technician can create a task that runs the script at logon for the conference room
216. - (Topic 3)
An organization implemented a method of wireless security that requires both a user and the user's
computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the
following wireless security methods BEST describes what this organization implemented?
A. TKIP
B. RADIUS
C. WPA2
D. AES
Answer: B
Explanation:
RADIUS stands for Remote Authentication Dial-In User Service and it is a protocol that provides centralized
126
Certify For Sure with IT Exam Dumps
authentication, authorization, and accounting for network access. RADIUS can be used to implement a
method of wireless security that requires both a user and the user’s computer to be in specific managed
groups on the server in order to connect to Wi-Fi. This is also known as 802.1X authentication or EAP-TLS
authentication
217. - (Topic 3)
After a failed update, an application no longer launches and generates the following error message:
Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to
A. Device Manager
B. Administrator Tools
D. Recovery
Answer: D
Explanation: Recovery is a Windows 10 utility that can be used to address the concern of a failed update
that prevents an application from launching. Recovery allows the user to reset the PC, go back to a
previous version of Windows, or use advanced startup options to troubleshoot and repair the system2.
Device Manager, Administrator Tools, and Programs and Features are not Windows 10 utilities that can fix
a failed update.
218. - (Topic 3)
A user is no longer able to start the OS on a computer and receives an error message indicating there is no
OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error
just days before this issue. Which of the following is the MOST likely cause of this issue?
A. Boot order
B. Malware
C. Drive failure
D. Windows updates
Answer: C
Explanation:
127
Certify For Sure with IT Exam Dumps
A S.M.A.R.T. error is a warning that a hard drive is about to fail or has failed. This means that the OS
cannot be loaded from the drive and the user will see an error message indicating there is no OS found.
219. - (Topic 3)
A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but
will not require the same private address each time. Which of the following protocols will the technician
A. DHCP
B. SMTP
C. DNS
D. RDP
Answer: A
Explanation: DHCP stands for Dynamic Host Configuration Protocol and it is used to assign IP addresses
and other network configuration parameters to devices on a network automatically. This is useful for
devices that do not require the same private address each time they connect to the internet.
220. - (Topic 3)
Which of the following is MOST likely used to run .vbs files on Windows devices?
A. winmgmt.exe
B. powershell.exe
C. cscript.exe
D. explorer.exe
Answer: C
Explanation:
A .vbs file is a Virtual Basic script written in the VBScript scripting language. It contains code that can be
executed within Windows via the Windows-based script host (Wscript.exe), to perform certain admin and
processing functions1. Cscript.exe is a command-line version of the Windows Script Host that provides
command-line options for setting script properties. Therefore, cscript.exe is most likely used to run .vbs files
128
Certify For Sure with IT Exam Dumps
https://docs.microsoft.com/en-us/windows-server/administration/windows- commands/cscript
221. - (Topic 3)
A user needs assistance installing software on a Windows PC but will not be in the office. Which of the
following solutions would a technician MOST likely use to assist the user without having to install additional
software?
A. VPN
B. MSRA
C. SSH
D. RDP
Answer: B
Explanation:
MSRA stands for Microsoft Remote Assistance, and it is a feature that allows a technician to remotely view
and control another user’s Windows PC with their permission. MSRA is built-in to Windows and does not
require any additional software installation. To use MSRA, the technician and the user need to follow these
steps:
✑ On the user’s PC, type msra in the search box on the taskbar and select Invite someone to connect to
✑ Select Save this invitation as a file and choose a location to save the file. This file contains a password
✑ Send the file and the password to the technician via email or another secure method.
✑ On the technician’s PC, type msra in the search box on the taskbar and select Help someone who has
invited you.
✑ Select Use an invitation file and browse to the location where the file from the user is saved. Enter the
✑ The user will see a message asking if they want to allow the technician to connect to their PC. The user
✑ The technician will see the user’s desktop and can request control of their PC by clicking Request control
on the top bar. The user should allow this request by clicking Yes.
✑ The technician can now view and control the user’s PC and assist them with installing software.
129
Certify For Sure with IT Exam Dumps
222. - (Topic 3)
Which of the following would MOST likely be deployed to enhance physical security for a building? (Select
TWO).
A. Multifactor authentication
B. Badge reader
D. Firewall
E. Motion sensor
F. Soft token
Answer: B,E
Explanation: Badge reader and motion sensor are devices that can be deployed to enhance physical
security for a building. A badge reader is a device that scans and verifies an identification card or tag that
grants access to authorized personnel only. A badge reader can help prevent unauthorized entry or
intrusion into a building or a restricted area. A motion sensor is a device that detects movement and triggers
an alarm or an action when motion is detected. A motion sensor can help deter or alert potential intruders or
trespassers in a building or an area. Multifactor authentication is a method of verifying identity using two or
more factors, such as something you know, something you have or something you are. Multifactor
authentication is not a device that can be deployed to enhance physical security for a building but a
technique that can be used to enhance logical security for systems or services. Personal identification
number is a numeric code that can be used as part of authentication or access control. Personal
identification number is not a device that can be deployed to enhance physical security for a building but an
example of something you know factor in multifactor authentication. Firewall is a device or software that
filters network traffic based on rules and policies. Firewall is not a device that can be deployed to enhance
physical security for a building but a device that can be used to enhance network security for systems or
services. Soft token is an application or software that generates one-time passwords or codes for
authentication purposes. Soft token is not a device that can be deployed to enhance physical security for a
building but an example of something you have factor in multifactor authentication. References:
CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 3.3
130
Certify For Sure with IT Exam Dumps
223. - (Topic 3)
A user added a second monitor and wants to extend the display to it. In which of the following Windows
settings will the user MOST likely be able to make this change?
A. System
B. Devices
C. Personalization
D. Accessibility
Answer: A
Explanation:
The user can most likely make the change of extending the display to a second monitor in the System
option in the Windows settings. The System option allows users to manage system settings and features,
such as display, sound, notifications, power and storage. The user can extend the display to a second
monitor by selecting Display from the System option and then choosing Extend these displays from the
Multiple displays drop-down menu. This will allow the user to use both monitors as one large desktop area.
Devices is an option in the Windows settings that allows users to add and manage devices connected to
the computer, such as printers, scanners, mice and keyboards. Devices is not related to extending the
display to a second monitor but to configuring device settings and preferences. Personalization is an option
in the Windows settings that allows users to customize the appearance and behavior of their desktop, such
224. - (Topic 3)
A user receives an error message from an online banking site that states the following:
Answer: C
Explanation:
131
Certify For Sure with IT Exam Dumps
The error message “Your connection is not private. Authority invalid.” means that the web browser cannot
verify the identity or security of the website’s SSL certificate. This could indicate that the website has been
compromised, has a configuration error, or has an expired or invalid certificate. The user should not
proceed to the site or use a different browser, as this could expose their sensitive information to potential
attackers. The user should also not reinstall the browser, as this is unlikely to fix the error and could cause
data loss. The best action for the user to take is to report the error to the bank and wait for them to resolve
it.
errors (https://support.google.com/chrome/answer/6098869?hl=en)
225. - (Topic 3)
A technician needs to add an individual as a local administrator on a Windows home PC. Which of the
Answer: C
Explanation: The technician would most likely use Settings > Accounts > Family and Other Users to add an
individual as a local administrator on a Windows home PC. Settings > Accounts > Family and Other Users
allows users to add and manage other user accounts on their Windows PC. The technician can add an
individual as a local administrator by selecting Add someone else to this PC under Other users and
following the steps to create a new user account with administrator privileges. Settings > Personalization
allows users to customize the appearance and behavior of their desktop, such as themes, colors,
backgrounds, lock screen and screensaver. Settings > Personalization is not related to adding an individual
as a local administrator on a Windows home PC but to configuring desktop settings and preferences.
Control Panel > Credential Manager allows users to view and manage their web credentials and Windows
credentials stored on their Windows PC. Control Panel > Credential Manager is not related to adding
132
Certify For Sure with IT Exam Dumps
226. - (Topic 3)
A technician is securing a new Windows 10 workstation and wants to enable a Screensaver lock. Which of
the following options in the Windows settings should the technician use?
A. Ease of Access
B. Privacy
C. Personalization
Answer: C
Explanation: The technician should use the Personalization option in the Windows settings to enable a
Screensaver lock. The Personalization option allows users to customize the appearance and behavior of
their desktop, such as themes, colors, backgrounds, lock screen and screensaver. The technician can
enable a Screensaver lock by choosing a screensaver from the drop-down menu, setting a wait time in
minutes and checking the box that says “On resume, display logon screen”. This will lock the computer and
require a password or PIN to log back in after the screensaver is activated. Ease of Access is an option in
the Windows settings that allows users to adjust accessibility features and settings, such as narrator,
magnifier, high contrast and keyboard shortcuts. Ease of Access is not related to enabling a Screensaver
lock. Privacy is an option in the Windows settings that allows users to manage privacy and security settings,
such as location, camera, microphone and app permissions. Privacy is not related to enabling a
Screensaver lock. Update and Security is an option in the Windows settings that allows users to check and
install updates, troubleshoot problems, backup files and restore system. Update and Security is not related
to enabling a Screensaver lock. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives
227. - (Topic 3)
Which of the following often uses an SMS or third-party application as a secondary method to access a
system?
A. MFA
B. WPA2
C. AES
D. RADIUS
133
Certify For Sure with IT Exam Dumps
Answer: A
Explanation:
MFA (Multi-Factor Authentication) is a security measure that often uses an SMS or third- party application
as a secondary method to access a system. MFA requires the user to provide two or more pieces of
evidence to prove their identity, such as something they know (e.g., password), something they have (e.g.,
phone), or something they are (e.g., fingerprint)2. WPA2 (Wi-Fi Protected Access 2) is a security protocol
for wireless networks that does not use SMS or third-party applications. AES (Advanced Encryption
Standard) is a symmetric encryption algorithm that does not use SMS or third-party applications. RADIUS
(Remote Authentication Dial-In User Service) is a network protocol that provides centralized authentication
and authorization for remote access clients, but does not use SMS or third-party applications.
228. - (Topic 3)
A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the
A. taskschd.msc
B. eventvwr.msc
C. de vmgmt. msc
D. diskmgmt.msc
Answer: C
Explanation:
The tool that the technician should use to resolve the connection issues with the third-party USB adapter is
devmgmt.msc. Devmgmt.msc is a command that opens the Device Manager, which is a utility that allows
users to view and manage the hardware devices and drivers installed on a computer. The technician can
use the Device Manager to check the status, properties and compatibility of the USB adapter and its driver,
and perform actions such as updating, uninstalling or reinstalling the driver, enabling or disabling the device,
or scanning for hardware changes. Taskschd.msc is a command that opens the Task Scheduler, which is a
utility that allows users to create and manage tasks that run automatically at specified times or events. The
Task Scheduler is not relevant or useful for resolving connection issues with the USB adapter.
Eventvwr.msc is a command that opens the Event Viewer, which is a utility that allows users to view and
monitor the system logs and events. The Event Viewer may provide some information or clues about the
134
Certify For Sure with IT Exam Dumps
connection issues with the USB adapter, but it does not allow users to manage or troubleshoot the device
or its driver directly. Diskmgmt.msc is a command that opens the Disk Management, which is a utility that
allows users to view and manage the disk drives and partitions on a computer. The Disk Management is not
relevant or useful for resolving connection issues with the USB adapter. References: CompTIA A+ Core 2
229. - (Topic 3)
A user calls the help desk to report that mapped drives are no longer accessible. The technician verifies
that clicking on any of the drives on the user's machine results in an error message. Other users in the
office are not having any issues. As a first step, the technician would like to remove and attempt to
reconnect the drives. Which of the following command-line tools should the technician use?
A. net use
B. set
C. mkdir
D. rename
Answer: A
Explanation: The technician should use net use command-line tool to remove and reconnect mapped
drives. Net use is a command that allows users to manage network connections and resources, such as
shared folders or printers. Net use can be used to map or unmap network drives by specifying their drive
letters and network paths. For example, net use Z: \server\share maps drive Z: to \server\share folder, and
net use Z: /delete unmaps drive Z:. Set is a command that displays or modifies environment variables for
the current user or process. Set is not related to managing mapped drives. Mkdir is a command that creates
a new directory or folder in the current or specified location. Mkdir is not related to managing mapped drives.
Rename is a command that renames a file or folder in the current or specified location. Rename is not
related to managing mapped drives. References: CompTIA A+ Core 2 (220-1002) Certification Exam
230. - (Topic 3)
A technician installed a new application on a workstation. For the program to function properly, it needs to
be listed in the Path Environment Variable. Which of the following Control Panel utilities should the
135
Certify For Sure with IT Exam Dumps
technician use?
A. System
B. Indexing Options
C. Device Manager
Answer: A
Explanation:
System is the Control Panel utility that should be used to change the Path Environment Variable. The Path
Environment Variable is a system variable that specifies the directories where executable files are located.
To edit the Path Environment Variable, the technician should go to System > Advanced system settings >
Environment Variables and then select Path from the list of system variables and click Edit.
231. - (Topic 3)
Which of the following would MOST likely be used to change the security settings on a user's device in a
domain environment?
A. Security groups
C. Group Policy
D. Login script
Answer: C
Explanation: Group Policy is the most likely tool to be used to change the security settings on a user’s
device in a domain environment. Group Policy is a feature of Windows that allows administrators to
manage and configure settings for multiple devices and users in a centralized way. Group Policy can be
used to enforce security policies such as password complexity, account lockout, firewall rules, encryption
settings, etc.
232. - (Topic 3)
A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers
to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen
locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?
136
Certify For Sure with IT Exam Dumps
A. Requiring employees to enter their usernames and passwords
Answer: C
Explanation: The best sign-on option that would allow any employee the ability to unlock the kiosk that
relies exclusively on a numeric keypad is to use a PIN and provide it to employees. A PIN is a Personal
Identification Number that is a numeric code that can be used as part of authentication or access control. A
PIN can be entered using only a numeric keypad and can be easily shared with employees who need to
unlock the kiosk. Requiring employees to enter their usernames and passwords may not be feasible or
convenient if the kiosk only has a numeric keypad and no other input devices. Setting up facial recognition
for each employee may not be possible or secure if the kiosk does not have a camera or biometric sensor.
Requiring employees to use their fingerprints may not be possible or secure if the kiosk does not have a
fingerprint scanner or biometric sensor. References: CompTIA A+ Core 2 (220-1002) Certification Exam
233. - (Topic 3)
A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation
Answer: D
Explanation: If this file is missing or corrupted, it can cause application crashes or errors when trying to
open websites in a browser. To fix this, the technician can perform a system file check, which is a utility that
scans and repairs corrupted or missing system files1. To perform a system file check, the technician can
137
Certify For Sure with IT Exam Dumps
✑ Open the Command Prompt as an administrator. To do this, type cmd in the search box on the taskbar,
✑ In the Command Prompt window, type sfc /scannow and hit Enter. This will start the scanning and
✑ Wait for the process to complete. If any problems are found and fixed, you will see a message saying
Windows Resource Protection found corrupt files and successfully repaired them. If no problems are found,
you will see a message saying Windows Resource Protection did not find any integrity violations.
234. - (Topic 3)
A new employee was hired recently. Which of the following documents will the new employee need to sign
A. MSDS
B. EULA
C. UAC
D. AUP
Answer: D
Explanation:
A new employee will need to sign an AUP before being granted login access to the network. An AUP is an
Acceptable Use Policy that defines the rules and guidelines for using network resources and services in an
organization. An AUP typically covers topics such as security, privacy, ethics, compliance and liability
issues related to network usage. An AUP helps protect the organization and its users from legal, regulatory
and reputational risks associated with network activities. An MSDS is a Material Safety Data Sheet that
provides information about hazardous substances and how to handle them safely. An MSDS is not related
to network access or usage. A EULA is an End User License Agreement that specifies the terms and
conditions for using a software product or service. A EULA is usually provided by software vendors or
developers and does not apply to network access or usage in general. A UAC is a User Account Control
that is a security feature that prompts users for permission or confirmation before performing certain actions
that require elevated privileges or affect system settings. A UAC is not a document that needs to be signed
by users but a mechanism that helps prevent unauthorized changes or malware infections on a system.
138
Certify For Sure with IT Exam Dumps
References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.1
235. - (Topic 3)
A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet
service has been installed and has been confirmed as functional. Which of the following is the FIRST step
the homeowner should take after installation of all relevant cabling and hardware?
C. Test all network sharing and printing functionality the customer uses.
Answer: D
Explanation: When a homeowner moves and sets up a new router for the new ISP it is important to take
appropriate security measures to protect their network from potential security threats. The FIRST step that
the homeowner should take after installation of all relevant cabling and hardware is to change the default
Most modern routers come with default usernames and passwords that are widely known to potential
attackers. If these defaults are not changed, it could make it easier for external attackers to gain
unauthorized access to the network. Changing the passwords on new network devices is a simple but
236. - (Topic 3)
A Windows user recently replaced a computer The user can access the public internet on the computer;
B. DHCP settings
C. IP address settings
D. Firewall settings
E. Antivirus settings
Answer: D
139
Certify For Sure with IT Exam Dumps
Explanation: The technician should adjust the firewall settings to resolve the issue of not being able to
access an internal site at https://companyintranet.com:8888. The firewall settings control how the firewall
filters and allows network traffic based on rules and policies. The firewall settings may be blocking or
preventing the access to the internal site by mistake or by default, especially if the site uses a non-standard
port number such as 8888. The technician should check and modify the firewall settings to allow the access
to the internal site or its port number. Default gateway settings determine how a computer connects to other
networks or the internet. Default gateway settings are not likely to cause the issue of not being able to
access an internal site if the user can access the public internet. DHCP settings determine how a computer
obtains its IP address and other network configuration parameters automatically from a DHCP server.
DHCP settings are not likely to cause the issue of not being able to access an internal site if the user can
access other network resources. IP address settings determine how a computer identifies itself and
communicates with other devices on a network. IP address settings are not likely to cause the issue of not
being able to access an internal site if the user can access other network resources. Antivirus settings
control how the antivirus software scans and protects the computer from malware and threats. Antivirus
settings are less likely to cause the issue of not being able to access an internal site than firewall settings,
unless the antivirus software has its own firewall feature that may interfere with the network traffic.
References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.6
237. - (Topic 3)
A technician needs to transfer a file to a user's workstation. Which of the following would BEST accomplish
A. VPN
B. SMB
C. RMM
D. MSRA
Answer: B
Explanation:
SMB stands for Server Message Block, which is a network file sharing protocol that allows applications on a
computer to read and write to files and to request services from server programs in a computer network.
SMB is a built-in protocol in Windows operating systems and can be used to transfer files between
140
Certify For Sure with IT Exam Dumps
computers over a network. The technician can use SMB to access a file share on the user’s workstation
and copy the file to or from it. VPN stands for virtual private network, which is a technology that creates a
secure and encrypted connection over a public network. VPN is not a built-in protocol in Windows operating
systems and does not directly transfer files between computers. RMM stands for remote monitoring and
management, which is a type of software solution that allows remote management and monitoring of
devices and networks. RMM is not a built-in protocol in Windows operating systems and does not directly
transfer files between computers. MSRA stands for Microsoft Remote Assistance, which is a feature that
allows a user to invite another user to view or control their computer remotely. MSRA is not a protocol, but
an application that uses Remote Desktop Protocol (RDP) to establish a connection. MSRA does not directly
238. - (Topic 3)
A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the
technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.
Which of the following types of malware is the system MOST likely infected with?
A. Keylogger
B. Rootkit
C. Ransomware
D. Trojan
Answer: C
Explanation: Ransomware is a type of malware that encrypts the files on the victim’s computer and
demands a ransom for their decryption. Ransomware can cause high disk throughput by encrypting large
239. - (Topic 3)
A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following
141
Certify For Sure with IT Exam Dumps
D. Enabling remote drive encryption
Answer: B
Explanation: The best action to protect against unauthorized access of the data on the lost company tablet
is to perform a remote wipe on the device. A remote wipe is a feature that allows an administrator or a user
to erase all the data and settings on a device remotely, usually through a web portal or an email command.
A remote wipe can help prevent the data from being accessed or compromised by anyone who finds or
steals the device. Changing the office’s Wi-Fi SSID and password may prevent the device from connecting
to the office network but may not prevent the data from being accessed locally or through other networks.
Changing the user’s password may prevent the device from logging in to the user’s account but may not
prevent the data from being accessed by other means or accounts. Enabling remote drive encryption may
protect the data from being read by unauthorized parties but may not be possible if the device is already
References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 3.1
240. - (Topic 3)
Which of the following features allows a technician to configure policies in a Windows 10 Professional
desktop?
A. gpedit
B. gpmc
C. gpresult
D. gpupdate
Answer: A
Explanation: The feature that allows a technician to configure policies in a Windows 10 Professional
desktop is gpedit. Gpedit is a command that opens the Local Group Policy Editor, which is a utility that
allows users to view and modify local group policies on their Windows PC. Local group policies are a set of
rules and settings that control the behavior and configuration of the system and its users. Local group
policies can be used to configure policies such as security, network, software installation and user rights.
Gpmc is a command that opens the Group Policy Management Console, which is a utility that allows users
to view and modify domain-based group policies on a Windows Server. Domain- based group policies are a
set of rules and settings that control the behavior and configuration of the computers and users in a domain.
142
Certify For Sure with IT Exam Dumps
Domain-based group policies are not available on a Windows 10 Professional desktop. Gpresult is a
command that displays the result of applying group policies on a Windows PC. Gpresult can be used to
troubleshoot or verify group policy settings but not to configure them. Gpupdate is a command that updates
or refreshes the group policy settings on a Windows PC. Gpupdate can be used to apply new or changed
group policy settings but not to configure them. References: CompTIA A+ Core 2 (220-1002) Certification
241. - (Topic 3)
A Windows workstation that was recently updated with approved system patches shut down instead of
restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS
folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is
still detected. Which of the following BEST describes why the system still has malware?
B. The system updates did not include the latest anti-malware definitions.
D. The malware was installed before the system restore point was created.
Answer: D
Explanation:
The best explanation for why the system still has malware after performing a System Restore is that the
malware was installed before the system restore point was created. A system restore point is a snapshot of
the system settings and configuration at a certain point in time. A System Restore is a feature that allows
users to restore their system to a previous state in case of problems or errors. However, a System Restore
does not affect personal files or folders, and it may not remove malware that was already present on the
system before the restore point was created. A system patch disabling the antivirus protection and host
firewall may increase the risk of malware infection, but it does not explain why the malware persists after a
System Restore. The system updates not including the latest anti-malware definitions may reduce the
effectiveness of malware detection and removal, but it does not explain why the malware persists after a
System Restore. The system restore process being compromised by the malware may prevent a
successful System Restore, but it does not explain why the malware persists after a System Restore.
References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 1.3
143
Certify For Sure with IT Exam Dumps
242. - (Topic 3)
A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even
though the technician installed 8GB. Which of the following is the MOST likely reason this system is not
Answer: B
Explanation:
The most likely reason that the system is not utilizing all the available RAM is that it is running a 32-bit OS.
A 32-bit OS can only address up to 4GB of RAM, and some of that is reserved for hardware and system
use1. Therefore, even if the technician installed 8GB of RAM, the system can only use around 3.5GB of
usable RAM. To use the full 8GB of RAM, the technician would need to install a 64-bit OS, which can
address much more memory2. The system missing updates, the system’s memory failing, or the system
References: 2:
https://support.microsoft.com/en-us/windows/windows-10-system-requirements-6d4e9a79-66bf-7950-467c
-795cf0386715 1: https://www.makeuseof.com/tag/unlock-64gb-ram-32-bit-windows-pae-patch/
243. - (Topic 3)
A manager called the help desk to ask for assistance with creating a more secure environment for the
finance department- which resides in a non-domain environment. Which of the following would be the BEST
Answer: B
144
Certify For Sure with IT Exam Dumps
Explanation:
Restricting user permissions is a method of creating a more secure environment for the finance department
in a non-domain environment. This means that users will only have access to the files and resources that
they need to perform their tasks and will not be able to modify or delete other files or settings that could
244. - (Topic 3)
Which of the following is used to integrate Linux servers and desktops into Windows Active Directory
environments?
A. apt-get
B. CIFS
C. Samba
D. greP
Answer: C
Explanation:
Samba is a software suite that allows Linux servers and desktops to integrate with Windows Active
Directory environments. Samba can act as a domain controller, a file server, a print server, or a client for
Windows networks. Samba can also provide authentication and authorization services for Linux users and
245. - (Topic 3)
A technician receives a call (rom a user who is having issues with an application. To best understand the
issue, the technician simultaneously views the user's screen with the user. Which of the following would
A. SSH
B. VPN
C. VNC
D. RDP
Answer: C
Explanation:
145
Certify For Sure with IT Exam Dumps
VNC (Virtual Network Computing) is a protocol that allows a technician to simultaneously view and control a
user’s screen remotely. VNC uses a server-client model, where the user’s computer runs a VNC server and
the technician’s computer runs a VNC client. VNC can work across different platforms and operating
systems3. SSH (Secure Shell) is a protocol that allows a technician to access a user’s command-line
interface remotely, but not their graphical user interface. VPN (Virtual Private Network) is a technology that
creates a secure and encrypted connection over a public network, but does not allow screen sharing. RDP
(Remote Desktop Protocol) is a protocol that allows a technician to access a user’s desktop remotely, but
246. - (Topic 3)
A user requires local administrative access to a workstation. Which of the following Control Panel utilities
A. System
C. User Accounts
Answer: C
Explanation:
User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on
a workstation1. The technician can use User Accounts to grant local administrative access to a user by
adding the user to the Administrators group1. The Administrators group has full control over the workstation
and can perform tasks such as installing software, changing system settings, and accessing all files.
(https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/local-users-a
nd-groups)
247. - (Topic 3)
A user requires local administrative access to a workstation. Which of the following Control Panel utilities
146
Certify For Sure with IT Exam Dumps
A. System
C. User Accounts
Answer: C
Explanation:
User Accounts is a Control Panel utility that allows the technician to manage user accounts and groups on
a local computer. The technician can use this utility to add a user to the local administrators group, which
grants the user local administrative access to the workstation. The other options are not relevant for this
task. References: :
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/manage-user-accounts-and-gro
ups
248. - (Topic 3)
A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following
would the technician need to execute after editing the hosts file?
Answer: D
Explanation: Resetting the network adapter is the best way to apply the changes made to the hosts file on a
few PCs. The hosts file is a text file that maps hostnames to IP addresses and can be used to block certain
domains by redirecting them to invalid or local addresses. Resetting the network adapter will clear the DNS
cache and force the PC to use the new entries in the hosts file.
249. - (Topic 3)
The audio on a user's mobile device is inconsistent when the user uses wireless headphones and moves
around. Which of the following should a technician perform to troubleshoot the issue?
147
Certify For Sure with IT Exam Dumps
B. Enable the NFC setting on the device.
Answer: C
Explanation: Bringing the device within Bluetooth range is the best way to troubleshoot the issue of
Bluetooth is a wireless technology that allows devices to communicate over short distances, typically up to
10 meters or 33 feet. If the device is too far from the headphones, the Bluetooth signal may be weak or
250. - (Topic 3)
A. Terminal
B. FileVault
C. Privacy
D. Keychain
Answer: D
Explanation:
Keychain is a feature of macOS that securely stores passwords, account numbers, and other confidential
information for your Mac, apps, servers, and websites1. You can use the Keychain Access app on your
Mac to view and manage your keychains and the items stored in them1. Keychain can also sync your
passwords and other secure information across your devices using iCloud Keychain1. Keychain can be
used as a password manager in macOS to help you keep track of and protect your passwords.
(https://support.apple.com/guide/mac-help/use-keychains-to-store-passwords- mchlf375f392/mac)
251. - (Topic 3)
A user's corporate phone was stolen, and the device contains company trade secrets.
Which of the following technologies should be implemented to mitigate this risk? (Select TWO).
A. Remote wipe
148
Certify For Sure with IT Exam Dumps
B. Firewall
C. Device encryption
D. Remote backup
E. Antivirus
Answer: A,C
Explanation:
Remote wipe is a feature that allows data to be deleted from a device or system remotely by an
administrator or owner1. It is used to protect data from being compromised if the device is lost, stolen, or
changed hands1. Device encryption is a feature that helps protect the data on a device by making it
unreadable to unauthorized users2. It requires a key or a password to access the data2. Both features can
help mitigate the risk of losing company trade secrets if a corporate phone is stolen.
(https://support.microsoft.com/en-us/windows/device-encryption-in-windows-ad5dcf4b-dbe0-2331-228f-79
25c2a3012d)
252. - (Topic 3)
A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even
though the technician installed 8GB. Which of the following is the MOST likely reason this system is not
Answer: B
Explanation:
The most likely reason that the system is not utilizing all the available RAM is that the system is utilizing a
32-bit OS. A 32-bit OS is an operating system that uses 32 bits to address memory locations and perform
calculations. A 32-bit OS can only support up to 4GB of RAM, and some of that RAM may be reserved for
149
Certify For Sure with IT Exam Dumps
hardware devices or system functions, leaving less than 4GB of usable RAM for applications and
processes. A 32-bit OS cannot recognize or utilize more than 4GB of RAM, even if more RAM is installed
on the system. To utilize all the available RAM, the system needs to use a 64-bit OS, which can support
much more RAM than a 32-bit OS. The system missing updates may cause some performance or
compatibility issues, but it does not affect the amount of usable RAM on the system. The system’s memory
failing may cause some errors or crashes, but it does not affect the amount of usable RAM on the system.
The system requiring BIOS updates may cause some configuration or compatibility issues, but it does not
affect the amount of usable RAM on the system. References: CompTIA A+ Core 2 (220-1002) Certification
253. - (Topic 3)
A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that
may infect these devices. Which of the following should the company deploy to address these concerns?
A. UAC
B. MDM
C. LDAP
D. SSO
Answer: B
Explanation:
MDM stands for mobile device management, which is a type of software solution that allows remote
management and security of mobile devices. MDM can help a company reduce data disclosure caused by
malware that may infect these devices by enforcing security policies, such as encryption, password
protection, antivirus software, and remote wipe. MDM can also monitor and control the access of personal
devices to corporate data and networks. UAC stands for user account control, which is a feature of
Windows that prompts users for permission or an administrator password before making changes that
affect the system. UAC may not be effective in preventing malware infection or data disclosure on personal
devices. LDAP stands for lightweight directory access protocol, which is a protocol for accessing and
managing information stored in a directory service, such as user names and passwords. LDAP does not
directly address the issue of malware infection or data disclosure on personal devices. SSO stands for
single sign-on, which is a feature that allows users to access multiple applications or services with one set
150
Certify For Sure with IT Exam Dumps
of credentials. SSO may not prevent malware infection or data disclosure on personal devices, and may
https://www.nist.gov/news-events/news/2021/03/mobile-device-security-bring-your-own-device-byod-draft-
sp-1800-22
254. - (Topic 3)
Which of the following is the default GUI and file manager in macOS?
A. Disk Utility
B. Finder
C. Dock
D. FileVault
Answer: B
Explanation: Finder is the default GUI and file manager in macOS. Finder is an application that allows users
to access and manage files and folders on their Mac computers. Finder also provides features such as
Quick Look, Spotlight, AirDrop and iCloud Drive. Finder uses a graphical user interface that consists of
icons, menus, toolbars and windows to display and interact with files and folders. Disk Utility is a utility that
allows users to view and manage disk drives and partitions on their Mac computers. Disk Utility is not a GUI
or a file manager but a disk management tool. Dock is a feature that allows users to access and launch
applications on their Mac computers. Dock is not a GUI or a file manager but an application launcher.
FileVault is a feature that allows users to encrypt and protect their data on their Mac computers. FileVault is
not a GUI or a file manager but an encryption tool. References: CompTIA A+ Core 2 (220-1002)
255. - (Topic 3)
A large company is selecting a new Windows operating system and needs to ensure it has built-in
encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?
A. Home
B. Pro
D. Enterprise
151
Certify For Sure with IT Exam Dumps
Answer: D
Explanation:
When selecting a new Windows operating system for a large company that needs built-in encryption and
endpoint protection, the Enterprise edition is the most likely choice. This edition provides advanced security
features such as Windows Defender Advanced Threat Protection (ATP), AppLocker, and BitLocker Drive
Encryption. These features can help to protect the company's data and endpoints against malware attacks,
The Home and Pro editions of Windows do not include some of the advanced security features provided by
the Enterprise edition, such as Windows Defender ATP and AppLocker. The Pro for Workstations edition is
designed for high-performance and high- end hardware configurations, but it does not provide additional
256. - (Topic 3)
A systems administrator is creating a new document with a list of the websites that users are allowed to
access. Which of the following types of documents is the administrator MOST likely creating?
C. Incident report
Answer: A
Explanation:
An access control list (ACL) is a list of permissions associated with a system resource (object), such as a
website. An ACL specifies which users or system processes are granted access to objects, as well as what
operations are allowed on given objects1. A systems administrator can create an ACL to define the list of
257. - (Topic 3)
A user contacts a technician about an issue with a laptop. The user states applications open without being
launched and the browser redirects when trying to go to certain websites. Which of the following is MOST
152
Certify For Sure with IT Exam Dumps
likely the cause of the user's issue?
A. Keylogger
B. Cryptominers
C. Virus
D. Malware
Answer: D
Explanation:
The most likely cause of the user’s issue of applications opening without being launched and browser
redirects when trying to go to certain websites is malware. Malware is a general term that refers to any
software or code that is malicious or harmful to a computer or system. Malware can perform various
browsers, displaying ads, stealing data, encrypting files or damaging hardware. Malware can infect a
computer or system through various means, such as email attachments, web downloads, removable media
or network connections. Keylogger is a type of malware that records and transmits the keystrokes made by
a user on a keyboard. Keylogger can be used to steal personal or sensitive information, such as passwords,
Keylogger does not typically open applications or redirect browsers but only captures user inputs.
Cryptominers are a type of malware that use the computing resources of a computer or system to mine
cryptocurrency, such as Bitcoin or Ethereum. Cryptominers can degrade the performance and increase the
power consumption of a computer or system. Cryptominers do not typically open applications or redirect
browsers but only consume CPU or GPU cycles. Virus is a type of malware that infects and replicates itself
258. - (Topic 3)
A customer called the help desk to report that a machine that was recently updated is no longer working.
The support technician checks the latest logs to see what updates were deployed, but nothing was
deployed in more than three weeks. Which of the following should the support technician do to BEST
B. Advise that the help desk will investigate and follow up at a later date.
153
Certify For Sure with IT Exam Dumps
C. Put the customer on hold and escalate the call to a manager.
Answer: D
Explanation:
Open-ended questions are questions that require more than a yes or no answer and encourage the
customer to provide more details and information. Using open-ended questions can help the support
technician to understand the problem better, identify the root cause, and find a suitable solution. Some
Offering to wipe and reset the device for the customer is not a good option, as it may result in data loss and
inconvenience for the customer. It should be used as a last resort only if other troubleshooting steps fail.
Advising that the help desk will investigate and follow up at a later date is not a good option, as it may leave
the customer unsatisfied and frustrated. It should be used only if the problem requires further research or
escalation and cannot be resolved on the first call. Putting the customer on hold and escalating the call to a
manager is not a good option, as it may waste time and resources. It should be used only if the problem is
beyond the support technician’s scope or authority and requires managerial intervention.
259. - (Topic 3)
Which of the following options should MOST likely be considered when preserving data from a hard drive
A. Licensing agreements
B. Chain of custody
D. Data integrity
F. Retention requirements
154
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: Chain of custody and data integrity are two options that should most likely be considered when
preserving data from a hard drive for forensic analysis. Chain of custody refers to the documentation and
tracking of who has access to the data and how it is handled, stored, and transferred. Data integrity refers
to the assurance that the data has not been altered, corrupted, or tampered with during the preservation
process
260. - (Topic 3)
Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility
A. APFS
B. ext4
C. CDFS
D. FAT32
Answer: D
Explanation:
The best filesystem format to ensure read and write compatibility of USB flash drives across several
generations of Microsoft operating systems is FAT32. FAT32 stands for File Allocation Table 32-bit and is a
filesystem format that organizes and manages files and folders on storage devices using 32-bit clusters.
FAT32 is compatible with most Microsoft operating systems since Windows 95 OSR2, as well as other
operating systems such as Linux and Mac OS X. FAT32 can support storage devices up to 2TB in size and
files up to 4GB in size. APFS stands for Apple File System and is a filesystem format that organizes and
manages files and folders on storage devices using encryption, snapshots and cloning features. APFS is
compatible with Mac OS X 10.13 High Sierra and later versions but not with Microsoft operating systems
natively. Ext4 stands for Fourth Extended File System and is a filesystem format that organizes and
manages files and folders on storage devices using journaling, extents and delayed allocation features.
Ext4 is compatible with Linux operating systems but not with Microsoft operating systems natively.
261. - (Topic 3)
A desktop engineer is deploying a master image. Which of the following should the desktop engineer
155
Certify For Sure with IT Exam Dumps
consider when building the master image? (Select TWO).
A. Device drivers
D. Display orientation
Answer: A,C
Explanation:
✑ A. Device drivers23: Device drivers are software components that enable the operating system to
communicate with hardware devices. Different devices may require different drivers, so the desktop
engineer should include the appropriate drivers in the master image or configure the deployment process to
✑ C. Installed application license keys2: Installed application license keys are codes that activate or
authenticate software applications. Some applications may require license keys to be entered during
installation or after deployment. The desktop engineer should include the license keys in the master image
262. - (Topic 3)
A BSOD appears on a user's workstation monitor. The user immediately presses the power button to shut
down the PC, hoping to repair the issue. The user then restarts the PC, and the BSOD reappears, so the
user contacts the help desk. Which of the following should the technician use to determine the cause?
A. Stop code
B. Event Mewer
C. Services
D. System Configuration
Answer: A
Explanation: When a Blue Screen of Death (BSOD) appears on a Windows workstation, it indicates that
there is a serious problem with the operating system. The stop code displayed on the BSOD can provide
valuable information to help determine the cause of the issue. The stop code is a specific error code that is
156
Certify For Sure with IT Exam Dumps
associated with the BSOD, and it can help identify the root cause of the problem.
In this scenario, the user has encountered a BSOD and has restarted the PC, only to see the BSOD
reappear. This suggests that the problem is persistent and requires further investigation. By analyzing the
stop code displayed on the BSOD, a technician can begin to identify the underlying issue and take
263. - (Topic 3)
While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have
very similar names. Which of the following social-engineering attacks is being attempted?
A. Evil twin
B. Impersonation
C. Insider threat
D. Whaling
Answer: A
Explanation: An evil twin is a type of social-engineering attack that involves setting up a rogue wireless
access point that mimics a legitimate one. The attacker can then intercept or modify the traffic of the users
who connect to the fake SSID. The attacker may also use phishing or malware to steal credentials or
264. - (Topic 3)
A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the
web browser cache does not resolve the issue. Which of the following should a technician investigate
Answer: B
Explanation: A possible cause of the user being redirected to unexpected websites is that the localhost file
entries have been modified by malware or hackers to point to malicious or unwanted websites. The
157
Certify For Sure with IT Exam Dumps
localhost file is a text file that maps hostnames to IP addresses and can override DNS settings. By
examining the localhost file entries, a technician can identify and remove any suspicious or unauthorized
entries that may cause the redirection issue. Enabling firewall ACLs may not resolve the issue if the firewall
rules do not block the malicious or unwanted websites. Verifying the routing tables may not resolve the
issue if the routing configuration is correct and does not affect the web traffic. Updating the antivirus
definitions may help prevent future infections but may not remove the existing malware or changes to the
localhost file. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0,
Domain 1.3
265. - (Topic 3)
A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the
following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).
A. Standard formatting
B. Drilling
C. Erasing
D. Recycling
E. Incinerating
F. Low-level formatting
Answer: B,E
Explanation: Drilling and incinerating are physical destruction methods that make the data on hard drives
unrecoverable. Standard formatting, erasing and low-level formatting are logical methods that can be
reversed with data recovery tools. Recycling is not a destruction method at all. Verified References:
266. - (Topic 3)
A. Scope
B. Purpose
C. Analysis
D. Impact
158
Certify For Sure with IT Exam Dumps
Answer: A
Explanation:
The term that defines the extent of a change is scope. Scope is a measure of the size, scale and
boundaries of a project or an activity. Scope defines what is included and excluded in the project or activity,
such as goals, requirements, deliverables, tasks and resources. Scope helps determine the feasibility,
duration and cost of the project or activity. Scope also helps manage the expectations and needs of the
stakeholders involved in the project or activity. Purpose is the reason or objective for doing a project or an
activity. Purpose defines why the project or activity is important or necessary, such as solving a problem,
meeting a need or achieving a goal. Purpose helps provide direction, motivation and justification for the
project or activity. Analysis is the process of examining, evaluating and interpreting data or information
related to a project or an activity. Analysis helps identify, understand and prioritize issues, risks,
opportunities and solutions for the project or activity. Impact is the effect or outcome of a project or an
activity on something or someone else. Impact defines how the project or activity affects or influences other
factors, such as performance, quality, satisfaction or value. Impact helps measure the success and
effectiveness of the project or activity. References: CompTIA A+ Core 2 (220-1002) Certification Exam
267. - (Topic 3)
A company needs employees who work remotely to have secure access to the corporate intranet. Which of
A. Password-protected Wi-Fi
B. Port forwarding
D. Perimeter network
Answer: C
Explanation:
A virtual private network (VPN) is a technology that creates a secure and encrypted connection over a
public network, such as the internet. A VPN allows remote employees to access the corporate intranet as if
Password-protected Wi-Fi is a security measure for wireless networks that does not provide access to the
159
Certify For Sure with IT Exam Dumps
corporate intranet. Port forwarding is a technique that allows external devices to access services on a
private network through a router, but does not provide access to the corporate intranet. A perimeter network
is a network segment that lies between an internal network and an external network, such as the internet,
and provides an additional layer of security, but does not provide access to the corporate intranet.
268. - (Topic 3)
A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight.
When the laptop started up again, the touchpad was no longer working. The technician thinks the software
that controls the touchpad might be the issue. Which of the following tools should the technician use to
make adjustments?
A. eventvwr.msc
B. perfmon.msc
C. gpedic.msc
D. devmgmt.msc
Answer: D
Explanation:
The technician should use devmgmt.msc tool to make adjustments for the touchpad issue after Windows
installed updates on a laptop. Devmgmt.msc is a command that opens the Device Manager, which is a
utility that allows users to view and manage the hardware devices and drivers installed on a computer. The
technician can use the Device Manager to check the status, properties and compatibility of the touchpad
device and its driver, and perform actions such as updating, uninstalling or reinstalling the driver, enabling
or disabling the device, or scanning for hardware changes. Eventvwr.msc is a command that opens the
Event Viewer, which is a utility that allows users to view and monitor the system logs and events. The Event
Viewer may provide some information or clues about the touchpad issue, but it does not allow users to
manage or troubleshoot the device or its driver directly. Perfmon.msc is a command that opens the
Performance Monitor, which is a utility that allows users to measure and analyze the performance of the
system
269. - (Topic 3)
A technician is troubleshooting an issue with a computer that contains sensitive information. The technician
160
Certify For Sure with IT Exam Dumps
determines the computer needs to be taken off site for repair. Which of the following should the technician
do NEXT?
A. Remove the HDD and then send the computer for repair.
C. Delete the sensitive information before the computer leaves the building.
Answer: D
Explanation: The next step that the technician should do before taking the computer off site for repair is to
get authorization from the manager. Getting authorization from the manager is important because it
ensures that the technician has permission and approval to remove the computer from the premises and
perform the repair work off site. Getting authorization from the manager can also help document and
communicate the reason and duration of the repair and avoid any misunderstanding or conflict with the user
or the organization. Removing the HDD and then sending the computer for repair may not be feasible or
necessary if the issue is not related to the HDD or if the HDD contains essential data or software for the
repair. Checking corporate policies for guidance may be a good step but it does not replace getting
authorization from the manager who is responsible for the computer and its data. Deleting the sensitive
information before the computer leaves the building may not be possible or advisable if the issue prevents
access to the data or if the data is needed for troubleshooting or recovery purposes. References: CompTIA
270. - (Topic 3)
A technician is working on a way to register all employee badges and associated computer IDs. Which of
the following options should the technician use in order to achieve this objective?
A. Database system
B. Software management
D. Infrastructure as a Service
Answer: A
Explanation:
A database system is a software application that allows storing, organizing, and managing data in a
161
Certify For Sure with IT Exam Dumps
structured way. A database system can be used to register all employee badges and associated computer
IDs by creating a table or a record for each employee that contains their badge number, computer ID, name,
and other relevant information. A database system can also facilitate searching, updating, and deleting data
as needed. Software management is a general term that refers to the process of planning, developing,
testing, deploying, and maintaining software applications. It does not directly address the issue of
registering employee badges and computer IDs. Active Directory description is a field in Active Directory
that can be used to store additional information about an object, such as a user or a computer. It is not a
software application that can be used to register employee badges and computer IDs by itself.
Infrastructure as a Service (IaaS) is a cloud computing model that provides servers, storage, networking,
and software over the internet. It does not directly address the issue of registering employee badges and
https://www.idcreator.com/
https://www.alphacard.com/photo-id-systems/card-type/employee-badges
271. - (Topic 3)
Which of the following script types is used with the Python language by default?
A. .ps1
B. .vbs
C. .bat
D. .py
Answer: D
Explanation:
The script type that is used with the Python language by default is .py. .py is a file extension that indicates a
Python script file that contains Python code that can be executed by a Python interpreter or compiler.
Python is a high-level, general-purpose and interpreted programming language that can be used for various
applications, such as web development, data analysis, machine learning and automation. .ps1 is a file
extension that indicates a PowerShell script file that contains PowerShell code that can be executed by a
PowerShell interpreter or compiler. PowerShell is a task-based, command-line and scripting language that
can be used for system administration and automation on Windows systems. .vbs is a file extension that
indicates a VBScript file that contains VBScript code that can be executed by a VBScript interpreter or
162
Certify For Sure with IT Exam Dumps
compiler. VBScript is an Active Scripting language that can be used for web development and automation
on Windows systems. .bat is a file extension that indicates a batch file that contains a series of commands
that can be executed by a command-line interpreter or shell on Windows systems. Batch files can be used
for system administration and automation on Windows systems. References: CompTIA A+ Core 2
272. - (Topic 3)
A data center is required to destroy SSDs that contain sensitive information. Which of the following is the
A. Wiping
B. Low-level formatting
C. Shredding
D. Erasing
Answer: C
Explanation: Shredding is the best method to use for the physical destruction of SSDs because it reduces
them to small pieces that cannot be recovered or accessed. Wiping, low-level formatting, and erasing are
not effective methods for destroying SSDs because they do not physically damage the flash memory chips
273. - (Topic 3)
A technician receives a call from a user who is unable to open Outlook. The user states that Outlook
worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is
C. Malware infection
Answer: D
Explanation:
Operating system updates can sometimes cause compatibility issues with some applications, such as
163
Certify For Sure with IT Exam Dumps
Outlook, that may prevent them from opening or working properly. This can happen if the update changes
some system files or settings that Outlook relies on, or if the update conflicts with some Outlook add-ins or
extensions. To fix this, the technician can try some of these troubleshooting steps:
✑ Start Outlook in safe mode and disable add-ins. Safe mode is a way of starting
Outlook without any add-ins or extensions that may interfere with its functionality. To start Outlook in safe
mode, press and hold the Ctrl key while clicking on the Outlook icon. You should see a message asking if
you want to start Outlook in safe mode. Click Yes. If Outlook works fine in safe mode, it means one of the
add- ins is causing the problem. To disable add-ins, go to File > Options > Add-ins. In the Manage
drop-down list, select COM Add-ins and click Go. Uncheck any add- ins that you don’t need and click OK.
✑ Create a new Outlook profile. A profile is a set of settings and information that
Outlook uses to manage your email accounts and data. Sometimes, a profile can get corrupted or damaged
and cause Outlook to malfunction. To create a new profile, go to Control Panel > Mail > Show Profiles. Click
Add and follow the instructions to set up a new profile with your email account. Make sure to select the
option to use the new profile as the default one. Restart Outlook and check if the issue is resolved5.
✑ Repair your Outlook data files. Data files are files that store your email messages,
contacts, calendar events, and other items on your computer. Sometimes, data files can get corrupted or
damaged and cause Outlook to malfunction. To repair your data files, you can use a tool called scanpst.exe,
which is located in the same folder where Outlook is installed (usually C:\Program Files\Microsoft
Office\root\Office16). To use scanpst.exe, close Outlook and locate the tool in the folder. Double-click on it
Select the file and click Start to begin the scanning and repairing process. When it’s done, restart Outlook
✑ Run the /resetnavpane command. The navigation pane is the panel on the left side
of Outlook that shows your folders and accounts. Sometimes, the navigation pane can get corrupted or
damaged and cause Outlook to malfunction. To reset the navigation pane, press Windows key + R to open
the Run dialog box, or open the Command Prompt. Type outlook.exe /resetnavpane and hit Enter. This will
clear and regenerate the navigation pane settings for Outlook. Restart Outlook and check if the issue is
resolved.
164
Certify For Sure with IT Exam Dumps
274. - (Topic 3)
A technician is in the process of installing a new hard drive on a server but is called away to another task.
The drive has been unpackaged and left on a desk. Which of the following should the technician perform
before leaving?
B. Leave the hard drive on the table; it will be okay while the other task is completed.
C. Place the hard drive in an antistatic bag and secure the area containing the hard drive.
Answer: C
Explanation:
The technician should place the hard drive in an antistatic bag and secure the area containing the hard
drive before leaving. This will protect the hard drive from electrostatic discharge (ESD), dust, moisture, and
physical damage. Asking coworkers to make sure no one touches the hard drive is not a reliable or secure
way to prevent damage. Leaving the hard drive on the table exposes it to ESD and other environmental
hazards. Connecting an electrostatic discharge strap to the drive is not enough to protect it from dust,
275. - (Topic 3)
BOOTMGR is missing
Which of the following should a desktop engineer attempt FIRST to address this issue?
A. Repair Windows.
Answer: A
Explanation:
The error “BOOTMGR is missing” indicates that the boot sector is damaged or missing1. The boot sector is
a part of the hard disk that contains the code and information needed to start Windows1. To fix this error,
165
Certify For Sure with IT Exam Dumps
one of the possible methods is to run Startup Repair from Windows Recovery Environment (WinRE)1.
Startup Repair is a tool that can automatically diagnose and repair problems with the boot process2.
References: 1: “Bootmgr is missing Press Ctrl+Alt+Del to restart” error when you start Windows
(https://support.microsoft.com/en-us/topic/-bootmgr-is-missing-press-ctrl-alt-del-to-restart-error-when-you-
(https://support.microsoft.com/en-us/windows/startup-repair-frequently-asked-questions-f5f412a0-19c4-8e
0a-9f68- bb0f17f3daa0)
276. - (Topic 3)
A. Linux
B. Microsoft Windows
C. iOS
D. Chromium
Answer: D
Explanation: Chromium is an operating system that only has a web browser interface. Chromium is an
open-source project that provides the source code and framework for Chrome OS, which is a Linux-based
operating system developed by Google. Chromium and Chrome OS are designed to run web applications
and cloud services through the Chrome web browser, which is the only user interface available on the
system. Chromium and Chrome OS are mainly used on devices such as Chromebooks, Chromeboxes and
Chromebits. Linux is an operating system that does not only have a web browser interface
but also a graphical user interface and a command-line interface. Linux is an open-source and
customizable operating system that can run various applications and services on different devices and
platforms. Linux can also support different web browsers, such as Firefox, Opera and Chromium. Microsoft
Windows is an operating system that does not only have a web browser interface but also a graphical user
interface and a command-line interface. Microsoft Windows is a proprietary and popular operating system
that can run various applications and services on different devices and platforms. Microsoft Windows can
also support different web browsers, such as Edge, Internet Explorer and Chrome. iOS is an operating
system that does not only have a web browser interface but also a graphical user interface and a
voice-based interface. iOS is a proprietary and mobile operating system developed by Apple that can run
166
Certify For Sure with IT Exam Dumps
various applications and services on devices such as iPhone, iPad and iPod Touch. iOS can also support
different web browsers, such as Safari, Firefox and Chrome. References: CompTIA A+ Core 2 (220- 1002)
277. - (Topic 3)
A neighbor successfully connected to a user's Wi-Fi network. Which of the following should the user do
after changing the network configuration to prevent the neighbor from being able to connect again?
D. Disable logging.
Answer: A
Explanation:
✑ A. Disable the SSID broadcast1: The SSID broadcast is a feature that allows a Wi- Fi network to be
visible to nearby devices. Disabling the SSID broadcast can make the network harder to find by
unauthorized users, but it does not prevent them from accessing it if they know the network name and
password.
278. - (Topic 3)
A user receives a call from someone who claims to be from the user's bank and requests information to
ensure the user's account is safe. Which of the following social-engineering attacks is the user
experiencing?
A. Phishing
B. Smishing
C. Whaling
D. Vishing
Answer: D
Explanation:
The user is experiencing a vishing attack. Vishing stands for voice phishing and is a type of
social-engineering attack that uses phone calls or voice messages to trick users into revealing personal or
167
Certify For Sure with IT Exam Dumps
financial information. Vishing attackers often pretend to be from legitimate organizations, such as banks,
government agencies or service providers, and use various tactics, such as urgency, fear or reward, to
persuade users to comply with their requests. Phishing is a type of social-engineering attack that uses
fraudulent emails or websites to trick users into revealing personal or financial information. Phishing does
not involve phone calls or voice messages. Smishing is a type of social-engineering attack that uses text
messages or SMS to trick users into revealing personal or financial information. Smishing does not involve
phone calls or voice messages. Whaling is a type of social- engineering attack that targets high-profile
individuals, such as executives, celebrities or politicians, to trick them into revealing personal or financial
information. Whaling does not necessarily involve phone calls or voice messages. References: CompTIA
A+ Core 2 (220- 1002) Certification Exam Objectives Version 4.0, Domain 3.1
279. - (Topic 3)
A macOS user is installing a new application. Which of the following system directories is the software
A. /etc/services
B. /Applications
C. /usr/bin
D. C:\Program Files
Answer: B
Explanation:
The software is most likely to install by default in the /Applications directory, which is the standard location
for macOS applications. This directory can be accessed from the Finder sidebar or by choosing Go >
Applications from the menu bar. The /Applications directory contains all the applications that are available
to all users on the system1. Some applications might also offer the option to install in the ~/Applications
directory, which is a personal applications folder for a single user2. The /etc/services directory is a system
configuration file that maps service names to port numbers and protocols3. The /usr/bin directory is a
system directory that contains executable binaries for various commands and utilities4. The C:\Program
280. - (Topic 3)
168
Certify For Sure with IT Exam Dumps
Which of the following macOS features provides the user with a high-level view of all open windows?
A. Mission Control
B. Finder
C. Multiple Desktops
D. Spotlight
Answer: A
Explanation: Mission Control is the macOS feature that provides the user with a high- level view of all open
windows. Mission Control allows the user to see and switch between multiple desktops, full-screen apps,
and windows in a single screen. Mission Control can be accessed by swiping up with three or four fingers
on the trackpad, pressing F3 on the keyboard, or moving the cursor to a hot corner
281. - (Topic 3)
Which of the following should be used to secure a device from known exploits?
A. Encryption
B. Remote wipe
D. Cross-site scripting
Answer: C
Explanation: Operating system updates are used to secure a device from known exploits. Operating system
updates are patches or fixes that are released by the vendor to address security vulnerabilities, bugs, or
performance issues. Operating system updates can also provide new features or enhancements to the
device. It is important to keep the operating system updated to prevent attackers from exploiting known
flaws or weaknesses.
282. - (Topic 3)
A customer calls a service support center and begins yelling at a technician about a feature for a product
that is not working to the customer's satisfaction. This feature is not supported by the service support center
and requires a field technician to troubleshoot. The customer continues to demand service. Which of the
following is the BEST course of action for the support center representative to take?
A. Inform the customer that the issue is not within the scope of this department.
169
Certify For Sure with IT Exam Dumps
B. Apologize to the customer and escalate the issue to a manager.
C. Ask the customer to explain the issue and then try to fix it independently.
D. Respond that the issue is something the customer should be able to fix.
Answer: B
Explanation:
Apologizing to the customer and escalating the issue to a manager is the best course of action for the
support center representative to take. This shows empathy and professionalism and allows the manager to
handle the situation and provide the appropriate service or resolution for the customer.
283. - (Topic 3)
A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive
immediately after the device is launched. Which of the following troubleshooting steps should the user
perform FIRST?
Answer: B
Explanation:
Sometimes, an OS update can cause compatibility issues with some applications that are not optimized for
the new version of the OS. To fix this, the user should check if there are any updates available for the
application that can resolve the issue. The user can check for application updates by following these steps:
✑ On an Android device, open the Google Play Store app and tap on the menu icon
in the top left corner. Then tap on My apps & games and look for any updates available for the application. If
✑ On an iOS device, open the App Store app and tap on the Updates tab at the bottom. Then look for any
updates available for the application. If there is an update, tap on Update to install it.
284. - (Topic 3)
An implementation specialist is replacing a legacy system at a vendor site that has only one wireless
170
Certify For Sure with IT Exam Dumps
network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has
open authentication. The technician needs to secure the vendor's sensitive data. Which of the following
Answer: B
Explanation:
The first thing that the specialist should do to protect the company’s data on an insecure network with open
authentication is to connect to the vendor’s network using a VPN. A VPN stands for Virtual Private Network
and is a technology that creates a secure and encrypted connection over a public or untrusted network. A
VPN can protect the company’s data by preventing eavesdropping, interception or modification of the
network traffic by unauthorized parties. A VPN can also provide access to the company’s internal network
and resources remotely. Manually configuring an IP address, a subnet mask and a default gateway may not
be necessary or possible if the vendor’s network uses DHCP to assign network configuration parameters
automatically. Manually configuring an IP address, a subnet mask and a default gateway does not protect
the company’s data from network attacks or threats. Changing the network location to private may not be
advisable or effective if the vendor’s network is a public or untrusted network. Changing the network
location to private does not protect the company’s data from network attacks or threats. Configuring MFA
on the network may not be feasible or sufficient if the vendor’s network has open authentication and does
not support or require MFA. Configuring MFA on the network does not protect the company’s data from
network attacks or threats. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives
285. - (Topic 3)
A SOHO client is having trouble navigating to a corporate website. Which of the following should a
171
Certify For Sure with IT Exam Dumps
C. Disable unused ports.
Answer: A
Explanation:
Content filtering is a process that manages or screens access to specific emails or webpages based on
their content categories1. Content filtering can be used by organizations to control content access through
their firewalls and enforce corporate policies around information system management2. A SOHO client may
have content filtering enabled on their network and may need to adjust it to allow access to a corporate
website that is blocked by default. The client can use a software program, a hardware device, or a
subscription service to configure the content filtering settings and whitelist the desired website2.
(https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content-filtering?view=o3
(https://www.fortinet.com/resources/cyberglossary/content-filtering)
286. - (Topic 3)
Which of the following is the proper way for a technician to dispose of used printer consumables?
C. Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.
Answer: A
Explanation:
When it comes to disposing of used printer consumables , it is important to follow the manufacturer's
instructions or guidelines for proper disposal, as different types of consumables may require different
disposal procedures. Some manufacturers provide specific instructions for proper disposal, such as
sending the used consumables back to the manufacturer or using special recycling programs.
Therefore, the proper way for a technician to dispose of used printer consumables is to proceed with the
custom manufacturer's procedure , if provided. This option ensures that the disposal is handled in an
172
Certify For Sure with IT Exam Dumps
287. - (Topic 3)
An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can
no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following
D. Rollback updates.
Answer: D
Explanation:
The technician should perform a rollback of the Windows update that caused the issue with the locally
attached devices. A rollback is a process of uninstalling an update and restoring the previous version of the
system. This can help to fix any compatibility or performance issues caused by the update1. To rollback an
update, the technician can use the Settings app, the Control Panel, or the System Restore feature. The
technician should also check for any device driver updates that might be needed after rolling back the
update. Disabling the Windows Update service is not a good practice, as it can prevent the system from
receiving important security and feature updates. Checking for updates might not fix the
issue, as the update that caused the issue might still be installed. Restoring hidden updates is not relevant,
as it only applies to updates that have been hidden by the user to prevent them from being installed2.
References: 1: https://www.windowscentral.com/how-uninstall-and-reinstall-updates-windows-10 2:
https://support.microsoft.com/en-us/windows/show-or-hide-updates-in-windows-10-9c9f0a4f-9a6e-4c8e-8b
44-afbc6b33f3cf
288. - (Topic 3)
A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The
source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities
A. copy
B. xcopy
173
Certify For Sure with IT Exam Dumps
C. robocopy
D. Copy-Item
Answer: C
Explanation:
Robocopy is a command-line utility that can be used to mirror the source data for the backup. It can copy
files and folders with various options, such as copying only changed files, preserving attributes and
permissions, and retrying failed copies. Robocopy is more powerful and flexible than copy or xcopy, which
are simpler commands that can only copy files and folders without mirroring or other advanced features.
Copy-Item is a PowerShell cmdlet that can also copy files and folders, but it is not a native Windows utility
References: 1: https://windowsreport.com/mirror-backup-software/
289. - (Topic 3)
All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working
fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?
Answer: A
Explanation: Rolling back video card drivers is the best way to resolve the issue of large desktop icons on a
user’s newly issued PC. This means restoring the previous version of the drivers that were working fine
before the software patch was deployed. The software patch may have caused compatibility issues or
290. - (Topic 3)
A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the
settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?
174
Certify For Sure with IT Exam Dumps
C. Recalibrating the digitizer
Answer: D
Explanation: When a user rotates a cell phone horizontally to read emails and the display remains vertical,
even though the settings indicate autorotate is on, this is typically due to a problem with the phone's
accelerometer. The accelerometer is the sensor that detects changes in the phone's orientation and adjusts
the display accordingly. If the accelerometer is not calibrated correctly, the display may not rotate as
expected.
Recalibrating the accelerometer is the most likely solution to this issue. The process for recalibrating the
accelerometer can vary depending on the specific device and operating system, but it typically involves
going to the device's settings and finding the option to calibrate or reset the sensor. Users may need to
search their device's documentation or online resources to find specific instructions for their device.
291. - (Topic 3)
A technician is installing a program from an ISO file. Which of the following steps should the technician
take?
C. Copy the ISO file to a backup location and run the ISO file.
Answer: A
Explanation: Mounting the ISO and running the installation file is the correct way to install a program from
an ISO file. An ISO file is an image of a disc that contains all the files and folders of a program. Mounting
the ISO means creating a virtual drive that can access the ISO file as if it were a physical disc. Running the
installation file means executing the setup program that will install the program on the computer
292. - (Topic 3)
A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The
technician needs to make use of a tool natively designed for Linux. Which of the following tools will the
175
Certify For Sure with IT Exam Dumps
A. VNC
B. MFA
C. MSRA
D. RDP
Answer: A
Explanation: The tool that the technician will most likely use to remotely connect to a Linux desktop is VNC.
VNC stands for Virtual Network Computing and is a protocol that allows remote access and control of a
graphical desktop environment over a network. VNC is natively designed for Linux and can also support
other operating systems, such as Windows and Mac OS. VNC can be used to assist users with
troubleshooting by viewing and interacting with their desktops remotely. MFA stands for Multi-Factor
Authentication and is a method of verifying identity using two or more factors, such as something you know,
something you have or something you are. MFA is not a tool that can be used to remotely connect to a
Linux desktop but a technique that can be used to enhance security for systems or services. MSRA stands
for Microsoft Remote Assistance and is a feature that allows remote access and control of a Windows
desktop environment over a network. MSRA is not natively designed for Linux and may not be compatible
or supported by Linux systems. RDP stands for Remote Desktop Protocol and is a protocol that allows
remote access and control of a Windows desktop environment over a network. RDP is not natively
designed for Linux and may not be compatible or supported by Linux systems. References: CompTIA A+
293. - (Topic 3)
A company acquired a local office, and a technician is attempting to join the machines at the office to the
local domain. The technician notes that the domain join option appears to be missing. Which of the
A. Windows Professional
B. Windows Education
C. Windows Enterprise
D. Windows Home
Answer: D
Explanation: Windows Home is the most likely edition of Windows installed on the machines that do not
176
Certify For Sure with IT Exam Dumps
have the domain join option. Windows Home is a consumer-oriented edition that does not support joining a
domain or using Group Policy. Only Windows Professional, Education, and Enterprise editions can join a
domain
294. - (Topic 3)
A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails
to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should
A. LCD
B. Battery
C. Accelerometer
D. Digitizer
Answer: C
Explanation:
The piece of hardware that the technician should replace to resolve the issue of the screen failing to rotate
on a mobile device that was dropped is the accelerometer. The accelerometer is a sensor that detects the
orientation and movement of the mobile device by measuring the acceleration forces acting on it. The
accelerometer allows the screen to rotate automatically according to the position and angle of the device. If
the accelerometer is damaged or malfunctioning, the screen may not rotate properly or at all, even if the
settings are correctly applied. LCD stands for Liquid Crystal Display and is a type of display that uses liquid
crystals and backlight to produce images on the screen. LCD is not related to the screen rotation feature
but to the quality and brightness of the display. Battery is a component that provides power to the mobile
device by storing and releasing electrical energy. Battery is not related to the screen rotation feature but to
the battery life and performance of the device. Digitizer is a component that converts touch inputs into
digital signals that can be processed by the mobile device. Digitizer is not related to the screen rotation
feature but to the touch sensitivity and accuracy of the display. References: CompTIA A+ Core 2 (220-1002)
295. - (Topic 3)
Which of the following is used to explain issues that may occur during a change implementation?
177
Certify For Sure with IT Exam Dumps
A. Scope change
B. End-user acceptance
C. Risk analysis
D. Rollback plan
Answer: C
Explanation:
Risk analysis is used to explain issues that may occur during a change implementation. Risk analysis is a
process of identifying, assessing and prioritizing potential risks that may affect a project or an activity. Risk
analysis can help determine the likelihood and impact of various issues that may arise during a change
degradation or user dissatisfaction. Risk analysis can also help plan and prepare for mitigating or avoiding
these issues. Scope change is a modification of the original goals, requirements or deliverables of a project
or an activity. Scope change is not used to explain issues that may occur during a change implementation
but to reflect changes in expectations or needs of the stakeholders. End- user acceptance is a measure of
how well the users are satisfied with and adopt a new system or service. End-user acceptance is not used
to explain issues that may occur during a change implementation but to evaluate the success and
effectiveness of the change. Rollback plan is a contingency plan that describes how to restore a system or
service to its previous state in case of a failed or problematic change implementation. Rollback plan is not
used to explain issues that may occur during a change implementation but to recover from them.
References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 5.2
296. - (Topic 3)
A user reports that the pages flash on the screen two or three times before finally staying open when
attempting to access banking web pages. Which of the following troubleshooting steps should the
Answer: B
178
Certify For Sure with IT Exam Dumps
Explanation:
The next troubleshooting step that the technician should perform to resolve the issue of pages flashing on
the screen before staying open when accessing banking web pages is to verify the address bar URL. The
address bar URL is the web address that appears in the browser’s address bar and indicates the location of
the web page being accessed. Verifying the address bar URL can help determine if the user is accessing a
legitimate or malicious website, as some phishing websites may try to impersonate banking websites by
297. - (Topic 3)
A change advisory board authorized a setting change so a technician is permitted to implement the change.
The technician successfully implemented the change. Which of the following should be done NEXT?
Answer: A
Explanation:
After implementing a change authorized by the change advisory board (CAB), the technician should
document the date and time of change as part of the post- implementation review. This helps to track the
change history, verify the success of the change, and identify any issues or incidents caused by the
change1. Documenting the purpose of the change, the risk level, and the findings of the sandbox test are all
part of the pre-implementation activities that should be done before submitting the change request to the
CAB2.
References: 2:
https://www.manageengine.com/products/service-desk/itil-change-management/cab-change-advisory-boar
d.html 1:
https://www.servicenow.com/content/dam/servicenow-assets/public/en-us/doc-type/success/quick-answer/
change-advisory-board-setup.pdf
298. - (Topic 3)
179
Certify For Sure with IT Exam Dumps
An IT security team is implementing a new Group Policy that will return a computer to the login after three
A. Login times
B. Screen lock
C. User permission
Answer: B
Explanation:
Screen lock is a feature that returns a computer to the login screen after a period of inactivity, requiring the
user to enter their credentials to resume their session. Screen lock can be configured using Group Policy
settings, such as Screen saver timeout and Interactive logon: Machine inactivity limit. Screen lock can help
prevent unauthorized access to a computer when the user is away from their desk. Login times are not a
feature that returns a computer to the login screen, but a measure of how long it takes for a user to log in to
a system. User permission is not a feature that returns a computer to the login screen, but a set of rights
and privileges that determine what a user can do on a system. Login lockout attempts are not a feature that
returns a computer to the login screen, but a security policy that locks out a user account after a number of
299. - (Topic 3)
A user notices a small USB drive is attached to the user's computer after a new vendor visited the office.
The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST
likely occurring?
A. Trojan
B. Rootkit
C. Cryptominer
D. Keylogger
Answer: D
Explanation:
A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote
attacker1. The attacker can use the captured information to steal passwords, credit card numbers, or other
180
Certify For Sure with IT Exam Dumps
sensitive data. A keylogger can be installed on a computer by attaching a small USB drive that contains a
malicious executable file, such as grabber.exe2. The output.txt file may contain the recorded keystrokes.
The user should remove the USB drive and scan the computer for malware.
300. - (Topic 3)
A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive
immediately after the device is launched. Which of the following troubleshooting steps should the user
perform FIRST?
Answer: B
Explanation: Checking for application updates is the first troubleshooting step that the user should perform,
because the application may not be compatible with the new OS version and may need an update to fix the
issue. Deleting the application’s cache, rolling back the OS update, or uninstalling and reinstalling the
application are possible solutions, but they are more time-consuming and disruptive than checking for
updates. References: :
https://www.comptia.org/training/resources/exam-objectives/comptia-a-core-2-exam- objectives :
https://www.lifewire.com/how-to-update-apps-on-android-4173855
301. - (Topic 4)
A payroll workstation has data on it that needs to be readily available and can be recovered quickly if
something is accidentally removed. Which of the following backup methods should be used to provide fast
A. Full
B. Differential
181
Certify For Sure with IT Exam Dumps
C. Synthetic
D. Incremental
Answer: A
Explanation: A full backup does not depend on any previous backups, unlike differential or incremental
backups, which only save the changes made since the last backup. A synthetic backup is a type of full
backup that combines an existing full backup with incremental backups to create a new full backup, but it
still requires multiple backup sets to recover data. Therefore, a full backup is the most suitable for the
payroll workstation that needs to have its data readily available and recoverable. You can learn more about
the differences between full, differential, incremental, and synthetic backups from this article.
302. - (Topic 4)
A company is looking lot a solution that provides a backup for all data on the system while providing the
lowest impact to the network. Which of the following backup types will the company MOST likely select?
A. Off-site
B. Synthetic
C. Full
D. Differential
Answer: B
Explanation: A synthetic backup is a backup type that provides a backup for all data on the system while
providing the lowest impact to the network. It combines a full backup with one or more incremental backups
to create a single backup set, without requiring access to the original data source. Off-site is a backup
location, not a backup type. Full and differential are backup types, but they have a higher impact on the
https://www.comptia.org/certifications/a
303. - (Topic 4)
Which of the following would most likely be used in a small office environment?
A. Print server
B. Virtualization
C. Domain access
182
Certify For Sure with IT Exam Dumps
D. Workgroup
Answer: D
Explanation: A workgroup is a network configuration that allows computers to communicate and share
resources with each other without requiring a centralized server or domain controller. A workgroup is
suitable for small office environments where there are only a few computers and users who need simple file
and printer sharing. A workgroup does not have centralized management or security policies, which may be
desirable for larger or more complex networks. Print server, virtualization, and domain access are not
network configurations that are most likely used in a small office environment.
304. - (Topic 4)
A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very
dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the
A. Power Plans
B. Hibernate
C. Sleep/Suspend
D. Screensaver
Answer: A
Explanation: Power Plans are Windows settings that allow a user to configure how a laptop’s screen
behaves when plugged in or running on battery power. They can adjust the screen brightness and the time
before the screen turns off due to inactivity. Hibernate, Sleep/Suspend and Screensaver are other Windows
settings that affect how a laptop’s screen behaves, but they do not allow changing the screen brightness or
https://www.comptia.org/certifications/a
305. - (Topic 4)
Every time a user tries to open the organization's proprietary application on an Android tablet, the
application immediately closes. Other applications are operating normally. Which of the following
troubleshooting actions would MOST likely resolve the Issue? (Select TWO).
183
Certify For Sure with IT Exam Dumps
B. Gaining root access to the tablet
Answer: A,E
Explanation: Uninstalling and reinstalling the application can resolve the issue of it crashing immediately on
an Android tablet, as it can fix any corrupted or missing files or settings. Clearing the application storage
can also resolve the issue, as it can free up space and remove any conflicting data. Gaining root access to
the tablet, resetting the web browser cache, deleting the application cache and disabling mobile device
management are not likely to resolve the issue, as they do not affect how the application runs. Verified
References: https://www.comptia.org/blog/how-to-fix-android-apps-crashing
https://www.comptia.org/certifications/a
306. - (Topic 4)
A developer receives the following error while trying to install virtualization software on a workstation:
Which of the following upgrades will MOST likely fix the issue?
A. Processor
B. Hard drive
C. Memory
D. Video card
Answer: A
Explanation: The processor is the component that determines if the system supports virtualization
technology (VTx), which is required for running virtualization software. The hard drive, memory and video
card are not directly related to VTx support, although they may affect the performance of the virtual
https://www.comptia.org/certifications/a
307. - (Topic 4)
184
Certify For Sure with IT Exam Dumps
A company recently experienced a security incident in which a USB drive containing malicious software
was able to covertly install malware on a workstation. Which of the following actions should be taken to
E. Disable AutoRun.
Answer: E,G
Explanation: AutoRun is a feature of Windows that automatically executes a program or file when a
removable media such as a USB drive is inserted into the computer. Disabling AutoRun can prevent a USB
drive containing malicious software from covertly installing malware on a workstation, as it would require
the user to manually open the drive and run the file. Restricting user permissions can also prevent a USB
drive containing malicious software from covertly installing malware on a workstation, as it would limit the
user’s ability to execute or install unauthorized programs or files. Installing a host-based IDS, restricting
log-in times, enabling a BIOS password, updating the password complexity, and updating
the antivirus definitions are not actions that can directly prevent this incident from happening again.
308. - (Topic 4)
A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to
A. FAT32
B. exFAT
C. BitLocker
D. EFS
Answer: D
Explanation: EFS (Encrypting File System) is a feature that allows a user to encrypt a single folder or file on
a Windows PC. It uses a public key encryption system to protect the data from unauthorized access. FAT32
185
Certify For Sure with IT Exam Dumps
and exFAT are file system formats that do not support encryption. BitLocker is a feature that encrypts the
https://www.comptia.org/certifications/a
309. - (Topic 4)
A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the
Answer: B,E
Explanation:
The correct answers are B. Removing the applications from startup and E. Defragmenting the hard drive.
These are the operations that would be best to do to resolve the issue of a slow boot at a minimal expense.
✑ Removing the applications from startup means disabling the programs that run automatically when the
PC is turned on. This will reduce the load on the CPU and RAM and speed up the boot process1.
✑ Defragmenting the hard drive means rearranging the files on the disk so that they are stored in
contiguous blocks. This will improve the disk performance and reduce the time it takes to read and write
data2.
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 23, section 3.1. 2: CompTIA A+ Certification
310. - (Topic 4)
The battery life on an employee's new phone seems to be drastically less than expected, and the screen
stays on for a very long time after the employee sets the phone down. Which of the following should the
A. Screen resolution
186
Certify For Sure with IT Exam Dumps
B. Screen zoom
C. Screen timeout
D. Screen brightness
E. Screen damage
Answer: C,D
Explanation: Screen timeout is the setting that determines how long the screen stays on after the user stops
interacting with the phone. Screen brightness is the setting that determines how much light the screen
emits. Both of these settings affect the battery life of the phone, as keeping the screen on longer and
brighter consumes more power than turning it off sooner and dimmer. A technician should check these
settings first to troubleshoot the issue of low battery life and adjust them accordingly. Screen resolution,
screen zoom, screen damage, and screen motion smoothness are not settings that directly affect the
311. - (Topic 4)
A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which
of the following data destruction methods should a technician use to ensure data is completely removed
A. Shredding
B. Degaussing
C. Low-level formatting
D. Recycling
Answer: A
Explanation: Shredding is a data destruction method that physically destroys the hard drive by cutting it into
small pieces using a machine. Shredding ensures that data is completely removed from the hard drive and
cannot be recovered by any means. Shredding is suitable for hard drives that contain PII (personally
identifiable information), which is any information that can be used to identify, contact, or locate an
individual. Degaussing, low-level formatting, and recycling are not data destruction methods that can
187
Certify For Sure with IT Exam Dumps
312. - (Topic 4)
An application user received an email indicating the version of the application currently in use will no longer
be sold. Users with this version of the application will no longer receive patches or updates either. Which of
A. AUP
B. EULA
C. EOL
D. UAC
Answer: C
Explanation: EOL (end-of-life) is a term that indicates a vendor no longer supports a product. It means that
the product will no longer be sold, updated or patched by the vendor, and that the users should migrate to a
newer version or alternative product. AUP (acceptable use policy), EULA (end-user license agreement) and
UAC (user account control) are not terms that indicate a vendor no longer supports a product. Verified
References: https://www.comptia.org/blog/what-is-end-of-life
https://www.comptia.org/certifications/a
313. - (Topic 4)
A technician received a call from a user who clicked on a web advertisement Now. every time the user
moves the mouse, a pop-up display across the monitor. Which of the following procedures should the
technician perform?
Answer: A,B
Explanation: Booting into safe mode and performing a malware scan are the steps that a technician should
perform when troubleshooting an issue with pop-up advertising messages on a PC. Safe mode is a
diagnostic mode that starts the PC with minimal drivers and services, which can prevent the pop-up
malware from running. Malware scan is a tool that can detect and remove the pop-up malware, as well as
prevent further infection or damage. Investigating how the malware was installed, reinstalling the browser
188
Certify For Sure with IT Exam Dumps
and restarting the machine are possible steps that can be done after booting into safe mode and performing
a malware scan, depending on the situation and the results of the scan. Verified References:
https://www.comptia.org/blog/how-to-boot-into-safe-mode https://www.comptia.org/certifications/a
314. - (Topic 4)
Which of the following Is a package management utility for PCs that are running the Linux operating
system?
A. chmod
B. yum
C. man
D. grep
Answer: B
Explanation: yum (Yellowdog Updater Modified) is a package management utility for PCs that are running
the Linux operating system. It can be used to install, update and remove software packages from
repositories. chmod (change mode) is a command that changes the permissions of files and directories in
Linux. man (manual) is a command that displays the documentation of other commands in Linux. grep
(global regular expression print) is a command that searches for patterns in text files in Linux. Verified
References: https://www.comptia.org/blog/linux-package-management
https://www.comptia.org/certifications/a
315. - (Topic 4)
Which of the following common security vulnerabilities can be mitigated by using input validation?
A. Brute-force attack
B. Cross-site scripting
C. SQL injection
Answer: B,C
Explanation: Cross-site scripting (XSS) and SQL injection are common security vulnerabilities that can be
mitigated by using input validation. Input validation is a technique that checks the user input for any
malicious or unexpected characters or commands before processing it. XSS is an attack that injects
189
Certify For Sure with IT Exam Dumps
malicious scripts into web pages to steal cookies, session tokens or other sensitive information from users
or web servers. SQL injection is an attack that injects malicious SQL statements into web applications to
https://www.comptia.org/blog/what-is-input-validation https://www.comptia.org/certifications/a
316. - (Topic 4)
A remote user is experiencing issues with Outlook settings and asks a technician to review
the settings. Which of the following can the technician use to access the user's computer remotely?
A. VPN
B. RDP
C. RMM
D. SSH
Answer: C
Explanation: One of the possible ways to access the user’s computer remotely is to use RDP, which stands
for Remote Desktop Protocol. RDP is a protocol that allows a user to connect to another computer over a
network and use its graphical interface. RDP is commonly used for remote desktop software, such as
Microsoft Remote Desktop Connection1. To use RDP, the user’s computer must run RDP server software,
and the technician must run RDP client software. The technician can then enter the user’s IP address or
hostname, and provide the appropriate credentials to log in to the user’s computer. Once connected, the
technician can view and control the user’s desktop, and review the Outlook settings.
317. - (Topic 4)
A. ext4
B. exFAT
C. NTFS
D. APFS
Answer: D
Explanation: APFS stands for Apple File System and it is the default filesystem type for macOS since High
Sierra (10.13) version1. APFS is optimized for flash storage and supports features such as encryption,
190
Certify For Sure with IT Exam Dumps
snapshots, cloning, and space sharing1.
318. - (Topic 4)
A company recently outsourced its night-shift cleaning service. A technician is concerned about having
unsupervised contractors in the building. Which of the following security measures can be used to prevent
B. Disabling AutoRun
Answer: B,E
Explanation: The correct answers are D. Restricting log-in times and E. Enabling a screen lock. These are
the security measures that can be used to prevent the computers from being accessed by unsupervised
✑ Restricting log-in times means setting a policy that allows users to log in only during certain hours, such
as the regular working hours of the company. This will prevent unauthorized access by contractors who
work at night1.
✑ Enabling a screen lock means setting a policy that requires users to enter a password or a PIN to unlock
their screens after a period of inactivity. This will prevent unauthorized access by contractors who might try
1: CompTIA A+ Certification Exam: Core 2 Objectives, page 19, section 2.3. 2: CompTIA A+ Certification
319. - (Topic 4)
Which of the following Is used to identify potential issues with a proposed change poor lo implementation?
A. Request form
B. Rollback plan
C. End-user acceptance
191
Certify For Sure with IT Exam Dumps
D. Sandbox testing
Answer: D
Explanation: Sandbox testing is a method of identifying potential issues with a proposed change prior to
implementation. It involves creating a simulated or isolated environment that mimics the real system and
applying the change to it. This can help to verify that the change works as expected and does not cause
any errors or conflicts. Request form, rollback plan and end-user acceptance are other components of a
change management process, but they do not involve identifying issues with a change. Verified References:
https://www.comptia.org/blog/what-is-sandbox-testing https://www.comptia.org/certifications/a
320. - (Topic 4)
A desktop technician has received reports that a user's PC is slow to load programs and saved files. The
technician investigates and discovers an older HDD with adequate free space. Which of the following
A. Disk Management
B. Disk Defragment
C. Disk Cleanup
D. Device Manager
Answer: B
Explanation: Disk Defragment is a tool that can be used to improve the performance of a hard disk drive
(HDD). HDDs store data in sectors and clusters on spinning platters. Over time, as data is written, deleted,
and moved, the data may become fragmented, meaning that it is spread across different locations on the
disk. This causes the HDD to take longer to access and load data, resulting in slower performance. Disk
Defragment consolidates the fragmented data and rearranges it in a contiguous manner, which reduces the
seek time and increases the speed of the HDD. Disk Management, Disk Cleanup, and Device Manager are
not tools that can alleviate the issue of slow HDD performance.
321. - (Topic 4)
A user connected an external hard drive but is unable to see it as a destination to save files. Which of the
A. Disk Management
192
Certify For Sure with IT Exam Dumps
B. Device Manager
C. Disk Cleanup
D. Disk Defragmenter
Answer: A
Explanation: Disk Management is a tool that allows users to create, format, delete, shrink, extend, and
manage partitions on hard drives. If the external hard drive is not formatted or has an incompatible
filesystem type, Disk Management can be used to format it with a supported filesystem type such as NTFS,
FAT32, or exFAT. Device Manager, Disk Cleanup, and Disk Defragmenter are not tools that can format a
hard drive.
322. - (Topic 4)
A user installed a new computer game. Upon starting the game, the user notices the frame rates are low.
Which of the following should the user upgrade to resolve the issue?
A. Hard drive
B. Graphics card
C. Random-access memory
D. Monitor
Answer: B
Explanation: A graphics card, also known as a video card or a GPU (graphics processing unit), is a
component that can affect the performance of a computer game. A graphics card is responsible for
rendering and displaying graphics on the screen, such as images, animations, and effects. A computer
game may require a high level of graphics processing power to run smoothly and achieve high frame rates,
which are the number of frames per second (FPS) that the game can display. Upgrading to a better
graphics card can improve the performance of a computer game by increasing its graphics quality and
frame rates. Hard drive, random-access memory, and monitor are not components that can directly
323. - (Topic 4)
A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which
of the following types of infections are the workstations most likely experiencing? (Select two).
193
Certify For Sure with IT Exam Dumps
A. Zombies
B. Keylogger
C. Adware
D. Botnet
E. Ransomware
F. Spyware
Answer: A,D
Explanation:
Zombies and botnets are terms that describe the types of infections that can cause internal workstations to
participate in a DDoS (distributed denial-of-service) attack. A DDoS attack is a malicious attempt to disrupt
the normal functioning of a website or a network by overwhelming it with a large amount of traffic from
multiple sources. Zombies are infected computers that are remotely controlled by hackers without the
owners’ knowledge or consent. Botnets are networks of zombies that are coordinated by hackers to launch
DDoS attacks or other malicious activities. Keylogger, adware, ransomware, and spyware are not types of
324. - (Topic 4)
A user is unable to access a web-based application. A technician verifies the computer cannot access any
web pages at all. The computer obtains an IP address from the DHCP server. Then, the technician verifies
the user can ping localhost. the gateway, and known IP addresses on the interne! and receive a response.
Which of the following Is the MOST likely reason tor the Issue?
Answer: C
Explanation: DNS (domain name system) is a protocol that translates domain names to IP addresses. If the
computer has an incorrect DNS address assigned, it will not be able to resolve the domain names of
web-based applications and access them. A firewall, a VLAN (virtual local area network) and a browser
cache are not the most likely reasons for the issue, since the computer can ping known IP addresses on the
194
Certify For Sure with IT Exam Dumps
internet and receive a response. Verified References: https://www.comptia.org/blog/what-is-dns
https://www.comptia.org/certifications/a
325. - (Topic 4)
A remote user is having issues accessing an online share. Which of the following tools
A. Screen-sharing software
B. Secure shell
Answer: A
Explanation: Screen-sharing software is a tool that allows a technician to remotely view and control a user’s
screen over the internet. It can be used to troubleshoot issues with accessing an online share, as well as
other problems that require visual inspection or guidance. Secure shell (SSH) is a protocol that allows
remote access and command execution on another device, but it does not allow screen-sharing. Virtual
private network (VPN) is a protocol that creates a secure tunnel between two devices over the internet, but
it does not allow remote troubleshooting. File transfer software is a tool that allows transferring files
between two devices over the internet, but it does not allow screen- sharing. Verified References:
326. - (Topic 4)
Which of the following threats will the use of a privacy screen on a computer help prevent?
A. Impersonation
B. Shoulder surfing
C. Whaling
D. Tailgating
Answer: B
Explanation: Shoulder surfing is a threat that involves someone looking over another person’s shoulder to
observe their screen, keyboard, or other sensitive information. Shoulder surfing can be used to steal
passwords, personal identification numbers (PINs), credit card numbers, or other confidential data. The use
195
Certify For Sure with IT Exam Dumps
of a privacy screen on a computer can help prevent shoulder surfing by limiting the viewing angle of the
screen and making it harder for someone to see the screen from the side or behind. Impersonation, whaling,
and tailgating are not threats that can be prevented by using a privacy screen on a computer.
327. - (Topic 4)
A technician needs to establish a remote access session with a user who has a Windows workstation. The
session must allow for simultaneous viewing of the workstation by both the user and technician. Which of
A. RDP
B. VPN
C. SSH
D. MSRA
Answer: D
Explanation: MSRA (Microsoft Remote Assistance) is a remote access technology that allows a technician
to establish a session with a user who has a Windows workstation. The session allows for simultaneous
viewing of the workstation by both the user and technician, as well as remote control and file transfer
capabilities. RDP (remote desktop protocol) is another remote access technology, but it does not allow
simultaneous viewing by default. VPN (virtual private network) and SSH (secure shell) are protocols that
create secure tunnels between two devices over the internet, but they do not allow remote access sessions.
328. - (Topic 4)
A Windows administrator is creating user profiles that will include home directories and network printers for
several new users. Which of the following is the most efficient way for the technician to complete this task?
A. Access control
B. Authentication application
C. Group Policy
D. Folder redirection
Answer: C
Explanation: Group Policy is a feature of Windows that allows administrators to centrally manage and apply
196
Certify For Sure with IT Exam Dumps
policies and settings to computers and users on a domain. Group Policy can be used to create user profiles
that include home directories and network printers for several new users, as well as other configurations
such as security settings, desktop preferences, and software installation. Group Policy can save time and
effort for the administrator by applying the same settings to multiple users at once. Access control,
authentication application, and folder redirection are not the most efficient ways to create user profiles that
include home directories and network printers for several new users.
329. - (Topic 4)
Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?
A. Testing
B. Rollback
C. Risk
D. Acceptance
Answer: B
Explanation: Rollback refers to the steps to be taken if an issue occurs during a change implementation. It
means restoring the system to its previous state before the change was applied, using backup data or
configuration files. It can minimize the impact and downtime caused by a failed change. Testing refers to
the steps to be taken before a change implementation, to verify that the change works as expected and
does not cause any errors or conflicts. Risk refers to the potential negative consequences of a change
implementation, such as data loss, security breach, performance degradation, etc. Acceptance refers to the
steps to be taken after a change implementation, to confirm that the change meets the requirements and
https://www.comptia.org/blog/change-management-process https://www.comptia.org/certifications/a
330. - (Topic 4)
While trying to repair a Windows 10 OS, a technician receives a prompt asking for a key. The technician
tries the administrator password, but it is rejected. Which of the following does the technician need in order
A. SSL key
B. Preshared key
197
Certify For Sure with IT Exam Dumps
C. WPA2 key
D. Recovery key
Answer: D
Explanation: A recovery key is a code that can be used to unlock a BitLocker-encrypted drive when the
normal authentication methods (such as password or PIN) are not available or have been forgotten.
BitLocker is a feature of Windows that encrypts the entire drive to protect data from unauthorized access. If
a technician is trying to repair a Windows 10 OS that has BitLocker enabled, they will need the recovery key
to access the drive and continue the OS repair. SSL key, preshared key, and WPA2 key are not keys that
331. - (Topic 4)
A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the
OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update
is turned on. Which of the following is MOST likely the cause of the Issue?
A. The device does not have enough free space lo download the OS updates.
C. The device is not compatible with the newest version of the OS.
Answer: D
Explanation: A corporate security policy can restrict a corporate-managed mobile device from updating its
OS automatically, even if the auto-update feature is turned on. This can be done to prevent compatibility
issues, security risks or performance problems caused by untested or unwanted updates. The device
administrator can control when and how the updates are applied to the device. The device not having
enough free space, needing domain administrator confirmation or being incompatible with the newest
version of the OS are not likely causes of the issue, since the user would receive an error message or a
https://www.comptia.org/certifications/a
332. - (Topic 4)
Which of the following best describes when to use the YUM command in Linux?
198
Certify For Sure with IT Exam Dumps
A. To add functionality
C. To show documentation
Answer: A
Explanation: YUM stands for Yellowdog Updater Modified and it is a command-line tool that allows users to
install, update, remove, and manage software packages in Linux. YUM can be used to add functionality to a
Linux system by installing new software packages or updating existing ones. To change folder permissions,
show documentation, or list file contents, other commands such as chmod, man, or ls can be used in Linux.
333. - (Topic 4)
A technician receives a help desk ticket from a user who is unable to update a phone. The technician
investigates the issue and notices the following error message: Insufficient storage space
While analyzing the phone, the technician does not discover any third-party' applications or photos. Which
Answer: D
Explanation: The best way to resolve the issue is to move factory applications to external memory. This will
free up some space on the phone’s internal storage, which is required for updating the phone. To do this,
Insert a microSD card into your phone if you don’t have one already. Go to Settings > Apps and tap on the
Tap on Storage and then on Change. Select the SD card option and tap on Move.
You may need to repeat this process for multiple apps until you have enough space to update your phone.
Alternatively, you can also clear the cache and data of some apps, or uninstall the apps that you don’t use
frequently. You can find more information on how to fix insufficient storage error on your phone in these
199
Certify For Sure with IT Exam Dumps
334. - (Topic 4)
A small-office customer needs three PCs to be configured in a network with no server. Which of the
following network types is the customer's BEST choice for this environment?
A. Workgroup network
B. Public network
D. Domain network
Answer: A
Explanation: A workgroup network is a peer-to-peer network where each PC can share files and resources
with other PCs without a central server. A public network is a network that is accessible to anyone on the
internet. A wide area network is a network that spans a large geographic area, such as a country or a
continent. A domain network is a network where a server controls the access and security of the PCs.
335. - (Topic 4)
A. Ubuntu
B. Android
C. CentOS
D. OSX
Answer: D
Explanation: OSX (now macOS) is an operating system that is considered closed source, meaning that its
source code is not publicly available or modifiable by anyone except its developers. It is owned and
maintained by Apple Inc. Ubuntu, Android and CentOS are operating systems that are considered open
source, meaning that their source code is publicly available and modifiable by anyone who wants to
https://www.comptia.org/blog/open-source-vs-closed-source-software
https://www.comptia.org/certifications/a
200
Certify For Sure with IT Exam Dumps
336. - (Topic 4)
A department manager submits a help desk ticket to request the migration of a printer's port utilization from
USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP
address allocation is required. Which of the following should happen Immediately before network use is
authorized?
Answer: B
Explanation: The correct answer is B. Submit a change request form. A change request form is a document
that describes the proposed change, the reason for the change, the expected benefits and impacts, the
risks and mitigation strategies, the implementation plan, and the approval process. A change request form
is an essential part of change management best practices, as it helps to ensure that the change is
A change request form should be submitted immediately before network use is authorized, because it
provides the necessary information and justification for the change to the relevant stakeholders, such as the
network administrator, the IT manager, and the department manager. The change request form also allows
the stakeholders to review and approve or reject the change, or request more information or modifications.
The change request form also serves as a record of the change history and status12.
337. - (Topic 4)
A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged
in to the laptop with a simple password. and no other security mechanisms were in place. Which of the
following would MOST likely prevent the stored data from being recovered?
A. Biometrics
D. Two-factor authentication
Answer: B
201
Certify For Sure with IT Exam Dumps
Explanation: Full disk encryption is a security mechanism that encrypts the entire data on a hard drive,
making it unreadable without the correct decryption key or password. It can prevent the stored data from
being recovered by unauthorized persons who steal or access the laptop. Biometrics, enforced strong
system password and two-factor authentication are other security mechanisms, but they only protect the
login access to the laptop, not the data on the hard drive. Verified References:
338. - (Topic 4)
A user called the help desk lo report an Issue with the internet connection speed on a laptop. The
technician thinks that background services may be using extra bandwidth. Which of the following tools
A. nslookup
B. net use
C. netstat
D. net user
Answer: C
Explanation: netstat is a tool that can be used to investigate connections on a Windows machine. It displays
information about the active TCP connections, listening ports, routing tables, network statistics, etc.
nslookup is a tool that can be used to query DNS servers and resolve domain names to IP addresses. net
use is a tool that can be used to connect or disconnect network drives or printers. net user is a tool that can
https://www.comptia.org/blog/what-is-netstat https://www.comptia.org/certifications/a
339. - (Topic 4)
Which of the following physical security controls can prevent laptops from being stolen?
A. Encryption
B. LoJack
C. Multifactor authentication
D. Equipment lock
E. Bollards
202
Certify For Sure with IT Exam Dumps
Answer: D
Explanation: An equipment lock is a physical security device that attaches a laptop to a fixed object, such
as a desk or a table, with a cable and a lock. This can prevent the laptop from being stolen by unauthorized
persons. Encryption, LoJack, multifactor authentication and bollards are other security measures, but they
https://www.comptia.org/certifications/a
340. - (Topic 4)
A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge.
A. Battery backup
B. Thermal paste
C. ESD strap
D. Consistent power
Answer: C
Explanation: An ESD strap, also known as an antistatic wrist strap, is a device that prevents electrostatic
discharge (ESD) from damaging sensitive electronic components such as RAM. ESD is the sudden flow of
electricity between two objects with different electrical charges, which can cause permanent damage or
malfunction to electronic devices. An ESD strap connects the technician’s wrist to a grounded surface, such
as a metal case or a mat, and equalizes the electrical potential between the technician and the device.
Battery backup, thermal paste, and consistent power are not devices that can protect against ESD.
341. - (Topic 4)
A. Connection security
C. Device compatibility
Answer: C
Explanation: Device compatibility is an advantage of using WPA2 instead of WPA3. WPA2 is the previous
203
Certify For Sure with IT Exam Dumps
version of the Wi-Fi Protected Access protocol, which provides security and encryption for wireless
networks. WPA3 is the latest version, which offers improved security features, such as stronger encryption,
enhanced protection against brute-force attacks, and easier configuration. However, WPA3 is not backward
compatible with older devices that only support WPA2 or earlier protocols. Therefore, using WPA3 may limit
the range of devices that can connect to the wireless network. Connection security, encryption key length,
and offline decryption resistance are advantages of using WPA3 instead of WPA2. References:
✑ CompTIA A+ Certification All-in-One Exam Guide (Exams 220-1101 & …, page 1000
342. - (Topic 4)
A technician discovers user input has been captured by a malicious actor. Which of the following malware
A. Cryptominers
B. Rootkit
C. Spear phishing
D. Keylogger
Answer: D
Explanation: A keylogger is a type of malware that captures user input, such as keystrokes, mouse clicks,
and clipboard data, and sends it to a malicious actor. Keyloggers can be used to steal passwords, credit
343. - (Topic 4)
Which of the following would most likely be used to extend the life of a device?
A. Battery backup
C. Proper ventilation
D. Green disposal
Answer: C
Explanation: Proper ventilation is a factor that can extend the life of a device by preventing overheating and
204
Certify For Sure with IT Exam Dumps
thermal damage to the device’s components. Proper ventilation means ensuring that there is enough
airflow around and inside the device to dissipate heat and maintain a suitable temperature for optimal
performance. Proper ventilation can be achieved by using fans, heat sinks, vents, or liquid cooling systems,
as well as avoiding placing the device near heat sources or in enclosed spaces. Battery backup,
electrostatic discharge mat, and green disposal are not factors that can extend the life of a device.
344. - (Topic 4)
A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the
A. DNS
B. IPS
C. VPN
D. SSH
Answer: C
Explanation: A VPN (virtual private network) is a protocol that creates a secure tunnel between two devices
over the internet, hiding their IP addresses and encrypting their traffic. DNS (domain name system) is a
protocol that translates domain names to IP addresses. IPS (intrusion prevention system) is a device that
monitors and blocks malicious network traffic. SSH (secure shell) is a protocol that allows remote access
https://www.comptia.org/blog/what-is-a-vpn https://www.comptia.org/certifications/a
345. - (Topic 4)
Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?
Answer: B
Explanation: Activation Lock is a feature that prevents anyone from erasing or activating an iOS device
without the owner’s Apple ID and password. If a corporate-owned iOS device is linked to an employee’s
205
Certify For Sure with IT Exam Dumps
Apple ID, it will have an Activation Lock issue when the employee leaves the company or forgets their
Apple ID credentials.
346. - (Topic 4)
A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The
user is not sure how to upgrade the OS. Which of the following should the technician do to apply this
license?
D. Activate with the digital license included with the device hardware.
Answer: B
Explanation: Redeeming the included activation key card for a product key is the correct way to apply a
Windows 10 Pro license to a computer that has Windows 10 Home installed. The activation key card is a
physical or digital card that contains a 25-digit code that can be used to activate Windows 10 Pro online or
by phone. Copying the windows.lie file, inserting a Windows USB hardware dongle and activating with the
digital license are not valid methods of applying a Windows 10 Pro license. Verified References:
https://www.comptia.org/blog/how-to-upgrade-windows-10-home-to-pro
https://www.comptia.org/certifications/a
347. - (Topic 4)
A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's
Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?
Answer: C
Explanation: The first step in troubleshooting a Bluetooth connection issue is to check that the accessory is
206
Certify For Sure with IT Exam Dumps
ready to pair with the mobile device. Some accessories may have a button or a switch that needs to be
pressed or turned on to initiate pairing mode. If the accessory is not ready to pair, the mobile device will not
348. - (Topic 4)
A change advisory board authorized a setting change so a technician is permitted to Implement the change.
The technician successfully implemented the change. Which of the following should be done next?
Answer: A
Explanation: The correct answer is A. Document the date and time of change. After implementing a change,
the technician should document the date and time of change in the change log or record. This helps to track
the change history, monitor the change performance, and identify any issues or incidents related to the
change. Documenting the date and time of change is also a good practice for auditing and compliance
purposes. Documenting the purpose of the change (B) and the risk level © are steps that should be done
before implementing the change, not after. These are important information that help to justify, prioritize,
and plan the change. The purpose of the change should explain why the change is needed and what
benefits it will bring to the organization. The risk level should assess the potential impact and probability of
Documenting the findings of the sandbox test (D) is also a step that should be done before implementing
the change, not after. A sandbox test is a way of testing the change in an isolated environment that mimics
the production environment. This helps to verify that the change works as expected and does not cause any
errors or conflicts with other systems or processes. The findings of the sandbox test should be documented
and reviewed by the change advisory board (CAB) before approving the change for implementation.
References:
What is a Change Advisory Board? (Overview, Roles, and Responsibilities) Best Practices in Change
207
Certify For Sure with IT Exam Dumps
349. - (Topic 4)
A technician is unable to access the internet or named network resources. The technician receives a valid
IP address from the DHCP server and can ping the default gateway. Which of the following should the
Answer: A
Explanation:
The correct answer is A. Verify the DNS server settings. This is because the DNS server is responsible for
resolving domain names to IP addresses, which is necessary for accessing the internet or named network
resources. If the DNS server settings are incorrect or the DNS server is down, the technician will not be
able to access these resources even if they have a valid IP address and can ping the default gateway1.
350. - (Topic 4)
A user is receiving repeated pop-up advertising messages while browsing the internet. A malware scan Is
unable to locate the source of an infection. Which of the following should the technician check NEXT?
A. Windows updates
B. DNS settings
C. Certificate store
D. Browser plug-ins
Answer: D
Explanation: Browser plug-ins are software components that add functionality to a web browser, such as
playing videos, displaying animations, etc. However, some browser plug- ins can also be malicious or
compromised and cause unwanted pop-up advertising messages while browsing the internet. A malware
scan may not be able to locate the source of the infection if it is hidden in a browser plug-in. Windows
updates, DNS settings and certificate store are not likely sources of pop-up advertising messages. Verified
208
Certify For Sure with IT Exam Dumps
References: https://www.comptia.org/blog/browser-security https://www.comptia.org/certifications/a
351. - (Topic 4)
A technician is selling up a newly built computer. Which of the following is the FASTEST way for the
A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation
Answer: D
Explanation: An unattended installation is the fastest way to install Windows 10 on a newly built computer. It
uses an answer file that contains all the configuration settings and preferences for the installation, such as
language, product key, partition size, etc. It does not require any user interaction or input during the
installation process. Factory reset, System Restore and in-place upgrade are not methods of installing
Windows 10 on a new computer, but ways of restoring or updating an existing Windows installation.
https://www.comptia.org/certifications/a
352. - (Topic 4)
The screen on a user's mobile device is not autorotating even after the feature has been enabled and the
device has been restarted. Which of the following should the technician do next to troubleshoot the issue?
Answer: A
Explanation: Calibrating the phone sensors is a step that can troubleshoot the issue of screen not
autorotating on a mobile device. Screen autorotation is a feature that automatically adjusts the screen
orientation based on the device’s position and movement. Screen autorotation relies on sensors such as
accelerometer and gyroscope to detect the device’s tilt and rotation. Calibrating the phone sensors can help
209
Certify For Sure with IT Exam Dumps
fix any errors or inaccuracies in the sensor readings that may prevent screen autorotation from working
properly. Enabling the touch screen, reinstalling the operating system, and replacing the screen are not
353. - (Topic 4)
A systems administrator is configuring centralized desktop management for computers on a domain. The
management team has decided that all users' workstations should have the same network drives, printers,
and configurations. Which of the following should the administrator use to accomplish this task?
B. net use
C. User Accounts
D. regedit
E. Group Policy
Answer: E
Explanation: Group Policy is a feature of Windows that allows administrators to centrally manage and apply
policies and settings to computers and users on a domain3. Group Policy can be used to configure network
drives, printers, security settings, desktop preferences, and other configurations for all users’ workstations3.
Network and Sharing Center, net use, User Accounts, and regedit are not tools that can accomplish this
task.
354. - (Topic 4)
A systems administrator notices that a server on the company network has extremely high CPU utilization.
Upon further inspection, the administrator sees that the server Is consistently communicating with an IP
address that is traced back to a company that awards digital currency for solving hash algorithms. Which of
A. Keylogger
B. Ransomware
D. Cryptomining malware
Answer: D
210
Certify For Sure with IT Exam Dumps
Explanation: Cryptomining malware is a type of malicious program that uses the CPU resources of a
compromised server to generate cryptocurrency, such as Bitcoin or Ethereum. It can cause extremely high
CPU utilization and network traffic to the IP address of the cryptocurrency service. Keylogger, ransomware
and boot sector virus are other types of malware, but they do not cause the same symptoms as
https://www.comptia.org/certifications/a
355. - (Topic 4)
A corporation purchased new computers for a school. The computers are the same make and model and
need to have the standard image loaded. Which of the following orchestration tools should a desktop
A. USB drive
C. PXE boot
D. Recovery partition
Answer: C
Explanation: PXE (Preboot eXecution Environment) boot is an orchestration tool that allows a desktop
administrator to deploy a standard image to multiple computers over a network. It requires a PXE server
that hosts the image and a PXE client that boots from the network interface card (NIC). USB drive and DVD
installation media are not orchestration tools, but manual methods of installing an image on each computer
individually. Recovery partition is not an orchestration tool, but a hidden partition on the hard drive that
pxe-boot https://www.comptia.org/certifications/a
356. - (Topic 4)
A large university wants to equip all classrooms with high-definition IP videoconferencing equipment. Which
A. SAN
B. LAN
C. GPU
211
Certify For Sure with IT Exam Dumps
D. PAN
Answer: B
Explanation: LAN is the most likely option to be impacted in this situation. LAN stands for Local Area
Network, and it is a network that connects devices within a limited area, such as a building or a campus.
Installing high-definition IP videoconferencing equipment in all classrooms would require a high bandwidth
and reliable LAN infrastructure to support the video and audio transmission. The LAN would also need to be
configured with proper security, quality of service, and multicast protocols to ensure the optimal
performance of the videoconferencing system. SAN, GPU, and PAN are not directly related to this scenario.
SAN stands for Storage Area Network, and it is a network that provides access to consolidated storage
devices. GPU stands for Graphics Processing Unit, and it is a hardware component that handles graphics
rendering and computation. PAN stands for Personal Area Network, and it is a network that connects
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 104
357. - (Topic 4)
A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the
A. Personalization
B. Apps
C. Updates
D. Display
Answer: A
Explanation: Personalization is a Windows 10 setting that allows a user to modify the desktop wallpaper, as
well as other aspects of the appearance and behavior of the desktop, such as colors, themes, sounds, etc.
Apps is a Windows 10 setting that allows a user to manage the installed applications and their features.
Updates is a Windows 10 setting that allows a user to check for and install the latest updates for the OS and
other components. Display is a Windows 10 setting that allows a user to adjust the screen resolution,
https://www.comptia.org/certifications/a
212
Certify For Sure with IT Exam Dumps
358. - (Topic 4)
A technician removed a virus from a user's device. The user returned the device a week later with the same
virus on it. Which of the following should the technician do to prevent future infections?
Answer: B
Explanation: Educating the end user is the best way to prevent future infections by viruses or other malware.
The technician should teach the user how to avoid risky behaviors, such as opening suspicious
attachments, clicking on unknown links, downloading untrusted software, etc. Disabling System Restore,
installing the latest OS patches and performing a clean installation are possible ways to remove existing
https://www.comptia.org/blog/how-to-prevent-malware https://www.comptia.org/certifications/a
359. - (Topic 4)
A company's assets are scanned annually. Which of the following will most likely help the company gain a
A. Creating a database
Answer: A
Explanation: Creating a database is the most likely option to help the company gain a holistic view of asset
cost. A database can store and organize information about the assets, such as purchase date, depreciation
value, maintenance cost, warranty status, and replacement cost. Assigning users to assets, inventorying
asset tags, and updating the procurement account owners are important steps for asset management, but
213
Certify For Sure with IT Exam Dumps
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 101
360. - (Topic 4)
An Internet cafe has several computers available for public use. Recently, users have reported the
computers are much slower than they were the previous week. A technician finds the CPU is at 100%
utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the
issue?
Answer: B
Explanation: A cryptominer is a malicious program that uses the CPU resources of a computer to generate
cryptocurrency, such as Bitcoin or Ethereum. This can cause the CPU to run at 100% utilization and slow
down the system. Spyware, virus and keylogger are other types of malware, but they do not necessarily
https://www.comptia.org/certifications/a
361. - (Topic 4)
A department manager submits a help desk ticket to request the migration of a printer's port utilization from
USB to Ethernet so multiple users can access the printer. This will be a new network printer; thus a new IP
address allocation is required. Which of the following should happen immediately before network use is
authorized?
Answer: D
Explanation: An IP address is a unique identifier that allows a device to communicate with other devices on
a network. A network printer needs an IP address to be accessible by multiple users on the network.
214
Certify For Sure with IT Exam Dumps
Requesting an unused IP address from the network administrator or using an IP address scanner is the
step that should happen immediately before network use is authorized, as it ensures that there is no IP
address conflict or duplication on the network. Documenting the date and time of the change, submitting a
change request form, and determining the risk level of this change are steps that should happen before
362. - (Topic 4)
A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following
Answer: A
Explanation: Quarantining the computer means isolating it from the network and other devices to prevent
the spread of malware or ransomware. Ransomware is a type of malware that encrypts the files on a
computer and demands payment (usually in cryptocurrency) to restore them. If a technician sees a file that
is requesting payment to a cryptocurrency address, it is likely that the computer has been infected by
ransomware. Quarantining the computer should be the first step to contain the infection and prevent further
damage. Disabling System Restore, updating the antivirus software definitions, and booting to safe mode
are not steps that should be done before quarantining the computer.
363. - (Topic 4)
A systems administrator installed the latest Windows security patch and received numerous tickets
reporting slow performance the next day. Which of the following should the administrator do to resolve this
issue?
215
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: Rolling back the updates is the best way to resolve the issue of slow performance caused by
installing the latest Windows security patch. This can be done by using the System Restore feature or by
uninstalling the specific update from the Control Panel. Rebuilding user profiles, restarting the services and
performing a system file check are not likely to fix the issue, since they do not undo the changes made by
https://www.comptia.org/certifications/a
364. - (Topic 4)
A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the
PC begins performing extremely slow. Which of the following steps should the technician take to resolve
the issue?
Answer: E
Explanation: Removing the user-installed antivirus software program is the best way to resolve the issue of
extremely slow performance caused by installing additional real-time protection antivirus software on a PC.
Having more than one antivirus software program running at the same time can cause conflicts, resource
consumption and performance degradation. Uninstalling one antivirus software program and installing a
different one, activating real-time protection on both antivirus software programs, enabling the quarantine
feature on both antivirus software programs and launching Windows Update are not effective ways to
https://www.comptia.org/blog/why-you-shouldnt-run-multiple-antivirus-programs-at-the-same-time
https://www.comptia.org/certifications/a
365. - (Topic 4)
A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools
216
Certify For Sure with IT Exam Dumps
should the technician use?
A. Disk Cleanup
B. Resource Monitor
C. Disk Defragment
D. Disk Management
Answer: A
Explanation: Disk Cleanup is a tool that can free up some space on a system drive that is nearly full. It can
delete temporary files, cached files, recycle bin files, old system files and other unnecessary data.
Resource Monitor is a tool that shows the network activity of each process on a Windows machine. Disk
Defragment is a tool that optimizes the performance of a hard drive by rearranging the data into contiguous
blocks. Disk Management is a tool that allows creating, formatting, resizing and deleting partitions on a hard
https://www.comptia.org/certifications/a
366. - (Topic 4)
A. PsExec
B. command.com
C. Terminal
D. CMD
Answer: C
Explanation: Terminal is an application that allows access to the command line in macOS. The command
line is an interface that allows users to interact with the operating system and perform various tasks by
typing commands and arguments. Terminal can be used to launch programs, manage files and folders,
configure settings, troubleshoot issues, and run scripts in macOS. PsExec, command.com, and CMD are
367. - (Topic 4)
A technician installs specialized software on a workstation. The technician then attempts to run the software.
The workstation displays a message indicating the software is not authorized to run. Which of the following
217
Certify For Sure with IT Exam Dumps
should the technician do to most likely resolve the issue?
C. Install OS updates.
Answer: B
Explanation: A hardware token is a physical device that provides an additional layer of security for software
authorization. Some specialized software may require a hardware token to be attached to the workstation in
order to run. A hardware token may contain a cryptographic key, a password, or a one-time code that
verifies the user’s identity or permission. Installing the software in safe mode, installing OS updates, and
restarting the workstation after installation are not likely to resolve the issue of software authorization.
368. - (Topic 4)
An administrator responded to an incident where an employee copied financial data to a portable hard drive
and then left the company with the data. The administrator documented the movement of the evidence.
Answer: A
Explanation: Preserving chain of custody is a concept that refers to the documentation and tracking of who
handled, accessed, modified, or transferred a piece of evidence, when, where, why, and how. Preserving
chain of custody can help establish the authenticity, integrity, and reliability of the evidence, as well as
prevent tampering, alteration, or loss of the evidence. An administrator who documented the movement of
the evidence demonstrated the concept of preserving chain of custody. Implementing data protection
policies, informing law enforcement, and creating a summary of the incident are not concepts that describe
369. - (Topic 4)
218
Certify For Sure with IT Exam Dumps
During an enterprise rollout of a new application, a technician needs to validate compliance with an
application's EULA while also reducing the number of licenses to manage. Which of the following licenses
C. Open-source license
D. Non-expiring license
Answer: B
Explanation: A corporate use license, also known as a volume license, is a type of software license that
allows an organization to purchase and use multiple copies of a software product with a single license key.
A corporate use license can help validate compliance with an application’s EULA (end-user license
agreement), which is a legal contract that defines the terms and conditions of using the software. A
corporate use license can also reduce the number of licenses to manage, as it eliminates the need to
activate and track individual licenses for each copy of the software. Personal use license, open-source
license, and non-expiring license are not types of licenses that can best accomplish this goal.
370. - (Topic 4)
A user is unable to access several documents saved on a work PC. A technician discovers the files were
corrupted and must change several system settings within Registry Editor to correct the issue. Which of the
Answer: B
Explanation: A restore point is a snapshot of the system settings and configuration at a specific point in
time2. Creating a restore point before modifying the registry keys allows the technician to revert the system
back to a previous state if something goes wrong or causes instability2. Updating the anti-malware software,
running the PC in safe mode, and rolling back the system updates are not necessary steps before
219
Certify For Sure with IT Exam Dumps
371. - (Topic 4)
During a network outage, a technician discovers a new network switch that was not listed in the support
documentation. The switch was installed during a recent change window when a new office was added to
the environment. Which of the following would most likely prevent this type of mismatch after next month's
change window?
Answer: B
Explanation: This would ensure that the support documentation reflects the current state of the network and
prevents any confusion or mismatch during a network outage. Updating the network diagrams is also one of
the best practices for network documentation, as stated in the Official CompTIA A+ Core 2 Study Guide1.
The other options are not as effective or feasible as option B. Performing annual network topology reviews
is too infrequent and may not capture recent changes. Allowing network changes once per year is too
restrictive and may not meet the business needs. Routinely backing up switch configuration files is
important, but it does not help with identifying new switches or devices on the network.
372. - (Topic 4)
An administrator is designing and implementing a server backup system that minimizes the capacity of
storage used. Which of the following is the BEST backup approach to use in conjunction with synthetic full
backups?
A. Differential
B. Open file
C. Archive
D. Incremental
Answer: D
Explanation: Incremental backups are backups that only include the changes made since the last backup,
whether it was a full or an incremental backup. Incremental backups minimize the capacity of storage used
220
Certify For Sure with IT Exam Dumps
and are often used in conjunction with synthetic full backups, which are backups that combine a full backup
373. - (Topic 4)
A technician is concerned about a large increase in the number of whaling attacks happening in the industry.
The technician wants to limit the company's risk to avoid any issues. Which of the following items should
A. Screened subnet
B. Firewall
C. Anti-phishing training
D. Antivirus
Answer: C
Explanation: Anti-phishing training is a method of educating users on how to identify and avoid phishing
attacks, which are attempts to trick users into revealing sensitive information or performing malicious
actions by impersonating legitimate entities or persons. Whaling attacks are a specific type of phishing
attack that target high-level executives or influential individuals within an organization. Anti-phishing training
can help users recognize the signs of whaling attacks and prevent them from falling victim to them.
Screened subnet, firewall, and antivirus are not items that can directly address the issue of whaling attacks.
374. - (Topic 4)
Which of the following security methods supports the majority of current Wi-Fi-capable devices without
sacrificing security?
A. WPA3
B. MAC filleting
C. RADIUS
D. TACACS+
Answer: A
Explanation: WPA3 (Wi-Fi Protected Access 3) is a wireless security method that supports the majority of
current Wi-Fi-capable devices without sacrificing security. It is backward compatible with WPA2 devices
221
Certify For Sure with IT Exam Dumps
and offers enhanced encryption and authentication features. MAC filtering is another wireless security
method, but it can be easily bypassed by spoofing MAC addresses. RADIUS (Remote Authentication
Dial-In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) are network
authentication protocols, but they are not wireless security methods by themselves. Verified References:
https://www.comptia.org/blog/wireless-security-standards https://www.comptia.org/certifications/a
375. - (Topic 4)
A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue
Answer: B,D
Explanation: The best operations to do to resolve the issue of a long boot time at a minimal expense are B.
Removing the applications from startup and D. Running the Disk Cleanup utility. These are two simple and
effective ways to speed up your PC’s boot time without spending any money on hardware upgrades.
Removing the applications from startup means preventing unnecessary programs from launching
automatically when you turn on your computer. This can reduce the load on your system resources and
make the boot process faster. You can do this in Windows 10 by pressing Ctrl + Alt + Esc to open the Task
Manager, and going to the Startup tab. There, you can see a list of programs that start with your computer,
and their impact on the startup performance. You can disable any program that you don’t need by
Running the Disk Cleanup utility means deleting temporary files, system files, and other unnecessary data
that may be taking up space and slowing down your computer. This can free up some disk space and
improve the performance of your system. You can do this in Windows 10 by typing disk cleanup in the
search box and selecting the Disk Cleanup app. There, you can choose which files you want to delete, such
as Recycle Bin, Temporary Internet Files, Thumbnails, etc. You can also click on Clean up system files to
222
Certify For Sure with IT Exam Dumps
delete more files, such as Windows Update Cleanup, Previous Windows installation(s), etc34.
376. - (Topic 4)
Which of the following macOS features can help a user close an application that has stopped responding?
A. Finder
B. Mission Control
C. System Preferences
D. Force Quit
Answer: D
Explanation: The correct answer is D. Force Quit. Force Quit is a macOS feature that allows users to close
an application that has stopped responding. To use Force Quit, users can press and hold Option (or Alt),
Command, and Esc (Escape) keys together, or choose Force Quit from the Apple menu in the corner of the
screen. A Force Quit window will open, where users can select the application that they want to close and
The web search results provide information about how to force an app to quit on Mac using different
methods, such as keyboard shortcuts, mouse clicks, or menu options. The results also explain what to do if
the app cannot be forced to quit or if the Mac does not respond. The first result1 is from the official Apple
Support website and provides detailed instructions and screenshots on how to force an app to quit on Mac
using the keyboard shortcut or the Apple menu. It also explains how to force quit the Finder app and how to
The second result2 is from the same website but for a different region (UK). It has the same content as the
first result but with some minor differences in spelling and wording. The third result4 is from a website called
Lifehacker that provides tips and tricks for various topics, including technology. It compares how to close a
program that is not responding on different operating systems, such as Windows, Mac, and Linux. It briefly
mentions how to force quit an app on Mac using the keyboard shortcut or the mouse click.
The fourth result3 is from a website called Parallels that provides software solutions for running Windows
on Mac. It focuses on how to force quit an app on Mac using the keyboard shortcut and provides a video
tutorial and a screenshot on how to do it. It also suggests some alternative ways to close an app that is not
223
Certify For Sure with IT Exam Dumps
377. - (Topic 4)
A technician needs to ensure that USB devices are not suspended by the operating system Which of the
following Control Panel utilities should the technician use to configure the setting?
A. System
B. Power Options
D. Ease of Access
Answer: B
Explanation: The correct answer is B. Power Options. The Power Options utility in the Control Panel allows
you to configure various settings related to how your computer uses and saves power, such as the power
plan, the sleep mode, the screen brightness, and the battery status. To access the Power Options utility,
Go to Control Panel > Hardware and Sound > Power Options. Click on Change plan settings for the power
Expand the USB settings category and then the USB selective suspend setting subcategory.
Set the option to Disabled for both On battery and Plugged in. Click on OK and then on Save changes.
This will prevent the operating system from suspending the USB devices to save power . System, Devices
and Printers, and Ease of Access are not the utilities that should be used to configure the setting. System is
a utility that provides information about your computer’s hardware and software, such as the processor,
memory, operating system, device manager, and system protection. Devices and Printers is a utility that
allows you to view and manage the devices and printers connected to your computer, such as adding or
removing devices, changing device settings, or troubleshooting problems. Ease of Access is a utility that
allows you to customize your computer’s accessibility options, such as the narrator, magnifier, high contrast,
keyboard, mouse, and speech recognition. None of these utilities have any option to configure the USB
378. - (Topic 4)
A systems administrator is tasked with configuring desktop systems to use a new proxy server that the
organization has added to provide content filtering. Which of the following Windows utilities is the best
224
Certify For Sure with IT Exam Dumps
A. Security and Maintenance
D. Internet Options
Answer: D
Explanation: Explore
The correct answer is D. Internet Options. The Internet Options utility in Windows allows you to configure
various settings related to your internet connection, including the proxy server settings. To access the
Internet Options utility, you can either open the Control Panel and click on Internet Options, or open any
web browser and click on the Tools menu and then on Internet Options. In the Internet Options window, go
to the Connections tab and click on the LAN settings button. Here, you can enable or disable the use of a
proxy server, as well as enter the address and port number of the proxy server you want to use12.
Security and Maintenance is a utility in Windows that allows you to view and manage the security and
maintenance status of your computer, such as firewall, antivirus, backup, troubleshooting, and recovery
settings. It does not have any option to configure proxy server settings.
Network and Sharing Center is a utility in Windows that allows you to view and manage your network
connections, such as Wi-Fi, Ethernet, VPN, or dial-up. It also allows you to change network settings, such
as network discovery, file and printer sharing, homegroup, and adapter settings. It does not have any option
to configure proxy server settings. Windows Defender Firewall is a utility in Windows that allows you to
enable or disable the firewall protection for your computer, as well as configure firewall rules for inbound
and outbound traffic. It does not have any option to configure proxy server settings.
379. - (Topic 4)
A company would like to implement multifactor authentication for all employees at a minimal cost. Which of
A. Biometrics
B. Soft token
D. Smart card
Answer: B
225
Certify For Sure with IT Exam Dumps
Explanation: A soft token, also known as a software token or an OTP (one-time password) app, is a type of
multifactor authentication that generates a temporary code or password on a user’s device, such as a
smartphone or a tablet. The user must enter this code or password along with their username and
password to access their account or service. A soft token can help improve security by adding an extra
layer of verification and preventing unauthorized access even if the user’s credentials are compromised. A
soft token can also be implemented at a minimal cost, as it does not require any additional hardware or
infrastructure. Biometrics, access control lists, and smart card are not types of multifactor authentication
380. - (Topic 4)
Which of the following helps ensure that a piece of evidence extracted from a PC is admissible in a court of
law?
C. Documentation of an incident
D. Chain of custody
Answer: D
Explanation: Chain of custody is a process that helps ensure that a piece of evidence extracted from a PC
is admissible in a court of law. Chain of custody refers to the documentation and tracking of who handled,
accessed, modified, or transferred the evidence, when, where, why, and how. Chain of custody can help
establish the authenticity, integrity, and reliability of the evidence, as well as prevent tampering, alteration,
or loss of the evidence. Data integrity form, valid operating system license, and documentation of an
incident are not processes that can ensure that a piece of evidence extracted from a PC is admissible in a
court of law.
381. - (Topic 4)
A salesperson's computer is unable to print any orders on a local printer that is connected to the computer
Which of the following tools should the salesperson use to restart the print spooler?
A. Control Panel
B. Processes
226
Certify For Sure with IT Exam Dumps
C. Startup
D. Services
Answer: D
Explanation:
The correct answer is D. Services. The print spooler is a service that manages the print queue and sends
print jobs to the printer. To restart the print spooler, the salesperson can use the Services app, which allows
them to stop and start the service. Alternatively, they can also use the Task Manager or the Command
The Services app is a tool that displays all the services that are running on the computer. It can be
accessed by typing services.msc in the Run window or by searching for Services in the Start menu. The
Services app allows users to start, stop, restart, or configure any service, including the print spooler123.
The Task Manager is a tool that shows information about the processes, applications, and services that are
running on the computer. It can be accessed by pressing Ctrl + Shift + Esc or by right-clicking on the
taskbar and selecting Task Manager. The Task Manager allows users to start, stop, or restart any service
by going to the Services tab and right- clicking on the service name12.
The Command Prompt is a tool that allows users to execute commands and perform tasks using text input.
It can be accessed by typing cmd in the Run window or by searching for Command Prompt in the Start
menu. The Command Prompt allows users to start, stop, or restart any service by using the net command
with the service name. For example, to restart the print spooler, users can type net stop spooler and then
The Control Panel is a tool that provides access to various settings and options for the computer. It can be
accessed by typing control panel in the Run window or by searching for Control Panel in the Start menu.
The Control Panel does not allow users to restart the print
spooler directly, but it can be used to access other tools such as Devices and Printers, Troubleshooting, or
Administrative Tools2.
The Processes tab is a part of the Task Manager that shows information about the processes that are
running on the computer. It can be accessed by opening the Task Manager and selecting the Processes
tab. The Processes tab does not allow users to restart the print spooler directly, but it can be used to end
any process that is related to printing or causing problems with the print spooler2.
The Startup tab is a part of the Task Manager that shows information about the programs that run
227
Certify For Sure with IT Exam Dumps
automatically when the computer starts. It can be accessed by opening the Task Manager and selecting the
Startup tab. The Startup tab does not allow users to restart the print spooler directly, but it can be used to
disable or enable any program that affects printing or interferes with the print spooler2.
382. - (Topic 4)
A user wants to back up a Windows 10 device. Which of the following should the user select?
Answer: C
Explanation: Update and Security is the section in Windows 10 Settings that allows the user to back up their
device. Backing up a device means creating a copy of the data and settings on the device and storing it in
another location, such as an external drive or a cloud service. Backing up a device can help the user
restore their data and settings in case of data loss, corruption, or theft. Devices and Printers, Email and
Accounts, and Apps and Features are not sections in Windows 10 Settings that allow the user to back up
their device.
383. - (Topic 4)
A user attempts to install additional software and receives a UAC prompt. Which of the following is the
Answer: A
Explanation: A user account that belongs to the local administrator’s group has the permission to install
software on a Windows machine. If a user receives a UAC (user account control) prompt when trying to
install software, it means the user does not have enough privileges and needs to enter an administrator’s
password or switch to an administrator’s account. Adding the user account to the local administrator’s
228
Certify For Sure with IT Exam Dumps
group can resolve this issue. Configuring Windows Defender Firewall, creating a Microsoft account and
disabling the guest account are not related to this issue. Verified References:
https://www.comptia.org/blog/user-account-control https://www.comptia.org/certifications/a
384. - (Topic 4)
Which of the following wireless security features can be enabled lo allow a user to use login credentials to
A. TACACS+
B. Kerberos
C. Preshared key
D. WPA2/AES
Answer: D
Explanation: WPA2/AES (Wi-Fi Protected Access 2/Advanced Encryption Standard) is a wireless security
standard that supports enterprise mode, which allows a user to use login credentials (username and
password) to authenticate to available corporate SSIDs (service set identifiers). TACACS+ (Terminal
Access Controller Access-Control System Plus) and Kerberos are network authentication protocols, but
they are not wireless security features. Preshared key is another wireless security feature, but it does not
https://www.comptia.org/certifications/a
385. - (Topic 4)
A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to
mitigate the risk of customer data being accidentally saved to the kiosk?
B. Private-browsing mode
D. Password manager
Answer: B
Explanation: Private-browsing mode is the best option to mitigate the risk of customer data being
accidentally saved to the kiosk. Private-browsing mode prevents the browser from storing cookies, history,
229
Certify For Sure with IT Exam Dumps
passwords, and other data that could reveal the customer’s identity or preferences. Manually clearing
browsing data is not a reliable option, as it depends on the customer’s awareness and willingness to do so.
Browser data synchronization and password manager are features that could actually increase the risk of
customer data being exposed, as they could sync or autofill sensitive information across devices or
accounts. References:
✑ Certification Study Guides and Books | CompTIA IT Certifications, CompTIA A+ Core 1 220-1101
386. - (Topic 4)
A user visits a game vendor's website to view the latest patch notes, but this information is not available on
the page. Which of the following should the user perform before reloading the page?
Answer: D
Explanation: Clearing the cached file is an action that can help resolve the issue of not
seeing the latest patch notes on a game vendor’s website. A cached file is a copy of a web page or file that
is stored locally on the user’s browser or device for faster loading and offline access. However, sometimes
a cached file may become outdated or corrupted and prevent the user from seeing the most recent or
accurate version of a web page or file. Clearing the cached file can force the browser to download and
display the latest version from the server instead of using the old copy from the cache. Synchronizing the
browser data, enabling private browsing mode, and marking the site as trusted are not actions that can help
387. - (Topic 4)
A help desk technician determines a motherboard has failed. Which of the following is the most logical next
230
Certify For Sure with IT Exam Dumps
B. Verifying warranty status with the vendor
D. Purchasing another PC
Answer: B
Explanation: Verifying warranty status with the vendor is the most logical next step in the remediation
process after determining that a motherboard has failed. A warranty is a guarantee from the vendor that
covers the repair or replacement of defective or faulty products within a specified period of time. Verifying
warranty status with the vendor can help the technician determine if the motherboard is eligible for warranty
service and what steps to take to obtain it. Escalating the issue to Tier 2, replacing the motherboard, and
purchasing another PC are not the most logical next steps in the remediation process.
388. - (Topic 4)
A user is unable to access files on a work PC after opening a text document. The text document was
labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the
Answer: B
Explanation: Running an antivirus scan for malicious software is the first step that a support technician
should do when a user reports a virus on a PC. The antivirus scan can detect and remove the virus, as well
as prevent further damage or infection. Quarantining the host, investigating how the malware was installed
and reimaging the computer are possible steps that can be done after running the antivirus scan,
depending on the situation and the results of the scan. Verified References:
389. - (Topic 4)
Which of the following protects a mobile device against unwanted access when it is left unattended?
A. PIN code
231
Certify For Sure with IT Exam Dumps
B. OS updates
C. Antivirus software
D. BYOD policy
Answer: A
Explanation: A PIN code is a numeric password that protects a mobile device against unwanted access
when it is left unattended. It requires the user to enter the correct code before unlocking the device. OS
updates, antivirus software and BYOD policy are other security measures for mobile devices, but they do
not prevent unauthorized access when the device is left unattended. Verified References:
390. - (Topic 4)
A department manager submits a help desk ticket to request the migration of a printer's port utilization from
USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP
address allocation is required. Which of the following should happen immediately before network use is
authorized?
Answer: B
Explanation: A change request form is a document that describes the proposed change, the reason for the
change, the impact of the change, and the approval process for the change. A change request form is
required for any planned changes to the network, such as adding a new network printer, to ensure that the
change is authorized, documented, and communicated to all stakeholders. Submitting a change request
form should happen immediately before network use is authorized, as stated in the Official CompTIA A+
Core 2 Study Guide. The other options are either too late (documenting the date and time of the change) or
too early (determining the risk level of the change and requesting an unused IP address) in the change
management process.
391. - (Topic 4)
232
Certify For Sure with IT Exam Dumps
Users access files in the department share. When a user creates a new subfolder, only that user can
access the folder and Its files. Which of the following will MOST likely allow all users to access the new
folders?
B. Enabling inheritance
Answer: B
Explanation: Enabling inheritance is a method that allows new subfolders to inherit the permissions and
settings from their parent folder. If users can access files in the department share, but not in the new
subfolders created by other users, it may indicate that inheritance is disabled and that each new subfolder
has its own permissions and settings that restrict access to only the creator. Enabling inheritance can help
resolve this issue by allowing all users to access the new subfolders with the same permissions and
settings as the department share. Assigning share permissions, requiring multifactor authentication, and
removing archive attribute are not methods that can most likely allow all users to access the new folders.
392. - (Topic 4)
A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the
Answer: B,D
Explanation: Removing the applications from startup can improve the boot time of a PC by reducing the
number of programs that load automatically when the PC starts. Some applications may add themselves to
the startup list without the user’s knowledge or consent, which can slow down the PC’s performance.
Running the Disk Cleanup utility can also improve the boot time of a PC by deleting unnecessary or
233
Certify For Sure with IT Exam Dumps
temporary files that take up disk space and affect the PC’s speed. Disk Cleanup can also remove old
system files that may cause conflicts or errors during booting. Installing additional RAM, installing a faster
SSD, defragmenting the hard drive, and ending the processes in the Task Manager are not operations that
would be best to do to resolve the issue of slow boot time at a minimal expense, as they may require
purchasing new hardware or software, or may have negative impacts on other aspects of the PC’s
performance.
393. - (Topic 4)
A technician is investigating options to secure a small office's wireless network. One requirement is to allow
automatic log-ins to the network using certificates instead of passwords. Which of the following should the
A. RADIUS
B. AES
C. EAP-EKE
D. MFA
Answer: A
Explanation:
RADIUS is the correct answer for this question. RADIUS stands for Remote Authentication Dial-In User
Service, and it is a protocol that provides centralized authentication, authorization, and accounting for
wireless networks. RADIUS can support certificate-based authentication, which allows users to log in to the
network automatically without entering passwords. RADIUS also provides other benefits, such as enforcing
security policies, logging user activities, and managing network access. AES, EAP-EKE, and MFA are not
wireless solutions, but rather encryption algorithms, authentication methods, and security factors,
respectively. References:
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459
394. - (Topic 4)
A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and
needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator
234
Certify For Sure with IT Exam Dumps
use to view which processes on the kiosk machine are connecting to the internet?
A. Resource Monitor
B. Performance Monitor
C. Command Prompt
D. System Information
Answer: A
Explanation: Resource Monitor is a tool that shows the network activity of each process on a Windows
machine, including the TCP connections and the sent and received bytes. Performance Monitor is a tool
that shows the performance metrics of the system, such as CPU, memory, disk and network usage.
Command Prompt is a tool that allows running commands and scripts on a Windows machine. System
Information is a tool that shows the hardware and software configuration of a Windows machine. Verified
References: https://www.comptia.org/blog/how-to-use-resource-monitor
https://www.comptia.org/certifications/a
395. - (Topic 4)
A new employee is having difficulties using a laptop with a docking station The laptop is connected to the
docking station, and the laptop is closed. The external monitor works for a few seconds, but then the laptop
goes to sleep. Which of the following options should the technician configure in order to fix the Issue?
A. Hibernate
B. Sleep/suspend
Answer: C
Explanation: The correct answer is C. Choose what closing the lid does. This option allows you to configure
how the laptop behaves when you close the lid, such as whether it goes to sleep, hibernates, shuts down,
or does nothing. To access this option, you can follow these steps :
Click on Choose what closing the lid does on the left side.
Under When I close the lid, select Do nothing for both On battery and Plugged in. Click on Save changes.
235
Certify For Sure with IT Exam Dumps
This will prevent the laptop from going to sleep when you close the lid while it is connected to the docking
Hibernate, sleep/suspend, and turn on fast startup are not the options that should be configured to fix the
issue. Hibernate and sleep/suspend are both power-saving modes that allow you to resume your work
without losing any data. However, they also turn off the display and other components of the laptop, which
means you will not be able to use the external monitor when the laptop is closed. Turn on fast startup is a
feature that reduces the boot time of Windows by saving some system information to a file when you shut
down. It does not affect how the laptop behaves when you close the lid .
396. - (Topic 4)
A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks
the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is
troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the
Answer: C
Explanation: Instructing the user to disconnect the Wi-Fi is the first action the technician should take if they
suspect a rogue access point. A rogue access point is an unauthorized wireless network that could be used
to intercept or manipulate network traffic, compromise security, or launch attacks. Disconnecting the Wi-Fi
would prevent further exposure or damage to the user’s device or data. Restarting the wireless adapter,
launching the browser, or running the antivirus software are possible actions to take after disconnecting the
Wi-Fi, but they are not as urgent or effective as the first step. References:
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456
397. - (Topic 4)
A company recently experienced a security incident in which a USB drive containing malicious software
236
Certify For Sure with IT Exam Dumps
was able to covertly install malware on a workstation_ Which of the following actions should be taken to
E. Disable AutoRun.
Answer: E,F
Explanation: The correct answers are E and F. Disabling AutoRun and updating the antivirus definitions are
two actions that should be taken to prevent the incident from happening again.
AutoRun is a feature of Windows that automatically executes a predetermined action when a removable
media such as a USB drive is inserted in a computer. For example, AutoRun can launch or install a new
However, this feature can also be exploited by malicious software that can run without the user’s consent or
knowledge. Therefore, disabling AutoRun can help prevent accidental installation of viruses and other
Updating the antivirus definitions is another important action that can help prevent malware infections from
USB drives. Antivirus definitions are files that contain information about the latest known threats and how to
detect and remove them. By updating the antivirus definitions regularly, you can ensure that your antivirus
software can recognize and block any malicious software that may be on the USB drive before it can harm
your computer45. A host-based IDS is a system that monitors and analyzes the activity on a single
computer or device for any signs of intrusion or malicious behavior. A host-based IDS can help detect and
prevent malware infections from USB drives, but it is not a sufficient action by itself. A host-based IDS
needs to be complemented by other security measures, such as disabling AutoRun and updating the
antivirus definitions6.
Restricting login times, enabling a BIOS password, and updating the password complexity are all actions
that can help improve the security of a computer or device, but they are not directly related to preventing
malware infections from USB drives. These actions can help prevent unauthorized access to the computer
237
Certify For Sure with IT Exam Dumps
or device, but they do not affect how the computer or device interacts with the USB drive or its contents.
Restricting user permissions is an action that can help limit the damage that malware can cause on a
computer or device, but it does not prevent the malware from being installed in the first place. Restricting
user permissions means limiting what actions a user can perform on the computer or device, such as
installing or deleting programs, modifying system settings, or accessing certain files or folders. By
restricting user permissions, you can reduce the impact of malware infections by preventing them from
398. - (Topic 4)
A user's iPhone was permanently locked after several tailed login attempts. Which of the following will
Answer: D
Explanation: A secondary account and recovery code are used to reset the primary account and password
on an iPhone after it has been locked due to failed login attempts. Fingerprint, pattern, facial recognition
and PIN code are biometric or numeric methods that can be used to unlock an iPhone, but they are not
https://support.apple.com/en-us/HT204306 https://www.comptia.org/certifications/a
399. - (Topic 4)
The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling
of evidence. Which of the following was MOST likely violated during the investigation?
A. Open-source software
B. EULA
C. Chain of custody
D. AUP
Answer: C
238
Certify For Sure with IT Exam Dumps
Explanation: Chain of custody is a process that documents how evidence is collected, handled, stored and
transferred during a cybercrime investigation. It ensures that the evidence is authentic, reliable and
admissible in court. If the chain of custody is violated during an investigation, it can compromise the
integrity of the evidence and lead to the case being dismissed. Open-source software, EULA (end-user
license agreement) and AUP (acceptable use policy) are not related to cybercrime investigations or
https://www.comptia.org/certifications/a
400. - (Topic 4)
A technician is setting up a newly built computer. Which of the following is the fastest way for the technician
A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation
Answer: D
Explanation: An unattended installation is a method of installing Windows 10 that does not require any user
input or interaction during the installation process. An unattended installation can be performed by using an
answer file, which is a file that contains all the configuration settings and preferences for the installation,
such as the product key, the language, the partition size, and the user accounts. An unattended installation
can be the fastest way to install Windows 10, as it automates and streamlines the installation process.
Factory reset, System Restore, and in-place upgrade are not methods of installing Windows 10.
401. - (Topic 4)
A technician has been tasked with troubleshooting audiovisual issues in a conference room. The meeting
presenters are unable to play a video with sound. The following error is received:
A. compmgmt.msc
B. regedit.exe
239
Certify For Sure with IT Exam Dumps
C. explorer.exe
D. taskmgt.exe
E. gpmc.msc
F. services.msc
Answer: F
Explanation: services.msc is a tool that can be used to resolve the issue of “The Audio Driver is not running”
on a Windows machine. It allows a technician to view, start, stop and configure the services that run on the
system, such as the Windows Audio service. compmgmt.msc, regedit.exe, explorer.exe, taskmgt.exe and
gpmc.msc are other tools that can be used for different purposes on a Windows machine, but they are not
services-msc https://www.comptia.org/certifications/a
402. - (Topic 4)
A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending
unusual SMS messages and registering strange network activity A technician thinks a virus or other
malware has infected the device. Which of the following should the technician suggest the user do to best
F. Update the OS
Answer: C,D
Explanation:
The best way to address the security and privacy concerns caused by a malware infection on a smartphone
is to uninstall all recently installed applications and schedule an antivirus scan. Uninstalling the applications
that may have introduced the malware can help remove the source of infection and prevent further damage.
Scheduling an antivirus scan can help detect and remove any remaining traces of malware and restore the
device’s functionality. References: CompTIA A+ Core 2 (220-1102) Certification Study Guide, Chapter 5:
240
Certify For Sure with IT Exam Dumps
Mobile Devices, Section 5.3: Mobile Device Security1
403. - (Topic 4)
A technician needs to ensure that USB devices are not suspended by the operating system. Which of the
following Control Panel utilities should the technician use to configure the setting?
A. System
B. Power Options
D. Ease of Access
Answer: B
Explanation: Power Options is a Control Panel utility that allows users to configure the power settings of
their computer, such as when to turn off the display, when to put the computer to sleep, and how to manage
the battery life. Power Options also allows users to configure the USB selective suspend setting, which is a
feature that automatically suspends the power supply to USB devices that are not in use, in order to save
energy. A user can disable this setting if they want to ensure that USB devices are not suspended by the
operating system. System, Devices and Printers, and Ease of Access are not Control Panel utilities that can
404. - (Topic 4)
A malicious file was executed automatically when a flash drive was plugged in. Which of the following
A. Disabling UAC
C. Enabling UPnP
Answer: D
Explanation: AutoPlay is a feature that automatically runs programs or files when a removable media
device, such as a flash drive, is plugged in. This can be exploited by malware authors who place malicious
files on flash drives that execute automatically when inserted into a computer. Turning off AutoPlay can
prevent this type of incident by requiring the user to manually open or run files from removable media
241
Certify For Sure with IT Exam Dumps
devices. Disabling UAC (user account control), restricting local administrators and enabling UPnP
(universal plug and play) are not effective ways to prevent this type of incident. Verified References:
https://www.comptia.org/blog/autoplay-security-risk https://www.comptia.org/certifications/a
405. - (Topic 4)
A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the
A. System Configuration
B. Task Manager
C. Performance Monitor
Answer: B
Explanation: Task Manager is the best tool to use to disable applications on startup in Windows 10. Task
Manager is a built-in utility that shows the current processes, performance, and users on a system. It also
has a Startup tab that lists the applications that run on boot and their impact on the system. The technician
can use Task Manager to disable or enable any application on startup by right-clicking on it and selecting
the appropriate option. System Configuration, Performance Monitor, and Group Policy Editor are other tools
that can be used to manage system settings, but they are not as simple or convenient as Task Manager for
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103
406. - (Topic 4)
Windows updates need to be performed on a department's servers. Which of the following methods should
A. FIP
B. MSRA
C. RDP
D. VPN
Answer: C
242
Certify For Sure with IT Exam Dumps
Explanation: RDP (Remote Desktop Protocol) is a protocol that allows a user to connect to and control a
remote computer over a network. RDP can be used to perform Windows updates on a department’s
407. - (Topic 4)
A technician is setting up a newly built computer. Which of the following is the fastest way for the technician
A. Factory reset
B. System Restore
C. In-place upgrade
D. Unattended installation
Answer: D
Explanation:
The correct answer is D. Unattended installation. An unattended installation is a way of installing Windows
10 without requiring any user input or interaction. It uses a configuration file called answer file that contains
the settings and preferences for the installation, such as the product key, language, partition, and network
settings. An unattended installation can be performed by using a bootable USB flash drive or DVD that
contains the Windows 10 installation files and the answer file1. This is the fastest way for the technician to
install Windows 10 on a newly built computer, as it automates the whole process and saves time. A factory
reset is a way of restoring a computer to its original state by deleting all the data and applications and
reinstalling the operating system. A factory reset can be performed by using the recovery partition or media
that came with the computer, or by using the Reset this PC option in Windows 10 settings2. A factory reset
is not a way of installing Windows 10 on a newly built computer, as it requires an existing operating system
to be present.
A system restore is a way of undoing changes to a computer’s system files and settings by using a restore
point that was created earlier. A system restore can be performed by using the System Restore option in
Windows 10 settings or by using the Advanced Startup Options menu3. A system restore is not a way of
installing Windows 10 on a newly built computer, as it requires an existing operating system and restore
points to be present.
243
Certify For Sure with IT Exam Dumps
An in-place upgrade is a way of upgrading an existing operating system to a newer version without losing
any data or applications. An in-place upgrade can be performed by using the Windows 10 Media Creation
Tool or by running the Setup.exe file from the Windows 10 installation media. An in-place upgrade is not a
way of installing Windows 10 on a newly built computer, as it requires an existing operating system to be
present.
408. - (Topic 4)
A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption
key. Which of the following is the best way for a technician to return the device to service safely?
A. Run an AV scan.
Answer: B
Explanation: The best way for a technician to return the device to service safely is to reinstall the operating
system. This is because the device is infected by ransomware, which is a form of malware that encrypts
files and demands payment for decryption. Reinstalling the operating system will erase the ransomware
and restore the device to its original state. However, this will also delete any data that was not backed up
before the infection. Therefore, it is important to have regular backups of critical data and protect them from
ransomware attacks1.
The other options are not effective or safe for ransomware recovery. Running an AV scan may not detect or
remove the ransomware, especially if it is a new or unknown variant. Installing a software firewall may
prevent future attacks, but it will not help with the current infection. Performing a system restore may not
work if the ransomware has corrupted or deleted the restore points. Complying with the on-screen
instructions is not advisable, as it will encourage the attackers and there is no guarantee that they will
To prevent and recover from ransomware attacks, it is recommended to follow some best practices, such
as234:
✑ Use strong passwords and multifactor authentication for all accounts and devices.
244
Certify For Sure with IT Exam Dumps
✑ Keep all software and firmware updated with the latest security patches.
✑ Educate users and staff on how to recognize and report phishing and social engineering attempts.
✑ Enable network segmentation and firewall rules to limit the spread of ransomware.
✑ Implement a Zero Trust security model to verify all requests and devices before granting access.
✑ Create and test backups of critical data and store them offline or in a separate network.
✑ Recover safely by isolating the infected devices, identifying the ransomware variant, and restoring data
from backups.
✑ Report any ransomware incidents to law enforcement agencies and seek help from experts.
409. - (Topic 4)
A user requires a drive to be mapped through a Windows command line. Which of the following
A. gpupdate
B. net use
C. hostname
D. dir
Answer: B
Explanation: Net use is a command-line tool that can be used to map a drive in Windows. Mapping a drive
means assigning a drive letter to a network location or a local folder, which allows the user to access it
more easily and quickly. Net use can also be used to disconnect a mapped drive, display information about
mapped drives, or connect to shared resources on another computer. Gpupdate, hostname, and dir are not
410. - (Topic 4)
A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which
of the following types of infections are the workstations most likely experiencing? (Select two)
A. Zombies
B. Keylogger
245
Certify For Sure with IT Exam Dumps
C. Adware
D. Botnet
E. Ransomvvare
F. Spyware
Answer: A,D
Explanation: The correct answers are A and D. Zombies and botnets are types of infections that allow
malicious actors to remotely control infected computers and use them to launch distributed
denial-of-service (DDoS) attacks against a target. A DDoS attack is a type of cyberattack that aims to
overwhelm a server or a network with a large volume of traffic from multiple sources, causing it to slow
down or crash.
A keylogger is a type of malware that records the keystrokes of a user and sends them to a remote server,
often for the purpose of stealing passwords, credit card numbers, or other sensitive information.
Adware is a type of software that displays unwanted advertisements on a user’s computer, often in the form
of pop-ups, banners, or redirects. Adware can also collect user data and compromise the security and
Ransomware is a type of malware that encrypts the files or locks the screen of a user’s computer and
demands a ransom for their restoration. Ransomware can also threaten to delete or expose the user’s data
Spyware is a type of software that covertly monitors and collects information about a user’s online activities,
such as browsing history, search queries, or personal data. Spyware can also alter the settings or
411. - (Topic 4)
A customer has a USB-only printer attached to a computer. A technician is configuring an arrangement that
allows other computers on the network to use the printer. In which of the following locations on the
246
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: The correct answer is B. Printer Properties/Sharing tab. This is the location where the
technician can enable printer sharing and assign a share name for the USB printer. This will allow other
computers on the network to access the printer by using the share name or the IP address of the computer
412. - (Topic 4)
A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of
A. SMS
B. MFA
C. ACL
D. MDM
Answer: C
Explanation: ACL (access control list) is a security control that describes what permissions a user or group
has on a shared network folder using NTFS (New Technology File System) security settings. It can be used
to grant or deny read, write, modify, delete or execute access to files and folders. SMS (short message
service), MFA (multifactor authentication), MDM (mobile device management) are not security controls that
https://www.comptia.org/certifications/a
413. - (Topic 4)
Which of the following macOS utilities uses AES-128 to encrypt the startup disk?
A. fdisk
B. Diskpart
C. Disk Utility
D. FileVault
Answer: D
Explanation: FileVault is a macOS utility that uses AES-128 (Advanced Encryption Standard) to encrypt the
247
Certify For Sure with IT Exam Dumps
startup disk of a Mac computer. It protects the data from unauthorized access if the computer is lost or
stolen. fdisk and Diskpart are disk partitioning utilities for Linux and Windows, respectively. Disk Utility is
another macOS utility that can perform disk management tasks, such as formatting, resizing, repairing, etc.
414. - (Topic 4)
A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the
following components should the developer upgrade to improve the hypervisor’s performance?
B. NIC performance
C. Storage IOPS
D. Dedicated GPU
Answer: A
Explanation: The correct answer is A. Amount of system RAM. A Type 2 hypervisor is a virtualization
software that runs on top of a host operating system, which means it shares the system resources with the
host OS and other applications. Therefore, increasing the amount of system RAM can improve the
performance of the hypervisor and the virtual machines running on it. RAM is used to store data and
instructions that are frequently accessed by the CPU, and having more RAM can reduce the need for
swapping data to and from the storage device, which is slower than RAM.
NIC performance, storage IOPS, and dedicated GPU are not as relevant for improving the hypervisor’s
performance in this scenario. NIC performance refers to the speed and quality of the network interface card,
which is used to connect the computer to a network. Storage IOPS refers to the number of input/output
operations per second that can be performed by the storage device, which is a measure of its speed and
efficiency. Dedicated GPU refers to a separate graphics processing unit that can handle complex graphics
tasks, such as gaming or video editing. These components may affect other aspects of the computer’s
performance, but they are not directly related to the hypervisor’s ability to compile new source code.
415. - (Topic 4)
A user contacts the help desk to request assistance with a program feature. The user is in a different
building but on the same network as the help desk technician. Which of the following should the technician
248
Certify For Sure with IT Exam Dumps
use to assist the user?
A. AAA
B. SSH
C. RDP
D. VPN
Answer: C
Explanation: RDP stands for Remote Desktop Protocol and it is a protocol that allows a user to remotely
access and control another computer over a network. A technician can use RDP to assist a user who is in a
different building but on the same network by connecting to the user’s computer and viewing their screen,
keyboard, and mouse. AAA, SSH, and VPN are not protocols that can be used to assist a user with a
program feature.
416. - (Topic 4)
A systems administrator is experiencing Issues connecting from a laptop to the corporate network using
PKI. Which to the following tools can the systems administrator use to help remediate the issue?
A. certmgr.msc
B. msconfig.exe
C. lusrmgr.msc
D. perfmon.msc
Answer: A
Explanation: certmgr.msc is a tool that can be used to troubleshoot issues with PKI (public key
infrastructure) on a Windows machine. It allows a system administrator to view, manage and import
certificates, as well as check their validity, expiration and revocation status. msconfig.exe, lusrmgr.msc and
perfmon.msc are other tools that can be used for different purposes on a Windows machine, but they are
https://www.comptia.org/certifications/a
417. - (Topic 5)
A user receives a call from someone claiming to be a technical support agent. The caller asks the user to
249
Certify For Sure with IT Exam Dumps
log in to the computer.
Which of the following security measures should the user take to ensure security and privacy?
Answer: A
Explanation: This is a scenario of a potential tech support scam, where a fraudster pretends to be a
technical support agent and tries to trick the user into giving them access to the computer, personal
information, or money. The user should not trust any unsolicited calls from unknown people claiming to be
from tech support, as they might be trying to install malware, steal data, or charge for fake services. The
user should only accept calls from known people, such as their IT department, their service provider, or
their software vendor, and verify their identity before logging in to the computer. The user should also report
References:
Avoid and report Microsoft technical support scams2 How to Protect Against Technical Support Scams3
418. - (Topic 5)
A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which
of the following partition styles should the technician use to partition the device?
A. EFS
B. GPT
C. MBR
D. FAT32
Answer: B
Explanation: GPT is the correct answer for this question. GPT stands for GUID Partition Table, and it is a
partition style that supports up to 128 primary partitions and up to 18 exabytes of disk size per partition.
250
Certify For Sure with IT Exam Dumps
GPT also uses a unique identifier for each partition and provides better data protection and recovery. GPT
is suitable for partitioning a hard disk that has five primary partitions with 4TB of free space each. EFS,
MBR, and FAT32 are not correct answers for this question. EFS stands for Encrypting File System, and it is
a feature that allows encrypting files and folders on NTFS volumes. EFS is not a partition style, but rather a
file system attribute. MBR stands for Master Boot Record, and it is an older partition style that supports up
to four primary partitions and up to 2TB of disk size per partition. MBR cannot handle five primary partitions
with 4TB of free space each. FAT32 stands for File Allocation Table 32, and it is a file system that supports
up to 32GB of disk size per partition and up to 4GB of file size. FAT32 is not a partition style, but rather a file
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 105
419. - (Topic 5)
Which of the following would allow physical access to a restricted area while maintaining a record of
events?
A. Hard token
C. Key fob
D. Door Lock
Answer: B
Explanation: Access control vestibule is the correct answer for this question. An access control vestibule is
a physical security device that consists of two doors that form an enclosed space between them. The first
door opens only after verifying the identity of the person entering, such as by using a card reader, biometric
scanner, or keypad. The second door opens only after the first door closes, creating a buffer zone that
prevents unauthorized access or tailgating. An access control vestibule also maintains a record of events,
such as who entered or exited, when, and how. Hard token, key fob, and door lock are not sufficient to meet
the requirements of this question. A hard token is a device that generates a one-time password or code for
authentication purposes. A key fob is a small device that can be attached to a key ring and used to unlock
doors or start vehicles remotely. A door lock is a mechanism that secures a door from opening without a
251
Certify For Sure with IT Exam Dumps
✑ Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 25
420. - (Topic 5)
A computer technician is investigating a computer that is not booting. The user reports that the computer
was working prior to shutting it down last night. The technician notices a removable USB device is inserted,
and the user explains the device is a prize the user received in the mail yesterday. Which of the following
A. Phishing
B. Dumpster diving
C. Tailgating
D. Evil twin
Answer: D
Explanation:
Phishing is the correct answer for this question. Phishing is a type of attack that uses fraudulent emails or
other messages to trick users into revealing sensitive information or installing malicious software. Phishing
emails often impersonate legitimate entities or individuals and offer incentives or threats to lure users into
clicking on malicious links or attachments. In this scenario, the user received a removable USB device in
the mail as a prize, which could be a phishing attempt to infect the user’s computer with malware or gain
access to the user’s data. Dumpster diving, tailgating, and evil twin are not correct answers for this question.
Dumpster diving is a type of attack that involves searching through trash bins or recycling containers to find
discarded documents or devices that contain valuable information. Tailgating is a type of attack that
involves following an authorized person into a restricted area without proper identification or authorization.
Evil twin is a type of attack that involves setting up a rogue wireless access point that mimics a legitimate
421. - (Topic 5)
Which of the following would typically require the most computing resources from the host computer?
A. Chrome OS
252
Certify For Sure with IT Exam Dumps
B. Windows
C. Android
D. macOS
E. Linux
Answer: B
Explanation:
Windows is the operating system that typically requires the most computing resources from the host
computer, compared to the other options. Computing resources include hardware components such as
CPU, RAM, disk space, graphics card, and network adapter. The minimum system requirements for an
operating system indicate the minimum amount of computing resources needed to install and run the
operating system on a computer. The higher the minimum system requirements, the more computing
According to the web search results, the minimum system requirements for Windows 10 and Windows 11
are as follows12:
✑ CPU: 1 GHz or faster with two or more cores (Windows 10); 1 GHz or faster with
✑ Disk space: 16 GB for 32-bit or 32 GB for 64-bit (Windows 10); 64 GB (Windows 11)
✑ Graphics card: DirectX 9 or later with WDDM 1.0 driver (Windows 10); DirectX 12 compatible with
✑ Network adapter: Ethernet or Wi-Fi (Windows 10); Ethernet or Wi-Fi that supports 5 GHz (Windows 11)
✑ RAM: 4 GB
✑ RAM: 2 GB
253
Certify For Sure with IT Exam Dumps
✑ Disk space: 16 GB
✑ RAM: 512 MB
✑ Disk space: 8 GB
The minimum system requirements for Linux vary depending on the distribution, but a common example is
✑ RAM: 4 GB
✑ Disk space: 25 GB
Based on the comparison of the minimum system requirements, Windows has the highest requirements for
CPU, RAM, disk space, and graphics card, while Chrome OS and Android have the lowest requirements.
macOS and Linux have moderate requirements, depending on the hardware and software configuration.
Therefore, Windows is the operating system that typically requires the most computing resources from the
host computer.
References:
✑ Windows, macOS, Chrome OS, or Linux: Which Operating System Is Right for You?1
✑ Chrome OS - Wikipedia
✑ Android - Wikipedia
254
Certify For Sure with IT Exam Dumps
422. - (Topic 5)
A client wants a technician to set up a proxy server in a branch office to manage internet access. This
involves configuring the workstations to use the new proxy server. Which of the following Internet Options
tabs in Control Panel would be most appropriate for the technician to use to configure the settings?
A. Privacy
B. Advanced
C. Content
D. Connections
E. Security
Answer: D
Explanation: The Connections tab in Internet Options allows the technician to configure the proxy server
settings for the workstations. The technician can enter the proxy server address and port number, and
specify which websites to bypass the proxy server for. The other tabs are not relevant for configuring the
proxy server settings. References: CompTIA A+ Certification Exam Core 2 Objectives, page 9, section 1.7;
CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 140, section 1.7.
423. - (Topic 5)
A laptop that was in the evidence room of a police station is missing. Which of the following is the best
Answer: A
Explanation: Chain of custody documentation is a record of the sequence of custody, control, transfer,
analysis, and disposition of physical or electronic evidence. It is important to maintain a chain of custody to
ensure the integrity and authenticity of the evidence, and to prevent tampering or contamination. If a laptop
that was in the evidence room of a police station is missing, the best reason to refer to chain of custody
documentation is to determine which party had the machine and when. This can help to identify the
possible suspects, locate the missing laptop, and verify if the evidence on the laptop was compromised or
255
Certify For Sure with IT Exam Dumps
not
424. - (Topic 5)
A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the
A. Degaussing
B. Standard formatting
C. Low-level wiping
D. Deleting
Answer: C
Explanation: Low-level wiping is the best data destruction method for recycling old hard drives for reuse.
Low-level wiping is a process that overwrites every bit of data on a hard drive with zeros or random patterns,
making it impossible to recover any data from the drive. Low-level wiping also restores the drive to its
factory state, removing any bad sectors or errors that may have accumulated over time. Low-level wiping
can be done using specialized software tools or hardware devices that connect to the drive. Degaussing,
standard formatting, and deleting are not suitable data destruction methods for recycling old hard drives for
reuse. Degaussing is a process that exposes a hard drive to a strong magnetic field, destroying both the
data and the drive itself. Degaussing renders the drive unusable for reuse. Standard formatting is a process
that erases the data on a hard drive by removing the file system structure, but it does not overwrite the data
itself. Standard formatting leaves some data recoverable using forensic tools or software utilities. Deleting
is a process that removes the data from a hard drive by marking it as free space, but it does not erase or
overwrite the data itself. Deleting leaves most data recoverable using undelete tools or software utilities.
References:
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 105
425. - (Topic 5)
A technician has verified a computer is infected with malware. The technician isolates the system and
updates the anti-malware software. Which of the following should the technician do next?
256
Certify For Sure with IT Exam Dumps
B. Back up the uninfected files and reimage the computer.
Answer: D
Explanation: Malware is malicious software that can cause damage or harm to a computer system or
network4. A technician has verified a computer is infected with malware by observing unusual behavior,
such as slow performance, pop-ups, or unwanted ads. The technician isolates the system and updates the
anti-malware software to prevent further infection or spread of the malware. The next step is to run
repeated remediation scans until the malware is removed. A remediation scan is a scan that detects and
removes malware from the system. Running one scan may not be enough to remove all traces of malware,
426. - (Topic 5)
Which of the following is command options is used to display hidden files and directories?
A. -a
B. -s
C. -lh
D. -t
Answer: A
Explanation: The -a option is used to display hidden files and directories in a command- line interface.
Hidden files and directories are those that start with a dot (.) and are normally not shown by default. The -a
option stands for “all” and shows all files and directories, including the hidden ones. The -a option can be
used with commands such as ls, dir, or find to list or search for hidden files and directories. The -s, -lh, and
-t options are not used to display hidden files and directories. The -s option stands for “size” and shows the
size of files or directories in bytes. The -lh option stands for “long human-readable” and shows the size of
files or directories in a more readable format, such as KB, MB, or GB. The -t option stands for “time” and
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 107
257
Certify For Sure with IT Exam Dumps
427. - (Topic 5)
Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a
A. Professional
B. Home
C. Enterprise
D. Embedded
Answer: A
Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes,
addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned
Education2. Windows 10 Home does not support BitLocker3, and Windows 10 Embedded is designed for
specialized devices and does not offer BitLocker as a feature4. Therefore, the most appropriate Windows
10 edition for a single user who wants to encrypt a hard drive with BitLocker is Professional. References1:
BitLocker overview - Windows Security | Microsoft Learn2: Device encryption in Windows - Microsoft
Support3: Can You Turn on BitLocker on Windows 10 Home?4: How to enable device encryption on
Windows 10 Home
428. - (Topic 5)
Which of the following items require special e-waste recycling? (Select two).
A. Solid-state drive
B. A/C adapter
C. Surge protector
D. Laptop battery
E. CRT monitor
F. Power supply
Answer: D,E
Explanation: Some electronic items require special e-waste recycling because they contain hazardous
materials that can harm the environment and human health if disposed of improperly12. Laptop batteries
258
Certify For Sure with IT Exam Dumps
Laptop batteries are usually made of lithium-ion or nickel-metal hydride, which are both toxic and flammable
substances34. If laptop batteries are thrown in the trash, they can leak, catch fire, or explode, causing
pollution and injuries5 . Therefore, laptop batteries should be recycled at authorized collection centers or
CRT monitors are old types of display devices that use cathode ray tubes, which are glass tubes that emit
electrons to create images on the screen . CRT monitors contain lead, mercury, cadmium, and phosphor,
which are all harmful metals that can contaminate the soil, water, and air if dumped in landfills . Therefore,
CRT monitors should be recycled at certified e-waste facilities or through retailer or manufacturer trade-in
Impacts – CompTIA A+ 220-1102 – 4.53 3: The Official CompTIA A+ Core 2 Instructor Guide (Exam
220-1102), page 10-12 4: CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key5 5:
[Why You Should Recycle Your Old Laptop Battery]: [How to Recycle Laptop Batteries] : [Laptop Battery
Recycling] : [How to Recycle Laptop Batteries] : The Official CompTIA A+ Core 2 Instructor Guide (Exam
220-1102), page 10- 12 : CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key :
[What is a CRT Monitor?] : [How to Recycle CRT Monitors] : [CRT Monitor Recycling] : [How to Recycle
CRT Monitors]
429. - (Topic 5)
A user is unable to access a remote server from a corporate desktop computer using the appropriate
terminal emulation program. The user contacts the help desk to report the issue. Which of the following
clarifying questions would be most effective for the help desk technician to ask the user in order to
Answer: A
Explanation: The most effective clarifying question for the help desk technician to ask the user in order to
understand the issue is A. What is the error message? This question will help the technician to identify the
possible cause and solution of the problem, as the error message will provide specific information about the
259
Certify For Sure with IT Exam Dumps
nature and location of the error, such as the server name, the port number, the protocol, the authentication
method, or the network status. The error message will also help the technician to troubleshoot the issue by
following the suggested steps or searching for the error code online.
* B. Does the program work on another computer? is not a very helpful question, as it will not reveal the
source of the error or how to fix it. The program may work on another computer for various reasons, such
as different network settings, firewall rules, permissions, or software versions. However, this question will
not tell the technician what is wrong with the user’s computer or the remote server, or what needs to be
* C. Did the program ever work? is not a very relevant question, as it will not address the current issue or
how to resolve it. The program may have worked in the past, but it may have stopped working due to
changes in the network configuration, the server status, the software updates, or the user credentials.
* D. Is anyone else having this issue? is not a very useful question, as it will not explain the reason or the
solution for the error. The issue may affect only the user, or multiple users, depending on the scope and the
impact of the error. However, this question will not tell the technician what is causing the error or how to fix it
References:
How to Troubleshoot Terminal Emulation Problems - Techwalla : How to Read and Understand Windows
Error Messages - Lifewire : How to Troubleshoot Network Connectivity Problems - How-To Geek : How to
Troubleshoot Software Problems - dummies : How to Troubleshoot Common PC Issues For Users -
MakeUseOf
430. - (Topic 5)
Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is
C. Schedule a scan.
260
Certify For Sure with IT Exam Dumps
D. Restart the PC.
Answer: B
Explanation: Recovery mode is a special boot option that allows the user to access advanced tools and
features to troubleshoot and remove malware from the device. Recovery mode can also restore the system
to a previous state or reset the device to factory settings. Running System Restore, scheduling a scan, or
restarting the PC may not be effective in removing the malware, as it may still be active or hidden in the
system files.
431. - (Topic 5)
A technician is creating a location on a Windows workstation for a customer to store meeting minutes.
A. c: \minutes
B. dir
C. rmdir
D. md
Answer: D
Explanation: The command md stands for make directory and is used to create a new directory or folder in
the current location. In this case, the technician can use md minutes to create a folder named minutes in the
C: drive. The other commands are not relevant for this task. c: \minutes is not a command but a path to a
folder. dir is used to display a list of files and folders in the current directory. rmdir is used to remove or
432. - (Topic 5)
Which of the following is the most likely reason a filtration system is critical for data centers?
Answer: B
Explanation: A filtration system is critical for data centers because it can control the humidity and
261
Certify For Sure with IT Exam Dumps
temperature levels in the environment. High humidity levels can cause condensation and corrosion on the
metal components of the servers and other equipment, leading to malfunction and damage. A filtration
system can also prevent dust, dirt, and other contaminants from entering the data center and clogging the
433. - (Topic 5)
A technician was assigned a help desk ticket and resolved the issue. Which of the following should the
B. Progress notes
C. Knowledge base
Answer: C
Explanation: A knowledge base is a centralized repository of information that can be used by technicians to
find solutions to common problems, best practices, troubleshooting guides, and other useful resources12.
Updating the knowledge base with the details of the issue and the resolution can help other technicians
who encounter similar issues in the future. It can also reduce the number of tickets and improve customer
satisfaction3. References1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-
434. - (Topic 5)
Which of the following are mobile operating systems used on smartphones? (Select two).
A. macOS
B. Windows
C. Chrome OS
D. Linux
E. iOS
F. Android
Answer: E,F
262
Certify For Sure with IT Exam Dumps
Explanation: iOS and Android are the two most popular and widely used mobile operating systems for
smartphones. They are both based on Unix-like kernels and provide a variety of features and applications
for users and developers. iOS is developed by Apple and runs exclusively on Apple devices, such as
iPhones and iPads. Android is developed by Google and runs on a range of devices from different
manufacturers, such as Samsung, Huawei, and Motorola. The other options are not mobile operating
systems for smartphones, but rather for other types of devices or platforms. macOS is a desktop operating
system for Apple computers, such as MacBooks and iMacs. Windows is a desktop operating system for
Microsoft computers, such as Surface and Dell. Chrome OS is a web-based operating system for Google
devices, such as Chromebooks and Chromecast. Linux is a family of open-source operating systems for
various devices and platforms, such as Ubuntu, Fedora, and Raspberry Pi.
435. - (Topic 5)
Remote employees need access to information that is hosted on local servers at the company. The IT
department needs to find a solution that gives employees secure access to the company's resources as if
the employees were on premises. Which of the following remote connection services should the IT team
implement?
A. SSH
B. VNC
C. VPN
D. RDP
Answer: C
Explanation: A VPN (Virtual Private Network) is a service that allows remote employees to access the
company’s network resources securely over the internet as if they were on premises. A VPN encrypts the
data traffic between the employee’s device and the VPN server, and assigns the employee a virtual IP
address that belongs to the company’s network. This way, the employee can access the local servers, files,
printers, and other resources without exposing them to the public internet. A VPN also protects the
employee’s privacy and identity by masking their real IP address and location.
436. - (Topic 5)
A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the
263
Certify For Sure with IT Exam Dumps
following steps should the technician take next?
Answer: B
Explanation: Removing the power cord is the first step to ensure the safety of the technician and the PC
components. This will prevent any electrical shock or damage that may occur if the PC is still connected to
a power source. The technician should also press the power button to drain any residual power from the
capacitors.
437. - (Topic 5)
In an organization with a standardized set of installed software, a developer submits a request to have new
software installed. The company does not currently have a license for this software, but the developer
already downloaded the installation file and is requesting that the technician install it. The developer states
that the management team approved the business use of this software. Which of the following is the best
A. Contact the software vendor to obtain the license for the user, and assist the user with installation once
B. Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the
C. Indicate to the developer that formal approval is needed; then, the IT team should investigate the
software and the impact it will have on the organization before installing the software.
D. Install the software and run a full system scan with antivirus software to confirm that the operating
Answer: C
Explanation: Installing new software on an organization’s system or device can have various implications,
such as compatibility, security, performance, licensing, and compliance issues. Therefore, it is important to
follow the best practices for software installation, such as doing research on the software, checking the
system requirements, scanning the installation file for malware, and obtaining the proper license345. The
264
Certify For Sure with IT Exam Dumps
technician should not install the software without formal approval from the management team, as this could
violate the organization’s policies or regulations. The technician should also not install the software without
investigating the software and its impact on the organization, as this could introduce potential risks or
problems to the system or device. The technician should indicate to the developer that formal approval is
needed, and then work with the IT team to evaluate the software and its suitability for the organization
before installing it
438. - (Topic 5)
Which of the following is the best reason for sandbox testing in change management?
Answer: A
Explanation:
Sandbox testing is a method of testing changes in a simulated environment that mimics the real one,
without affecting the actual production system. Sandbox testing is useful for change management because
it allows the testers to evaluate the change before deployment, and ensure that it works as intended, does
not cause any errors or conflicts, and meets the requirements and expectations of the stakeholders.
Sandbox testing also helps to protect the investment in the existing system, as it reduces the risk of
introducing bugs or breaking functionality that could harm the customer experience or the business
operations. Sandbox testing also gives the testers more control over the customer experience, as they can
experiment with different scenarios and configurations, and optimize the change for the best possible
outcome.
References:
1: Change Management and Sandbox - Quickbase1 2: Embracing change: Build, test, and adapt in a
439. - (Topic 5)
A user reports a hardware issue to the help desk. Which of the following should the help desk technician do
265
Certify For Sure with IT Exam Dumps
first when responding to the user?
Answer: A
Explanation: The first step in troubleshooting a hardware issue is to identify the hardware device that is
causing the problem. Asking the user for the model number of the hardware can help the help desk
technician to find the specifications, manuals, drivers, and other relevant information for the device. This
can also help the technician to determine if the device is compatible with the user’s system, if it has any
known issues or defects, and if it is covered by warranty or support contract. Asking the user for the model
number of the hardware is a help desk best practice that can save time and effort in resolving the issue
440. - (Topic 5)
Answer: B
Explanation: Scripting languages are used to write small to medium-sized programs that perform specific
tasks. Some common uses of scripting languages are: automating repetitive processes, web development,
system administration, data processing, multimedia and games, report generation, document and text
processing, writing plugins and extensions for existing programs and applications1.
…(https://leverageedu.com/blog/scripting-language/)
441. - (Topic 5)
A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure
what the user means and needs to view the email to assist with troubleshooting. Which of the following
266
Certify For Sure with IT Exam Dumps
should the technician use to assist the user?
A. VNC
B. SSH
C. VPN
D. RMM
Answer: D
Explanation: The best tool to use to assist the user with viewing the email is RMM, which stands for remote
monitoring and management. This is a software that allows the technician to remotely access, monitor, and
manage the user’s computer and applications. The technician can use RMM to view the user’s screen,
control the mouse and keyboard, and troubleshoot the email issue. The other tools are not suitable for this
task. VNC is a software that allows remote desktop sharing, but it requires the user to install and configure
it on their computer, which may not be feasible or convenient. SSH is a protocol that allows secure remote
access to a command-line interface, but it is not useful for viewing graphical applications such as email.
VPN is a technology that creates a secure and encrypted connection over a public network, but it does not
442. - (Topic 5)
A Windows computer is experiencing slow performance when the user tries to open programs and files.
The user recently installed a new software program from an external website.
Various websites are being redirected to an unauthorized site, and Task Manager shows the CPU usage is
Answer: A
Explanation:
The symptoms that the user’s Windows computer is experiencing suggest that the new software program
that the user installed from an external website may be malicious or incompatible with the system. The
program may be consuming a lot of CPU resources, slowing down the performance of other programs and
267
Certify For Sure with IT Exam Dumps
files. The program may also be altering the browser settings or the HOSTS file, causing the web redirection
to an unauthorized site. The first step that the technician should do is to uninstall the new program from the
Control Panel or the Settings app, and then restart the computer. This may resolve the issue and restore
the normal functionality of the computer. If the problem persists, the technician may need to perform
additional steps, such as scanning for malware, checking the HOSTS file, clearing the web browser cache,
As a corporate technician, you are asked to evaluate several suspect email messages on a client's
Review each email and perform the following within the email:
Answer:
Explanation:
Classification: a) Phishing
This email is a phishing attempt, as it tries to trick the user into clicking on a malicious link that could
268
Certify For Sure with IT Exam Dumps
compromise their account or personal information. Some suspicious items in this
email are:
✑ The email has a generic greeting and does not address the user by name.
✑ The email uses a sense of urgency and fear to pressure the user into clicking on the link.
✑ The email does not match the official format or domain of the IT Help Desk at CompTIA.
✑ The email has two black bat icons, which are not related to CompTIA or IT support.
The appropriate resolution for this email is A. Report email to Information Security. The user should not
click on the link, reply to the email, or provide any personal or account information. The user should forward
the email to the Information Security team or use a professional email form to report the phishing attempt.
The user should also delete the email from their inbox and trash folder.
✑ b) From address
✑ d) Hyperlinks
These items indicate that the email is not from a legitimate source and that the link is potentially malicious.
The other items are not suspicious in this case, as the to address is the user’s own email and there are no
attachments.
Classification: b) Spam
This email is a spam email, as it is an unsolicited and unwanted message that tries to persuade the user to
participate in a survey and claim a reward. Some suspicious items in this email are:
✑ The email offers a free wireless headphone as an incentive, which is too good to be true.
✑ The email does not provide any details about the survey company, such as its name, address, or contact
The No.1 IT Certification Dumps
269
Certify For Sure with IT Exam Dumps
information.
✑ The email contains an external survey link, which may lead to a malicious or fraudulent website.
✑ The email does not have an unsubscribe option, which is required by law for commercial emails.
The appropriate resolution for this email is C. Unsubscribe. The user should look for an unsubscribe link or
button at the bottom of the email and follow the instructions to opt out of receiving future emails from the
sender. The user should also mark the email as spam or junk in their email client, which will help filter out
similar emails in the future. The user should not click on the survey link, reply to the email, or provide any
Classification: c) Legitimate
This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no
suspicious items in this email, as the from address, the to address, the attachment, and the email body are
all consistent and relevant. The appropriate resolution for this email is B. Perform no additional actions. The
user can open the attachment and review the orientation material as instructed. The user does not need to
270
Certify For Sure with IT Exam Dumps
Classification: a) Phishing
This email is a phishing attempt, as it tries to deceive the user into downloading and running a malicious
attachment that could compromise their system or data. Some suspicious items in this email are:
✑ The email has a generic greeting and does not address the user by name or
username.
✑ The email has an urgent tone and claims that a security patch needs to be installed immediately.
✑ The email has an attachment named “patch1.exe”, which is an executable file that could contain
malware or ransomware.
✑ The email does not match the official format or domain of CompTIA Information Security.
The appropriate resolution for this email is A. Report email to Information Security. The user should not
open the attachment, reply to the email, or provide any personal or account information. The user should
forward the email to the Information Security team or use a professional email form to report the phishing
attempt. The user should also delete the email from their inbox and trash folder.
271
Certify For Sure with IT Exam Dumps
Classification: c) Legitimate
This email is a legitimate email, as it is from a trusted source and has a valid purpose. There are no
suspicious items in this email, as the from address, the to address, and the email body are all consistent
and relevant. The appropriate resolution for this email is B. Perform no additional actions. The user can
reply to the email and thank the sender for the interview opportunity. The user does not need to report,
272
Certify For Sure with IT Exam Dumps
444. - (Topic 5)
An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should
A. SSID
B. DHCP
C. Firewall
D. SSD
Answer: A
Explanation: The SSID (Service Set Identifier) is the name of a wireless network that is broadcasted by the
router or the Wi-Fi base station. The SSID helps nearby devices to identify and connect to the available
networks. However, broadcasting the SSID also exposes the network to potential connection attempts from
unauthorized or malicious users. Therefore, disabling the SSID can mitigate connection attempts by making
the network invisible or hidden to the devices that are not already connected to it. To connect to a hidden
network, the user would need to know the exact SSID and enter it manually. The other options are not
related to mitigating connection attempts to the corporate Wi-Fi. DHCP (Dynamic Host Configuration
Protocol) is a protocol that assigns IP addresses to the devices on a network. Firewall is a software or
hardware device that filters the incoming and outgoing network traffic based on predefined rules. SSD
(Solid State Drive) is a type of storage device that uses flash memory to store data. Disabling any of these
options would not prevent connection attempts to the Wi-Fi network, and may cause other problems or
273
Certify For Sure with IT Exam Dumps
References:
✑ Choosing an SSID2
445. - (Topic 5)
Which of the following filesystems replaced FAT as the preferred filesystem for Microsoft Windows OS?
A. APFS
B. FAT32
C. NTFS
D. ext4
Answer: C
Explanation: NTFS stands for New Technology File System and it is the preferred filesystem for Microsoft
Windows OS since Windows NT 3.1 in 19931. NTFS replaced FAT (File Allocation Table) as the default
filesystem for Windows because it offers many advantages over FAT, such as:
✑ Support for journaling, which records changes to the filesystem and helps recover from errors2
FAT32 is an improved version of FAT that supports larger volumes and files (up to 32 GB and 4 GB
respectively) and is compatible with older versions of Windows and other operating systems3. However,
FAT32 still has many limitations and drawbacks compared to NTFS, such as:
✑ No support for journaling, which makes it vulnerable to corruption and data loss3
APFS (Apple File System) is the default filesystem for macOS, iOS, iPadOS, watchOS, and tvOS since
20174. APFS replaced HFS+ (Hierarchical File System Plus) as the preferred filesystem for Apple devices
274
Certify For Sure with IT Exam Dumps
✑ Support for larger volumes and files (up to 8 zettabytes)4
✑ Support for space sharing, which allows multiple volumes to share the same storage pool4
✑ Support for fast directory sizing, which improves performance and efficiency4 ext4 (Fourth Extended
Filesystem) is the default filesystem for most Linux distributions since 20085. ext4 replaced ext3 as the
preferred filesystem for Linux because it offers many advantages over ext3, such as:
✑ Support for larger volumes and files (up to 1 exabyte and 16 terabytes respectively)5
✑ Support for journal checksumming, which improves reliability and reduces recovery time5
✑ Support for delayed allocation, which improves efficiency and reduces metadata overhead5
References:
1: NTFS - Wikipedia 2: [NTFS vs FAT32 vs exFAT: What’s the Difference?] 3: [FAT32 - Wikipedia] 4: [Apple
File System - Wikipedia] 5: [ext4 - Wikipedia] : NTFS vs FAT32 vs exFAT: What’s the Difference? : FAT32 -
446. - (Topic 5)
A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to
A. Startup
B. Performance
C. Application history
D. Processes
Answer: D
Explanation: The Processes tab in the Task Manager shows all the running processes on the computer,
including applications and background services. The user can use this tab to identify the unresponsive
application and end its process by right-clicking on it and selecting End task. This will free up the system
resources and close the application. The other tabs in the Task Manager do not allow the user to address
the situation. The Startup tab shows the programs that run when the computer starts, the Performance tab
shows the system resource usage and statistics, and the Application history tab shows the resource usage
275
Certify For Sure with IT Exam Dumps
447. - (Topic 5)
A user's Windows computer seems to work well at the beginning of the day. However, its performance
degrades throughout the day, and the system freezes when several applications are open. Which of the
Answer: C,E
Explanation: The most likely causes of the user’s Windows computer performance degradation and
freezing are insufficient RAM and excessive software running in the background. Therefore, the technician
✑ Increase the RAM. RAM is the memory that the computer uses to store and run applications and
processes. If the RAM is not enough to handle the workload, the computer will use the hard drive as a
virtual memory, which is much slower and can cause performance issues. Increasing the RAM will allow the
computer to run more applications and processes smoothly and avoid freezing. The technician should
check the system requirements of the applications that the user needs to run, and install additional RAM
modules that are compatible with the motherboard and the existing RAM. The technician should also make
sure that the system is managing the page file size automatically, or adjust it manually to optimize the
✑ Uninstall unnecessary software. Software that the user does not need or use can take up valuable disk
space and system resources, and can interfere with the performance of other applications. Some software
may also run in the background or start automatically when the computer boots up, which can slow down
the system and cause freezing. The technician should help the user to identify and uninstall unnecessary
software from the control panel or the settings app, and disable unnecessary startup programs from the
task manager or the system configuration tool. The technician should also check for and remove viruses
276
Certify For Sure with IT Exam Dumps
References:
1: Tips to improve PC performance in Windows - Microsoft Support1 2: How to Upgrade or Install RAM on
448. - (Topic 5)
A remote user's smartphone is performing very slowly. The user notices that the performance improves
slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone
does not get any faster after connecting to the company's corporate guest network. A technician sees that
the phone has a large number of applications installed on it. Which of the following is the most likely cause
of the issue?
Answer: B
Explanation:
One of the common reasons for a slow smartphone performance is having too many apps installed and
running in the background. These apps consume the device’s memory (RAM) and CPU resources, which
can affect the speed and responsiveness of the phone. Rebooting the phone can temporarily clear the RAM
and stop some background processes, but they may resume after a while. Connecting to a different
network does not affect the performance of the phone, unless the network is congested or has a poor
signal. The user can improve the phone’s performance by uninstalling unused apps, clearing app caches,
and restricting background activities12. Malware can also slow down a phone, but it is not the most likely
cause in this scenario, as the user does not report any other symptoms of infection, such as pop-ups,
battery drain, or data usage spikes3. Jailbreaking a phone can also affect its performance, but it is not a
cause, rather a consequence, of the user’s actions. Jailbreaking is the process of removing the
manufacturer’s restrictions on a phone, which allows the user to install unauthorized apps, customize the
system, and access root privileges4. However, jailbreaking also exposes the phone to security risks, voids
277
Certify For Sure with IT Exam Dumps
References1: Speed up a slow Android device - Android Help - Google Help2: Why your phone slows down
over time and what you can do to stop it | TechRadar3: How to tell if your phone has a virus | Norton4: What
449. - (Topic 5)
A. Security enhancement
B. Encryption
C. Digital signature
Answer: A
Explanation: MFA stands for multi-factor authentication, which is an electronic authentication method that
requires the user to provide two or more verification factors to gain access to a resource such as an
application, online account, or a VPN1. MFA provides security enhancement by making it harder for
attackers to compromise the user’s identity or credentials, as they would need to obtain more than just the
username and password. MFA can also prevent unauthorized access to sensitive data or resources, as
450. - (Topic 5)
A large organization is researching proprietary software with vendor support for a multiuser environment.
A. Corporate
B. Perpetual
C. Open-source
D. Personal
Answer: A
Explanation: A corporate EULA is a type of end-user license agreement that is designed for a large
organization that needs to use proprietary software with vendor support for a multiuser environment. A
corporate EULA typically grants the organization a volume license that allows it to install and use the
software on multiple devices or servers, and to distribute the software to its employees or affiliates. A
278
Certify For Sure with IT Exam Dumps
corporate EULA also usually provides the organization with technical support, maintenance, updates, and
warranty from the software vendor, as well as some customization options and discounts. A corporate
EULA may also include terms and conditions that specify the rights and obligations of both parties, such as
A perpetual EULA (B) is a type of end-user license agreement that grants the user a permanent and
irrevocable license to use the software, without any time limit or expiration date. However, a perpetual
EULA does not necessarily include vendor support, updates, or warranty, and it may not allow the user to
install the software on multiple devices or servers, or to distribute the software to other users. A perpetual
EULA may also be more expensive than a corporate EULA, as it requires a one-time payment upfront,
An open-source EULA © is a type of end-user license agreement that grants the user a license to use,
modify, and redistribute the software, which is publicly available and free of charge. However, an
open-source EULA does not provide any vendor support, maintenance, updates, or warranty, and it may
impose some restrictions or obligations on the user, such as disclosing the source code, attributing the
original author, or using a compatible license for derivative works. An open-source EULA may not be
suitable for a large organization that needs proprietary software with vendor support for a multiuser
environment56.
A personal EULA (D) is a type of end-user license agreement that grants the user a license to use the
software for personal, non-commercial purposes only. A personal EULA may limit the number of devices or
servers that the user can install the software on, and prohibit the user from distributing, copying, or reselling
the software to other users. A personal EULA may also provide limited or no vendor support, maintenance,
updates, or warranty, and it may have a fixed or renewable term. A personal EULA may not meet the needs
of a large organization that needs proprietary software with vendor support for a multiuser
environment7 . References:
Agreement - Template - Word & PDF2 3: What is a Perpetual License? - Definition from Techopedia3 4:
Perpetual vs. Subscription Software Licensing: Which Is Best for You?4 5: What is an Open Source
License? - Definition from Techopedia5 6: Open Source Licenses: Which One Should You Use?6 7: What
is a Personal License Agreement? - Definition from Techopedia7 : Personal License Agreement - Template
279
Certify For Sure with IT Exam Dumps
- Word & PDF
451. - (Topic 5)
Which of the following file extensions should a technician use for a PowerShell script?
A. .ps1
B. .py
C. .sh
D. .bat
E. .cmd
Answer: A
Explanation: A PowerShell script is a plain text file that contains one or more PowerShell commands.
Scripts have a .ps1 file extension and can be run on your computer or in a remote session. PowerShell
scripts can be used to automate tasks and change settings on Windows devices. To create and run a
PowerShell script, you need a text editor (such as Visual Studio Code or Notepad) and the PowerShell
Integrated Scripting Environment (ISE) console. You also need to enable the correct execution policy to
452. - (Topic 5)
Which of the following combinations meets the requirements for mobile device multifactor authentication?
Answer: C
Explanation:
Mobile device multifactor authentication (MFA) is a method of verifying a user’s identity by requiring two or
more factors, such as something the user knows (e.g., password, PIN, security question), something the
user has (e.g., smartphone, OTP app, security key), or something the user is (e.g., fingerprint, face, iris)12.
The combination of fingerprint and password meets the requirements for mobile device MFA because it
uses two different factors: something the user is (fingerprint) and something the user knows (password).
280
Certify For Sure with IT Exam Dumps
The other combinations do not meet the requirements because they use only one factor: something the
user knows (password or PIN) or something the user does (swipe). References1: Set up the Microsoft
Authenticator app as your verification method2: What is Multi-Factor Authentication (MFA)? | OneLogin
453. - (Topic 5)
A customer installed a new web browser from an unsolicited USB drive that the customer received in the
mail. The browser is not working as expected, and internet searches are redirected to another site. Which
of the following should the user do next after uninstalling the browser?
Answer: D
Explanation: The customer’s web browser is likely infected by a browser hijacker, which is a type of
malware that changes the browser’s settings and redirects the user to malicious websites. A browser
hijacker can also steal the user’s personal data, display unwanted ads, and install more malware on the
device. To remove a browser hijacker, the user should first uninstall the browser from the Control Panel,
then scan the device with an antivirus or anti-malware program, and finally install a trusted browser from a
legitimate source. Deleting the browser cookies and history, resetting the browser settings, or
changing the browser default search engine may not be enough to get rid of the browser hijacker, as it may
454. - (Topic 5)
An organization is updating the monitors on kiosk machines. While performing the upgrade, the
organization would like to remove physical input devices. Which of the following utilities in the Control Panel
can be used to turn on the on-screen keyboard to replace the physical input devices?
B. Ease of Access
D. Device Manager
281
Certify For Sure with IT Exam Dumps
Answer: B
Explanation: Ease of Access is a utility in the Control Panel that allows users to adjust various accessibility
settings on Windows, such as the on-screen keyboard, magnifier, narrator, high contrast, etc. The
on-screen keyboard can be turned on by going to Ease of Access > Keyboard and toggling the switch to
On12. Alternatively, the on-screen keyboard can be opened by pressing Windows + Ctrl + O keys or by
type(https://support.microsoft.com/en-us/windows/use-the-on-screen-keyboard-osk-to-type-
Windows 10 -
Lifewire(https://www.lifewire.com/enable-or-disable-on-screen-keyboard-in-windows-10-5180667)3
11/10(https://www.thewindowsclub.com/windows-onscreen-keyboard).
455. - (Topic 5)
Which of the following operating systems is most commonly used in embedded systems?
A. Chrome OS
B. macOS
C. Windows
D. Linux
Answer: D
Explanation: Linux is the most commonly used operating system in embedded systems because it is open
source, free, customizable, and supports a wide range of architectures and devices. Linux also offers many
advantages for embedded development, such as real- time capabilities, modularity, security, scalability,
and reliability. Linux can run on embedded systems with limited resources, such as memory, storage, or
power, and can be tailored to the specific needs of the application. Linux also has a large and active
community of developers and users who contribute to its improvement and innovation. Some examples of
embedded systems that use Linux are smart TVs, routers, drones, robots, smart watches, and IoT devices
456. - (Topic 5)
282
Certify For Sure with IT Exam Dumps
A technician successfully removed malicious software from an infected computer after running updates and
scheduled scans to mitigate future risks. Which of the following should the technician do next?
Answer: A
Explanation:
Educating the end user on best practices for security is the next step that the technician should take after
successfully removing malicious software from an infected computer. Educating the end user on best
practices for security is an important part of preventing future infections and mitigating risks. The technician
should explain to the end user how to avoid common sources of malware, such as phishing emails,
malicious websites, or removable media. The technician should also advise the end user to use strong
passwords, update software regularly, enable antivirus and firewall protection, and backup data frequently.
Educating the end user on best practices for security can help the end user become more aware and
responsible for their own security and reduce the likelihood of recurrence of malware infections.
Quarantining the host in the antivirus system, investigating how the system was infected with malware, and
creating a system restore point are not the next steps that the technician should take after successfully
removing malicious software from an infected computer. Quarantining the host in the antivirus system is a
step that the technician should take before removing malicious software from an infected computer.
Quarantining the host in the antivirus system means isolating the infected computer from the network or
other devices to prevent the spread of malware. Investigating how the system was infected with malware is
a step that the technician should take during or after removing malicious software from an infected
computer. Investigating how the system was infected with malware means identifying the source, type, and
impact of malware on the system and documenting the findings and actions taken. Creating a system
restore point is a step that the technician should take before removing malicious software from an infected
computer. Creating a system restore point means saving a snapshot of the system’s configuration and
settings at a certain point in time, which can be used to restore the system in case of failure or corruption.
References:
283
Certify For Sure with IT Exam Dumps
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458
457. - (Topic 5)
A large company is changing its password length requirements. The Chief Information Officer is mandating
that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to
A. Group Policy
B. User accounts
D. Authenticator applications
Answer: A
Explanation: Group Policy is a feature of Windows that allows administrators to manage and configure
settings for computers and users on a network12. One of the settings that can be controlled by Group
Policy is the password policy, which defines the rules for creating and changing passwords, such as
minimum length, complexity, expiration, and history34. By using Group Policy, the Chief Information Officer
can enforce the new password length requirement for all users and computers in the company’s domain,
References1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10-11 2: CompTIA
A+ Certification Exam Core 2 Objectives, page 13 3: The Official CompTIA A+ Core 2 Instructor Guide
(Exam 220-1102), page 10-12 4: CompTIA A+ Certification Exam: Core 2 (220-1102) Exam Objectives
458. - (Topic 5)
An IT technician is attempting to access a user's workstation on the corporate network but needs more
information from the user before an invitation can be sent. Which of the following command-line tools
A. nslookup
B. tracert
C. hostname
D. gpresult
Answer: C
284
Certify For Sure with IT Exam Dumps
Explanation:
The hostname command-line tool is used to display the name of the local machine. This information can be
crucial for identifying the device within a network, especially when setting up remote access or sharing
resources like folders and printers. Unlike other command-line tools that provide more detailed network
diagnostics or configuration details, hostname straightforwardly offers the device's network identification,
making it suitable for the scenario described.References: Official CompTIA A+ Core 1 and Core 2 Student
Guide
459. - (Topic 5)
A technician receives an invalid certificate error when visiting a website. Other workstations on the same
local network are unable to replicate this issue. Which of the following is most likely causing the issue?
D. Log-on times
Answer: A
Explanation: Date and time is the most likely cause of the issue. The date and time settings on a
workstation affect the validity of the certificates used by websites to establish secure connections. If the
date and time are incorrect, the workstation may not recognize the certificate as valid and display an invalid
certificate error. Other workstations on the same local network may not have this issue if their date and time
are correct. User access control, UEFI boot mode, and log-on times are not likely causes of the issue. User
access control is a feature that prevents unauthorized changes to the system by prompting for confirmation
or credentials. UEFI boot mode is a firmware interface that controls the boot process of the workstation.
Log-on times are settings that restrict when a user can log in to the workstation. None of these factors affect
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 456
460. - (Topic 5)
A user's company phone was stolen. Which of the following should a technician do next?
285
Certify For Sure with IT Exam Dumps
A. Perform a low-level format.
Answer: B
Explanation: Remotely wiping the device is the best option to prevent unauthorized access to the company
data stored on the phone. A low-level format, degaussing, or providing the GPS location of the device are
461. - (Topic 5)
A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet
can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?
Answer: B
Explanation: Setting the connection to be metered is the best solution for limiting the amount of cellular data
a user’s Windows 10 tablet can utilize when traveling. A metered connection is a network connection that
has a data limit or charges fees based on the amount of data used. Windows 10 allows users to set any
network connection as metered, which reduces the amount of data that Windows and some apps use in the
background. For example, setting a connection as metered will prevent Windows from downloading
updates automatically, stop some apps from syncing data online, and disable some live tiles on the Start
menu. Setting a connection as metered can help users save cellular data and avoid extra charges when
traveling. Turning on airplane mode, configuring the device to use a static IP address, and enabling the
Windows Defender Firewall are not effective solutions for limiting the amount of cellular data a user’s
Windows 10 tablet can utilize when traveling. Turning on airplane mode will disable all wireless connections
on the device, including Wi-Fi, Bluetooth, and cellular data. This will prevent the user from accessing any
online services or applications on the tablet. Configuring the device to use a static IP address will assign a
286
Certify For Sure with IT Exam Dumps
fixed IP address to the device instead of obtaining one dynamically from a DHCP server. This will not affect
the amount of cellular data the device uses, and it may cause IP conflicts or connectivity issues on some
networks. Enabling the Windows Defender Firewall will block or allow incoming and outgoing network traffic
based on predefined or custom rules. This will not reduce the amount of cellular data the device uses, and it
access. References:
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 108
462. - (Topic 5)
A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install
C. Enable SSH.
D. Reboot computer.
Answer: B
Explanation:
Developer Mode on Windows 10 is a feature that allows developers to test and debug their applications on
their devices, as well as sideload apps and access other developer tools12. To enable Developer Mode,
the user needs to go to the Settings app, select Update & Security, choose For Developers, and switch to
Developer Mode123. However, enabling Developer Mode requires internet connectivity, as Windows will
download and install a package of features, such as Windows Device Portal and SSH services, that are
necessary for Developer Mode124. If the user does not have internet connectivity, they will receive a “failed
to install package” message when trying to enable Developer Mode4. Therefore, the first thing that the
technician should do is to ensure that the laptop has internet access, either through Wi-Fi or Ethernet, and
463. - (Topic 5)
After a security event, a technician removes malware from an affected laptop and disconnects the laptop
287
Certify For Sure with IT Exam Dumps
from the network. Which of the following should the technician do to prevent the operating system from
C. Enable antivirus.
D. Disable antivirus.
Answer: B
Explanation: System Restore is a feature that allows the user to revert the system to a previous state.
However, this can also restore the malware that was removed by the technician. Disabling System Restore
can prevent the operating system from automatically returning to an infected state. Enabling antivirus,
educating the user, and enabling System Restore are good preventive measures, but they do not address
the question. Disabling antivirus can make the system more vulnerable to malware attacks
464. - (Topic 5)
A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the
A. Network share
B. Group Policy
C. BitLocker
D. Static IP
Answer: C
Explanation: BitLocker is a Windows security feature that provides encryption for entire volumes,
addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned
devices1. BitLocker helps mitigate unauthorized data access by enhancing file and system protections,
rendering data inaccessible when BitLocker-protected devices are decommissioned or recycled1. Network
share, Group Policy, and Static IP are not features that can prevent unauthorized data access if a computer
is lost or stolen.
References:
BitLocker overview - Windows Security | Microsoft Learn1 The Official CompTIA A+ Core 2 Study Guide2,
288
Certify For Sure with IT Exam Dumps
page 315.
465. - (Topic 5)
The calendar application on an employee's smartphone is experiencing frequent crashes, and the
smartphone has become unresponsive. Which of the following should a technician do first to resolve the
issue?
Answer: D
Explanation: Rebooting the smartphone is the first and simplest step to resolve the issue of frequent
crashes and unresponsiveness. Rebooting clears the memory, closes the background apps, and refreshes
the system. It can also fix minor glitches and bugs that may cause the calendar app or the smartphone to
malfunction12. The other options are either too drastic or unnecessary. Reinstalling the application may not
solve the problem if the issue is with the smartphone itself. Updating the smartphone’s OS may not be
possible or helpful if the device is unresponsive or incompatible. Resetting the smartphone to factory
settings will erase all the data and settings on the device, which should be the last resort. References: 1
466. - (Topic 5)
Which of the following commands can a technician use to get the MAC address of a Linux distribution?
A.net use
B. ifconfig
C. netstat
D. ping
Answer: B
Explanation: The ifconfig command is a tool for configuring network interfaces that any Linux system
289
Certify For Sure with IT Exam Dumps
administrator should know. It is used to bring interfaces up or down, assign and remove addresses and
routes, manage ARP cache, and much more1. One of the information that ifconfig can display is the MAC
address of each network interface, which is a unique identifier of the physical layer of the network device.
The MAC address is usually shown as a hexadecimal string separated by colons, such as 00:0c:29:3f:5c:1f.
To get the MAC address of a Linux distribution, a technician can use the ifconfig command without any
arguments, which will show the details of all the active network interfaces, or specify the name of a
particular interface, such as eth0 or wlan0, to show only the details of that interface.
467. - (Topic 5)
A technician is troubleshooting a Windows 10 PC that is unable to start the GUI. A new SSD and a new
copy of Windows were recently installed on the PC. Which of the following is the most appropriate
A. msconfig
B. chkdsk
C. sfc
D. diskpart
E. mstsc
Answer: C
Explanation: The sfc command is a tool for scanning and repairing system files that are corrupted or
missing on Windows operating systems12. System files are essential files that are required for the proper
functioning of the operating system, such as the GUI, drivers, services, and applications. If system files are
damaged or deleted, the operating system may fail to start or run properly, causing errors, crashes, or blue
screens.
The sfc command can be used to fix the issue of the PC that is unable to start the GUI, assuming that the
problem is caused by corrupted or missing system files. The sfc command can be run from the command
prompt, which can be accessed by booting the PC from the installation media, choosing the repair option,
and selecting the command prompt option3. The sfc command can be used with different switches, such as
/scannow,
290
Certify For Sure with IT Exam Dumps
/verifyonly, /scanfile, or /offbootdir, depending on the situation and the desired action4. The most common
switch is /scannow, which scans all the system files and repairs any
problems that are found5. The syntax of the sfc command with the /scannow switch is: sfc /scannow
The sfc command will then scan and repair the system files, and display the results on the screen. If the sfc
command is able to fix the system files, the PC should be able to start the GUI normally after rebooting. If
the sfc command is unable to fix the system files, the PC may need further troubleshooting or a clean
installation of Windows.
(220-1102) Complete Video Course, Lesson 26 Documentation 3: How to use SFC Scannow to repair
Windows system files 4: SFC Command (System File Checker) 5: How to Repair Windows 10 using
Command Prompt
468. - (Topic 5)
A hotel's Wi-Fi was used to steal information on a corporate laptop. A technician notes the following
security log:
SRC: 192.168.1.1/secrets.zip Protocol SMB >> DST: 192.168.1.50/capture The technician analyses the
Which of the following protocols most likely allowed the data theft to occur?
A. 1
B. 53
C. 110
D. 445
Answer: D
Explanation: The protocol that most likely allowed the data theft to occur is SMB over TCP port 445. SMB is
291
Certify For Sure with IT Exam Dumps
a network file sharing protocol that enables access to files, printers, and other resources on a network. Port
445 is used by SMB to communicate directly over TCP without the need for NetBIOS, which is an older and
less secure protocol. The security log shows that the source IP address 192.168.1.1 sent a file named
secrets.zip using SMB protocol to the destination IP address 192.168.1.50, which captured the file. The
Windows firewall information shows that port 445 is enabled for inbound and outbound traffic, which means
that it is not blocked by the firewall. Therefore, port 445 is the most likely port that
was exploited by the attacker to steal the data from the corporate laptop. References:
✑ SMB port number: Ports 445, 139, 138, and 137 explained1
469. - (Topic 5)
Which of the following should be documented to ensure that the change management plan is followed?
Answer: A
Explanation:
The scope of the change is one of the elements that should be documented to ensure that the change
management plan is followed. The scope of the change defines the boundaries and limitations of the
change, such as what is included and excluded, what are the deliverables and outcomes, what are the
assumptions and constraints, and what are the dependencies and risks. The scope of the change helps to
clarify the expectations and objectives of the change, as well as to prevent scope creep or deviation from
the original plan. The scope of the change also helps to measure the progress and success of the change,
470. - (Topic 5)
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications,
and experiencing slow response. After checking the device, a technician notices the device has been
292
Certify For Sure with IT Exam Dumps
jailbroken. Which of the following should the technician do next?
Answer: B
Explanation: The best course of action for the technician is to restore the defaults and reimage the
corporate OS on the device. This will remove the jailbreak and any unauthorized or malicious apps that may
have been installed on the device, as well as restore the security features and policies that the company
has set for its devices. This will also ensure that the device can receive the latest updates and patches from
the manufacturer and the company, and prevent any data leakage or compromise from the device.
Jailbreaking is a process of bypassing the built-in security features of a device to install software other than
what the manufacturer has made available for that device1. Jailbreaking allows the device owner to gain full
access to the root of the operating system and access all the features1. However, jailbreaking also exposes
✑ Increased volatility of the device2. Some of the signs of a jailbroken device are:
✑ A high number of ads, which may indicate the presence of adware or spyware on the device3.
✑ Receiving data-usage limit notifications, which may indicate the device is sending or receiving data in the
✑ Experiencing slow response, which may indicate the device is running unauthorized or malicious apps
that consume resources or interfere with the normal functioning of the device3.
✑ Finding apps or icons that the user did not install or recognize, such as Cydia, which is a storefront for
The other options are not sufficient or appropriate for dealing with a jailbroken device. Running an antivirus
and enabling encryption may not detect or remove all the threats or vulnerabilities that the jailbreak has
introduced, and may not restore the device to its original state or functionality. Backing up the files and
293
Certify For Sure with IT Exam Dumps
doing a system restore may not erase the jailbreak or the unauthorized apps, and may also backup the
infected or compromised files. Undoing the jailbreak and enabling an antivirus may not be possible or
effective, as the jailbreak may prevent the device from updating or installing security software, and may
also leave traces of the jailbreak or the unauthorized apps on the device.
References:
471. - (Topic 5)
A technician is hardening a company file server and needs to prevent unauthorized LAN devices from
accessing stored files. Which of the following should the technician use?
A. Software firewall
B. Password complexity
C. Antivirus application
D. Anti-malware scans
Answer: A
Explanation: A software firewall is a program that monitors and controls the incoming and outgoing network
traffic on a computer or a server. A software firewall can help prevent unauthorized LAN devices from
accessing stored files on a company file server by applying rules and policies that filter the network packets
based on their source, destination, protocol, port, or content. A software firewall can also block or allow
specific applications or services from communicating with the network, and alert the administrator of any
Password complexity (B) is a good practice to protect the file server from unauthorized access, but it is not
sufficient by itself. Password complexity refers to the use of strong passwords that are hard to guess or
crack by attackers, and that are changed frequently and securely. Password complexity can prevent brute
force attacks or credential theft, but it cannot stop network attacks that exploit vulnerabilities in the file
294
Certify For Sure with IT Exam Dumps
server software or hardware, or that bypass the authentication process34.
Antivirus application © and anti-malware scans (D) are important tools to protect the file server from viruses
and malware that can infect, damage, or encrypt the stored files. However, they are not effective in
preventing unauthorized LAN devices from accessing the files in the first place. Antivirus and anti-malware
tools can only detect and remove known threats, and they may not be able to stop zero-day attacks or
advanced persistent threats that can evade or disable them. Moreover, antivirus and anti-malware tools
cannot control the network traffic or the file server permissions, and they may not be compatible with all file
References:
1: What is a Firewall and How Does it Work? - Cisco1 2: How to Harden Your Windows Server -
ServerMania2 3: Password Security: Complexity vs. Length - Norton7 4: Password Hardening: 5 Ways to
Protect Your Passwords - Infosec 5: What is Antivirus Software and How Does it Work? - Kaspersky 6:
472. - (Topic 5)
A user requested that the file permissions on a Linux device be changed to only allow access to a certain
group of users. Which of the following commands should be used to complete the user's request?
A. cat
B. chmod
C. pwd
D. cacls
Answer: B
Explanation:
The chmod command is used to change the permissions of files and directories in Linux. It can grant or
revoke read, write, and execute permissions for the owner, the group, and others. To change the file
permissions to only allow access to a certain group of users, the chmod command can use either the
symbolic or the numeric mode. For example, to give read and write permissions to the group and no
295
Certify For Sure with IT Exam Dumps
References: 1 Chmod Command in Linux (File Permissions) |
to/change-file-directory-permissions-linux).
473. - (Topic 5)
A corporate smartphone was stored for five months after setup. During this time, the company did not have
any system updates. When the phone is turned on, an application runs, but it crashes intermittently. Which
Answer: C
Explanation: Reinstalling the application is the best option to fix the intermittent crashing of the application
on the corporate smartphone. Reinstalling the application will ensure that the latest version of the app is
installed, which may have bug fixes and compatibility updates that can resolve the crashing issue.
Reinstalling the app will also clear any corrupted or outdated data or cache that may cause the app to
malfunction.
The other options are not as effective or appropriate as reinstalling the app. Restarting the phone may
temporarily fix the issue, but it will not address the root cause of the app crashing, which may be related to
the app itself or its data. Reimaging the OS is a drastic and unnecessary measure that will erase all the
data and settings on the phone and restore it to its factory state. This will also remove all the other apps and
files that may be important for the corporate use of the phone. Clearing the cache may help to free up some
space and improve the performance of the app, but it will not update the app or fix any bugs that may cause
References:
✑ Top 5 Reasons Behind Your App Crash and Solutions To Fix Them1
✑ Why are my Android phone apps crashing or closing & how to fix the issue3
296
Certify For Sure with IT Exam Dumps
474. - (Topic 5)
A technician is unable to completely start up a system. The OS freezes when the desktop background
appears, and the issue persists when the system is restarted. Which of the following should the technician
Answer: B
Explanation: Loading the system in safe mode is a common troubleshooting step that allows the technician
to isolate the problem by disabling unnecessary drivers and services. This can help determine if the issue is
475. - (Topic 5)
A systems administrator is troubleshooting network performance issues in a large corporate office. The end
users report that traffic to certain internal environments is not stable and often drops. Which of the following
command-line tools can provide the most detailed information for investigating the issue further?
A. ipconfig
B. arp
C. nslookup
D. pathping
Answer: D
Explanation:
Pathping is the best command-line tool to provide the most detailed information for investigating the
network performance issue further. Pathping is a utility that combines the functions of ping and tracert,
which are two other command-line tools that test network connectivity and latency. Pathping sends packets
to each router on the path to a destination and then computes results based on the packets returned from
each hop. Pathping can show the route taken by the packets, the number of hops, the latency of each hop,
and the packet loss percentage. This information can help the systems administrator identify where the
297
Certify For Sure with IT Exam Dumps
network problem occurs and how severe it is. Ipconfig, arp, and nslookup are not as useful as pathping for
this task. Ipconfig shows the configuration of the network interface card, such as IP address, subnet mask,
and default gateway. Arp shows the mapping of IP addresses to MAC addresses in the local network.
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 457
476. - (Topic 5)
When trying to access a secure internal network, the user receives an error messaging stating, "There is a
problem with this website's security certificate." The user reboots the desktop and tries to access the
website again, but the issue persists. Which of the following should the user do to prevent this error from
reoccurring?
Answer: C
Explanation: The error message indicates that the website’s security certificate is not trusted by the user’s
device, which may prevent the user from accessing the secure internal network. To resolve this issue, the
user can view the certificate details and install it on the device, which will add it to the trusted root certificate
store. Reimaging the system and installing SSL, installing Trusted Root Certificate, or continuing to access
the website are not recommended solutions, as they may compromise the security of the device or the
network.
477. - (Topic 5)
A technician cannot uninstall a system driver because the driver is currently in use. Which of the following
A. msinfo32.exe
B. dxdiag.exe
C. msconfig.exe
298
Certify For Sure with IT Exam Dumps
D. regedit.exe
Answer: C
Explanation: The msconfig.exe tool, also known as the System Configuration utility, is a tool that allows
users to modify various system settings, such as startup options, services, boot options, and more. One of
the features of msconfig.exe is the ability to disable or enable device drivers that are loaded during the
system startup. By using msconfig.exe, a technician can prevent a driver from being loaded and used by
the system, which will allow them to uninstall it without any errors. To use msconfig.exe to disable a driver,
Open the Run dialog box by pressing the Windows key + R. Type msconfig.exe and press Enter.
Check the box next to No GUI boot and click OK. This will prevent the graphical user interface from loading
during the boot process, which will also prevent some drivers from loading.
Click on the Services tab and check the box next to Hide all Microsoft services. This will show only the
Find the service or driver that corresponds to the device that the technician wants to uninstall and uncheck
the box next to it. This will disable the service or driver from starting during the system startup.
After the computer restarts, the technician can use the Device Manager or the Control Panel to uninstall the
References:
How to Completely Remove/Uninstall a Driver in Windows, section 31 The Official CompTIA A+ Core 2
478. - (Topic 5)
Which of the following file types would be used in the Windows Startup folder to automate copying a
A. .bat
B. .dll
C. .ps1
D. .txt
299
Certify For Sure with IT Exam Dumps
Answer: A
Explanation: The .bat file type would be used in the Windows Startup folder to automate copying a personal
storage table (.pst) file to a network drive at log-in. A .bat file is a batch file that contains a series of
commands that can be executed by the command interpreter. A .bat file can be used to perform various
tasks, such as copying, moving, deleting, or renaming files or directories. A .bat file can be placed in the
Windows Startup folder to run automatically when a user logs in to the system. A .bat file can use the copy
command to copy a .pst file from a local drive to a network drive. A .pst file is a personal storage table file
that contains email messages, contacts, calendars, and other data from Microsoft Outlook. A .pst file can
be backed up to a network drive for security or recovery purposes. The .dll, .ps1, and .txt file types are not
used in the Windows Startup folder to automate copying a .pst file to a network drive at log-in. A .dll file is a
dynamic link library file that contains code or data that can be shared by multiple programs. A .dll file cannot
be executed directly by the user or the system. A .ps1 file is a PowerShell script file that contains
commands or expressions that can be executed by the PowerShell interpreter. A .ps1 file can also perform
various tasks, such as copying files or directories, but it requires PowerShell to be installed and configured
on the system. A .txt file is a plain text file that contains unformatted text that can be read by any text editor
or word processor. A .txt file cannot contain commands or expressions that can be executed by the system.
References:
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 459
479. - (Topic 5)
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the
A. Valid license
D. Chain of custody
Answer: D
Explanation: Chain of custody is a legal term that refers to the chronological documentation or paper trail
that records the sequence of custody, control, transfer, analysis, and disposition of materials, including
300
Certify For Sure with IT Exam Dumps
physical or electronic evidence1. It is important in forensic investigations to establish that the evidence is in
fact related to the case, and that it has not been tampered with or contaminated. A technician needs to track
evidence for a forensic investigation on a Windows computer by following the proper procedures for
collecting, handling, storing, and analyzing the evidence, and documenting every step of the process on a
480. - (Topic 5)
A technician is trying to connect to a user's laptop in order to securely install updates. Given the following
Answer: D
Explanation: In order to connect to a user’s laptop via RDP, the technician should open port 3389 on the
Windows firewall. This is because RDP uses port 3389 for communication12. The other options are not
✑ Confirming the user can ping the default gateway is not required for RDP, as it only tests the network
connectivity between the user’s laptop and the router. RDP works over the internet, so the technician
should be able to ping the user’s laptop directly using its IP address3.
✑ Changing the IP address on the user’s laptop is not needed for RDP, as long as the IP address is valid
and not conflicting with another device on the network. The user’s laptop has a valid IP address of
192.168.0.45, which belongs to the same subnet as the gateway (192.168.0.1) and the subnet mask
(255.255.255.0)4.
301
Certify For Sure with IT Exam Dumps
✑ Changing the subnet mask on the user’s laptop is not required for RDP, as long as the subnet mask
matches the network configuration. The user’s laptop has a correct subnet mask of 255.255.255.0, which
References:
1: [What is RDP and How Does It Work? - CompTIA] 2: CompTIA A+ Certification Exam Core 2 Objectives
- CompTIA 3: [Ping (networking utility) - Wikipedia] 4: [IP address - Wikipedia] : What is RDP and How Does
It Work? - CompTIA : CompTIA A+ Certification Exam Core 2 Objectives - CompTIA : Ping (networking
481. - (Topic 5)
Which of the following operating systems would most likely be used to run the inventory management
system at a factory?
A. Windows
B. Chrome OS
C. Android
D. iOS
Answer: A
Explanation: Windows is widely used in industrial and business environments due to its major market
presence, extensive support from the industry, and a broad selection of operating system options. It
supports a wide variety of software, making it suitable for running complex systems like an inventory
management system in a factory. Other options such as Chrome OS, Android, and iOS are either more
consumer-oriented or designed for specific types of devices, making them less likely choices for an
Course Notes.
482. - (Topic 5)
A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also
noticed random pop-up windows. Which of the following is the first step a technician should take to resolve
the issue?
302
Certify For Sure with IT Exam Dumps
B. Perform a system restore.
Answer: A
Explanation: The most likely cause of the user’s laptop issues is that it has been infected by some type of
malware or ransomware. Malware and ransomware are malicious software that can harm, exploit, or
disrupt devices or networks12. They can cause symptoms such as slow performance, browser redirects,
pop-up windows, data encryption, or ransom demands12. Therefore, the first step a technician should take
to resolve the issue is to scan the laptop for malware and ransomware using a reliable and updated
anti-malware tool34. This can help identify and remove any malicious software that may be present on
the laptop. Scanning for malware and ransomware is more effective and urgent than the other options
because:
✑ Performing a system restore may not remove the malware or ransomware, as some of them can persist
or hide in the system files or backup copies34. Moreover, a system restore may result in data loss or
corruption, as it restores the system to a previous state and deletes any changes made after that point5.
✑ Checking the network utilization may not help diagnose or fix the problem, as the malware or
ransomware may not be using the network at all, or may be using it in a stealthy or encrypted manner34.
Furthermore, checking the network utilization does not address the root cause of the issue, which is the
✑ Updating the antivirus software may not be sufficient to detect or remove the malware or ransomware, as
some of them may evade or disable the antivirus software, or may be too new or unknown for the antivirus
software to recognize34. Additionally, updating the antivirus software does not guarantee that the laptop
will be scanned for malware or ransomware, as the user may need to initiate or schedule the scan
manually.
483. - (Topic 5)
A. WEP
B. WPA
C. WPA2
303
Certify For Sure with IT Exam Dumps
D. LEAP
E. PEAP
Answer: C
Explanation:
WPA2 is the only protocol among the options that supports fast roaming between networks. Fast roaming,
also known as IEEE 802.11r or Fast BSS Transition (FT), enables a client device to roam quickly in
environments implementing WPA2 Enterprise security, by ensuring that the client device does not need to
re-authenticate to the RADIUS server every time it roams from one access point to another1. WEP, WPA,
LEAP, and PEAP do not support fast roaming and require the client device to perform the full authentication
process every time it roams, which can cause delays and interruptions in the network service.
References:
The Official CompTIA A+ Core 2 Study Guide2, page 263. WiFi Fast Roaming, Simplified3
484. - (Topic 5)
A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen.
Which of the following Control Panel options should a technician adjust to help the user?
A. Color Management
B. System
C. Troubleshooting
D. Device Manager
E. Administrative Tools
Answer: B
485. - (Topic 5)
An administrator has submitted a change request for an upcoming server deployment. Which of the
A. Risk analysis
B. Sandbox testing
D. Lessons learned
304
Certify For Sure with IT Exam Dumps
Answer: A
Explanation:
Risk analysis is the process of identifying and evaluating the potential threats and impacts of a change on
the system, network, or service. It is an essential step before approving a change request, as it helps to
determine the level of risk, the mitigation strategies, and the contingency plans. Risk analysis also helps to
Quantitative(https://www.isaca.org/resources/isaca-journal/issues/2021/volume-2/risk-assessment-and-an
alysis-methods).
486. - (Topic 5)
A technician requires graphical remote access to various Windows, Linux, and macOS desktops on the
company LAN. The security administrator asks the technician to utilize a single software solution that does
not require an external internet connection. Which of the following remote access tools is the technician
A. VNC
B. RMM
C. RDP
D. SSH
Answer: A
Explanation:
VNC (Virtual Network Computing) is a remote access tool that allows the technician to access and control
various Windows, Linux, and macOS desktops on the company LAN using a graphical user interface. VNC
does not require an external internet connection, as it works over a local network or a VPN. VNC uses a
client-server model, where the server runs on the remote desktop and the client connects to it from another
device. VNC can transmit the keyboard and mouse events from the client to the server, and the screen
updates from the server to the client, enabling the technician to interact with the remote desktop as if it were
local12.
305
Certify For Sure with IT Exam Dumps
VNC is a better option than the other choices because:
✑ RMM (Remote Monitoring and Management) (B) is not a single software solution, but a category of
software solutions that enable IT professionals to remotely monitor, manage, and troubleshoot multiple
devices and networks. RMM software may include remote access tools, but also other features such as
patch management, backup and recovery, security, reporting, and automation. RMM software may require
an external internet connection, as it often relies on cloud- based services or web-based consoles34.
✑ RDP (Remote Desktop Protocol) © is a remote access tool that allows the technician to access and
control Windows desktops on the company LAN using a graphical user interface. However, RDP is not
compatible with Linux or macOS desktops, unless they have third-party software installed that can emulate
or translate the RDP protocol. RDP also has some security and performance issues, such as encryption
✑ SSH (Secure Shell) (D) is a remote access tool that allows the technician to access and control various
Windows, Linux, and macOS desktops on the company LAN using a command-line interface. SSH does
not require an external internet connection, as it works over a local network or a VPN. SSH uses encryption
and authentication to secure the communication between the client and the server. However, SSH does not
provide a graphical user interface, which may limit the functionality and usability of the remote desktop7 .
References:
1: What is VNC? - Definition from Techopedia1 2: How VNC Works - RealVNC2 3: What is Remote
Monitoring and Management (RMM)? - Definition from Techopedia3 4: What is RMM Software? -
NinjaRMM4 5: What is Remote Desktop Protocol (RDP)? - Definition from Techopedia5 6: Remote
Desktop Protocol: What it is and how to secure it - CSO Online6 7: What is Secure Shell (SSH)? - Definition
from Techopedia7 : How to Use SSH to Access a Remote Server in Linux or Windows - Hostinger Tutorials
487. - (Topic 5)
A technician is moving a Windows workstation from the accounting department to the sales department and
needs to update the IP and gateway settings. Which of the following Control Panel utilities should the
technician use?
C. User Accounts
306
Certify For Sure with IT Exam Dumps
D. Device Manager
Answer: B
Explanation: The Network and Sharing Center is a Control Panel utility that allows users to view and modify
network settings, such as IP address, subnet mask, default gateway, DNS servers, and network profiles. To
change the IP and gateway settings of a Windows workstation, the technician can follow these steps:
Open the Network and Sharing Center by clicking on the network icon in the system tray or by searching for
Right-click on the network adapter that is connected to the network and select Properties. Double-click on
Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) depending on the network
protocol used.
Select Use the following IP address and enter the desired IP address, subnet mask, and default gateway
for the workstation. Alternatively, select Obtain an IP address automatically if the network uses DHCP to
Click OK to save the changes and close the dialog boxes. References:
488. - (Topic 5)
A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which
Answer: D
Explanation: The first step in removing a virus from a computer is to update the antivirus software with the
latest virus definitions. Virus definitions are files that contain information about the characteristics and
behavior of known viruses and malware. They help the antivirus software to identify and remove the
malicious threats from the computer. Without the latest virus definitions, the antivirus software may not be
307
Certify For Sure with IT Exam Dumps
able to detect or remove the virus that infected the user’s computer. Therefore, the technician should
download the latest virus definitions from the antivirus vendor’s website or use the update feature in the
References:
How to remove malware or viruses from my Windows 10 PC, section 21 How to Remove a Virus From a
489. - (Topic 5)
Which of the following languages is used for scripting the creation of Active Directory accounts?
A. Bash
B. SQL
C. PHP
D. PowerShell
Answer: D
Explanation:
PowerShell is a scripting language that can interact with Active Directory and other Windows components.
It has a built-in cmdlet called New-ADUser that can create user accounts in Active Directory. PowerShell
can also use the Active Directory module to access other AD-related functions and attributes. Other
languages, such as Bash, SQL, and PHP, are not designed for creating Active Directory accounts and
490. - (Topic 5)
When visiting a particular website, a user receives a message stating, "Your connection is not private."
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
Answer: A
308
Certify For Sure with IT Exam Dumps
Explanation:
A certificate warning is a message that appears when a web browser cannot verify the identity or security of
a website. It usually means that there is a problem with the website’s SSL certificate, such as expiration,
invalidity, or mismatch. A certificate warning can indicate that the website is unsafe or compromised, and
Blog(https://blog.hubspot.com/website/how-to-fix-your-connection-is-not-private).
491. - (Topic 5)
An engineer is configuring a new server that requires a bare-metal installation. Which of the following
installation methods should the engineer use if installation media is not available on site?
A. Image deployment
D. Repair installation
Answer: D
Explanation:
Remote network installation is the best option for configuring a new server that requires a bare-metal
installation without installation media on site. A remote network installation is a method of installing an
operating system or an application over a network connection, such as LAN, WAN, or Internet. A remote
network installation can use various protocols, such as PXE, HTTP, FTP, or SMB, to access the installation
files from a server or a cloud service. A remote network installation can also use various tools, such as
Windows Deployment Services, Microsoft Deployment Toolkit, or Red Hat Kickstart, to automate and
customize the installation process. A remote network installation can save time and resources by
eliminating the need for physical media and allowing centralized management of multiple installations.
Image deployment, recovery partition installation, and repair installation are not correct answers for this
309
Certify For Sure with IT Exam Dumps
question. Image deployment is a method of installing an operating system or an application by copying a
preconfigured image file to a target device. Image deployment requires an existing image file and a
application from a hidden partition on the hard disk that contains the original factory settings. Recovery
partition installation requires an existing recovery partition and a functional hard disk. Repair installation is a
repairing the system files without affecting the user data or settings. Repair installation requires an existing
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 106
492. - (Topic 5)
A user clicks a link in an email. A warning message in the user's browser states the site's certificate cannot
be verified. Which of the following is the most appropriate action for a technician to take?
A. Click proceed.
B. Report the employee to the human resources department for violating company policy.
Answer: D
Explanation: A warning message in the user’s browser stating the site’s certificate cannot be verified
indicates that the site may be insecure, fraudulent, or malicious. This could be a sign of a phishing attempt,
where the sender of the email tries to trick the user into clicking a link that leads to a fake website that
mimics a legitimate one, in order to steal the user’s personal or financial information. The most appropriate
action for a technician to take in this situation is to close the browser window and report the email to IT
security, who can investigate the source and content of the email, and take the necessary steps to protect
the user and the network from potential harm. Clicking proceed could expose the user to malware, identity
theft, or data breach. Reporting the employee to the human resources department for violating company
policy is unnecessary and harsh, as the user may not have been aware of the phishing attempt or the
company policy. Restoring the computer from the last known backup is premature and ineffective, as the
user may not have been infected by anything, and the backup may not remove the email or the link from the
310
Certify For Sure with IT Exam Dumps
user’s inbox
493. - (Topic 5)
Maintaining the chain of custody is an important part of the incident response process. Which of the
Answer: C
Explanation: Maintaining the chain of custody is important to control evidence and maintain integrity. The
chain of custody is a process that documents who handled, accessed, or modified a piece of evidence,
when, where, how, and why. The chain of custody ensures that the evidence is preserved, protected, and
authenticated throughout the incident response process. Maintaining the chain of custody can help prevent
tampering, alteration, or loss of evidence, as well as establish its reliability and validity in legal proceedings.
Maintaining an information security policy, properly identifying the issue, and gathering as much information
as possible are not reasons why maintaining the chain of custody is important. Maintaining an information
security policy is a general practice that defines the rules and guidelines for securing an organization’s
information assets and resources. Properly identifying the issue is a step in the incident response process
that involves analyzing and classifying the incident based on its severity, impact, and scope. Gathering as
much information as possible is a step in the incident response process that involves collecting and
documenting relevant data and evidence from various sources, such as logs, alerts, or witnesses.
References:
494. - (Topic 5)
A user's iPhone was permanently locked after several failed log-in attempts. Which of the following
authentication methods are needed to restore access, applications, and data to the device?
311
Certify For Sure with IT Exam Dumps
C. Primary account and password
Answer: D
Explanation: If a user’s iPhone is permanently locked after several failed log-in attempts, the user will need
to use the recovery contact and recovery key to restore access, applications, and data to the device. The
recovery contact is a trusted person who can receive a verification code from Apple and share it with the
user. The recovery key is a 28- character code that the user created when setting up two-factor
authentication for their Apple ID. The user will need to enter both the verification code and the recovery key
on another device or computer to unlock their iPhone. This method will erase the iPhone and restore it from
495. - (Topic 5)
A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software
product, but the user does not want to pay for a license. Which of the following license types should the
technician recommend?
A. Corporate
B. Open-source
C. Personal
D. Enterprise
Answer: B
Explanation: Open-source software is software that has its source code available for anyone to inspect,
modify, and distribute. Open-source software is usually free of charge and does not require a license to use.
Some examples of open-source antivirus software are ClamAV, Comodo, and Immunet12. The other
license types are either not free or not suitable for a SOHO PC. Corporate and enterprise licenses are
designed for large-scale organizations and networks, and they usually require a subscription fee. Personal
licenses are for individual users and may have limited features or support.
Report(https://windowsreport.com/antivirus-with-unlimited-validity/).
312
Certify For Sure with IT Exam Dumps
496. - (Topic 5)
An organization is creating guidelines for the incorporation of generative Al solutions. In which of the
C. Security protocols
Answer: B
Explanation: An acceptable use policy (AUP) is a document that defines the rules and
expectations for the users of a system, network, or service. It typically covers topics such as the purpose,
scope, responsibilities, and restrictions of using the system, network, or service1. An AUP is a suitable
place to publish the guidelines for the incorporation of generative AI solutions, as it can inform the users of
the benefits, risks, and ethical implications of using such tools. It can also specify the conditions and
limitations for using generative AI solutions, such as the types of data, content, and applications that are
allowed or prohibited, the security and privacy requirements, the legal and regulatory compliance, and the
Techopedia(https://security.stackexchange.com/questions/84168/the-difference-of-security-
Canada.ca(https://www.canada.ca/en/government/system/digital-government/digital-
ISACA(https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2023/volume-
44/key-considerations-for-developing-organizational-generative-ai-policies).
497. - (Topic 5)
Which of the following is the most likely to use NTFS as the native filesystem?
A. macOS
B. Linux
313
Certify For Sure with IT Exam Dumps
C. Windows
D. Android
Answer: C
Explanation: NTFS stands for New Technology File System, which is a proprietary file system developed by
Microsoft4. NTFS is the default file system for the Windows NT family of operating systems, which includes
Windows 10, Windows Server 2019, and other versions5. NTFS provides features such as security,
encryption, compression, journaling, and large volume support45. NTFS is not the native file system for
other operating systems, such as macOS, Linux, or Android, although some of them can read or write to
498. - (Topic 5)
A management team at a small office wants to block access to inappropriate websites and create a log of
these access attempts. Which of the following is a way to meet these requirements?
A. Content filter
B. Screened subnet
C. Port forwarding
Answer: A
Explanation: A content filter is a device or software that blocks or allows access to web pages based on
predefined criteria, such as keywords, categories, or ratings. A content filter can also create a log of the
blocked or allowed web requests, which can help the management team monitor and audit the web usage
of their employees. A content filter is different from the other options because:
✑ A screened subnet is a network segment that is protected by two firewalls, one facing the internet and
one facing the internal network. A screened subnet can isolate servers or hosts that need to be accessed
from both sides, such as a web server or a bastion host. A screened subnet does not filter web content
based on predefined criteria, but rather on network addresses, ports, and protocols.
✑ Port forwarding is a technique that allows a router to forward packets from one port to another port,
usually on a different device. Port forwarding can enable remote access to services or applications that are
hosted on a private network, such as a web server or a game server. Port forwarding does not filter web
content based on predefined criteria, but rather on destination ports and addresses.
314
Certify For Sure with IT Exam Dumps
✑ An access control list (ACL) is a set of rules that defines which packets are allowed or denied on a
network device, such as a router or a firewall. An ACL can filter packets based on source and destination
addresses, ports, protocols, and other criteria. An ACL can also create a log of the matched or unmatched
packets, which can help the management team troubleshoot and secure their network. An ACL does not
filter web content based on predefined criteria, but rather on packet headers and fields.
499. - (Topic 5)
A user reports that an air-gapped computer may have been infected with a virus after the user transferred
files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an
infection. Which of the following actions should the technician take next? (Select two).
Answer: A,D
Explanation: When dealing with a suspected virus infection on an air-gapped computer, after an initial scan
with Windows Defender shows no infection, the next steps should include examining the event logs to look
for suspicious activity and updating the virus definitions for a more thorough scan. Event logs can provide
insights into system changes and potential malicious activities, while updated definitions ensure the
antivirus software can detect the latest threats. Connecting to the network or enabling the firewall might not
be appropriate due to the risk of spreading the infection, and re-imaging the computer or documenting the
findings would be subsequent steps if the initial actions don't resolve the issue.References: Official
500. - (Topic 5)
Which of the following is also known as something you know, something you have, and something you are?
A. ACL
B. MFA
315
Certify For Sure with IT Exam Dumps
C. SMS
D. NFC
Answer: B
Explanation: MFA stands for Multi-Factor Authentication, which is a method of verifying a user’s identity
using two or more different factors of authentication. The three factors of authentication are something you
know, something you have, and something you are. These factors correspond to different types of
information or evidence that only the legitimate user should possess or provide. For example:
MFA provides a higher level of security than single-factor authentication, which only uses one factor, such
as a password. MFA reduces the risk of unauthorized access, identity theft, and data breaches, as an
attacker would need to compromise more than one factor to impersonate a user. MFA is commonly used for
online banking, email accounts, cloud services, and other sensitive applications
501. - (Topic 5)
A technician needs administrator access on a Windows workstation to facilitate system changes without
elevating permissions. Which of the following would best accomplish this task?
C. Device Manager
D. System Configuration
Answer: B
Explanation:
Local Users and Groups is the best option to accomplish this task. Local Users and Groups is a tool that
allows managing the local user accounts and groups on a Windows workstation. The technician can use
this tool to create a new user account with administrator privileges or add an existing user account to the
Administrators group. This way, the technician can log in with the administrator account and make system
changes without elevating permissions. Group Policy Editor, Device Manager, and System Configuration
are not correct answers for this question. Group Policy Editor is a tool that allows configuring policies and
316
Certify For Sure with IT Exam Dumps
settings for users and computers in a domain environment. Device Manager is a tool that allows managing
the hardware devices and drivers on a Windows workstation. System Configuration is a tool that allows
modifying the startup options and services on a Windows workstation. None of these tools can directly
✑ CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam …, page 103
502. - (Topic 5)
A customer calls desktop support and begins yelling at a technician. The customer claims to have
submitted a support ticket two hours ago and complains that the issue still has not been resolved. Which of
Answer: C
Explanation: The best way to deal with an angry customer who is yelling at a technician is to wait until the
customer is done speaking and offer assistance. This shows respect, empathy, and professionalism, and
allows the technician to understand the customer’s problem and find a solution. According to the CompTIA
A+ Core 2 (220-1102) Certification Study Guide1, some of the steps to handle angry customers are:
The other options are not appropriate ways to deal with angry customers, as they may worsen the situation
or damage the customer relationship. Placing the customer on hold may make them feel ignored or
dismissed. Disconnecting the call may make them feel disrespected or abandoned. Escalating the issue to
317
Certify For Sure with IT Exam Dumps
a supervisor may make them feel frustrated or powerless, unless the technician cannot resolve the issue or
References:
503. - (Topic 5)
Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined.
Which of the following should be performed first to prevent further damage to the host and other systems?
Answer: A
Explanation: Turning off the machine is the first and most urgent step to prevent further damage to the host
and other systems. Ransomware can encrypt files, steal data, and spread to other devices on the network if
the infected machine remains online. Turning off the machine will stop the ransomware process and isolate
the machine from the network12. The other options are either ineffective or risky. Running a full antivirus
scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Removing the
LAN card may disconnect the machine from the network, but it will not stop the ransomware from
encrypting or deleting files on the local drive. Installing a different endpoint solution may not be possible or
helpful if the ransomware has already compromised the system or blocked the installation.
ransomware(https://www.microsoft.com/en-us/security/blog/2021/09/07/3-steps-to-prevent-
CISA(https://www.cisa.gov/stopransomware/ransomware-guide).
318
Certify For Sure with IT Exam Dumps
504. - (Topic 5)
A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is
displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the
Answer: C
Explanation: The most likely cause of the intermittent crashes is that the proprietary software is
incompatible, outdated, or corrupted. Reinstalling and updating the software can fix these issues and
ensure the software runs smoothly. Reimaging the computer or replacing the system RAM are too drastic
and unnecessary steps. Decreasing the page file size can worsen the low memory problem and affect the
505. - (Topic 5)
A technician downloaded a software program to a network share. When the technician attempts to copy the
program to the Windows tablet for installation, the technician receives an error. Which of the following is the
Answer: A
Explanation:
Copying the program file to a USB drive and installing it from there is the simplest and most reliable way to
transfer the software from the network share to the Windows tablet. The other options are either
unnecessary, risky, or impractical. Burning the program file to a CD requires a CD burner and a CD reader,
which may not be available on the tablet. Formatting or replacing the HDD will erase all the data and
settings on the tablet, which is not advisable unless there is a backup or a serious problem. Moreover,
319
Certify For Sure with IT Exam Dumps
formatting or replacing the HDD will not solve the issue of copying the program file from the network share.
Ways(https://www.minitool.com/news/transfer-copy-programs-from-one-computer-to- another.html)2
Fi(https://www.techrepublic.com/article/transfer-files-between-your-android-tablet-and-pc- using-wi-fi/)3
10(https://www.diskpart.com/articles/transfer-installed-program-to-another-pc-windows-10- 0825.html).
506. - (Topic 5)
A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most
Answer: C
Explanation:
Quarantining the infected system is the most appropriate way to remediate the issue of an infection that the
antivirus software cannot remove. Quarantining means isolating the system from the network and other
devices to prevent the infection from spreading or causing further damage. Quarantining also allows the
technician to perform further analysis and removal of the infection without risking the security of other
systems or data.
Disconnect the system from the internet and any local network connections, such as Wi-Fi, Ethernet,
Bluetooth, or USB.
Disable any file-sharing or remote access services on the system, such as Windows File Sharing, Remote
Desktop, or TeamViewer.
Use a separate device to download and update the antivirus software and any other tools that may be
320
Certify For Sure with IT Exam Dumps
needed to remove the infection, such as malware scanners, rootkit removers, or bootable rescue disks.
Transfer the updated antivirus software and tools to the infected system using a removable media, such as
a CD, DVD, or USB flash drive. Scan the removable media for any infections before and after using it on the
infected system.
Run the antivirus software and tools on the infected system and follow the instructions to delete or
quarantine the infection. If the infection is persistent or complex, it may require booting the system from a
rescue disk or using a Linux live disc to access and clean the system files.
After the infection is removed, restore the system to a previous clean state using System Restore, backup,
or recovery partition. Scan the system again to ensure that it is clean and secure. Reconnect the system to
the network and update the system and the antivirus software.
References:
Uninstalling Antivirus Software, the Clean Way: 40 Removal Tools & Instructions, section 22
How to manually remove an infected file from a Windows computer3 The Official CompTIA A+ Core 2
507. - (Topic 5)
A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10
Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the
Answer: D
Explanation: The best solution for a technician to implement is to disable the browser from sending
notifications to the Action Center. This will prevent the random advertisement notifications from appearing
in the Windows 10 Action Center, which can be annoying and distracting for the user. The technician can
Open the browser that is sending the notifications, such as Microsoft Edge, Google Chrome, or Mozilla
321
Certify For Sure with IT Exam Dumps
Firefox.
Go to the browser settings or options menu, and look for the privacy and security section. Find the option to
You will see a list of sites that are allowed or blocked from sending notifications to the browser and the
Action Center. You can either block all sites from sending notifications, or select specific sites that you want
to block or allow.
Save the changes and close the browser settings. This solution is better than the other options because:
Running a full antivirus scan on the computer (B) is not necessary, as the advertisement notifications are
not malicious or harmful, and they are not caused by a virus or malware infection. Running a scan will not
Disabling all Action Center notifications © is not advisable, as the Action Center is a useful feature that
shows notifications and alerts from various apps and system events, such as email, calendar, security,
updates, etc. Disabling all notifications will make the user miss important information and reminders, and
reduce the functionality of the Action Center. Moving specific site notifications from Allowed to Block (D) is
not the best solution, as it will only stop the notifications from some sites, but not from others. The user may
still receive advertisement notifications from other sites that are not blocked, or from new sites that are
added to the Allowed list. This solution will also require the user to manually manage the list of sites, which
References:
508. - (Topic 5)
A user is setting up backups on a workstation. The user wants to ensure that the restore process is as
simple as possible. Which of the following backup types should the user select?
A. Full
B. Incremental
C. Differential
D. Synthetic
Answer: A
322
Certify For Sure with IT Exam Dumps
Explanation:
Full backup is the best option to ensure that the restore process is as simple as possible. A full backup is a
backup type that copies all the data from the source to the destination, regardless of whether the data has
changed or not. A full backup provides the most complete and consistent backup of the data, and it allows
the user to restore the data from a single backup set without relying on any previous or subsequent
backups. Incremental, differential, and synthetic backups are not as simple as full backups for restoring
data. An incremental backup is a backup type that copies only the data that has changed since the last
backup, whether it was full or incremental. An incremental backup requires less time and space than a full
backup, but it also requires multiple backup sets to restore the data completely. A differential backup is a
backup type that copies only the data that has changed since the last full backup. A differential backup
requires more time and space than an incremental backup, but it also requires fewer backup sets to restore
the data than an incremental backup. A synthetic backup is a backup type that combines a full backup with
one or more incremental or differential backups to create a consolidated backup set. A synthetic backup
requires less time and bandwidth than a full backup, but it also requires more processing power and
✑ CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Cert Guide, page 458
509. - (Topic 5)
A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to
B. System
C. Personalization
D. Accounts
Answer: A
Explanation: The Network & Internet settings in Windows 10 allow the user to input the SSID and password
of a Wi-Fi network, as well as manage other network-related options, such as airplane mode, mobile
hotspot, VPN, proxy, etc1. To access the Network & Internet settings, the user can select the Start button,
then select Settings > Network & Internet2. Alternatively, the user can right-click the Wi-Fi icon on the
323
Certify For Sure with IT Exam Dumps
taskbar and click "Open Network & Internet Settings"3.
The System settings in Windows 10 allow the user to configure the display, sound, notifications, power,
storage, and other system-related options1. The Personalization settings in Windows 10 allow the user to
customize the background, colors, lock screen, themes, fonts, and other appearance-related options1. The
Accounts settings in Windows 10 allow the user to manage the user accounts, sign-in options, sync settings,
and other account-related options1. None of these settings can be used to input the SSID and password of
a Wi-Fi network.
References:
The Official CompTIA A+ Core 2 Study Guide1, page 221, 222, 223, 224.
510. - (Topic 5)
An employee has repeatedly contacted a technician about malware infecting a work computer. The
technician has removed the malware several times, but the user's PC keeps getting infected. Which of the
Answer: C
Explanation: Malware is software that infects computer systems to damage, disable or exploit the computer
or network for various malicious purposes5. Malware is typically distributed via email attachments, fake
internet ads, infected applications or websites, and often relies on user interaction to execute6. Therefore,
one of the most effective ways to prevent malware infections is to educate the end user about the common
signs and sources of malware, and how to avoid them7. Configuring the firewall, restoring the system from
backups, and updating the antivirus program are also important security measures, but they do not address
the root cause of the user’s repeated infections, which is likely due to a lack of awareness or caution.
References5: Malware: what it is, how it works, and how to stop it - Norton6: How to Prevent Malware: 15
Best Practices for Malware Prevention7: 10 Security Tips for How to Prevent Malware Infections - Netwrix
511. - (Topic 5)
324
Certify For Sure with IT Exam Dumps
Which of the following is used to ensure users have the appropriate level of access to perform their job
functions?
B. Multifactor authentication
C. Least privilege
Answer: C
Explanation: Least privilege is the principle that is used to ensure users have the appropriate level of
access to perform their job functions. Least privilege means granting users only the minimum amount of
access rights and permissions they need to perform their tasks, and nothing more. Least privilege reduces
the risk of unauthorized access, data leakage, malware infection, or accidental damage by limiting what
users can do on the system or network. Access control list, multifactor authentication, and mobile device
management are not principles, but rather mechanisms or methods that can implement least privilege.
Access control list is a list that specifies the users or groups that are allowed or denied access to a resource,
such as a file, folder, or printer. Multifactor authentication is a method that requires users to provide two or
more pieces of evidence to prove their identity, such as a password, a token, or a biometric factor. Mobile
device management is a tool that allows managing and securing mobile devices, such as smartphones or
tablets, that are used by employees to access corporate data or applications. References:
512. - (Topic 5)
A technician is modifying the default home page of all the workstations in a company. Which of the following
A. Group Policy
B. Browser extension
C. System Configuration
D. Task Scheduler
Answer: A
Explanation: Group Policy is a feature of Windows that allows administrators to centrally manage and
325
Certify For Sure with IT Exam Dumps
configure the settings of computers and users in a domain network. Group Policy can be used to modify the
default home page of all the workstations in a company by creating and applying a policy that specifies the
desired URL for the home page. This way, the change will be automatically applied to all the workstations
513. - (Topic 5)
A technician is familiar with most personnel at a customer's location and has clearance to work
unsupervised. Which of the following describes how the technician should handle personal communication
while on site?
A. Respond to calls and text messages while on site but not when working directly with personnel.
C. Respond to calls and text messages only when an emergency situation requires a response.
Answer: C
Explanation:
A technician should handle personal communication while on site in a professional and respectful manner.
According to the CompTIA A+ Core 2 (220-1102) exam objectives, one of the best practices for
communication skills is to “avoid distractions and interruptions” when working with customers1. This means
that the technician should not respond to calls and text messages that are not related to the work or the
customer, unless there is an emergency situation that requires a response. Responding to personal
communication while on site can be seen as rude, unprofessional, and disrespectful to the customer and
their time. It can also affect the quality and efficiency of the technician’s work and cause errors or delays.
Therefore, the technician should only respond to calls and text messages when an emergency situation
requires a response, and inform the customer about the situation and apologize for the interruption.
The other options are not appropriate for handling personal communication while on site. Responding to
calls and text messages while on site but not when working directly with personnel (A) is still distracting and
unprofessional, as it can interfere with the technician’s focus and productivity. Responding to calls and text
messages only from family (B) is not a valid criterion, as the technician may receive calls and text
messages from other sources that are not related to the work or the customer. Responding to calls and text
messages discreetly while on site (D) is not a good practice, as it can still be noticed by the customer or
326
Certify For Sure with IT Exam Dumps
other personnel and create a negative impression.
References:
514. - (Topic 5)
Which of the following involves sending arbitrary characters in a web page request?
A. SMS
B. SSL
C. XSS
D. VPN
Answer: C
Explanation: XSS stands for cross-site scripting, which is a web security vulnerability that allows an attacker
to inject malicious code into a web page that is viewed by other users1. XSS involves sending arbitrary
characters in a web page request, such as a query string, a form field, a cookie, or a header, that contain a
malicious script. The web server does not validate or encode the input, and returns it as part of the web
page response. The browser then executes the script, which can perform various actions on behalf of the
attacker, such as stealing cookies, session tokens, or other sensitive information, redirecting the user to a
515. - (Topic 5)
A technician is building a new desktop machine for a user who will be using the workstation to render 3-D
A. Dedicated GPU
B. DDR5 SODIMM
C. NVMe disk
D. 64-bit CPU
Answer: A
Explanation:
A dedicated GPU (graphics processing unit) is the most important component for rendering 3-D
promotional movies, as it can handle the complex calculations and graphics operations required for
327
Certify For Sure with IT Exam Dumps
creating realistic and high-quality images. A dedicated GPU has its own memory and processor, which are
optimized for graphics tasks. A dedicated GPU can also support multiple monitors, high resolutions, and
advanced features such as ray tracing12. References: 1 What Kind of Computer Do You Need for 3D
GarageFarm(https://garagefarm.net/blog/how-to-choose-the-best-hardware-for-a-3d-artist).
516. - (Topic 5)
When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a
cellular connection. Which of the following is the best way to fix this issue?
Answer: A
Explanation:
The best way to fix the issue of slow cellular connection in the office is to connect to the company’s Wi-Fi
network. This will allow the user’s mobile phone to access the internet through a faster and more reliable
wireless network, instead of relying on the cellular network. Connecting to the Wi-Fi network will also save
Some of the factors that can affect the cellular connection speed are the distance from the cell tower, the
obstructions between the phone and the tower, the network congestion, the network technology, and the
features of the phone12. In the office, the user may experience a weak or unstable cellular signal due to the
building structure, the location, or the interference from other devices. Therefore, switching to the Wi-Fi
network can improve the performance of the phone’s applications and web browsing.
References:
328
Certify For Sure with IT Exam Dumps
517. - (Topic 5)
Which of the following environmental factors are most important to consider when planning the
A. Temperature levels
C. Humidity levels
D. Noise levels
E. Lighting levels
F. Cable management
Answer: A,C
Explanation:
Temperature and humidity levels are the most important environmental factors to consider when planning
the configuration of a data center, as they directly affect the performance, reliability, and energy efficiency
of the IT equipment. Excessive heat or moisture can cause overheating, corrosion, condensation, or static
electricity, which can damage the hardware and lead to data loss or service disruption. Therefore, data
centers need to monitor and control the temperature and humidity levels within the recommended ranges
Monitoring(https://community.fs.com/blog/5-factors-to-consider-for-data-center-
DataSpan(https://dataspan.com/blog/data-center-environmental-standards/).
518. - (Topic 5)
A help desk technician needs to remotely access and control a customer's Windows PC by using a secure
session that allows the technician the same control as the customer. Which of the following tools provides
A. FTP
B. RDP
C. SSH
329
Certify For Sure with IT Exam Dumps
D. VNC
Answer: B
Explanation: RDP stands for Remote Desktop Protocol, which is a proprietary protocol developed by
Microsoft that allows a user to remotely access and control another computer over a network. RDP
provides a secure session that encrypts the data between the client and the host, and allows the user to
see and interact with the desktop and applications of the remote computer as if they were sitting in front of it.
RDP also supports features such as audio, video, clipboard, printer, and file sharing, as well as multiple
monitor support and session recording. To use RDP, the host computer must have Remote Desktop
enabled and configured, and the client computer must have a Remote Desktop client software installed.
The client can connect to the host by entering its IP address, hostname, or domain name, and providing the
login credentials of a user account on the host. RDP is commonly used for remote administration, technical
519. - (Topic 5)
A network technician is deploying a new machine in a small branch office that does not have a DHCP
server. The new machine automatically receives the IP address of 169.254.0.2 and is unable to
communicate with the rest of the network. Which of the following would restore communication?
A. Static entry
B. ARP table
C. APIPA address
D. NTP specification
Answer: A
Explanation: A static entry is the best option to restore communication for the new machine in a small
branch office that does not have a DHCP server. A static entry means manually configuring the IP address,
subnet mask, default gateway, and DNS server for the network adapter of the machine. A static entry
ensures that the machine has a valid and unique IP address that matches the network configuration and
The new machine automatically receives the IP address of 169.254.0.2 because it uses APIPA (Automatic
Private IP Addressing), which is a feature that enables computers to self-assign an IP address when a
DHCP server is not available. However, APIPA only works for local communication within the same subnet,
330
Certify For Sure with IT Exam Dumps
and does not provide a default gateway or a DNS server. Therefore, the new machine is unable to
communicate with the rest of the network, which may be on a different subnet or require a gateway or a
The other options are not related to restoring communication for the new machine. ARP table is a cache
that stores the mapping between IP addresses and MAC addresses for the devices on the network. NTP
specification is a protocol that synchronizes the clocks of the devices on the network.
References:
520. - (Topic 5)
Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in
A. .exe
B. .dmg
C. . app
D. . rpm
E. .pkg
Answer: C
Explanation:
app files are application bundles that contain all the necessary files and resources for a Mac app. They can
be easily deleted by dragging them to the Trash or using Launchpad12. Other file types, such
as .exe, .dmg, .rpm, and .pkg, are either not compatible with macOS or require additional steps to
uninstall34.
331
Certify For Sure with IT Exam Dumps
completely uninstall an app on a Mac and delete all junk
files(https://www.xda-developers.com/how-to-uninstall-app-mac/).
521. - (Topic 5)
A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a
Answer: D
Explanation: The first mitigation step that a technician should take when a machine is suspected to contain
ransomware is to quarantine the system. This means isolating the infected machine from the network and
other devices, to prevent the ransomware from spreading and encrypting more data. The technician can
quarantine the system by disconnecting the network cable, turning off the wireless adapter, or using firewall
Disabling System Restore (A) is not a priority, as it will not stop the ransomware from running or spreading.
System Restore is a feature that allows users to restore their system to a previous state, but it may not work
if the ransomware has encrypted or deleted the restore points. Moreover, disabling System Restore may
prevent the user from recovering some data or settings in the future13.
Remediating the system (B) is the ultimate goal, but it cannot be done before quarantining the system.
Remediating the system means removing the ransomware, restoring the data, and fixing the vulnerabilities
that allowed the attack. However, this process requires careful analysis, planning, and execution, and it
may not be possible if the ransomware is still active and communicating with the attackers. Therefore, the
technician should first isolate the system and then proceed with the remediation steps12.
Educating the system user © is a preventive measure, but it is not a mitigation step. Educating the system
user means raising awareness and providing training on how to avoid ransomware attacks, such as by
recognizing phishing emails, avoiding suspicious links or attachments, and updating and patching the
system regularly. However, this step will not help if the system is already infected, and it may not be
332
Certify For Sure with IT Exam Dumps
effective if the user is not willing or able to follow the best practices. Therefore, the technician should focus
on resolving the current incident and then educate the user as part of the recovery plan14. References:
prevent and recover from ransomware | Microsoft Security Blog3 3: How to use System Restore on
Delinea4
522. - (Topic 5)
A technician has identified malicious traffic originating from a user's computer. Which of the following is the
Answer: B
Explanation: Isolating the machine from the network is the best way to identify the source of the attack,
because it prevents the malicious traffic from spreading to other devices or reaching the attacker. Isolating
the machine can also help preserve the evidence of the attack, such as the malware files, the network
connections, the registry entries, or the system logs. By isolating the machine, a technician can safely
analyze the machine and determine the source of the attack, such as a phishing email, a compromised
523. - (Topic 5)
A Linux technician needs a filesystem type that meets the following requirements:
A. ext3
B. FAT32
333
Certify For Sure with IT Exam Dumps
C. exFAT
D. NTFS
Answer: A
Explanation: The ext3 file system is a Linux native file system that meets the requirements of the question.
✑ All changes are tracked. The ext3 file system uses a journaling mechanism that records all changes to
the file system metadata in a special log called the journal before applying them to the actual file system.
This ensures that the file system can be restored to a consistent state in case of a power failure or system
crash12.
✑ The possibility of file corruption is reduced. The journaling feature of ext3 also reduces the possibility of
file corruption, as it avoids the need for a full file system check after an unclean shutdown. The file system
can be quickly replayed from the journal and any inconsistencies can be fixed12.
✑ Data recovery is easy. The ext3 file system supports undeletion of files using tools such as ext3grep or
extundelete, which can scan the file system for deleted inodes and attempt to recover the data blocks
References:
1: Introduction to Linux File System [Structure and Types] - MiniTool1 2: 7 Ways to Determine the File
System Type in Linux (Ext2, Ext3 or Ext4) - Tecmint3 3: How to Recover Deleted Files in Linux with
524. - (Topic 5)
A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications,
and experiencing slow response. After checking the device, a technician notices the device has been
Answer: B
Explanation:
334
Certify For Sure with IT Exam Dumps
Jailbreaking a device exposes it to various security risks, such as malware, data theft, network attacks, and
service disruption1234. Running an antivirus and enabling encryption may not be enough to remove the
threats and restore the device’s functionality. Undoing the jailbreak may not be possible or effective,
depending on the method used. Backing up the files and doing a system restore may preserve the jailbreak
and the associated problems. The best option is to erase the device and reinstall the original operating
system that is compatible with the corporate policies and standards. This will ensure that the device is clean,
10(https://community.spiceworks.com/topic/2196812-resetting-a-corporate-laptop-back-to-
a-personal-laptop-enterprise-vs-pro).
525. - (Topic 5)
A user's computer unexpectedly shut down immediately after the user plugged in a USB headset. Once the
user turned the computer back on, everything was functioning properly, including the headset. Which of the
following Microsoft tools would most likely be used to determine the root cause?
A. Event Viewer
B. System Configuration
C. Device Manager
D. Performance Monitor
Answer: A
Explanation: Event Viewer is a Microsoft tool that records and displays system events, errors, warnings,
and information. Event Viewer can help troubleshoot and diagnose problems, such as unexpected
shutdowns, by showing the details of what happened before, during, and after the incident. Event Viewer
335
Certify For Sure with IT Exam Dumps
can also show the source of the event, such as an application, a service, a driver, or a hardware device. By
using Event Viewer, a technician can identify the root cause of the unexpected shutdown, such as a power
526. - (Topic 5)
A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20
minutes late. The customer will also be late. Which of the following should the technician do considering
Answer: C
Explanation: The best option for the technician to demonstrate proper communication techniques and
professionalism is to contact the customer if the technician is arriving late. This shows respect for the
customer’s time and expectations, and allows the customer to adjust their schedule accordingly. It also
helps to maintain a positive relationship and trust between the technician and the customer. The technician
should apologize for the delay and provide a realistic estimate of their arrival time. The technician should
The other options are not appropriate or professional. Do not notify the customer if arriving before the
customer is not a good practice, as it may cause confusion or frustration for the customer. The customer
may have made other plans or arrangements based on the technician’s original schedule, and may not be
available or prepared for the service. Dismiss the customer and proceed with the after-hours work is rude
and disrespectful, as it ignores the customer’s needs and preferences. The customer may have questions
or concerns about the service, or may want to supervise or verify the work. The technician should always
communicate with the customer before, during, and after the service. Disclose the experience via social
media is unethical and unprofessional, as it may violate the customer’s privacy and the company’s policies.
The technician should not share any confidential or sensitive information about the customer or the service
on social media, or make any negative or inappropriate comments about the customer or the situation.
References:
336
Certify For Sure with IT Exam Dumps
✑ CompTIA A+ Certification Exam Core 2 Objectives1
527. - (Topic 5)
Which of the following is the best way to limit the loss of confidential data if an employee's company
A. Installing a VPN
D. Enabling backups
Answer: C
Explanation: Configuring remote wipe allows the device owner or administrator to erase all the data on the
device remotely, in case it is lost or stolen. This prevents unauthorized access to confidential data and
reduces the risk of data breaches. Installing a VPN, implementing location tracking, and enabling backups
are useful features, but they do not directly limit the loss of data if the device is compromised. References:
CompTIA A+ Certification Exam Core 2 Objectives, Domain 2.0: Security, Objective 2.5: Given a scenario,
528. - (Topic 5)
A developer reports that a workstation's database file extensions have been changed from
.d b to .enc. The developer is also unable to open the database files manually. Which of the following is the
Answer: C
Explanation: The scenario described in the question suggests that the workstation has
337
Certify For Sure with IT Exam Dumps
been infected by a ransomware, which is a type of malware that encrypts the files on the target system and
demands a ransom for the decryption key12. The file extension .enc is commonly used by some
ransomware variants to mark the encrypted files34. The developer is unable to open the database files
manually because they are encrypted and require the decryption key, which is usually held by the attacker.
The best option for recovering the data is to utilize the backups, assuming that the backups are recent, valid,
and not affected by the ransomware. Backups are copies of the data that are stored in a separate location
or device, and can be used to restore the data in case of a disaster, such as a ransomware attack . By
restoring the data from the backups, the developer can avoid paying the ransom and losing the data
permanently.
Accessing a restore point is not a good option, because restore points are snapshots of the system settings
and configuration, not the data files. Restore points can help to undo some system changes, such as
installing a faulty driver or software, but they cannot recover the encrypted data files .
Rebooting into safe mode is also not a good option, because safe mode is a diagnostic mode that allows
the system to run with minimal drivers and services, but it does not affect the data files. Safe mode can help
to troubleshoot some system issues, such as malware infections, but it cannot decrypt the data files .
Using an AV to scan the affected files is also not a good option, because an AV is a software that can
detect and remove some malware, but it cannot decrypt the data files. An AV can help to prevent or remove
some ransomware infections, but it cannot recover the encrypted data files .
(220-1102) Complete Video Course, Lesson 26 Documentation 3: How to remove .e nc file virus
(Ransomware virus removal guide) 4: Enc File Extension - What is an .enc file and how do I open it? :
CompTIA A+ Certification Exam Core 2 Objectives, page 13 : CompTIA A+ Core 2 (220-1102) Complete
Video Course, Lesson 26 Documentation: What is a restore point? : How to use System Restore on
Windows 10 : [What is Safe Mode?] : [How to boot into Safe Mode on Windows 10] : CompTIA A+
Certification Exam Core 2 Objectives, page 10 : [Can antivirus software remove ransomware?]
529. - (Topic 5)
Applications on a computer are not updating, which is preventing the user from opening certain files. Which
of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?
A. gpedit.msc
338
Certify For Sure with IT Exam Dumps
B. perfmon.msc
C. devmgmt.msc
Answer: C
Explanation: devmgmt.msc is the MMC snap-in that opens the Device Manager, a tool that allows the
technician to view and manage the hardware devices and their drivers on the computer1. If the applications
are not updating properly, it could be due to outdated, corrupted, or incompatible drivers that prevent the
hardware from functioning normally. The technician can use the Device Manager to update, uninstall,
rollback, or disable the drivers, as well as scan for hardware changes, troubleshoot problems, and view
device properties2. gpedit.msc is the MMC snap-in that opens the Group Policy Editor, a tool that allows the
technician to configure the local or domain group policy settings for the computer or a group of computers3.
Group policy settings can affect the security, performance, and functionality of the system, but they are not
directly related to the application updates or the hardware drivers. perfmon.msc is the MMC snap-in that
opens the Performance Monitor, a tool that allows the technician to monitor and analyze the performance of
the system and its components, such as processor, memory, disk, network, etc4. Performance Monitor can
display real- time data or collect log data for later analysis, as well as generate reports and alerts based on
the performance counters5. Performance Monitor can help the technician identify and diagnose
performance issues, but it does not provide a way to manage the hardware drivers.
References:
The Official CompTIA A+ Core 2 Study Guide6, page 223, 225, 227, 228.
530. - (Topic 5)
Which of the following environments allows for the testing of critical systems without the risk of them being
A. Regression
B. Cloud
C. Production
D. Sandbox
Answer: D
Explanation: A sandbox is an isolated environment that allows for the testing of critical systems without the
risk of them being negatively impacted by changes. A sandbox can be used to simulate real-world
339
Certify For Sure with IT Exam Dumps
scenarios, experiment with new features, debug errors, or evaluate the performance and security of a
sandbox prevents any changes made in the testing environment from affecting the production environment,
https://www.comptia.org/training/books/a-core-2-220-1102-study-guide
531. - (Topic 5)
A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in
customizing the wallpaper. Which of the following should the student use to change the wallpaper?
B. Personalization
C. File Explorer
D. Task Manager
Answer: B
Explanation: To change the wallpaper on a Windows 10 laptop, the "Personalization" settings should be
used. These settings allow users to customize themes, which include various aspects of the desktop
environment such as the desktop wallpaper, screen saver, color scheme, and more. This makes
"Personalization" the correct option for customizing the wallpaper.References: Official CompTIA A+ Core 1
532. - (Topic 5)
A technician needs to reimage a desktop in an area without network access. Which of the following should
A. USB
B. PXE
C. Optical media
D. Partition
E. Boot record
F. SMB
Answer: A,C
340
Certify For Sure with IT Exam Dumps
Explanation: A technician needs to reimage a desktop in an area without network access, which means that
the technician cannot use network-based methods such as PXE or SMB to deploy the image. Therefore,
the technician should use offline methods that involve removable media such as USB or optical media.
USB and optical media are common ways to store and transfer system images, and they can be used to
boot the desktop and initiate the reimaging process. The technician will need to create a bootable USB or
optical media that contains the system image and the imaging software, and then insert it into the desktop
and change the boot order in the BIOS or UEFI settings. The technician can then follow the instructions on
533. - (Topic 5)
A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer
performance issues. Which of the following actions should the technician take next?
Answer: A
Explanation: Isolating the machine from the network is a good practice when troubleshooting a PC that is
suspected of being infected with malware. This can prevent the malware from spreading to other devices
on the network or communicating with external servers that may control or exploit the malware. Isolating the
machine can be done by disconnecting the network cable, disabling the wireless adapter, or blocking the
534. - (Topic 6)
After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address.
341
Certify For Sure with IT Exam Dumps
C. Theswitchhas port security enabled.
Answer: C
Explanation:
When upgraded computers are not able to obtain an IP address, the issue often lies in the network
✑ Option A: The switch is only providing IPv6 addresses.This is unlikely because if the switch were
providing IPv6 addresses, the devices would still receive an IP address, albeit an IPv6 one. The issue
✑ Option B: The OS must be updated to be compatible with the imaging software.This option is unrelated
to obtaining an IP address. Compatibility with imaging software would not prevent the devices from getting
an IP address.
✑ Option C: The switch has port security enabled.Correct Answer. Port security on a switch restricts
access based on MAC addresses. If the MAC addresses of the upgraded computers are not recognized or
have not been added to the allowed list, the switch will not provide network access, resulting in the
Option D: The switch does not support multicast traffic.This is unrelated to obtaining an IP address.
Multicast traffic deals with specific types of network communication and would not affect the basic DHCP IP
535. - (Topic 6)
A malicious user was able to export an entire website's user database by entering specific commands into a
field on the company's website. Which of the following did the malicious user most likely exploit to extract
the data?
A. Cross-site scripting
B. SQL injection
C. Brute-force attack
D. DDoS attack
Answer: B
342
Certify For Sure with IT Exam Dumps
Explanation:
SQL injection is a type of attack that takes advantage of vulnerabilities in a web application's database
query software, allowing an attacker to send malicious SQL commands through the application to the
database. These commands can manipulate the database and can lead to unauthorized data access or
manipulation.
✑ SQL injection: In the scenario described, the malicious user was able to export an entire website's user
database by entering specific commands into a field on the company's website, which is a classic example
of an SQL injection attack. This type of attack exploits vulnerabilities in the database layer of an application
Cross-site scripting (A) involves injecting malicious scripts into content from otherwise trusted websites. A
brute-force attack (C) is an attempt to gain access to a system by systematically checking all possible keys
or passwords until the correct one is found. A DDoS attack (D) is an attempt to make a machine or network
resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
536. - (Topic 6)
Which of the following environmental effects can be the result of using virtualization?
B. Noise pollution
Answer: C
Explanation: One of the key environmental benefits of using virtualization is the reduction in physical space
requirements. Virtualization allows multiple virtual machines to run on a single physical server, reducing the
need for multiple physical servers. This consolidation leads to fewer physical machines, saving space in
✑ B. Noise pollution can be reduced because fewer physical machines often mean less overall noise.
✑ D. Fewer maintenance needs is a possible benefit but not directly related to environmental effects like
343
Certify For Sure with IT Exam Dumps
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.5: Summarizing environmental impacts and
537. - (Topic 6)
A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and
saved many large files over the past week. Which of the following tools should a technician use to
A. Disk Defragment
B. Registry Editor
C. System Information
D. Disk Cleanup
Answer: A
Explanation: Over time, especially with frequent opening, modification, and saving of large files, a hard disk
drive (HDD) can become fragmented. Fragmentation occurs when pieces of individual files are scattered
across the disk, leading to longer read and write times, which can significantly slow down the computer.
Disk defragmentation reorganizes these fragmented files, placing the pieces closer together on the drive,
✑ Disk Defragment: Using the Disk Defragment tool on a Windows 10 system with an HDD will help in
reorganizing the data more efficiently, thus potentially remedying the slow performance issue.
The Registry Editor (B) is a tool that allows for the viewing and editing of the Windows registry and is
generally not used for performance improvement but rather for system settings and configuration
adjustments. System Information (C) provides a detailed look at the computer's hardware and system
details but does not offer tools for performance improvement. Disk Cleanup (D) can help free up space on
the hard drive by removing temporary files and system files that are no longer needed, which can indirectly
improve performance but is not the primary tool for addressing fragmentation.
538. - (Topic 6)
The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the
text larger when the user shares the computer screen. When not in meetings, the user wants the text be
344
Certify For Sure with IT Exam Dumps
smaller for work tasks. Which of the following is the most efficient way to change text font size?
A. Issuinga laptop to the user with increased font size to be used only for meetings
C. Addinga local user account, which has a larger font size set, for the user to log In toduring meetings
D. Addinga second monitor to the user's desktop and increase the font size for only that display
Answer: B
Explanation:
Changing the text size efficiently for different scenarios, such as meetings and regular work tasks, can be
managed directly through the Windows display settings. This method is both quick and easily reversible,
making it the most efficient solution compared to the other options provided.
✑ Option A: Issuing a laptop to the user with increased font size to be used only for meetingsThis option is
not efficient as it requires additional hardware and setup time, which is impractical for simply adjusting text
size.
✑ Option B: Using display settings to adjust the text size during meetingsCorrect Answer. Windows
provides built-in functionality to adjust the text size on the display. This can be accessed via:
Option C: Adding a local user account, which has a larger font size set, for the user to log in to during
meetingsThis approach involves additional steps of logging out and logging back in, which is less efficient
Option D: Adding a second monitor to the user's desktop and increase the font size for only that
displayWhile this can be a solution, it is not the most efficient way as it involves additional hardware and
configuration. It's more suited for scenarios requiring constant dual-display use rather than just changing
539. - (Topic 6)
Which of the following languages is used for scripting the creation of Active Directory accounts?
A. Bash
C. Hypertext Preprocessor
D. PowerShell
345
Certify For Sure with IT Exam Dumps
Answer: D
Explanation: For scripting the creation of Active Directory accounts, PowerShell (D) is used. PowerShell is
a task automation and configuration management framework from Microsoft, consisting of a command-line
shell and the associated scripting language. It is built on the .NET framework and is particularly suited for
540. - (Topic 6)
A technician needs to troubleshoot a user's computer while the user is connected to the system. The
technician must also connect to the user's system using remote access tools built in to Windows Which of
A. Screen share
B. MSRA
D. RDP
Answer: B
Explanation: To troubleshoot a user's computer remotely while the user is connected, the best option is
Microsoft Remote Assistance (MSRA). MSRA allows the technician to view and control the user's screen
with their permission, facilitating an effective troubleshooting session without disconnecting the user.
541. - (Topic 6)
An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the
A. Degauss
B. Delete
C. Incinerate
D. Recycle
E. Format
F. Shred
Answer: C,F
Explanation: Disposing of SSDs (Solid State Drives) containing sensitive data requires methods that ensure
346
Certify For Sure with IT Exam Dumps
the data cannot be recovered. SSDs store data on flash memory, which makes traditional data destruction
methods like degaussing ineffective, as degaussing relies on demagnetizing the magnetic media found in
✑ Incineration: This method ensures the complete destruction of the SSD by burning it at high
temperatures. This process is effective as it physically destroys the flash memory chips, making data
recovery impossible.
✑ Shredding: Shredding involves physically breaking the SSD into small pieces.
Specialized shredding machines designed for electronic media can cut the SSD into pieces small enough to
Other listed options such as Degaussing (A) is ineffective on SSDs because they don't use magnetic
storage. Simple Deletion (B) and Formatting (E) are not secure methods for data destruction as the data
can potentially be recovered using specialized software. Recycling (D) is environmentally friendly but does
not guarantee data destruction if the drive is not physically destroyed first.
542. - (Topic 6)
Which of the following will automatically map network drives based on Group Policy configuration?
A. Log-in scripts
B. Access controllists
C. Organizationalunits
D. Folder redirection
Answer: A
Explanation: Network drives can be automatically mapped for users based on Group Policy configuration
✑ Log-in scripts: These are scripts executed when a user logs in to a domain. They can be configured
through Group Policy in Active Directory to map network drives automatically. The scripts can use
✑ Access control lists (ACLs): While ACLs control permissions for files and folders, they do not
✑ Organizational units (OUs): OUs are used to organize users and computers in a directory structure but
347
Certify For Sure with IT Exam Dumps
✑ Folder redirection: This redirects the path of a folder to a new location, typically on a network share, but it
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.6: Given a scenario configure Microsoft Windows
543. - (Topic 6)
A technician receives a high-priority ticket about sensitive information collected from an end user’s
workstation. Which of the following steps should a technician take to preserve the chain of custody for a
forensic investigation?
Answer: C
Explanation:
In the context of a forensic investigation, especially involving sensitive information, preserving the integrity
and the chain of custody of the potential evidence is crucial. The step to "Recover and secure the
workstation" involves physically securing the workstation to prevent any unauthorized access and logically
securing the data by ensuring that no changes are made to the system or files. This step helps maintain the
original state of the workstation, which is essential for a legitimate forensic analysis and ensuring that the
544. - (Topic 6)
A Windows 10 computer is not installing updates and continues to receive errors even during manual
update installations. Which of the following should a technician do to fix the issues? (Select two).
348
Certify For Sure with IT Exam Dumps
D. Run the System check to verify system files.
Answer: B,C
Explanation: Refreshing local Windows Server Update Services (WSUS) settings and deleting the
Windows Update cache are effective steps in resolving issues with Windows 10 not installing updates.
These actions help in rectifying any corrupt update files and ensuring that the workstation is properly
communicating with the update servers, which can resolve errors during manual and automatic update
installations.
545. - (Topic 6)
A technician is investigating a workstation that has not received the latest policy changes. Which of the
following commands should the technician use to apply the latest domain policy changes?
A. sfc /scannow
B. gpupdare /force
C. chkdsk /y
D. xcopy Zp
Answer: B
Explanation:
When a workstation has not received the latest policy changes, the gpupdate command is used to manually
✑ Option A: sfc /scannowThis command is used to scan and repair corrupted system files, not to update
group policies.
✑ Option B: gpupdate /forceThis command forces the workstation to reapply all group policies, ensuring
✑ Option C: chkdsk /yThis command checks the integrity of the file system and fixes logical file system
✑ Option D: xcopy /ZpThis command is used for copying files and directories, not for updating group
policies.
References:
349
Certify For Sure with IT Exam Dumps
✑ CompTIA A+ 220-1102 Objective 1.6 (Configure Microsoft Windows networking features on a
546. - (Topic 6)
A user receives an error message on a Windows 10 device when trying to access a mapped drive from a
Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of
the following Control Panel utilities should the user select to enable connectivity to the device?
B. Administrative Tools
Answer: C
Explanation:
The Network and Sharing Center in the Control Panel is the central place to manage network connections
and settings in Windows. When facing issues with accessing a mapped drive, this utility allows users to
review and adjust network settings, making it possible to resolve connectivity problems. It provides options
to view network status, set up new connections, change adapter settings, and troubleshoot network
problems, which can help in enabling connectivity to the mapped drive on the Windows XP machine.
547. - (Topic 6)
An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal
using the company-provided VPN service. Which of the following describes the cause of the issue?
Answer: C
Explanation: When an employee is unable to access the company portal using a VPN on their personal
✑ The smartphone is not enrolled in MDM service: Mobile Device Management (MDM) services often
350
Certify For Sure with IT Exam Dumps
control access to company resources. If the smartphone is not enrolled, it may be blocked from accessing
✑ The application must be purchased by the company: Unlikely, as most VPN applications are free to
✑ The smartphone is not on the latest OS version: While this could cause compatibility issues, it is less
✑ The application fails to install and launch: This would be a different problem and would usually present
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and
embedded devices.
548. - (Topic 6)
C. An administrator applies new settings to a computer after the previous settings failed.
Answer: D
Explanation: A rollback plan describes the process of reverting a system to its previous state after a failed
upgrade or change. This ensures system stability and functionality by restoring known good configurations
and is a crucial part of change management to minimize disruptions in case of unsuccessful updates.
549. - (Topic 6)
A user reports receiving constant, unwanted pop-ups and being unable to close the browser window. These
issues have impacted the user's productivity and may have caused the user's files to be altered. Which of
the following should a technician do to address these issues with minimal impact to the user?
351
Certify For Sure with IT Exam Dumps
C. Identify whether the disk partition table has been reduced in size.
Answer: D
Explanation: For issues related to constant, unwanted pop-ups and browser window problems, a careful
approach that minimizes impact to the user's data and productivity is advisable:
✑ Perform a full-system, antivirus scan: This step involves using antivirus software to scan the entire
system for malware or adware that might be causing the pop-ups and browser issues.
✑ Check browser notifications: Some unwanted pop-ups may result from browser notification permissions
inadvertently granted to malicious or spammy websites. Reviewing and adjusting these settings can help
550. - (Topic 6)
When a user is in the office, web pages are loading slowly on the user's phone. Which of the following best
Answer: D
Explanation: When a user experiences slow web page loading on their phone while in the office, the most
✑ High network traffic: In an office environment, many devices are often connected to the network
simultaneously, which can lead to congestion and slow internet speeds. High network traffic means more
✑ Exceeded the data usage limit: This typically applies to cellular data plans, not Wi-Fi in an office setting.
✑ Sluggish response time: This is a symptom rather than a cause and can result from high network traffic.
✑ Degraded network service: While this could be a factor, it is broader and less specific than high network
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Given a scenario troubleshoot problems with wired
352
Certify For Sure with IT Exam Dumps
and wireless networks.
551. - (Topic 6)
A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the
file, a message indicates no software is installed to run this file. Which of the following should the technician
Answer: B
Explanation: If a technician is unable to run an OS installation file and receives a message indicating no
software is installed to handle the file, the next step is to mount the ISO file. Mounting the ISO will create a
virtual drive from which the installation can be run, mimicking the behavior of a physical installation media.
552. - (Topic 6)
A company installed WAPs and deployed new laptops and docking stations to all employees. The docking
stations are connected via LAN cables. Users are now reporting degraded network service. The IT
department has determined that the WAP mesh network is experiencing a higher than anticipated amount
of traffic. Which of the following would be the most efficient way to ensure the wireless network can support
Answer: D
Explanation: When a WAP (Wireless Access Point) mesh network is experiencing a higher than anticipated
amount of traffic, leading to degraded network service, upgrading the network to a more advanced wireless
standard can help alleviate the problem. The 802.11n specification, also known as Wireless-N, offers
353
Certify For Sure with IT Exam Dumps
significant improvements over earlier standards like 802.11b/g in terms of speed, range, and reliability. It
allows for increased data throughput and better coverage, which can support a higher number of wireless
users effectively.
✑ Upgrading to 802.11n: This involves replacing existing WAPs with those that support the 802.11n
standard or higher. The upgrade can result in improved network performance by accommodating more
wireless connections with higher data rates, reducing congestion and improving overall network efficiency.
Replacing non-mobile users' laptops with wired desktop systems (A) could reduce wireless traffic but may
not be feasible or desirable for all users. Increasing the wireless network adapter metric (B) would affect
route priority but not overall network capacity. Adding wireless repeaters (C) can extend the range but
might also introduce additional latency and does not necessarily increase the network's capacity to handle
553. - (Topic 6)
A user's home system has been infected with malware. A technician has isolated the system from the
network and disabled System Restore. Which of the following should the technician do next?
Answer: A
Explanation:
When dealing with a malware-infected system, isolating the system from the network and disabling System
Restore are critical initial steps. The next step in the malware removal process should be:
✑ Perform an antivirus scan: This helps to identify and remove the malware from the system. Running a
thorough scan using updated antivirus software is essential to detect and clean any malicious files.
✑ Run Windows updates: This is important for system security but should be done after the malware is
✑ Reimage the system: This is a more drastic measure and should be considered if the antivirus scan
✑ Enable System Restore: This should only be done after the system is confirmed to be clean.
354
Certify For Sure with IT Exam Dumps
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 3.3: Given a scenario use best practice procedures for
malware removal.
554. - (Topic 6)
A technician is setting up a new PC in a SOHO. Which of the following should the technician most likely
A. VDI
B. Mapped drives
C. Wireless WAN
D. Domain
Answer: B
Explanation: In a Small Office/Home Office (SOHO) setup, the technician is most likely to configure
mapped drives on a new PC. Mapped drives allow for easy access to shared resources such as files and
printers on the network. This setup facilitates file sharing and collaboration within a small network, making it
555. - (Topic 6)
A user's Windows desktop has low disk space. A technician thinks some upgrade files were never removed.
Which of the following tools should the technician use to correct the issue?
A. devmgmt.msc
B. cleanmgr.exe
C. dfrgui.exe
D. diskmgmt.mac
Answer: B
Explanation: The correct tool to use for removing upgrade files and freeing up disk space on a Windows
desktop is cleanmgr.exe, which stands for Disk Cleanup. Disk Cleanup is a maintenance utility included in
Microsoft Windows designed to free up disk space on a computer's hard drive. The utility scans and
analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. It
355
Certify For Sure with IT Exam Dumps
can delete temporary files, system files, empty the Recycle Bin, and remove a variety of system files and
556. - (Topic 6)
A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to
make sure the printer stays connected in the future and is available on all the computers in the house.
A. DNS settings
B. Static IP
C. WWAN
D. Meteredconnection
Answer: B
Explanation: Configuring a static IP address for a network printer in a SOHO (Small Office/Home Office)
environment ensures that the printer maintains the same IP address over time. This consistency is crucial
for networked devices like printers, as computers and other devices rely on this specific address to connect
to the printer. If the printer's IP address were to change (as it might with DHCP), devices would no longer be
✑ Static IP: Assigning a static IP address to the printer ensures it always uses the same IP, making it
reliably accessible to all computers in the house regardless of network changes or router reboots.
DNS settings (A) are generally not necessary to configure directly on most network printers unless you're
dealing with advanced network configurations or using the printer for scanning to email functions. WWAN
(C) stands for Wireless Wide Area Network, which is not typically relevant for a standard network printer
setup in a home or small office. Metered connection (D) is a Windows feature that helps reduce data usage
557. - (Topic 6)
A user is attempting to access a shared drive from a company-issued laptop while working from home. The
user is unable to access any files and notices a red X next to each shared drive. Which of the following
needs to be configured in order to restore the user's access to the shared drives?
A. IPv6
356
Certify For Sure with IT Exam Dumps
B. VPN
C. IPS
D. DNS
Answer: B
Explanation: When a user is unable to access shared drives from a company-issued laptop while working
✑ VPN (Virtual Private Network): A VPN allows secure access to the company’s network from a remote
location. Without a VPN connection, the user cannot access network resources such as shared drives.
✑ IPv6: Involves IP addressing and is not directly related to accessing shared drives.
✑ IPS (Intrusion Prevention System): Provides network security but does not facilitate access to shared
drives.
✑ DNS: Manages domain name resolution and is not typically the issue when specific shared drives are
inaccessible.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and
embedded devices.
558. - (Topic 6)
A company uses shared drives as part of a workforce collaboration process. To ensure the correct access
permissions, inheritance at the top-level folder is assigned to each department. A manager's team is
working on confidential material and wants to ensure only the immediate team can view a specific folder
and its subsequent files and subfolders. Which of the following actions should the technician most likely
take?
A. Turn off inheritance on the requested folder only and set the requested permissions to each file
manually.
B. Turn off inheritance at the top-level folder and remove all inherited permissions.
C. Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.
D. Turn off inheritance on the requested folder only, set the requested permissions, and then turn on
357
Certify For Sure with IT Exam Dumps
Answer: D
Explanation: Turning off inheritance on the specific folder requested by the manager and setting the
requested permissions, followed by turning on inheritance under the child folders, ensures that only the
immediate team has access to the confidential material while maintaining the broader permissions structure
for other folders and files. This action isolates the folder's permissions from the top-level inheritance,
559. - (Topic 6)
A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work
both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT
manager cautions that the new applications must not have a detrimental effect on company finances.
A. Device
B. Business
C. Network
D. Operation
Answer: B
Explanation: The IT manager's caution regarding the new applications not having a detrimental effect on
company finances points directly to concerns about the business impact. This encompasses potential costs
associated with upgrading legacy systems, compatibility issues that might arise from running new
applications on old infrastructure, and the risks of system downtime or reduced performance affecting
business operations. The focus here is on ensuring that the integration of new applications into the legacy
system does not incur unexpected expenses or disrupt critical business processes.
560. - (Topic 6)
A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that
File Explorer is open and data is being copied from the local drive to an unknown cloud storage location.
358
Certify For Sure with IT Exam Dumps
C. Educate the user about dangerous links.
Answer: D
Explanation:
When a user's cursor is moving on its own and unauthorized data transfer is occurring, the first step a
technician should take is to Quarantine the workstation. This involves isolating the affected system from the
network to prevent the spread of malware or unauthorized access to other parts of the network.
Quarantining helps in containing the threat and provides a safe environment to investigate and remediate
561. - (Topic 6)
A technician is implementing the latest application security updates for endpoints on an enterprise network.
Which of the following solutions should the technician use to ensure device security on the network while
Answer: A
Explanation: To ensure device security on the network while adhering to industry best practices, the
technician should:
✑ Automate the patching process: This ensures that all devices receive the latest security updates in a
✑ Monitor the firewall configuration: Important for network security but does not directly ensure all devices
are patched.
✑ Implement access control lists: Controls access to resources but does not ensure devices are patched.
✑ Document all changes: Important for change management but does not directly impact the patching
process.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.6: Given a scenario configure a workstation to meet
359
Certify For Sure with IT Exam Dumps
best practices for security.
562. - (Topic 6)
Employees at comptia.org are reporting getting an usual amount of emails from a coworker. A technician
A. Whaling
B. Insider threat
C. Phishing
D. Vishing
E. Evil twin
Answer: C
Explanation:
Phishing involves tricking individuals into disclosing sensitive information or installing malware through
deceptive emails.
✑ Phishing: General deceptive emails to trick users into compromising information or installing malware.
✑ Evil twin: A rogue Wi-Fi access point mimicking a legitimate one to intercept data.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.4: Explain common social engineering attacks,
563. - (Topic 6)
A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate
data on SSDs?
A. Degaussing
B. Shredding
360
Certify For Sure with IT Exam Dumps
C. Erasing
D. Drilling
Answer: B
Explanation: For securely disposing of SSDs, physical destruction methods like shredding are considered
most effective:
✑ Shredding: This method involves physically breaking the SSD into small pieces,
making data recovery practically impossible. It's a recommended practice for ensuring that sensitive data
564. - (Topic 6)
A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The
customer does not know the exact name of the file but can provide a partial file name. Which of the
A. cat
B. df
C. grep
D. ps
E. dig
F. find
G. top
Answer: C,F
Explanation:
To locate a missing file with only a partial name known, the best tools to use in a Linux environment would
✑ grep: This command is used to search the contents of files for a specific pattern.
While grep itself might not be the first choice for finding file names, it can be combined with other
✑ find: This command is used to search for files in a directory hierarchy based on
various criteria like name, size, modification date, etc. find can be used to search for files by partial name by
361
Certify For Sure with IT Exam Dumps
cat (A) is used to concatenate and display the content of files. df (B) displays the amount of disk space used
and available on filesystems. ps (D) shows information about active processes. dig (E) is used for querying
DNS name servers. top (G) displays Linux tasks and system performance information. None of these tools
565. - (Topic 6)
A user reports that an Android mobile device takes a long time to boot, and all applications crash when
launched. The user installed the applications from a third-party website. Which of the following steps should
Answer: A
Explanation: When an Android device experiences slow boot times and application crashes after installing
apps from a third-party website, scanning the system for malware is a critical first step. Third-party sources
can often host malicious software that can compromise device performance and security. A malware scan
can identify and remove such threats, potentially resolving the performance issues and application
instability. Clearing the web browser cache, enrolling the device in an MDM system, and confirming app
compatibility are useful steps but do not address the immediate concern of potential malware introduced by
566. - (Topic 6)
A network administrator is setting up the security for a SOHO wireless network. Which of the following
A. NAT
B. WPA3
C. 802.1X
D. Static IP
Answer: B
362
Certify For Sure with IT Exam Dumps
Explanation: To secure a SOHO wireless network, enabling WPA3 is the recommended option. WPA3
(Wi-Fi Protected Access 3) is the latest security certification program developed by the Wi-Fi Alliance to
secure wireless computer networks. It provides cutting- edge security protocols and cryptographic methods
to enhance and replace its predecessors, WPA2 and WPA, offering improved protection against brute-force
567. - (Topic 6)
A technician is installing a new copy of Windows on all computers in the enterprise Given the following
requirements:
• The install phase must be scripted to run over the network • Each computer requires a new SSD as the
Which of the following command-line tools should the technician use to install the drive and transfer the
A. net use
B. robocopy
C. winver
D. diskpart
E. sfc
F. r.etstat
G. ping
H. chkdsk
Answer: A,B,D
Explanation: For scripted network installations requiring new SSDs and keeping HDDs as backup, the
necessary tools are: 'net use' to connect to network shares, 'robocopy' to copy files efficiently from the
network share to the local drive, and 'diskpart' to manage disk partitions, including initializing and formatting
the new SSD. The other options are not relevant to the installation process as described.
568. - (Topic 6)
A technician, who is completing hardware upgrades at a company, is approached by a user who submitted
a computer upgrade request. After checking the list of offices to upgrade, the technician finds that the user's
363
Certify For Sure with IT Exam Dumps
office is not listed for an upgrade. Which of the following actions should the technician take next?
C. Tell the user that this request is not on the list to be upgraded.
D. Ask the user's supervisor if the technician should upgrade the computer.
Answer: B
Explanation: When a technician finds that a user's office is not listed for an upgrade but the user has
✑ Notify the project manager about the user's concern: The project manager oversees the upgrade
process and can address any discrepancies or omissions in the upgrade list.
✑ Ask the company's human resources department to address the issue: HR typically handles personnel
✑ Tell the user that this request is not on the list to be upgraded: This does not resolve the user's concern
✑ Ask the user's supervisor if the technician should upgrade the computer: The supervisor may not have
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 4.1: Given a scenario implement best practices
Best practices for handling user requests and project management documentation.
569. - (Topic 6)
A user submits a request to have a graphics application installed on a desktop When the technician
attempts to install the application, the installation fails and the error message "Not compatible with OS' is
displayed. Which of the following is the most likely reason for this error message?
Answer: C
364
Certify For Sure with IT Exam Dumps
Explanation: The most likely reason for an error message stating "Not compatible with OS" during a
software installation is that the installation requires administrative rights. Many software installations,
especially those that affect system files or install drivers, require administrative privileges to execute
correctly. Without these rights, the installer cannot make the necessary changes to the system, leading to
570. - (Topic 6)
A user reports that a device with a statically defined IP is unable to connect to the internet. The technician
runs the ipconfig /all command and sees the following output:
Which of the following is most likely the reason for the issue?
Answer: D
The issue with the subnet mask being set to 255.255.255.255 is that it specifies a single host subnet,
meaning the device cannot communicate with other devices on the network or access the internet. The
✑ Subnet mask of 255.255.255.0: This allows for communication within the same
✑ Default gateway 192.168.0.1: Correct, this is the typical address for the router.
✑ IPv4 Address 192.168.0.74: Correct, within the correct subnet range. Changing the subnet mask to
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario, install and configure basic
365
Certify For Sure with IT Exam Dumps
wired/wireless small office/home office (SOHO) networks.
571. - (Topic 6)
A customer, whose smartphone's screen was recently repaired, reports that the device has no internet
access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and
has no subnet mask. Which of the following should the technician check next?
B. Static IP settings
C. Airplane mode
D. Digitizer calibration
Answer: A
Explanation: Given that the smartphone's screen was recently repaired and now experiences issues with
Wi-Fi connectivity, despite showing that it is connected to a network, the problem could be related to the
internal antenna connections that might have been disturbed or disconnected during the repair process.
✑ Internal Antenna Connections: Smartphones use internal antennas for Wi-Fi and cellular connections. If
these antennas are not properly connected, the device may show as connected to a Wi-Fi network but fail
Checking static IP settings (B) would be relevant if the device were not obtaining an IP address at all, but
the device does have an IP address. Airplane mode (C) would prevent the device from connecting to Wi-Fi
networks entirely. Digitizer calibration (D) is related to the touchscreen functionality and would not affect
Wi-Fi connectivity.
572. - (Topic 6)
The camera and microphone on an iPhone user's device are activating without any user input. The user’s
friend recently modified the device to allow applications to be installed outside the normal App Store. Which
366
Certify For Sure with IT Exam Dumps
D. The iPhone has an out-of-date operating system.
Answer: C
Explanation:
The camera and microphone on an iPhone activating without user input, especially after allowing
applications to be installed outside the normal App Store, is a classic sign of the device being jailbroken.
Jailbreaking an iPhone removes many of the built-in security features and restrictions, allowing the
installation of apps from third-party sources. These third-party apps can be malicious and can gain
counterfeit cables can be harmful, they typically cause charging or connectivity issues rather than security
vulnerabilities that would enable camera and microphone activation without user input.
MDM removes organizational controls but does not directly cause unauthorized camera and microphone
activation.
vulnerabilities, but the scenario specifically mentions modifications to allow third- party app installations,
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 2.3: Security measures and their purposes
573. - (Topic 6)
A. WEP
B. WPA2
C. TKIP
D. AES
Answer: A
Explanation:
WEP (Wired Equivalent Privacy) is known to be the weakest wireless security protocol due to its
367
Certify For Sure with IT Exam Dumps
vulnerabilities and ease of being compromised.
✑ WEP: The oldest and weakest protocol, susceptible to various attacks and easily
cracked.
✑ WPA2: Much stronger security with AES encryption, currently one of the most secure standards.
✑ TKIP: Used with WPA, stronger than WEP but weaker than WPA2 with AES.
✑ AES: Advanced Encryption Standard, used in WPA2 and known for strong security.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.2: Compare and contrast wireless security
574. - (Topic 6)
Which of the following features can a technician use to ensure users are following password length
requirements?
A. Group Policy
B. Log-on script
C. Access controllist
D. Security groups
Answer: A
Explanation: Group Policy is a feature in Windows that allows network administrators to manage and
configure operating system, application settings, and user settings in an Active Directory environment. It
can enforce password policies across the network, including password length requirements, making it the
575. - (Topic 6)
A technician wants to improve password security after several users admitted to using very simple
passwords. Which of the following is the best way to resolve this issue?
Answer: A
368
Certify For Sure with IT Exam Dumps
Explanation: Improving password security is crucial to protect user accounts from unauthorized access.
Requiring passwords to include four character types—uppercase letters, lowercase letters, numbers, and
passwords much harder to guess or crack using common methods like brute force attacks, thereby
✑ Requiring four character types: This approach forces users to create more complex and less predictable
passwords, reducing the risk of simple passwords that are easy to exploit.
Decreasing the password expiration times (B) can encourage users to change their passwords more
frequently but does not directly address the issue of password complexity. Enabling an automatic lock timer
(C) can add a layer of security by locking accounts after a period of inactivity, but it does not improve the
strength of the passwords themselves. Adding two characters to the minimum password length (D) can
help to some extent by making passwords longer, but without requiring a mix of character types, passwords
576. - (Topic 6)
An application is not performing well and will occasionally shut down with no error provided. Which of the
following Task Manager tabs should be used to troubleshoot the application while it is active?
A. Users
B. Services
C. Performance
D. Startup
Answer: C
Explanation:
When troubleshooting an application that is not performing well and occasionally shuts down with no error,
the "Performance" tab in Task Manager is the most appropriate tool to use. This tab provides real-time data
on CPU, memory, disk, and network usage, which can help identify resource bottlenecks or spikes that
could be causing the application to malfunction. Monitoring these metrics while the application is running
can offer insights into whether the issue is related to system resources.
✑ A. Users tab shows which users are currently logged into the system and their
resource usage but does not provide detailed performance metrics for troubleshooting application issues.
369
Certify For Sure with IT Exam Dumps
✑ B. Services tab shows the status of background services but does not provide direct information about
✑ D. Startup tab manages which applications start with Windows and their impact on startup time but is not
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.3: Using features and tools of the Microsoft
577. - (Topic 6)
A user received an alert from a Windows computer indicating low storage space. Which of the following will
Answer: B
Explanation: To resolve an issue of low storage space on a Windows computer, the best approach is to
Run Disk Cleanup (B). Disk Cleanup is a built-in utility that helps users free up space on their hard drives by
deleting temporary files, system files, and other unnecessary files that are no longer needed, thereby
578. - (Topic 6)
A technician needs to import a new digital certificate and place it in the proper location. Which of the
following Control Panel utilities should the technician use to import the certificate?
A. Internet Options
C. Credential Manager
Answer: A
370
Certify For Sure with IT Exam Dumps
Explanation:
To import a new digital certificate and place it in the proper location, the technician should use the "Internet
Options" utility in the Control Panel. This utility allows users to manage various settings related to internet
connections and security, including the import and management of digital certificates under the "Content"
tab.
✑ B. Network and Sharing Center is used for managing network connections and sharing settings but not
✑ C. Credential Manager is used to store and manage login credentials for websites and applications but
✑ D. Security and Maintenance provides an overview of the security and maintenance status of the system
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.4: Using Control Panel utilities including
579. - (Topic 6)
A user with a disability needs to be able to press the Ctrl+Alt+Del keyboard sequence one key at a time.
Answer: A
Explanation: The Ease of Access feature in Windows that allows a user to press keyboard shortcuts one
key at a time is called "Sticky Keys." Sticky Keys is designed to assist users with disabilities who have
✑ Press the Shift key five times in a row: This is the quickest method to activate Sticky Keys. When you
press the Shift key five times, a dialog box appears, asking if you want to turn on Sticky Keys. This method
✑ Confirmation dialog: A confirmation dialog will appear asking if you want to turn on Sticky Keys. Click
371
Certify For Sure with IT Exam Dumps
"Yes" to enable it.
✑ Control Panel or Settings: Alternatively, you can enable Sticky Keys through the Control Panel or the
Settings app. Go to "Ease of Access" settings, find the "Keyboard" section, and turn on Sticky Keys from
there.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.4: Given a scenario, use the appropriate Microsoft
580. - (Topic 6)
A technician is configuring security for a computer that is located in a common area. A sign above the
computer indicates only authorized users can use the computer. Guests visiting the office must walk past
the computer to enter and leave the office. Which of the following will offer the best protection against
physical threats?
Answer: D
Explanation: The best protection against physical threats, especially in a common area where the computer
✑ Option A: Using screen lockScreen locks are good for securing access temporarily but do not protect
✑ Option B: Installing a privacy screenPrivacy screens prevent visual access but do not secure the
hardware.
✑ Option C: Implementing password complexityPassword complexity helps secure digital access but does
✑ Option D: Locking the computer casePhysically securing the case prevents unauthorized individuals
372
Certify For Sure with IT Exam Dumps
✑ Option E: Enabling drive encryptionEncryption protects data but does not prevent physical access to the
hardware itself.
References:
✑ CompTIA A+ 220-1102 Objective 2.1 (Physical security), particularly physical security measures like
581. - (Topic 6)
A customer service representative is unable to send jobs to a printer at a remote branch office. However,
the representative can print successfully to a local network printer. Which of the following commands
should a technician use to view the path of the network traffic from the PC?
A. netstat
B. ping
C. format
D. tracert
Answer: D
Explanation: The "tracert" command is used to view the path that network traffic takes from a PC to a
specified destination. It is helpful in identifying where along the path the traffic may be failing or
experiencing delays. In the scenario where a customer service representative can't send jobs to a remote
printer but can print locally, "tracert" can help diagnose if there's a network routing issue affecting the
582. - (Topic 6)
A user's computer is running slower than usual and takes a long time to start up. Which of the following
A. Action Center
B. Task Manager
C. Resource Monitor
E. Event Viewer
Answer: B
373
Certify For Sure with IT Exam Dumps
Explanation: When a computer is running slower than usual and experiences long startup times, the first
✑ Task Manager: This utility provides real-time data on the processes and applications consuming system
resources like CPU, memory, and disk usage. By identifying resource-heavy processes, a technician can
583. - (Topic 6)
A systems administrator needs to access a hypervisor that went offline. After doing a port scan, the
administrator notices that company policy is blocking the RDP default port. Which of the following ports
A. 22
B. 23
C. 80
D. 3090
Answer: A
Explanation: When a systems administrator needs to access a hypervisor and the default RDP port (3389)
is blocked by company policy, the administrator can use an alternative method. One common alternative is
using SSH:
✑ Port 22: This is the default port for SSH (Secure Shell), which is commonly used for secure remote
✑ Port 23: This is the default port for Telnet, which is an unsecured protocol and generally not
✑ Port 80: This is the default port for HTTP, used for web traffic, not remote access.
✑ Port 3090: This is not a standard port for remote access protocols.
Using SSH (port 22) is a secure and widely accepted method for remote management of servers and
hypervisors.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.6: Compare and contrast network services and
protocols.
374
Certify For Sure with IT Exam Dumps
584. - (Topic 6)
A technician needs to implement a system to handle both authentication and authorization Which of the
A. WPA3
B. MFA
C. TACACS+
D. RADIUS
Answer: C
Explanation: To implement a system that handles both authentication and authorization, TACACS+
(Terminal Access Controller Access-Control System Plus) is the best option. TACACS+ is a security
protocol that provides centralized Authentication, Authorization, and Accounting (AAA) services for
networked access control, meeting the requirement for both authentication and authorization management.
585. - (Topic 6)
A user is unable to start a computer following a failed Windows 10 update. When trying to start the
computer, the user sees a blue screen of death. Which of the following steps should a technician take to
Answer: A
Explanation: Booting in safe mode is the initial step to diagnose a computer experiencing a blue screen of
death (BSOD) following a failed Windows 10 update. Safe mode starts the computer with a minimal set of
drivers and services, allowing troubleshooting and identification of the problematic software or driver
causing the BSOD. This mode provides a safer environment to uninstall recent updates or drivers, perform
system scans, and restore the system if necessary. Other options like System Restore wizard, last
known-good configuration, and resetting BIOS settings may be subsequent steps but do not directly
375
Certify For Sure with IT Exam Dumps
You have been contacted through the help desk chat application. A user is setting up a replacement SOHO
INSTRUCTIONS
Select the most appropriate statement for each response. Click the send button after each response to
continue the chat. If at any time you would like to bring back
the initial state of the simulation, please click the Reset All button.
Answer:
Explanation:
376
Certify For Sure with IT Exam Dumps
587. - (Topic 6)
Which of the following is used to generate passcodes necessary to access applications or systems that
A. Authenticator application
C. Biometrics
Answer: A
time-sensitive passcodes used in two-factor authentication (2FA) processes. These passcodes are used in
conjunction with traditional credentials (like usernames and passwords) to grant access to systems or
applications. This extra layer of security ensures that even if primary login credentials are compromised,
unauthorized access is still prevented without the dynamically generated code from the authenticator app.
588. - (Topic 6)
A user reports that a new, personally owned tablet will not connect to the corporate Wi-Fi network. The user
is able to connect to the Wi-Fi network with other devices, and the tablet is running the latest software.
C. Outdated drivers
Answer: B
Explanation: When a user reports that a new, personally owned tablet will not connect to the corporate
Wi-Fi network, but other devices can connect, and the tablet is running the latest software, the most likely
377
Certify For Sure with IT Exam Dumps
cause of the issue is a blocked MAC address. Here’s why:
✑ MAC Filtering: Many corporate networks implement MAC address filtering as a security measure. This
involves only allowing devices with specific MAC addresses to connect to the network. If the MAC address
of the new tablet is not on the allowed list, it will be blocked from connecting.
✑ Check Network Settings: To troubleshoot this, the network administrator can check the network's MAC
✑ Add MAC Address: If the MAC address is blocked, adding the tablet's MAC address to the allowed list
Other options like incorrect encryption settings or outdated drivers are less likely because the user can
connect with other devices and the tablet is running the latest software. Disabled location services do not
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.6: Given a scenario configure basic mobile device
589. - (Topic 6)
A technician is configuring a SOHO router and wants to only allow specific computers on the network.
B. Disable DHCP.
Answer: A
Explanation:
For a SOHO (Small Office/Home Office) router setup where the goal is to only allow specific computers on
✑ Configure MAC filtering: This security measure involves creating a list of allowed device MAC (Media
Access Control) addresses in the router's settings. Only devices with MAC addresses on this list will be
able to connect to the network, effectively restricting access to authorized computers only.
378
Certify For Sure with IT Exam Dumps
590. - (Topic 6)
An organization's critical database files were attacked with ransomware. The company refuses to pay the
ransom for a decryption key. All traces of the infection have been removed from the underlying servers.
A. Scan all of the infected files with up-to-date, anti-malware cleaning software.
Answer: D
Explanation: When an organization refuses to pay the ransom for a decryption key after a ransomware
attack, and all traces of the infection have been removed, the next critical step is:
✑ Restore critical data from backup: This is the most effective way to recover from a ransomware attack
without paying the ransom. Assuming the organization has good backup practices, the backups should be
free from infection and can be restored to get the systems operational again.
✑ Scan all of the infected files with up-to-date, anti-malware cleaning software: This step is important
during the infection removal process but does not address restoring the encrypted files.
✑ Fully patch the server operating systems hosting the fileshares: While this is necessary to prevent future
✑ Change the files to be read-only: This will not help recover the encrypted data.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario use common data destruction and
disposal methods.
591. - (Topic 6)
•Applications
•User profiles
379
Certify For Sure with IT Exam Dumps
•System settings
Which of the following backup methods can the administrator use to ensure the workstation is properly
backed up?
A. Differential
B. Image
C. Synthetic
D. Archive
Answer: B
Explanation: An image backup captures a complete snapshot of the entire system at a specific point in time,
including the operating system, installed applications, user profiles, and system settings. This method is
most suitable for backing up the components listed in the question because it ensures that every aspect of
the workstation, from the core OS to individual user settings, is preserved and can be restored in its entirety.
This is crucial for quickly recovering a system to a fully operational state after a failure or when migrating to
new hardware. Other methods like differential, synthetic, and archive backups do not provide the
comprehensive one-step restoration capability that an image backup offers for the complete system
recovery.
592. - (Topic 6)
While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning
Which of the following steps should a technician take next? (Select two).
Answer: A
Explanation: When encountering a warning about antivirus protection malfunctioning, the first step should
be to isolate the computer from the network to prevent potential spread of malware. Updating the endpoint
protection software is also crucial to ensure the latest virus definitions and security features are in place to
380
Certify For Sure with IT Exam Dumps
effectively identify and remove the threat.
593. - (Topic 6)
A technician needs to recommend a way to keep company devices for field and home- based staff up to
date. The users live in various places across the country and the company has several national offices that
staff can go to for technical support Which of the following methods is most appropriate for the users?
A. Make office attendance mandatory for one day per week so that updates can be installed.
B. Ask users to ensure that they run updates on devices and reboot computers on a regular basis.
C. Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.
Answer: D
Explanation:
For a company with geographically dispersed staff and the need to keep devices updated, using
cloud-based endpoint management software is the most efficient method. This type of software allows IT
administrators to remotely manage and push updates to company devices, regardless of their location. It
ensures that all devices remain up to date with the latest security patches and software updates without
requiring physical access or user intervention. This approach is scalable, reduces the risk of unpatched
vulnerabilities, and is convenient for both the IT department and the end-users.
594. - (Topic 6)
A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on
A technician from work confirms that the static IP that was set up on the machine was changed back to
A. HTTPS
B. VLAN
C. DNS
D. SMTP
Answer: C
381
Certify For Sure with IT Exam Dumps
Explanation: The error "This site cannot be reached" often indicates a problem with DNS (Domain Name
System) resolution, where the browser is unable to translate a website's domain name into its
corresponding IP address. Since the laptop was set to use DHCP (Dynamic Host Configuration Protocol) at
home, it's possible that it's not receiving the correct DNS server information from the home network, or the
DNS servers it was using at work are not accessible from the home network.
✑ DNS: Checking and possibly correcting the DNS settings to ensure they are appropriate for the home
network might resolve the browsing issue. The user can try using public DNS servers like those provided by
Google (8.8.8.8 and 8.8.4.4) or Cloudflare (1.1.1.1) if the default DNS servers provided by the home ISP
HTTPS (A) is a protocol for secure communication over a computer network but is not something that
needs to be configured on the user's end to solve this type of issue. VLAN (B) stands for Virtual Local Area
Network and is more related to network segmentation and management within larger networks, not typically
applicable to home internet issues. SMTP (D) stands for Simple Mail Transfer Protocol, which is used for
595. - (Topic 6)
A technician needs to configure a computer for a user to work from home so the user can still securely
access the user's shared files and corporate email. Which of the following tools would best accomplish this
task?
A. MSRA
B. FTP
C. RMM
D. VPN
Answer: D
Explanation:
To securely access shared files and corporate email from home, the best tool to use is a Virtual Private
✑ VPN (Virtual Private Network): A VPN creates a secure connection over the internet, allowing the user to
access the corporate network as if they were on-site. It encrypts the data transmitted between the user's
382
Certify For Sure with IT Exam Dumps
✑ MSRA (Microsoft Remote Assistance): Used for remote support but not for accessing shared files and
emails securely.
✑ FTP (File Transfer Protocol): Used for transferring files but does not provide secure access to a
✑ RMM (Remote Monitoring and Management): Used by IT professionals to manage client systems
remotely but not for user access to shared files and emails.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.9: Given a scenario configure appropriate security
596. - (Topic 6)
A user's workstation was infected with a newly discovered virus that the AV system detected. After a full
virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions
Answer: B
Explanation:
Using bootable antivirus media to scan the system is an effective method for removing a persistent virus.
Booting from external antivirus media allows the system to scan for and remove malware without the
infected operating system running, which can prevent the virus from hiding or resisting removal efforts that
597. - (Topic 6)
Users report that they can log in to the web application during business hours, but none of the application's
functions are working properly. Company policy does not allow for the server to be rebooted during
business hours. Which of the following should a technician do to fix the web application and follow company
383
Certify For Sure with IT Exam Dumps
policy?
A. Restart services.
Answer: A
Explanation: Restarting services can resolve issues with web applications without requiring a full server
✑ Restart services: Likely to resolve issues with the web application by refreshing the necessary services.
✑ Roll back Windows updates: Unnecessary if the issue is with the application services.
✑ Perform a Windows repair: More disruptive and not typically needed for application service issues.
✑ Add RAM to the server: Would require a reboot and is not immediately necessary for troubleshooting
application issues.
Reference: CompTIA A+ Exam Objectives [220-1102] - 3.1: Given a scenario, troubleshoot common
Windows OS problems.
598. - (Topic 6)
A network administrator wants to enforce a company's security policy that prohibits USB drives on user
workstations. Which of the following commands should the administrator run on the users' workstations?
A. diskpart
B. chown
C. gpupdate
D. netstat
Answer: C
Explanation: To enforce a security policy that prohibits USB drives on user workstations, the network
administrator should run the gpupdate (C) command. This command forces a Group Policy update, which
can include policies to disable USB drives. Group Policy is a feature in Microsoft Windows that allows for
centralized management and configuration of operating systems, applications, and users' settings in an
384
Certify For Sure with IT Exam Dumps
599. - (Topic 6)
Employees want their Windows 10 laptops to wirelessly connect when they take them home. Which of the
following should the employees configure so the laptops can automatically connect wirelessly?
D. Personalization settings
Answer: A
Explanation: To ensure that Windows 10 laptops can automatically connect to Wi-Fi networks when
✑ Network and Internet settings: These settings allow users to manage Wi-Fi connections, configure
✑ uk.co.certification.simulator.questionpool.PList@1a499550
✑ Windows Firewall settings: These are used to manage firewall rules and do not control Wi-Fi
connectivity.
✑ Devices and Printers: Used for managing connected devices and printers, not for network connections.
✑ Personalization settings: These settings are for customizing the appearance of the Windows interface
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.6: Given a scenario configure Microsoft Windows
600. - (Topic 6)
A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The
technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following
A. Wireless protocol
B. DHCP pool
C. Content filtering
385
Certify For Sure with IT Exam Dumps
D. Firewall
Answer: D
Explanation: When a technician is unable to connect to a laptop over a VPN, one of the most common
reasons is that the firewall settings on either the laptop or the network are blocking the connection.
✑ Content filtering: Typically involves filtering web content, not affecting direct connections.
✑ Firewall: The correct setting to review, as it may block the necessary ports or services required for
remote access.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.3: Given a scenario, troubleshoot common wired
601. - (Topic 6)
A web developer installs and launches a new external web server. Immediately following the launch, the
performance of all traffic traversing the firewall degrades substantially. Which of the following
A. OS compatibility
B. Quality of service
D. Storage requirements
Answer: B
Explanation: The performance degradation following the launch of a new external web server suggests that
Quality of Service (QoS) considerations were overlooked. QoS settings help prioritize traffic to ensure that
critical services like web servers receive the bandwidth they need without negatively impacting the overall
network performance. Without proper QoS configuration, the new server's traffic could overwhelm the
602. - (Topic 6)
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the
386
Certify For Sure with IT Exam Dumps
A. Valid license
D. Chain of custody
Answer: D
Explanation:
In forensic investigations, maintaining the integrity of the evidence is crucial. The chain of custody is a
process that ensures that evidence has been collected, preserved, and transferred in a manner that is
legally defensible.
✑ Data retention requirements: Policies for how long data should be kept, but not specifically related to
✑ Material safety data sheet: Documentation for handling hazardous materials, not applicable here.
✑ Chain of custody: The correct process for documenting the handling and transfer of evidence to maintain
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.7: Given a scenario, use proper communication
603. - (Topic 6)
Which of the following documents in criminal proceedings must be updated every time a piece of evidence
A. Licensing agreement
B. Regulatory compliance
C. Incident documentation
D. Chain of custody
Answer: D
Explanation: In criminal proceedings, maintaining the integrity of evidence is crucial. The document that
✑ Chain of custody: This document tracks the history of the evidence, detailing every person who has
handled it and every transfer that has occurred. It ensures that the evidence has not been tampered with
387
Certify For Sure with IT Exam Dumps
and maintains its validity in court.
✑ Licensing agreement: Pertains to software usage rights and has no relation to evidence handling.
✑ Regulatory compliance: Refers to adherence to laws and regulations, not evidence tracking.
✑ Incident documentation: Details the incident but does not specifically track evidence handling.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 4.6: Explain the importance of prohibited content/activity
604. - (Topic 6)
•The default home page of the web browser has changed to a suspicious search engine.
B. Uninstall the suspicious search engine and reset the home page.
Answer: A
Explanation: When a user reports slow performance, a changed home page, and pop-up ads, these are
✑ Update the antivirus program and run a full system scan: This helps identify and
remove any malware present on the system, addressing the root cause of the issues.
✑ Uninstall the suspicious search engine and reset the home page: This addresses
the symptom but not the underlying cause, which is likely malware.
✑ Install the latest updates for the operating system: Important for security but secondary to removing
malware.
✑ Block the pop-up ads using the web browser settings: Again, addresses the symptom but not the root
cause.
388
Certify For Sure with IT Exam Dumps
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 3.3: Given a scenario use best practice procedures for
malware removal.
605. - (Topic 6)
A technician is setting up a printer on a Linux workstation. Which of the following commands should the
A. ipr
B. Ispool
C. Ipstat
D. Ipoptions
Answer: A
Explanation: In Linux, the lp command is used to manage print jobs, including setting the default printer.
The lp command allows users to send print jobs to a printer queue, check the status of print jobs, and
cancel print jobs, among other functionalities. By using options and parameters with the lp command, a
technician can specify a particular printer as the default for future print jobs, ensuring that documents are
606. - (Topic 6)
A user is unable to access the company’s internal network on a separate subnet. A help desk technician
verifies the user's credentials, and the user has the appropriate permissions to access the network. The
technician checks the network and finds the connection is stable. No other users are having this issue.
A. Consult with the firewall team to see If the user's IP address Is blocked.
Answer: A
Explanation: In this scenario, the user cannot access a separate subnet, and all other checks (credentials,
389
Certify For Sure with IT Exam Dumps
network stability, and permissions) have been verified. The next logical step is to check if the user's IP
✑ Option A: Consult with the firewall team to see if the user's IP address is blockedFirewalls can block
specific IP addresses, preventing access to certain network segments. Given the problem's nature and the
steps already taken, this is the most logical next step to ensure the user's IP is not inadvertently blocked.
✑ Option B: Delete the user’s credentials and create new onesThis step is unnecessary since the
✑ Option C: Run a virus scan on the user's workstationWhile important for overall security, a virus scan is
unlikely to resolve an issue specific to accessing a subnet if the problem does not affect other users.
✑ Option D: Update the network drivers on the user’s workstationIf the network connection is stable and
the issue is isolated to accessing a specific subnet, network drivers are unlikely to be the cause.
References:
607. - (Topic 6)
A technician is troubleshooting a smartphone that is unable to download and install the latest OS update.
The technician notices the device operates more slowly than expected, even after rebooting and closing all
A. Application permissions
Answer: B
Explanation: When a smartphone is unable to download and install the latest OS update and is operating
slower than expected, one of the first things to check is the available storage space. Operating system
updates often require a significant amount of free space for downloading and installing, and insufficient
✑ Available Storage Space: Smartphones use their internal storage to hold the OS, apps, user data, and
temporary files needed for updates. If the storage is nearly full, the device can slow down due to the lack of
space for writing temporary files and may not have enough space to download and install updates. Clearing
390
Certify For Sure with IT Exam Dumps
up space can resolve these issues.
Checking application permissions (A) might be relevant for specific app-related issues but is less likely to
affect OS updates. The battery charge level (C) can affect the initiation of an update, as some devices
require a minimum charge level to start the update process, but it doesn't typically cause slow operation.
While a stable Wi-Fi connection (D) is necessary for downloading updates, it's less likely to be the cause of
608. - (Topic 6)
A customer wants to make sure the data is protected and secure on a Windows laptop's hard drive. Which
A. Windows Backup
B. BitLocker
C. Shadow Copy
D. Trusted PlatformModule
Answer: B
Explanation: BitLocker is a full-disk encryption feature included with Windows Vista and later. It is designed
to protect data by providing encryption for entire volumes. By encrypting the hard drive, BitLocker prevents
unauthorized access to the data stored on the drive, securing it in case the laptop is lost or stolen. BitLocker
is preferable over options like Windows Backup (which is for data recovery, not encryption), Shadow Copy
(used for backup and does not encrypt data), and Trusted Platform Module (TPM, which is a hardware
609. - (Topic 6)
Users report that a network printer intermittently goes offline during the day. Which of the following
commands should the technician use to confirm whether the printer has connectivity issues?
A. ping
B. netstat
C. net
D. nslookup
Answer: A
391
Certify For Sure with IT Exam Dumps
Explanation:
To confirm whether a network printer has connectivity issues, the technician should use:
✑ ping: This command checks the connectivity to the printer by sending packets and measuring the
✑ netstat: Provides statistics and current network connections but does not directly confirm connectivity to
a specific device.
✑ net: Used for network resources management but not specifically for checking connectivity.
✑ nslookup: Used for querying DNS to obtain domain name or IP address mapping, not for checking
connectivity.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.8: Given a scenario, use networking tools.
610. - (Topic 6)
A. top
B. apt-get
C. Is
D. cat
Answer: A
Explanation: The 'top' command in Linux is used to display the running processes along with information
about system resources like CPU and memory usage. It provides a real- time view of the system's resource
consumption, making it an essential tool for monitoring and managing system performance.
611. - (Topic 6)
An organization wants to deploy a customizable operating system. Which of the following should the
organization choose?
A. Windows 10
B. macOS
C. Linux
392
Certify For Sure with IT Exam Dumps
D. Chrome OS
E. iOS
Answer: C
Explanation: Linux is known for its high degree of customizability and flexibility, making it an ideal choice for
organizations looking to deploy a customizable operating system. Unlike proprietary operating systems,
Linux allows users to modify or replace almost any part of the system, from the kernel to the desktop
✑ Linux: This open-source operating system provides access to the source code, enabling extensive
customization. Organizations can tailor Linux distributions to fit specific requirements, making it a popular
Windows 10 (A) and macOS (B) offer some level of customization but are more restricted due to their
proprietary nature. Chrome OS (D) is designed for simplicity and security, focusing on web applications,
which limits deep system-level customizations. iOS (E) is designed for Apple's mobile devices and is not
applicable for organizational deployment beyond mobile and tablet devices; it also offers limited
612. - (Topic 6)
A technician is an administrator on a messaging application for a private work group of mixed departments.
One of the technician’s colleagues discloses to the group that their employer recently suffered a major
security breach and shared details about the breach to the group Which of the following should the
technician do first7
A. Ignore the messages as all of the group members work for the same employer.
B. Remove the colleague from the group and ask members to delete the messages.
C. Message the colleague privately and ask the colleague to delete the messages immediately.
D. Contact the supervisor and report the colleague with screen shots of the messages
Answer: D
Explanation:
In the case of a security breach disclosure, it's crucial to follow proper protocol to handle sensitive
information responsibly:
✑ Ignore the messages: Not appropriate as it disregards the potential impact and severity of the breach.
393
Certify For Sure with IT Exam Dumps
✑ Remove the colleague and ask members to delete the messages: While it might limit the spread of the
✑ Message the colleague privately: Might help in immediate removal of messages but does not follow the
✑ Contact the supervisor: The correct action, as it ensures that the incident is handled by higher authorities
who can take appropriate measures. Reporting with screenshots ensures that there is evidence of the
disclosure.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.7: Given a scenario, use proper communication
613. - (Topic 6)
A customer recently upgraded their computer to the latest Windows version and is now having issues with
the display. The icons and text are too large, and the colors are not accurate. Which of the following Control
A. Ease of Access
B. Device Manager
Answer: B
Explanation: When a customer experiences display issues such as large icons and inaccurate colors after a
Windows upgrade, the most appropriate Control Panel option to address these issues is "Device Manager."
The technician can use Device Manager to check and update display drivers, which are often the cause of
such problems after an OS upgrade. Updating or reinstalling the correct drivers can help resolve display
✑ A. Ease of Access focuses on accessibility features and does not directly address display driver issues.
✑ C. Network and Sharing Center is related to network settings and does not affect display settings.
✑ D. Programs and Features is used for managing installed programs and features but is not relevant for
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 1.3: Using features and tools of the Microsoft
394
Certify For Sure with IT Exam Dumps
Windows OS, including Device Manager for managing hardware drivers.
614. - (Topic 6)
A user is unable to see transaction details on a website, and nothing happens when the user clicks the
details button. Which of the following should the user do to fix this issue?
Answer: B
Explanation:
Pop-up blockers can sometimes prevent essential pop-up windows required by websites to display
transaction details.
✑ Clear the browser cache: Helps with loading issues but not specific to pop-ups.
✑ Disable the pop-up blocker: The correct solution, as it allows the blocked pop-up to be displayed.
✑ Configure private browsing: Prevents storing browsing data but does not affect pop-ups.
✑ Verify valid certificates: Ensures secure connections but does not resolve pop-up issues.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.10: Given a scenario, install and configure
615. - (Topic 6)
A technician wants to update the local security policies on a Windows machine but is unable to launch the
B. The user did not sign the end user license agreement.
Answer: A
Explanation: The inability to launch the expected security policy snap-in is likely because the computer is
running Windows Home edition, which does not include the Group Policy Editor or certain other
395
Certify For Sure with IT Exam Dumps
administrative tools available in Professional, Enterprise, and Education editions. The Home edition is
designed for general consumer use and lacks some of the advanced security and management features
616. - (Topic 6)
An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about
the possibility of a breach of private data. Which of the following is the best way for a technician to protect
B. Remote access
C. Remote encrypt
Answer: B
Explanation: When a smartphone is lost, especially one that might contain sensitive or private data, the
primary concern is to ensure that any data on the device cannot be accessed by unauthorized persons.
✑ Remote lock: This option will lock the device remotely, preventing access.
However, it does not remove the data and might not be effective if the device is powered off or reset.
✑ Remote wipe: This is the best option as it allows the technician to erase all data from the device remotely,
ensuring that sensitive information is not accessible to anyone who finds or steals the device.
✑ Remote access: This option would allow a technician to access the device remotely, but it would not
✑ Remote encrypt: Encrypting the device remotely might not be possible if the device is not accessible or
turned on, and it does not remove existing data which could be at risk.
Reference: CompTIA A+ Exam Objectives [220-1102] - 3.4: Given a scenario, use best practices to secure
a mobile device.
617. - (Topic 6)
A technician needs to strengthen security controls against brute-force attacks. Which of the following
A. Multifactor authentication
396
Certify For Sure with IT Exam Dumps
B. Encryption
Answer: A
Explanation: Multifactor authentication (MFA) significantly enhances security by requiring two or more
forms of verification before granting access to an account or system. This method is highly effective against
brute-force attacks, where attackers attempt to guess a user's password through repeated trials. By
implementing MFA, even if a password is compromised, unauthorized access is still prevented without the
additional authentication factor(s), such as a code from a smartphone app, a fingerprint, or a physical
security token.
✑ Multifactor authentication: Provides an additional layer of security beyond just the password, making it
much harder for attackers to gain unauthorized access through brute-force methods, as they would need to
Encryption (B) is crucial for protecting data at rest and in transit, but it does not directly prevent brute-force
login attempts. Increased password complexity (C) can deter brute- force attacks by making passwords
harder to guess, but it is not as effective as MFA in preventing access when passwords are compromised.
A secure password vault (D) helps users manage and store their passwords securely, which can indirectly
contribute to security by allowing users to keep more complex passwords, but it does not directly prevent
618. - (Topic 6)
A technician is adding some Windows 10 workstations to the corporate domain. A script was able to add
the majority of the workstations, but failed on a couple. Which of the following menus should the technician
A. User Accounts
B. System Properties
C. Windows Firewall
Answer: B
Explanation:
397
Certify For Sure with IT Exam Dumps
To manually add a workstation to a domain, the technician needs to access the System Properties menu
✑ User Accounts: Manages user accounts but does not handle domain membership.
✑ System Properties: The correct place to add or change domain membership settings.
✑ Network and Sharing: Manages network connections and sharing but not domain settings.
Reference: CompTIA A+ Exam Objectives [220-1102] - 1.6: Given a scenario, configure Microsoft Windows
619. - (Topic 6)
A technician needs to update the software on several hundred Mac laptops. Which of the following is the
A. SSH
B. MDM
C. RDP
D. SFTP
Answer: B
Explanation: For updating software on several hundred Mac laptops, the best method is Mobile Device
Management (MDM). MDM solutions allow administrators to remotely manage and update software across
multiple devices efficiently, making it an ideal choice for handling software updates on a large scale.
620. - (Topic 6)
After a user upgraded the Windows operating system to the latest feature release, the user notices that one
of the legacy applications that was running correctly before the upgrade does not open some windows and
is only partially functional. Which of the following actions should the user take to troubleshoot the issue?
Answer: A
398
Certify For Sure with IT Exam Dumps
Explanation: When a legacy application is not fully functional after upgrading the Windows operating
✑ Run the application as Administrator: Legacy applications often require administrative privileges to run
correctly. Running the application with these privileges can resolve issues related to permissions and
✑ Raise the User Account Control level: This increases security prompts but does not resolve compatibility
issues.
✑ Turn off Windows Defender Firewall: This can expose the system to security risks and is unlikely to
✑ Disable compatibility mode for the application: Compatibility mode should generally be enabled for
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.3: Given a scenario use features and tools of the
621. - (Topic 6)
Which of the following environmental controls is most important to maintain the safety of a data center?
A. Temperature control
B. Humidity control
D. Power managementcontrol
Answer: A
Explanation: The most important environmental control to maintain the safety of a data center is
Temperature control (A). Proper temperature control is crucial to prevent overheating, which can lead to
hardware failure, reduced performance, and shortened equipment lifespan. Data centers house
high-density computing equipment that generates significant amounts of heat, making effective
622. - (Topic 6)
399
Certify For Sure with IT Exam Dumps
A technician is assisting a customer who is having difficulty accessing the company’s website. Which of the
Answer: D
Explanation:
When a customer is having difficulty accessing the company’s website, the technician should first
document the issue in the company’s ticketing system. This step ensures that the problem is officially
logged, which allows for proper tracking, prioritization, and assignment to the appropriate personnel if
needed. Recording the details helps in maintaining a record of the issue and the troubleshooting steps
✑ A. Ask the customer for their log-in credentials. This is not appropriate as it breaches security protocols
✑ B. Check the company's internal knowledge base for solutions. While useful, this step comes after the
✑ C. Refer the customer to a more experienced technician. This might be necessary later, but initially, the
References:
✑ CompTIA A+ Core 2 (220-1102) Exam Objectives, Section 4.1: Documentation and support systems,
623. - (Topic 6)
A technician wants to harden Windows workstations after a recent security audit indicated the company is
vulnerable to brute-force attacks. Which of the following features should the technician implement to
400
Certify For Sure with IT Exam Dumps
D. Data-at-rest encryption
Answer: B
Explanation: To mitigate brute-force attacks, implementing a failed log-in lockout feature is effective. This
security measure temporarily disables user accounts after a specified number of unsuccessful login
attempts, preventing attackers from continuously trying different password combinations to gain
unauthorized access.
624. - (Topic 6)
When a user attempts to open an email using a company-issued smartphone, the user receives a message
stating the email is encrypted and cannot be opened. The user forwards the email to a personal account
and receives the same message. The user then contacts the IT department for assistance. The technician
instructs the user to contact the sender to exchange information in order to decode the message. Which of
A. Keys
B. Token
C. Password
D. RootCA
Answer: A
Explanation:
When an email is encrypted and the recipient cannot open it, the issue typically revolves around the need
for encryption keys. Encryption keys are used to encode and decode the email content, ensuring that only
authorized recipients with the correct key can access the information. In this scenario, the user would need
to receive the appropriate decryption key from the sender to unlock and read the encrypted email. This
exchange ensures that sensitive information remains secure during transmission and is only accessible to
intended recipients.
625. - (Topic 6)
A technician has been unable to remediate a persistent malware infection on a user's workstation. After the
technician reinstalled the OS. the malware infection returned later that day. Which of the following is the
401
Certify For Sure with IT Exam Dumps
A. Trojan
C. Spyware
D. Rootkit
Answer: B
Explanation: A boot sector virus infects the master boot record (MBR) of a hard drive, the sector that
contains information required to start the operating system after the computer is turned on. This type of
virus is particularly insidious because it loads into memory immediately upon booting and before most
antivirus programs start. This makes it possible for the virus to evade detection and removal, and can easily
reinfect a system even after the operating system is reinstalled if the boot sector is not cleaned.
✑ Boot sector virus: Given that the malware infection returned after the OS reinstallation, it's likely that the
virus was not removed from the boot sector during the reinstallation process. Reinstalling the OS without
cleaning the boot sector won't remove the infection, allowing the virus to continue to affect the system.
Other options:
While Trojans can be persistent, the reinstallation of the OS should remove any Trojans unless they are
✑ Spyware: Spyware is designed to gather information about a person or organization without their
knowledge. Like Trojans, spyware should be removed with an OS reinstallation unless it is reintroduced in
some way.
✑ Rootkit: Rootkits are designed to enable continued privileged access to a computer while actively hiding
their presence. While a rootkit could potentially survive an OS reinstall if it infects the firmware or certain
areas outside the OS, the scenario described points more specifically to a boot sector virus, especially
626. - (Topic 6)
A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following
prerequisites must be in place before the technician can start the installation process?
A. Internet connection
B. Product key
402
Certify For Sure with IT Exam Dumps
C. Sufficient storage space
D. UEFI firmware
E. Legacy BIOS
Answer: C
Explanation: Before starting a bare-metal installation of Windows 10, ensuring that there is sufficient
storage space on the system's hard drive or SSD is crucial. This is because the installation files need
enough room to be copied and for the operating system to be installed and function properly. Without
adequate storage, the installation process can fail or the operating system might not perform optimally.
Other prerequisites like internet connection, product key, and specific firmware types might be necessary at
different stages of installation or activation, but the fundamental requirement is enough storage space to
627. - (Topic 6)
A user receives a message on a PC stating it has been infected by malware. A technician runs a full scan
on the user's machine and detects no malware. Later that day, the same message reappears. Which of the
following steps should the technician take to restore the system to regular functionality?
Answer: B
Explanation:
In change management, the scope of a project lists all the changes that are taking place. The scope
ensures that all team members understand the boundaries and extent of the project, helping to prevent
✑ Scope: Defines the project's boundaries and deliverables, including all the planned changes. It ensures
that everyone involved understands what is included and excluded in the project, minimizing unexpected
changes.
✑ Risk analysis: Identifies potential risks and their impact but does not list the changes.
✑ Rollback plan: Provides a strategy for reverting changes if something goes wrong but does not list
403
Certify For Sure with IT Exam Dumps
changes.
✑ Review: Involves evaluating changes but does not compile the list of changes.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 4.2: Explain basic change-management best practices.
628. - (Topic 6)
Which of the following change management practices lists all the changes that are taking place for a project
A. Risk analysis
B. Scope
C. Rollbackplan
D. Review
Answer: B
Explanation:
In change management, the scope of a project lists all the changes that are taking place. The scope
ensures that all team members understand the boundaries and extent of the project, helping to prevent
✑ Scope: Defines the project's boundaries and deliverables, including all the planned changes. It ensures
that everyone involved understands what is included and excluded in the project, minimizing unexpected
changes.
✑ Risk analysis: Identifies potential risks and their impact but does not list the changes.
✑ Rollback plan: Provides a strategy for reverting changes if something goes wrong but does not list
changes.
✑ Review: Involves evaluating changes but does not compile the list of changes.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 4.2: Explain basic change-management best practices.
629. - (Topic 6)
404
Certify For Sure with IT Exam Dumps
A company wants to take advantage of modern technology and transition away from face- to-face meetings.
Which of the following types of software would benefit the company the most? (Select two).
A. Videoconferencing
B. File transfer
C. Screen-sharing
D. Financial
E. Remote access
F. Record-keeping
Answer: A,C
Explanation:
For a company looking to transition away from face-to-face meetings, videoconferencing and
✑ Videoconferencing software allows participants to conduct virtual meetings with audio and video
capabilities, effectively simulating a face-to-face interaction without the need for physical presence. This
can greatly reduce travel costs and time while maintaining the personal touch of meetings.
✑ Screen-sharing enables participants in a virtual meeting to view one another's computer screens in real
time. This is particularly useful for presentations, collaborative work, and troubleshooting, as it allows for a
Both technologies support the company's goal of leveraging modern technology to enhance communication
630. - (Topic 6)
Multiple users routinely record log-in information in readily accessible areas. Which of the following is the
A. Trusted sources
B. Valid certificates
C. User training
D. Password manager
Answer: D
Explanation:
405
Certify For Sure with IT Exam Dumps
Using a password manager is the best way to mitigate the issue of users recording their login information in
accessible areas. Password managers securely store and encrypt passwords and login details, reducing
the need for users to write down or remember multiple complex passwords. This approach enhances
security by encouraging the use of strong, unique passwords for different accounts without the risk of
forgetting them or the unsafe practice of writing them down. Trusted sources, valid certificates, and user
training are important security measures but do not directly address the problem of managing multiple
631. - (Topic 6)
A user is trying to limit the amount of time their children spend on the internet. Which of the following
A. Family Options
C. Ease of Access
E. Privacy
Answer: A
Explanation: Windows 10 includes a set of parental controls within the "Family Options" section of the
Windows settings. This feature allows parents to manage their children's computing activities, including
setting time limits on device use, filtering web content, managing privacy and online safety settings, and
✑ Family Options: By enabling and configuring Family Options, the user can set specific times when their
children can use the device and access the internet, effectively limiting their overall screen time and internet
usage.
Update & Security (B) mainly deals with Windows updates and security features but does not directly
provide settings for time management. Ease of Access (C) is focused on accessibility settings and does not
include time management options. Network & Internet (D) settings control network connectivity and do not
offer parental controls or time limits. Privacy (E) settings manage which applications can access device
features and user data but do not include time management options.
406
Certify For Sure with IT Exam Dumps
632. - (Topic 6)
A company wants to reduce the negative ecological impacts of its business and has decided to hire an
e-waste company to dispose of equipment. Which of the following should the e-waste company provide the
business7
A. Non-disclosure agreement
B. Certification of destruction
C. Low-level formatting
D. Shredding/drilling
Answer: B
Explanation: When disposing of e-waste, it is important to ensure that the data on the equipment is securely
destroyed and that the disposal process complies with environmental regulations.
✑ Certification of destruction: The correct document verifying that the equipment has been disposed of in
✑ Low-level formatting: A method to wipe data but does not guarantee compliance with e-waste disposal
regulations.
✑ Shredding/drilling: Physical destruction methods that might be used, but certification of destruction is the
documentation needed.
Reference: CompTIA A+ Exam Objectives [220-1102] - 3.7: Explain the importance of physical security
measures.
Multiple users are reporting audio issues as well as performance issues after downloading unauthorized
software. You have been dispatched to identify and resolve any issues on the network using best practice
procedures.
INSTRUCTIONS
Quarantine and configure the appropriate device(s) so that the users' audio issues are
resolved using best practice procedures. Multiple devices may be selected for quarantine.
407
Certify For Sure with IT Exam Dumps
408
Certify For Sure with IT Exam Dumps
409
Certify For Sure with IT Exam Dumps
Answer:
Explanation:
634. - (Topic 6)
Which of the following operating systems was the app file type designed to run under as an application file
bundle?
A. macOS
B. Chrome
C. Windows
D. Linux
Answer: A
Explanation: The app file type is designed to run under macOS as an application file bundle. macOS uses
application bundles to store executable files and related resources, such as libraries, image files, and
localized content, in a single directory hierarchy. This approach simplifies application management and
635. - (Topic 6)
Which of the following features can be used to ensure a user can access multiple versions of files?
A. Multiple desktops
B. Remote Disc
C. Time Machine
D. FileVault
Answer: C
Explanation:
Time Machine is a backup feature available in macOS that automatically makes hourly backups for the past
24 hours, daily backups for the past month, and weekly backups for all previous months to an external drive
or NAS. It allows users to recover the entire system or specific files from any point in time, ensuring access
to multiple versions of files. This feature is particularly useful for reverting to earlier versions of a document
410
Certify For Sure with IT Exam Dumps
or recovering a file that has been accidentally deleted or altered. The other options, such as Multiple
Desktops, Remote Disc, and FileVault, do not provide versioning capabilities for file access.
636. - (Topic 6)
A user reports being unable to access a sports team's website on an office computer. The administrator
tells the user this blocked access is intentional and based on company guidelines. Which of the following is
A. NDA
B. AUP
C. VPN
D. SOP
Answer: B
Explanation: An AUP, or Acceptable Use Policy, is a set of rules applied by the owner, creator, or
administrator of a network, website, or service that restricts the ways in which the network, website, or
system may be used. In this scenario, the administrator is likely referring to the company's AUP, which
outlines what employees can and cannot do on the company's network, including restrictions on accessing
certain types of websites, such as sports teams' sites, for non-work-related purposes.
✑ AUP (Acceptable Use Policy): This policy typically includes rules designed to maintain the security of the
network, ensure the productivity of employees, and comply with legal regulations. Blocking access to
specific websites is a common practice enforced through an AUP to align with these goals.
An NDA (Non-Disclosure Agreement) (A) is a legal contract between at least two parties that outlines
confidential material, knowledge, or information that the parties wish to share with one another for certain
purposes but wish to restrict access to or by third parties. A VPN (Virtual Private Network) (C) extends a
private network across a public network and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to the private network. SOP
(Standard Operating Procedures) (D) are a set of step-by-step instructions compiled by an organization to
help workers carry out complex routine operations, which wouldn't typically include website access
guidelines.
637. - (Topic 6)
411
Certify For Sure with IT Exam Dumps
A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the
A. Release notes
B. Antivirus software
D. Device drivers
Answer: C,D
Explanation:
To safely upgrade the Microsoft Windows 10 OS, it is essential to backup critical data (C) and ensure that
you have the necessary device drivers (D). Backing up critical data protects against potential data loss
during the upgrade process. Having the correct device drivers ensures that the hardware components
function properly with the new OS version, preventing issues like loss of functionality or compatibility
problems.
638. - (Topic 6)
A Windows user wants a filesystem that protects confidential data from attackers who have physical access
A. ext
B. APFS
C. FAT
D. EFS
Answer: D
Explanation:
EFS (Encrypting File System) is a feature of Windows that provides filesystem-level encryption. It is
designed to encrypt files and folders to protect them from unauthorized access, even if an attacker has
✑ ext: A filesystem type used primarily in Linux, without native encryption features for Windows.
412
Certify For Sure with IT Exam Dumps
✑ FAT: A simple filesystem type with no encryption features.
✑ EFS: The correct choice for a Windows user needing to encrypt data at the filesystem level to protect
Reference: CompTIA A+ Exam Objectives [220-1102] - 1.6: Given a scenario, use appropriate Microsoft
639. - (Topic 6)
A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work
interruptions. Which of the following should a help desk specialist do to remediate the issue?
B. Disablehibernation.
Answer: C
Explanation: When a user's laptop shuts down every time the lid is closed, it typically means that the power
settings are configured to put the laptop into a shutdown state when the lid is closed. To remediate this
issue:
✑ Edit the power plan: This involves changing the settings for what happens when the laptop lid is closed.
✑ uk.co.certification.simulator.questionpool.PList@1996bb50
✑ Configure the sleep settings: While similar to editing the power plan, this option specifically adjusts the
✑ Disable hibernation: This is a less direct solution but could be considered if the laptop was set to
✑ Turn on fast startup: This setting affects how quickly the computer starts up from a shutdown, but it does
not directly address the issue of what happens when the lid is closed.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.5: Given a scenario, use the appropriate Microsoft
Windows settings.
413
Certify For Sure with IT Exam Dumps
640. - (Topic 6)
A company was recently attacked by ransomware. The IT department has remediated the threat and
determined that the attack method used was email. Which of the following is the most effective way to
A. Spam filtering
B. Malware preventionsoftware
Answer: C
Explanation: To prevent ransomware attacks via email, the most effective way is End user education (C).
Educating users about the dangers of phishing emails, how to recognize suspicious emails, and the
importance of not clicking on unknown links or attachments can significantly reduce the risk of ransomware
infections. Awareness and training can empower users to act as the first line of defense against such cyber
threats
641. - (Topic 6)
An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple
devices wanting to share photos and videos and asking whether the user would like to accept the request
Which of the following configurations should the technician advise the user to change first"?
A. Wi-Fi
B. iCloud
C. Antivirus
D. AirDrop
Answer: D
Explanation: AirDrop is a feature on Apple devices that allows users to wirelessly share files, photos, and
videos with nearby Apple devices. If the MacBook is receiving unsolicited AirDrop requests, adjusting the
AirDrop settings to allow sharing with contacts only or turning it off completely can help prevent these
642. - (Topic 6)
414
Certify For Sure with IT Exam Dumps
A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free
software downloads. When the technician tries to open a document, the system displays an error message
that reads: Not enough memory to perform this operation. Which of the following should be the technician's
A. Install antispyware
Answer: A
Explanation: The presence of pop-up windows advertising free software and the error message about
memory are indicative of spyware infection. Installing and running antispyware software is a practical first
step to remove the unwanted software and resolve the issue without resorting to more drastic measures
643. - (Topic 6)
A technician is installing software on a user's workstation. The installation fails due to incompliance with the
HCL. Which of the following components is most likely causing the installation to fail? (Select two).
A. NIC
B. CPU
C. PSU
D. KVM
E. RAM
F. DVI
Answer: A,B
Explanation: The Hardware Compatibility List (HCL) is a list that indicates hardware components that are
compatible with a specific software or operating system. If software installation fails due to incompliance
with the HCL, it's most likely due to core hardware components like the Network Interface Card (NIC) or the
Central Processing Unit (CPU) not being supported or not meeting the software's minimum hardware
requirements. The PSU, KVM, RAM, and DVI are less likely to directly impact software compatibility as
415
Certify For Sure with IT Exam Dumps
defined by the HCL.
644. - (Topic 6)
Which of the following provides disk encryption on computers running a Windows OS?
A. FileVault
B. BitLocker
C. Private Key
D. PowerShell
Answer: B
Explanation: BitLocker is a full-disk encryption feature included with certain editions of Windows, designed
✑ Option B: BitLockerBitLocker is the correct tool for disk encryption on Windows operating systems,
✑ Option C: Private KeyA private key is part of public key infrastructure (PKI) used in encryption, but it is
References:
✑ CompTIA A+ 220-1102 Objective 2.5 (Manage and configure basic security settings in the Windows OS),
645. - (Topic 6)
A customer needs to purchase a desktop capable of rendering video. Which of the following should the
customer prioritize?
A. NIC
B. USB
C. GPU
D. HDMI
Answer: C
416
Certify For Sure with IT Exam Dumps
Explanation:
For rendering video, the most critical component a customer should prioritize in a desktop is:
✑ GPU (Graphics Processing Unit): The GPU is specifically designed to handle complex graphics and
video rendering tasks. A powerful GPU will significantly improve performance in video rendering
applications.
✑ NIC (Network Interface Card): Important for network connectivity but irrelevant for video rendering.
✑ USB: Useful for peripherals but does not impact video rendering capabilities.
✑ HDMI: An important output interface for connecting monitors but not crucial for the rendering process
itself.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes,
646. - (Topic 6)
A user identified that a program installed in a workstation does not have optional features enabled. Which of
Answer: D
Explanation: When a user needs to install optional features for a program that is already installed, the
technician should:
✑ Click on Change: The "Change" option allows modifications to the installed program, such as adding or
This method is the most efficient and avoids unnecessary reinstallation of the software, which could lead to
417
Certify For Sure with IT Exam Dumps
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.4: Given a scenario use the appropriate Microsoft
647. - (Topic 6)
Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who
A. Education
B. Pro
C. Enterprise
D. Home
Answer: B
Explanation:
For a single user who needs to access their computer remotely, the Windows 10 Pro edition is the most
cost-effective and appropriate choice. It includes features such as Remote Desktop, which are essential for
remote access.
✑ Option A: EducationThis edition is designed for academic institutions and includes educational features.
✑ Option B: ProWindows 10 Pro includes Remote Desktop and other business features. It is suitable and
✑ Option C: EnterpriseThis edition includes advanced features for large organizations and is more
✑ Option D: HomeWhile cost-effective, Windows 10 Home does not include the Remote Desktop feature,
References:
✑ CompTIA A+ 220-1102 Objective 1.1 (Identify basic features of Microsoft Windows editions), particularly
648. - (Topic 6)
418
Certify For Sure with IT Exam Dumps
A user accidentally installed the incorrect word processing application on an iMac. Which of the following
C. Use Spotlight to search for the application, and then run the application.
Answer: B
Explanation: On macOS, uninstalling an application typically involves locating the app in Finder and
dragging it to the Trash. This method is straightforward and commonly used for removing unwanted
applications. The other options do not directly relate to the standard process of uninstalling applications on
a Mac.
649. - (Topic 6)
A user accidentally installed the incorrect word processing application on an iMac. Which of the following
C. Use Spotlight to search for the application, and then run the application.
Answer: B
Explanation: To uninstall an incorrect application on an iMac, the standard and recommended method is:
✑ Identify the application in Finder and drag it to the trash can: This action removes the application from
the system. After dragging the application to the trash, the user should empty the trash to complete the
uninstallation.
✑ Move the application to the desktop and press delete: This action does not uninstall the application.
✑ Use Spotlight to search for the application, and then run the application: Running the application does
✑ Use Time Machine to go back to the date before the installation: This method can be used to restore the
Reference:
419
Certify For Sure with IT Exam Dumps
CompTIA A+ 220-1102 Exam Objectives, Section 1.10: Identify common features and tools of the
macOS/desktop OS.
650. - (Topic 6)
A user opened an infected email. A security administrator responded to the malicious event, successfully
mitigated the situation, and returned the machine to service Which of the following needs to be completed
B. Incident report
Answer: B
Explanation: After successfully mitigating a malicious event caused by an infected email, the final step
before considering the event closed is to complete an incident report. This document should detail the
nature of the incident, the steps taken to resolve it, and any lessons learned to improve future responses to
similar threats.
651. - (Topic 6)
Which of the following Linux commands would help to identify which directory the user is currently operating
in?
A. pwd
B. dig
C. find
D. cat
Answer: A
Explanation: The pwd command, which stands for "print working directory," is used in Linux and Unix-like
operating systems to display the current directory in which the user is operating. This command outputs the
full pathname of the current working directory, helping users to understand their current location in the
filesystem hierarchy.
420
Certify For Sure with IT Exam Dumps
✑ pwd: When executed, it provides the absolute path of the directory you're currently in, which is useful for
✑ dig: This command is used for querying DNS name servers for information about host addresses, mail
✑ find: This command is used to search for files in a directory hierarchy based on specified criteria (such as
✑ cat: Short for "concatenate," this command is used to read the contents of files and output them to the
terminal.
652. - (Topic 6)
A. NTFS
B. exFAT
C. HFS
D. ext2
Answer: A
Explanation: Journaling is a feature that helps maintain the integrity of the filesystem by keeping a record of
changes not yet committed to the main file system. This feature is supported by various filesystems, but not
all.
✑ Option A: NTFSNTFS (New Technology File System) is a filesystem used by Windows that supports
journaling. This makes it resilient to corruption from unexpected shutdowns or crashes by keeping a log of
file changes.
✑ Option B: exFATexFAT (Extended File Allocation Table) does not support journaling. It is optimized for
flash drives and large files but lacks advanced features like journaling.
✑ Option C: HFSHFS (Hierarchical File System) is an older filesystem used by Apple. HFS+ (also known
✑ Option D: ext2ext2 (Second Extended File System) is a filesystem for Linux that does not support
References:
✑ CompTIA A+ 220-1102 Objective 1.8 (Explain common OS types and their purposes), particularly
421
Certify For Sure with IT Exam Dumps
filesystems and their features.
653. - (Topic 6)
During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU
utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following
A. Firewall activities
B. Botnet attack
C. DDoS attack
D. Keylogger attack
Answer: B
Explanation:
When a system administrator discovers a user's PC running slowly with 100% CPU utilization, it often
indicates that the system is being used for unauthorized purposes, such as being part of a botnet attack.
Here’s why:
✑ Botnet attack: Botnets are networks of computers infected with malware and controlled by an attacker.
These infected computers (bots) are often used to carry out tasks like sending spam or participating in
Distributed Denial of Service (DDoS) attacks. The high CPU utilization and resource usage indicate that the
✑ Firewall activities: While firewall activities can use some resources, they generally do not cause
✑ DDoS attack: DDoS attacks target external systems by overwhelming them with traffic. A system
participating in a DDoS might have high network usage, but the primary symptom on the user’s PC would
✑ Keylogger attack: Keyloggers record keystrokes and generally do not cause high CPU utilization. They
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.4: Explain common social-engineering attacks, threats,
and vulnerabilities.
422
Certify For Sure with IT Exam Dumps
654. - (Topic 6)
A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the
Answer: B
Explanation:
Phishing attacks are typically delivered via email, so the most effective immediate measure is to filter out
✑ Enabling Windows Firewall: Helps protect against network threats but does not specifically address
phishing emails.
✑ Activating the email spam filter: Directly targets phishing attempts by filtering and blocking suspicious
✑ Using a secure VPN connection: Enhances secure communications but does not prevent phishing
attacks.
✑ Running vulnerability scans on a schedule: Identifies and mitigates vulnerabilities but does not address
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.3: Given a scenario, detect, remove, and prevent
655. - (Topic 6)
h company uses shared drives as part of a workforce collaboration process. To ensure the correct access
permissions, inheritance at the top-level folder is assigned to each department. A manager's team is
working on confidential material and wants to ensure only the immediate team can view a specific folder
and its subsequent files and subfolders. Which of the following actions should the technician most likely
take?
A. Turn off inheritance on the requested folder only and set the requested permissions to each file
423
Certify For Sure with IT Exam Dumps
manually.
B. Turn off inheritance at the top-level folder and remove all inherited permissions.
C. Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.
D. Turn off inheritance on the requested folder only, set the requested permissions, and then turn on
Answer: D
Explanation: For managing permissions where a specific folder needs to have different access controls
than its parent, turning off inheritance for that specific folder is the correct approach.
✑ Option A: Turn off inheritance on the requested folder only and set the requested permissions to each
file manuallyThis is partially correct, but setting permissions manually for each file is inefficient and
error-prone.
✑ Option B: Turn off inheritance at the top-level folder and remove all inherited permissionsThis action
would disrupt permissions for all other folders and files, not just the confidential folder.
✑ Option C: Turn off inheritance at the top-level folder and set permissions to each file and subfolder
manuallyThis approach is overly broad and inefficient, impacting more than just the specific folder that
✑ Option D: Turn off inheritance on the requested folder only, set the requested permissions, and then turn
on inheritance under the child foldersThis ensures the specific folder has unique permissions while allowing
those permissions to propagate to its children, maintaining security and ease of management.
References:
✑ CompTIA A+ 220-1102 Objective 2.5 (Manage and configure basic security settings in the Windows OS),
656. - (Topic 6)
Which of the following ensures data is unrecoverable on a lost or stolen mobile device?
A. Device encryption
B. Remote wipe
C. Data backup
D. Fingerprint reader
Answer: B
424
Certify For Sure with IT Exam Dumps
Explanation: To ensure data is unrecoverable on a lost or stolen mobile device, the best solution is:
✑ Remote wipe: This feature allows the device owner or IT administrator to remotely erase all data on the
✑ Device encryption: While important for protecting data, encryption alone does not remove data from the
device.
✑ Data backup: Ensures data is saved elsewhere but does not make it unrecoverable on the lost or stolen
device.
✑ Fingerprint reader: Provides security for accessing the device but does not affect data recovery if the
device is compromised.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.7: Explain common methods for securing mobile and
embedded devices.
657. - (Topic 6)
A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The
technician thinks malware may be causing the issues, but before the issues began the user installed
anti-malware software in response to a pop-up window Which of the following is the most likely cause of
these issues'?
A. Expired certificate
B. False alert
D. OS update failure
Answer: B
Explanation: The scenario described is characteristic of a malware tactic known as scareware, where users
are tricked into installing malware through false alerts claiming that their system is infected. The
anti-malware software installed in response to a pop-up is likely malicious, causing the system to run slowly
658. - (Topic 6)
425
Certify For Sure with IT Exam Dumps
Which of the following combinations meets the requirements for mobile device multifactor authentication?
Answer: C
Explanation:
Multifactor authentication (MFA) requires the use of two or more verification factors to gain access to a
resource such as an application, online account, or a VPN. The factors are categorized into something you
know (like a password or PIN), something you have (like a security token or a smartphone), and something
✑ Fingerprint and password: This combination meets the criteria for MFA as it uses two different categories
of authentication factors: "something you are" (fingerprint) and "something you know" (password). This
✑ Password and PIN: Both of these factors fall under the same category of "something you know," and
✑ Password and swipe: Swiping a pattern is similar to a password in that it is something you know, so this
✑ Swipe and PIN: Again, both of these are "something you know" and do not qualify as multifactor
659. - (Topic 6)
A user recently downloaded a free game application on an Android device. The device then began crashing
frequently and quickly losing its battery charge. Which of the following should the technician recommend be
426
Certify For Sure with IT Exam Dumps
E. Clear the application's cache.
Answer: A,D
Explanation: When an Android device starts exhibiting issues like frequent crashes and rapid battery drain
after downloading an application, the first step should be to address the immediate cause:
✑ Uninstall the game application: Since the issues started after the game application was installed,
removing it is a logical first step. Unwanted or malicious applications can cause such symptoms by running
✑ Install the latest security patches: Keeping the device updated with the latest security patches is crucial
for protecting against vulnerabilities that could be exploited by malicious software. Updating can resolve
660. - (Topic 6)
Which of the following macOS file types requires mounting before installation?
A. .pkg
B. .zip
C. .app
D. .dmg
Answer: D
Explanation: The .dmg file type in macOS requires mounting before installation. .dmg files are disk image
files used to distribute software on macOS. When opened, they mount a virtual disk on the desktop, from
which the application can be installed. Other file types like .pkg, .zip, and .app have different processes for
661. - (Topic 6)
A workstation does not recognize a printer. However, the previous day. the printer successfully received a
job from the workstation. Which of the following tools should a technician use to see what happened before
the failure?
A. Performance Monitor
427
Certify For Sure with IT Exam Dumps
C. Task Scheduler
D. Event Viewer
Answer: D
Explanation: When troubleshooting a printer that was previously working but is no longer recognized by a
workstation, Event Viewer is the most appropriate tool to check for historical logs and events related to the
✑ Option A: Performance MonitorPerformance Monitor is used for monitoring system performance and
resources in real-time and does not provide specific historical event logs related to device failures.
✑ Option B: Devices and PrintersDevices and Printers show the status and properties of connected
✑ Option C: Task SchedulerTask Scheduler manages and monitors scheduled tasks but does not log
✑ Option D: Event ViewerEvent Viewer logs system events, including errors, warnings, and information
related to hardware and software. It is ideal for checking what happened prior to the printer failure.
References:
✑ CompTIA A+ 220-1102 Objective 3.1 (Troubleshoot common Windows OS problems), particularly using
662. - (Topic 6)
•The user cannot hear any sound from a speaker paired with the smartphone.
•The user is having issues synchronizing data from their smart watch, which is also connected via
Bluetooth.
A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and
adjusted the volume levels, but still could not hear anything. Which of the following steps should the
428
Certify For Sure with IT Exam Dumps
Answer: A
Explanation: Restarting the smartphone can resolve a wide range of technical issues, including those
related to Bluetooth connectivity. This simple step can refresh the system and eliminate temporary software
glitches that might be interfering with Bluetooth functions like audio output and data synchronization.
✑ Restart the smartphone: This action clears the system's RAM and can resolve conflicts between the
Bluetooth service and other processes running on the smartphone, potentially fixing both the audio and
synchronization issues.
Resetting network settings (B) could also potentially fix the issue but is a more drastic step that also clears
Wi-Fi networks and passwords, cellular settings, and VPN configurations, which might not be necessary.
Unpairing the Bluetooth speaker (C) could help if the issue is specific to the speaker, but since there are
also synchronization issues with the smartwatch, the problem seems broader. Checking for system updates
(D) is a good general maintenance step, but it's more likely to help with ongoing or known issues rather
663. - (Topic 6)
A technician needs to configure security settings on a Windows 10 workstation. Which of the following
C. System Protection
D. Firewall
Answer: A
Explanation: Configuring the Account Lockout Policy in Windows 10 is the appropriate action to limit
password attempts. This security setting determines the number of failed login attempts that will trigger a
lockout, preventing unauthorized access due to repeated password guessing. It is an effective measure to
664. - (Topic 6)
A company’s help desk receives numerous calls from employees reporting issues related to a current
security breach. Which of the following steps should the help desk team take to document the breach?
429
Certify For Sure with IT Exam Dumps
A. Record the details in the ticketing system.
Answer: A
Explanation:
In the event of a security breach, documenting the incident is crucial for tracking, analysis, and resolution.
✑ Option A: Record the details in the ticketing system.Correct Answer. The ticketing system is the primary
tool for IT support to track incidents. Recording the details in the ticketing system ensures that all relevant
information is documented systematically, can be easily accessed, and tracked through the resolution
process.
✑ uk.co.certification.simulator.questionpool.PList@1a49a160
✑ Option B: Take screenshots and attach them to the root cause analysis.While screenshots can be useful,
the first step should be to record the details in the ticketing system. Screenshots may be added later as
supplementary information.
✑ Option C: Discuss the incident with the company’s legal team.Involving the legal team is important for
certain aspects of a security breach, but the initial step should still be to document the incident in the
ticketing system.
665. - (Topic 6)
A technician is following the ticketing system’s best practices when handling user support requests. Which
of the following should the technician do first when responding to a user support request that contains
insufficient information?
Answer: A
Explanation: When handling a user support request that contains insufficient information, the first step a
430
Certify For Sure with IT Exam Dumps
technician should take is to Ask the user for clarification (A). This involves gathering more details about the
issue to understand the problem better and provide an accurate resolution. Effective communication and
asking the right questions are essential for diagnosing and resolving IT issues efficiently.
666. - (Topic 6)
Which of the following operating systems uses the ext4 filesystem type?
A. macOS
B. iOS
C. Linux
D. Windows
Answer: C
Explanation: The ext4 (fourth extended filesystem) is a journaling file system for Linux. It is widely used in
many Linux distributions due to its performance, robustness, and advanced features like large file and
volume support.
✑ Linux: Uses ext4 among other filesystems like ext3, XFS, Btrfs, etc.
Reference: CompTIA A+ Exam Objectives [220-1102] - 1.1: Compare and contrast common operating
667. - (Topic 6)
Which of the following operating systems were designed for smartphones? (Select two).
A. Ubuntu
B. CentOS
C. macOS
D. Chrome OS
E. iOS
F. Android
Answer: E,F
431
Certify For Sure with IT Exam Dumps
Explanation: The operating systems designed for smartphones include iOS and Android. iOS is developed
by Apple Inc. for its iPhone range, while Android, developed by Google, is used across a variety of devices
from different manufacturers. Both operating systems are specifically tailored to provide a mobile
computing experience, with interfaces, applications, and functionalities designed for touchscreen input and
mobile hardware.
668. - (Topic 6)
A technician assigns the equivalent of root-level permissions to a user to perform a task. Which of the
following user roles within the Windows OS should the technician choose?
A. Power
B. Default
C. Administrator
D. Superuser
Answer: C
Explanation: In the Windows OS, to grant a user permissions equivalent to root-level permissions (which
means full control over the system), the user needs to be given:
✑ Administrator: The Administrator role provides full control over the system, including the ability to install
and uninstall software, change system settings, and access all files and directories.
✑ Power: The Power User role provides some administrative capabilities but not full control. It is a legacy
✑ Superuser: This term is more commonly associated with Unix/Linux systems and is not a specific role in
Windows.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 2.5: Given a scenario manage and configure basic
669. - (Topic 6)
An employee has been using the same password for multiple applications and websites for the past several
432
Certify For Sure with IT Exam Dumps
years. Which of the following would be best to prevent security issues?
Answer: B
Explanation: To prevent security issues related to an employee using the same password for multiple
applications and websites, implementing expiration policies (B) is best. Password expiration policies require
users to change their passwords at regular intervals, which helps to mitigate the risks associated with
password reuse. Regularly changing passwords reduces the chances of unauthorized access from
compromised credentials.
670. - (Topic 6)
A user's company phone has several pending software updates. A technician completes the following
steps:
•Connected to Wi-Fi
Answer: D
Explanation: After rebooting the phone, connecting to Wi-Fi, and disabling metered data, the next step the
technician should take is to Clear the cache (D). Clearing the cache can resolve issues with the phone's
performance and is often necessary before updating software to ensure that the updates can be
downloaded and installed without issues. It removes temporary files that may be interfering with the update
process.
433
Certify For Sure with IT Exam Dumps
671. - (Topic 6)
A company using Active Directory wants to change the location of all users' "Documents" to a file server on
the network. Which of the following should the company set up to accomplish this task?
A. Security groups
B. Folder redirection
Answer: B
Explanation:
Folder redirection is a feature in Windows that allows administrators to change the default location of
certain special folders within the user profile, such as the "Documents" folder, to a different location,
typically on a network server. This is commonly used in organizational environments to centralize file
storage, simplify backups, and ensure data is stored on network drives with potentially more robust security
✑ Folder redirection: By implementing folder redirection through Group Policy in Active Directory, a
company can ensure that all users' "Documents" folders are stored on a specified file server on the network,
Security groups (A) are used to manage user and computer access to shared resources, but they don't
directly enable the relocation of user folders. Organizational unit structure (C) helps in managing and
applying policies within Active Directory but is not directly related to the physical location of files. Access
control lists (D) are used to define permissions for files and directories, but they do not govern where those
672. - (Topic 6)
A technician is troubleshooting a PC that is unable to perform DNS lookups. Utilizing the following firewall
output:
Protocol/PortActionDirection 1 AllowOut
445 BlockOut
53 BlockOut
123 BlockOut
434
Certify For Sure with IT Exam Dumps
80 BlockOut
Which of the following ports should be opened to allow for DNS recursion?
A. 1
B. 53
C. 80
D. 123
E. 445
Answer: B
Explanation:
DNS (Domain Name System) lookups are essential for translating human-friendly domain names into IP
addresses that computers use to communicate. DNS typically uses port 53 for its communication.
In the provided firewall output, various ports are either allowed or blocked for outgoing traffic. For DNS
recursion, which is the process of resolving domain names to IP addresses, port 53 must be open.
✑ Port 53: This is the standard port used by DNS for queries and responses. The fact that it is currently
blocked (as per the firewall output) is the reason why DNS lookups are failing. Opening port 53 will allow the
DNS requests to pass through the firewall, enabling the resolution of domain names to IP addresses.
Other ports mentioned in the output are used for different services and protocols:
✑ Port 445 is associated with SMB (Server Message Block) for file sharing in Windows environments.
✑ Port 123 is used by NTP (Network Time Protocol) for time synchronization.
✑ Port 80 is used for HTTP traffic, which is web traffic but not related to DNS lookups.
673. - (Topic 6)
A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this
task?
A. Incremental backup
B. System image
D. Differential backup
Answer: B
435
Certify For Sure with IT Exam Dumps
Explanation: A system image is a complete snapshot of everything on a device's storage at a given point in
time, including the operating system, installed programs, system settings, and all user files. This method is
the best way to back up the OS and data comprehensively because it allows for the restoration of a system
to its exact state at the time the image was taken. This is particularly useful in disaster recovery scenarios
where it's crucial to restore a system quickly and efficiently to minimize downtime.
674. - (Topic 6)
A home office user wants to ensure a PC is backed up and protected against local natural disasters and
hardware failures. Which of the following would meet the user's requirements?
Answer: A
Explanation:
For ensuring data protection against local natural disasters and hardware failures, the best approach is to
use an off-site solution that provides redundancy and is resilient to local disruptions.
✑ Using an agent-based cloud backup solution: This method involves backing up data to a remote cloud
server, providing protection against local disasters like floods, fires, or hardware failures since the data is
✑ Implementing a grandfather-father-son backup rotation: While effective for managing local backups, this
method typically involves physical media which could still be vulnerable to local disasters.
✑ Automating backups to a local network share: This keeps the backups within the same physical location,
✑ Saving files manually to an external drive: This method is prone to human error and doesn't provide
Reference: CompTIA A+ Exam Objectives [220-1102] - 4.3: Given a scenario, implement workstation
675. - (Topic 6)
436
Certify For Sure with IT Exam Dumps
A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed
optional Windows updates. Which of the following is best way to resolve the issue?
Answer: B
Explanation: To resolve a BSOD issue on a Windows 10 PC after installing optional Windows updates, the
best approach is to Roll back the device drivers (B). BSODs can often be caused by incompatible or faulty
drivers introduced during an update. Rolling back the drivers to a previous version can restore system
676. - (Topic 6)
An administrator's change was approved by the change management review board. Which of the following
Answer: C
Explanation: Once a change has been approved by the change management review board, the next step is
to:
✑ Implement the change: This involves carrying out the approved change in the system or environment
✑ Perform risk analysis: This should be done before the change is approved to assess potential impacts.
✑ Assign a change coordinator: This role should be designated earlier in the process to oversee the
change implementation.
✑ Verify testing results: This should have been done before seeking approval from the review board.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 4.2: Explain basic change-management best practices.
437
Certify For Sure with IT Exam Dumps
Change management process documentation.
677. - (Topic 6)
A customer is configuring on an old desktop an inexpensive file server to share photos and videos and
wants to avoid complicated licensing. Which of the following operating systems should the technician most
likely recommend?
A. Chrome OS
B. Linux
C. macOS
D. Windows
Answer: B
Explanation: For an inexpensive file server to share photos and videos while avoiding complicated licensing,
✑ Linux: Linux is a free and open-source operating system that is ideal for setting up a file server. It offers
✑ Chrome OS: Designed primarily for lightweight, web-based tasks and not ideal for a file server.
✑ macOS: Requires Apple hardware and involves more complex licensing compared to Linux.
✑ Windows: While capable of being a file server, Windows may involve licensing fees, particularly for
server editions.
Reference:
CompTIA A+ 220-1102 Exam Objectives, Section 1.8: Explain common OS types and their purposes.
678. - (Topic 6)
Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a
B. Username/password
C. One-time-use token
D. Cryptographic device
438
Certify For Sure with IT Exam Dumps
Answer: A
authenticate secure access to their devices, apps, online services, and networks with just a look or a touch.
If users have difficulty using the facial recognition feature, Windows Hello also supports a Personal
Identification Number (PIN) as a secondary feature for logging in. The PIN is tied to the specific device on
which it is set up, adding a layer of security even if the PIN is obtained by someone else.
✑ Personal identification number: The PIN serves as an alternative to the facial recognition feature,
allowing users to quickly and securely access their devices without relying solely on biometric
authentication.
Username/password (B) is the traditional method of authentication but is not specifically a secondary
feature of Windows Hello. One-time-use token (C) and cryptographic device (D) could be part of an MFA
setup but are not directly related to Windows Hello's alternate authentication options.
679. - (Topic 6)
A user's Android phone has been randomly restarting. A technician investigates and finds several
applications have been installed that are not available within the standard marketplace. Which of the
Answer: B
Explanation: Random restarting of an Android phone and the presence of applications not from the
✑ Option A: The OS update failedWhile an OS update failure can cause issues, it is less likely to result in
✑ Option B: The user downloaded malwareMalware is a common cause of erratic behavior, including
random restarts, especially when applications are installed from unofficial sources.
✑ Option C: The device is in developer modeDeveloper mode alone does not typically cause random
restarts. It may make the device more susceptible to issues if improper apps are installed.
439
Certify For Sure with IT Exam Dumps
✑ Option D: The over-the-air carrier update failedSimilar to the OS update, this would more likely cause
References:
✑ CompTIA A+ 220-1102 Objective 2.3 (Detect, remove, and prevent malware) and Objective 3.5 (Mobile
680. - (Topic 6)
A technician is troubleshooting a Windows system that is having issues with the OS loading at startup.
Answer: A
Explanation: When troubleshooting a Windows system that is experiencing issues during the OS loading
phase at startup, enabling boot logging is a practical step. Boot logging creates a record of all drivers and
services that are loaded (or attempted to be loaded) during the startup process. This record, typically
named ntbtlog.txt, can be reviewed to identify any drivers or services that failed to load, which could be
contributing to the startup issues. This diagnostic step helps pinpoint the problematic component(s) and
681. - (Topic 6)
An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued
devices must have two authentication methods, and the organization has already enforced the use of PIN
codes as one method. Which of the following device features should the administrator enable?
A. Smart card
B. Biometrics
C. Hard token
D. One-time password
440
Certify For Sure with IT Exam Dumps
Answer: B
Explanation:
For securing mobile devices with two authentication methods, combining something the user knows (a PIN)
with something the user is (biometrics) enhances security by implementing multi-factor authentication.
✑ Smart card: Generally requires additional hardware and is not commonly used in mobile devices.
✑ Biometrics: Uses unique biological traits such as fingerprints or facial recognition, providing a convenient
✑ Hard token: Involves additional physical devices which might not be practical for mobile devices.
✑ One-time password: Usually used for specific applications rather than as a general device authentication
method.
Reference: CompTIA A+ Exam Objectives [220-1102] - 2.1: Summarize various security measures and
their purposes.
682. - (Topic 6)
A. Compiled
B. Scripting
C. Web
D. Database
Answer: B
Explanation:
Scripting languages are designed for automating tasks by writing scripts that can execute a series of
commands. They are typically easier to write and understand compared to compiled languages and are
widely used for automating repetitive tasks, making them the best option for task automation.
683. - (Topic 6)
A user is setting up a new Windows 10 laptop. Which of the following Windows settings should be used to
B. System
441
Certify For Sure with IT Exam Dumps
C. Personalization
D. Accounts
Answer: A
Explanation: In Windows 10, the "Network & Internet" settings category is where users can manage all
network-related configurations, including Wi-Fi connections. To connect to a Wi-Fi network, users need to
input the network's SSID (Service Set Identifier) and the corresponding password. This section allows users
to view available networks, enter credentials for secure networks, and manage other network features such
684. - (Topic 6)
A technician needs to configure a computer for a user to work from home so the user can still securely
access the user’s shared files and corporate email. Which of the following tools would best accomplish this
task*?
A. MSRA
B. FTP
C. RMM
D. VPN
Answer: D
Explanation: A Virtual Private Network (VPN) creates a secure connection over the internet to a network,
allowing a user to access shared files and corporate email as if they were directly connected to the network.
This makes VPN the best tool for secure remote work access, compared to the other options which do not
685. - (Topic 6)
A network technician installed a SOHO router for a home office user. The user has read reports about
home routers being targeted by malicious actors and then used in DDoS attacks. Which of the following can
442
Certify For Sure with IT Exam Dumps
D. Change the default credentials.
Answer: D
Explanation:
One of the most effective ways to defend against malicious actors targeting home routers for DDoS attacks
is to change the default credentials of the router. The default credentials are often well-known or easily
guessed by attackers, who can then access and compromise the router settings and firmware. By changing
the default credentials to strong and unique ones, a technician can prevent unauthorized access and
configuration changes to the router. Adding network content filtering may help block some malicious or
unwanted websites but may not prevent attackers from exploiting router vulnerabilities or backdoors.
Disabling the SSID broadcast may help reduce the visibility of the wireless network but may not prevent
attackers from scanning or detecting it. Configuring port forwarding may help direct incoming traffic to
specific devices or services but may not prevent attackers from sending malicious packets or requests to
the router. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain
3.3
443