CompTIA A+ Core 2 Practice Test A

CompTIA A+ Core 2 Practice Test A

University

80 Qs

quiz-placeholder

Similar activities

Cengage CompTIA A+ Guide to Technical Support

Cengage CompTIA A+ Guide to Technical Support

11th Grade - University

80 Qs

Server 2019 Chapters 4-6 Test Review

Server 2019 Chapters 4-6 Test Review

University

80 Qs

IT Skills and Concepts Quiz

IT Skills and Concepts Quiz

10th Grade - University

75 Qs

CompTIA A+ Core 1 Practice Test A

CompTIA A+ Core 1 Practice Test A

University

80 Qs

CompTIA A+ 1102

CompTIA A+ 1102

9th Grade - Professional Development

77 Qs

CompTIA A+ Domain 4

CompTIA A+ Domain 4

University

80 Qs

CompTIA A+ Core 1

CompTIA A+ Core 1

University

80 Qs

CompTIA A+ Core 2 Practice Test A

CompTIA A+ Core 2 Practice Test A

Assessment

Quiz

Computers

University

Medium

Created by

Candice Kiser

Used 1K+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?

He should let the customer continue to shout; sooner or later the customer will get tired and calm down

He should call the supervisor and complain

He should leave the customer site and document the incident

He should shout back at the customer in an attempt to regain control of the situation

Answer explanation

Explanation:

The technician should leave the customer site and document the incident. In rare cases, there is no way to calm down the customer, and you might have to leave the site if there is no other alternative.

Incorrect Answers: If the customer has been shouting for a while and the technician cannot calm down the customer, it’s pointless to stay and wait. You don’t want to call your supervisor and complain about the situation while you’re at the customer’s location; that would probably infuriate the customer further. Wait until you have left the customer’s premises. Never shout back at the customer; this is not a battle for power, and you should never take a customer’s anger personally. Be sure to document the incident in depth after leaving the customer’s location. Definitely let your supervisor know what has happened – without complaining.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of software helps protect against viruses that are attached to email?

Firewall software

Antivirus software

Edge

Hardware firewall

Answer explanation

Explanation:

Antivirus software (from vendors such as McAfee or Norton) updates automatically to protect you against the latest viruses, whether they are attached to emails or are lying in wait on removable media. You might also choose to use the built-in Microsoft Defender or Windows Security on newer versions of Windows.

Incorrect Answers: Firewalls protect against intrusion but not viruses. They could be hardware based, such as the ones found in most SOHO multifunction network devices, or software based, such as Windows Defender Firewall. Edge and Chrome (as well as other web browsers) can be configured to make your system more secure (especially when dealing with web-based emails), but that is not the best answer listed.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You create an answer file to aid in installing Windows. Which type of installation are you performing?

Drive image installation

USB installation

Multiboot installation

Unattended installation

Answer explanation

Explanation:

An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation, using Windows Deployment Services (WDS) in Windows Server.

Incorrect Answers: Drive image installations use third-party programs such as Ghost or work with a System Restore image created within Windows. Local installation from USB is possible if you copy the Windows .iso file to the USB flash drive (if the drive is big enough) and obtain the USB/DVD download tool from the Microsoft website. A multiboot installation means that more than one operating system is being installed to the same drive. One or both of these could possibly be unattended installations. Remember that with multiboot installations, each OS should inhabit its own primary partition.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You need to locate a mobile device that was stolen. Which technology can aid in this?

GPS

Screen orientation

Passcode lock

Gmail

Answer explanation

Explanation:

The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have GPS technology installed; others rely on geotracking or Wi-Fi hotspot location techniques. (You are being watched!)

Incorrect Answers: Screen orientation is the direction of screen display – vertical or horizontal (or upside down) – which typically depends on how you hold the device. It can be calibrated on Android devices with the G-Sensor calibration tool. A passcode lock is a set of numbers that must be entered to open a mobile device or take it out of sleep mode. Gmail is Google’s web-based email service and is incorporated into the Android operating system.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When a person takes control of a session between a server and a client, it is known as which type of attack?

DDoS

Brute force

Session hijacking

Malicious software

Answer explanation

Explanation:

Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be an on-path attack – also known as a man-in-the-middle (MITM) attack.

Incorrect Answers: DDoS stands for distributed denial-of-service attack, an attack perpetuated by hundreds or thousands of computers in an effort to take down a single server; the computers involved in this type of attack, individually known as zombies, are often unknowingly part of a botnet. A brute-force attack is an attempt to crack an encryption code or password. Malicious software is any compromising code or software that can damage a computer’s files; examples include viruses, spyware, worms, rootkits, ransomware, and Trojans.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following settings must be established when you want to make a secure wireless connection? (Choose Two.)

The brand of access point

The wireless standard used

The encryption standard used

The SSID of the access point

Answer explanation

Explanation:

To make a secure connection, you need to know the service set identifier (SSID) of the AP and the encryption being used (for example, WPA2 or WPA3). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.

Incorrect Answers: Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11ax, ac, n, or g), but the brand of access point isn’t really helpful.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which log file contains information about Windows setup errors?

setupact.log

setuperr.log

unattend.xml

diskmgmt.msc

Answer explanation

Explanation:

setuperr.log contains information about setup errors during the installation of Windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation.

Incorrect Answers: setupact.log contains the events that occurred during the installation. unattend.xml is the answer file used by Windows during unattended installations. diskmgmt.msc is a command that can be run from the Run prompt or the command line to open the Disk Management utility.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?