CompTIA A+ Core 2 Practice Test A

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 1K+ times
FREE Resource
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?
He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back at the customer in an attempt to regain control of the situation
Answer explanation
Explanation:
The technician should leave the customer site and document the incident. In rare cases, there is no way to calm down the customer, and you might have to leave the site if there is no other alternative.
Incorrect Answers: If the customer has been shouting for a while and the technician cannot calm down the customer, it’s pointless to stay and wait. You don’t want to call your supervisor and complain about the situation while you’re at the customer’s location; that would probably infuriate the customer further. Wait until you have left the customer’s premises. Never shout back at the customer; this is not a battle for power, and you should never take a customer’s anger personally. Be sure to document the incident in depth after leaving the customer’s location. Definitely let your supervisor know what has happened – without complaining.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of software helps protect against viruses that are attached to email?
Firewall software
Antivirus software
Edge
Hardware firewall
Answer explanation
Explanation:
Antivirus software (from vendors such as McAfee or Norton) updates automatically to protect you against the latest viruses, whether they are attached to emails or are lying in wait on removable media. You might also choose to use the built-in Microsoft Defender or Windows Security on newer versions of Windows.
Incorrect Answers: Firewalls protect against intrusion but not viruses. They could be hardware based, such as the ones found in most SOHO multifunction network devices, or software based, such as Windows Defender Firewall. Edge and Chrome (as well as other web browsers) can be configured to make your system more secure (especially when dealing with web-based emails), but that is not the best answer listed.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You create an answer file to aid in installing Windows. Which type of installation are you performing?
Drive image installation
USB installation
Multiboot installation
Unattended installation
Answer explanation
Explanation:
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation, using Windows Deployment Services (WDS) in Windows Server.
Incorrect Answers: Drive image installations use third-party programs such as Ghost or work with a System Restore image created within Windows. Local installation from USB is possible if you copy the Windows .iso file to the USB flash drive (if the drive is big enough) and obtain the USB/DVD download tool from the Microsoft website. A multiboot installation means that more than one operating system is being installed to the same drive. One or both of these could possibly be unattended installations. Remember that with multiboot installations, each OS should inhabit its own primary partition.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You need to locate a mobile device that was stolen. Which technology can aid in this?
GPS
Screen orientation
Passcode lock
Gmail
Answer explanation
Explanation:
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have GPS technology installed; others rely on geotracking or Wi-Fi hotspot location techniques. (You are being watched!)
Incorrect Answers: Screen orientation is the direction of screen display – vertical or horizontal (or upside down) – which typically depends on how you hold the device. It can be calibrated on Android devices with the G-Sensor calibration tool. A passcode lock is a set of numbers that must be entered to open a mobile device or take it out of sleep mode. Gmail is Google’s web-based email service and is incorporated into the Android operating system.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When a person takes control of a session between a server and a client, it is known as which type of attack?
DDoS
Brute force
Session hijacking
Malicious software
Answer explanation
Explanation:
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be an on-path attack – also known as a man-in-the-middle (MITM) attack.
Incorrect Answers: DDoS stands for distributed denial-of-service attack, an attack perpetuated by hundreds or thousands of computers in an effort to take down a single server; the computers involved in this type of attack, individually known as zombies, are often unknowingly part of a botnet. A brute-force attack is an attempt to crack an encryption code or password. Malicious software is any compromising code or software that can damage a computer’s files; examples include viruses, spyware, worms, rootkits, ransomware, and Trojans.
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following settings must be established when you want to make a secure wireless connection? (Choose Two.)
The brand of access point
The wireless standard used
The encryption standard used
The SSID of the access point
Answer explanation
Explanation:
To make a secure connection, you need to know the service set identifier (SSID) of the AP and the encryption being used (for example, WPA2 or WPA3). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.
Incorrect Answers: Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11ax, ac, n, or g), but the brand of access point isn’t really helpful.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which log file contains information about Windows setup errors?
setupact.log
setuperr.log
unattend.xml
diskmgmt.msc
Answer explanation
Explanation:
setuperr.log contains information about setup errors during the installation of Windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation.
Incorrect Answers: setupact.log contains the events that occurred during the installation. unattend.xml is the answer file used by Windows during unattended installations. diskmgmt.msc is a command that can be run from the Run prompt or the command line to open the Disk Management utility.
Create a free account and access millions of resources
Similar Resources on Wayground
80 questions
KELAS 7_SOAL CAMPUREAN

Quiz
•
7th Grade - University
75 questions
Đề 23 E3 HT 23.24

Quiz
•
University
80 questions
A-Chương 2

Quiz
•
University
77 questions
ICT for exam

Quiz
•
University
80 questions
KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2

Quiz
•
2nd Grade - University
83 questions
Ақпараттық жүйелер мен вирустар

Quiz
•
University
80 questions
ÔN TẬP CUỐI KÌ K11

Quiz
•
University
75 questions
Database Essentials

Quiz
•
KG - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University