CompTIA 220-1102 CompTIA A+ Certification Core 2 Exam Online Training
CompTIA 220-1102 Online Training
The questions for 220-1102 were last updated at Apr 21,2024.
- Exam Code: 220-1102
- Exam Name: CompTIA A+ Certification Core 2 Exam
- Certification Provider: CompTIA
- Latest update: Apr 21,2024
A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites.
Which of the following is MOST likely the cause of the user’s issue?
- A . Keylogger
- B . Cryptominers
- C . Virus
- D . Malware
D
Explanation:
The most likely cause of the user’s issue of applications opening without being launched and browser redirects when trying to go to certain websites is malware. Malware is a general term that refers to any software or code that is malicious or harmful to a computer or system. Malware can perform various unwanted or unauthorized actions on a computer or system, such as opening applications, redirecting browsers, displaying ads, stealing data, encrypting files or damaging hardware. Malware can infect a computer or system through various means, such as email attachments, web downloads, removable media or network connections. Keylogger is a type of malware that records and transmits the keystrokes made by a user on a keyboard. Keylogger can be used to steal personal or sensitive information, such as passwords, credit card numbers or chat messages. Keylogger does not typically open applications or redirect browsers but only captures user inputs. Cryptominers are a type of malware that use the computing resources of a computer or system to mine cryptocurrency, such as Bitcoin or Ethereum. Cryptominers can degrade the performance and increase the power consumption of a computer or system. Cryptominers do not typically open applications or redirect browsers but only consume CPU or GPU cycles. Virus is a type of malware that infects and replicates itself on other files or programs on a computer or system.
Which of the following is MOST likely contained in an EULA?
- A . Chain of custody
- B . Backup of software code
- C . Personally identifiable information
- D . Restrictions of use
D
Explanation:
An EULA (End-User License Agreement) is a legally binding contract between a software supplier and a customer or end-user, generally made available to the customer via a retailer acting as an intermediary. A EULA specifies in detail the rights and restrictions which apply to the use of the software. Some of the main terms included in an EULA are the terms and scope of the license, any licensing fees, warranties and disclaimers, limitation of liability, revocation or termination of the license, and intellectual property information and restrictions on using the license (e.g. modification and copying)1 https://www.termsfeed.com/blog/eula-vs-terms-conditions/
A technician has been asked to set up a new wireless router with the best possible security.
Which of the following should the technician implement?
- A . WPS
- B . TKIP
- C . WPA3
- D . WEP
C
Explanation:
WPA3 (Wi-Fi Protected Access version 3) is the latest version of Wi-Fi security and offers the highest level of protection available. It is designed to protect against brute force password attempts and protect against eavesdropping and man-in-the-middle attacks. WPA3 also supports the use of stronger encryption algorithms, such as the Advanced Encryption Standard (AES), which provides additional protection for wireless networks. WPA3 should be implemented in order to ensure the best possible security for the new wireless router.
A user purchased a netbook that has a web-based, proprietary operating system.
Which of the following operating systems is MOST likely installed on the netbook?
- A . macOS
- B . Linux
- C . Chrome OS
- D . Windows
C
Explanation:
A user purchased a netbook that has a web-based, proprietary operating system.
Which of the following operating systems is MOST likely installed on the netbook?
- A . macOS
- B . Linux
- C . Chrome OS
- D . Windows
C
Explanation:
A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer.
Which of the following filesystems will the technician MOST likely use?
- A . FAT32
- B . ext4
- C . NTFS
- D . exFAT
D
Explanation:
A technician needs to manually set an IP address on a computer that is running macOS.
Which of the following commands should the technician use?
- A . ipconfig
- B . ifconfig
- C . arpa
- D . ping
B
Explanation:
ifconfig is a command-line utility that allows you to configure network interfaces on macOS and other Unix-like systems1. To set an IP address using ifconfig, you need to know the name of the network interface you want to configure (such as en0 or en1), and the IP address you want to assign (such as 192.168.0.150). You also need to use sudo to run the command with administrative privileges2. The syntax of the command is: sudo ifconfig interface address
For example, to set the IP address of en1 to 192.168.0.150, you would type:
sudo ifconfig en1 192.168.0.150
You may also need to specify other parameters such as subnet mask, gateway, or DNS servers, depending on your network configuration3. The other commands are not directly related to setting an IP address on macOS. ipconfig is a similar command for Windows systems4, arpa is a domain name used for reverse DNS lookup, and ping is a command for testing network connectivity.
A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet.
Which of the following attacks MOST likely occurred?
- A . Brute force
- B . Zero day
- C . Denial of service
- D . On-path
B
Explanation:
A zero-day attack is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerability
✑ Configuring AAA Services. Retrieved from https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-0/security/configuration/guide/sc40crsbook_chapter1.html
An organization’s Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years.
Which of the following backup methods would BEST meet the requirements?
- A . A daily, incremental backup that is saved to the corporate file server
- B . An additional, secondary hard drive in a mirrored RAID configuration
- C . A full backup of the data that is stored of site in cold storage
- D . Weekly, differential backups that are stored in a cloud-hosting provider
C
Explanation:
According to CompTIA A+ Core 2 objectives, a full backup stored off-site provides the greatest protection against data loss in the event of a ransomware attack or other data disaster. By storing the backup in a separate physical location, it is less likely to be affected by the same event that could cause data loss on the original system. Cold storage is a term used for data archiving, which typically refers to a long-term storage solution that is used for retaining data that is infrequently accessed, but still needs to be kept for regulatory or compliance reasons.
A user reports a computer is running slow.
Which of the following tools will help a technician identity the issued
- A . Disk Cleanup
- B . Group Policy Editor
- C . Disk Management
- D . Resource Monitor
D
Explanation:
Resource Monitor will help a technician identify the issue when a user reports a computer is running slow1