Last Updated on July 2, 2021 by Admin 2

220-1002 : CompTIA A+ Certification Exam: Core 2 : Part 14

  1. A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine?

    • chmod
    • grep
    • ifconfig
    • sudo
  2. Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

    • Create a static DNS entry on the server for the PC
    • Change her NIC IP address to dynamic
    • Create a new exception on her local firewall
    • Make sure the PC’s IP is in the management VLAN
  3. A user is unable to access a network share but can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

    • ping
    • nslookup
    • net use
    • ipconfig
  4. A user is unable to print to the office’s networked laser printer from a Windows desktop. A technician attempts to print a test page, but nothing comes out of the printer. The technician tries to print from a label printer, which is connected via USB, but there is no output from that printer either. Which of the following actions are MOST likely to restore printing functionality to both printers? (Choose two.)

    • Restart the wired AutoConfig service
    • Restart the Windows Firewall service
    • Power cycle the label printer
    • Power cycle the desktop
    • Power cycle the laser printer
    • Restart the print spooler service
  5. Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?

    • Shoulder surfing
    • Man-in-the-middle
    • Tailgating
    • Impersonation
  6. Which of the following extensions identify files that are typically implemented as scripts? (Choose two.)

    • .vbs
    • .txt
    • .exe
    • .zip
    • .bat
    • .xlsx
  7. Which of the following uses a remote access server to forward a user’s logon password to an authentication server, allowing or denying access to a system?

    • WPA2-PSK
    • AES
    • TACACS
    • TKIP
  8. A Linux user wants to use the grep command to identify every file name in the current directory that contains the word “mandatory”. Which of the following commands would BEST accomplish this?

    • grep –d mandatory *
    • grep –d mandatory *
    • grep mandatory file
    • grep mandatory *
  9. A customer’s smartphone has been overheating frequently and becoming unresponsive since installing an OS update. A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Choose two.)

    • Roll back the OS update
    • Update the PRL
    • Force stop running applications
    • Enable airplane mode
    • Perform a factory reset
    • Run application updates
    • Reset network settings
  10. Which of the following Windows versions introduced using applications in the Metro interface?

    • Windows 7
    • Windows 8
    • Windows 8.1
    • Windows 10
  11. A security team recommends a disaster recovery plan with the following requirements:
    Recent backups should be readily available.
    Only long-term backups should be stored off premises.
    There should be minimum expenditure on hardware.

    Which of the following satisfies all of these requirements?

    • Store 30 days of backups on premises and then age the backups to the public cloud
    • Store backups on premises and burst to the public cloud if needed
    • Store backups both on premises and in a public cloud infrastructure
    • Store all the backups in a public cloud with no on-premises backup storage
  12. Joe, a technician, is configuring advanced security settings on a SOHO router. Joe cannot locate the settings he intends to change, but the online vendor documentation has instructions for configuring those settings. Which of the following should the technician perform?

    • Configure content filtering
    • Check for a firmware update
    • Disable the SSID broadcast
    • Change the firewall settings
  13. Which of the following standards controls the processing of credit cards?

    • PCI
    • PHI
    • PGP
    • PII
  14. A user lives in a location that experiences frequent lightning storms. Which of the following would be the LEAST expensive solution to protect the user’s computer hardware?

    • A surge protector
    • Grounding
    • A power generator
    • An uninterruptible power supply
  15. Which of the following attack types exploits vulnerabilities in human nature?

    • Zero-day
    • Man-in-the-middle
    • Spoofing
    • Phishing
  16. A user installed an application that now requires a license key to enable full functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task?

    • SSH
    • RDP
    • FTP
    • Telnet
  17. A technician is securing a server room by implementing a two-factor authentication solution. Which of the following should the technician implement to provide the BEST security for the server room?

    • Door lock and mantrap
    • Server lock and badge reader
    • Security guard and entry control roster
    • Biometric lock and hardware token
  18. After a virus outbreak due to USB usage, a technician must deny users access to removable hard drives via USB ports as soon as possible. The technician has been asked to avoid interrupting any users. Which of the following is the BEST way for the technician to perform this security feature?

    • Push a group policy
    • Assign a local security policy
    • Create a network login script
    • Update the AUP
  19. A user recently connected a Windows laptop to a free WiFi hotspot. After returning to the office, the user cannot access network shares. Which of the following is the MOST likely cause?

    • Remote access has been disabled
    • The local firewall settings are incorrect
    • Location-based settings are not turned on
    • The network shares are hidden
  20. When hackers execute code against a vulnerability in the hope that it has not yet been addressed, this is known as a:

    • zero-day attack
    • spoofing attack
    • DDoS attack
    • brute force attack