CompTIA A+ Core 2 Practice Test A

Quiz
•
Computers
•
University
•
Medium
Candice Kiser
Used 1K+ times
FREE Resource
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
One of your technicians is on a service call and is dealing with a furious customer who has been shouting loudly. The technician tries but cannot calm down the customer. Which of the following statements best describes the next step the technician should take?
He should let the customer continue to shout; sooner or later the customer will get tired and calm down
He should call the supervisor and complain
He should leave the customer site and document the incident
He should shout back at the customer in an attempt to regain control of the situation
Answer explanation
Explanation:
The technician should leave the customer site and document the incident. In rare cases, there is no way to calm down the customer, and you might have to leave the site if there is no other alternative.
Incorrect Answers: If the customer has been shouting for a while and the technician cannot calm down the customer, it’s pointless to stay and wait. You don’t want to call your supervisor and complain about the situation while you’re at the customer’s location; that would probably infuriate the customer further. Wait until you have left the customer’s premises. Never shout back at the customer; this is not a battle for power, and you should never take a customer’s anger personally. Be sure to document the incident in depth after leaving the customer’s location. Definitely let your supervisor know what has happened – without complaining.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which type of software helps protect against viruses that are attached to email?
Firewall software
Antivirus software
Edge
Hardware firewall
Answer explanation
Explanation:
Antivirus software (from vendors such as McAfee or Norton) updates automatically to protect you against the latest viruses, whether they are attached to emails or are lying in wait on removable media. You might also choose to use the built-in Microsoft Defender or Windows Security on newer versions of Windows.
Incorrect Answers: Firewalls protect against intrusion but not viruses. They could be hardware based, such as the ones found in most SOHO multifunction network devices, or software based, such as Windows Defender Firewall. Edge and Chrome (as well as other web browsers) can be configured to make your system more secure (especially when dealing with web-based emails), but that is not the best answer listed.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You create an answer file to aid in installing Windows. Which type of installation are you performing?
Drive image installation
USB installation
Multiboot installation
Unattended installation
Answer explanation
Explanation:
An unattended installation of Windows requires an answer file. This file is normally named unattend.xml. Unattended installations can be done locally or as part of a network installation, using Windows Deployment Services (WDS) in Windows Server.
Incorrect Answers: Drive image installations use third-party programs such as Ghost or work with a System Restore image created within Windows. Local installation from USB is possible if you copy the Windows .iso file to the USB flash drive (if the drive is big enough) and obtain the USB/DVD download tool from the Microsoft website. A multiboot installation means that more than one operating system is being installed to the same drive. One or both of these could possibly be unattended installations. Remember that with multiboot installations, each OS should inhabit its own primary partition.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
You need to locate a mobile device that was stolen. Which technology can aid in this?
GPS
Screen orientation
Passcode lock
Gmail
Answer explanation
Explanation:
The Global Positioning System (GPS) technology (or location services) can be instrumental in locating lost or stolen mobile devices. Many devices have GPS technology installed; others rely on geotracking or Wi-Fi hotspot location techniques. (You are being watched!)
Incorrect Answers: Screen orientation is the direction of screen display – vertical or horizontal (or upside down) – which typically depends on how you hold the device. It can be calibrated on Android devices with the G-Sensor calibration tool. A passcode lock is a set of numbers that must be entered to open a mobile device or take it out of sleep mode. Gmail is Google’s web-based email service and is incorporated into the Android operating system.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When a person takes control of a session between a server and a client, it is known as which type of attack?
DDoS
Brute force
Session hijacking
Malicious software
Answer explanation
Explanation:
Session hijacking occurs when an unwanted mediator takes control of the session between a client and a server (for example, an FTP or HTTP session). An example of this would be an on-path attack – also known as a man-in-the-middle (MITM) attack.
Incorrect Answers: DDoS stands for distributed denial-of-service attack, an attack perpetuated by hundreds or thousands of computers in an effort to take down a single server; the computers involved in this type of attack, individually known as zombies, are often unknowingly part of a botnet. A brute-force attack is an attempt to crack an encryption code or password. Malicious software is any compromising code or software that can damage a computer’s files; examples include viruses, spyware, worms, rootkits, ransomware, and Trojans.
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following settings must be established when you want to make a secure wireless connection? (Choose Two.)
The brand of access point
The wireless standard used
The encryption standard used
The SSID of the access point
Answer explanation
Explanation:
To make a secure connection, you need to know the service set identifier (SSID) of the AP and the encryption being used (for example, WPA2 or WPA3). The SSID takes care of the “connection” portion, and the encryption takes care of the “secure” portion. After all computers are connected, consider disabling the SSID for increased security.
Incorrect Answers: Knowing the wireless standard being used can help you verify whether your computer is compatible (802.11ax, ac, n, or g), but the brand of access point isn’t really helpful.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which log file contains information about Windows setup errors?
setupact.log
setuperr.log
unattend.xml
diskmgmt.msc
Answer explanation
Explanation:
setuperr.log contains information about setup errors during the installation of Windows. Start with this log file when troubleshooting. A file size of 0 bytes indicates no errors during installation.
Incorrect Answers: setupact.log contains the events that occurred during the installation. unattend.xml is the answer file used by Windows during unattended installations. diskmgmt.msc is a command that can be run from the Run prompt or the command line to open the Disk Management utility.
Create a free account and access millions of resources
Similar Resources on Wayground
75 questions
Sistemas informáticos

Quiz
•
10th Grade - University
83 questions
ITP 324 - Quiz 1

Quiz
•
University
75 questions
Career Development Semester Exam 2025

Quiz
•
8th Grade - University
80 questions
DSA Quiz (A)

Quiz
•
University
81 questions
CUP DE COMPUTACION

Quiz
•
University
80 questions
Bài kiểm tra THCB

Quiz
•
University
79 questions
Bài đầu tiên

Quiz
•
University
77 questions
SC-900 (81-167)

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University