IT CertificationsComprehensive Study Set

Comptia A+ 1102 Pbq

87 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

PBQ: Wireless Router Settings

ANSWER

1. Wireless Radio: set to "Enable" 2. Security: Select WPA3 3. Content Filtering: check to enable 4. DHCP: check to enable 5. Transmit Power: set to Medium (avoid transmitting access too far beyond your apartment) 6. Freq band: set to 5 GHz (avoid overly used 2.4 freq) 7. SSID broadcast: Disable 8. Password generation: Check ALL boxes 9. Check for firmware update: check to enable

QUESTION 2

PBQ: Safety repairing server

ANSWER

1. What must change in the repair environment: remove carpet 2. Where can you attack an anti-ESD strap: attach to server's metal chassis 3. How should you handle sensitive parts as you remove or install them into the server: hold the edges 4. Select all tools and equipment that can help you prevent shock to yourself, the server, or the components you are handling: check ALL 5. Select the appropriate packaging to carry the defective parts back to the warehouse: shiny, gray metallic packaging 6. Provide a recommendation to prevent the server from sustaining any further damage in the same or similar situation: connect server to a UPS

QUESTION 3

PBQ: complete the Windows commands that would display the directory of the C drive

ANSWER

1. cd C:\Windows\DigitalLocker 2. cd .. 3. cd\ 4. cd Users 5. cd\ 6. dir 7. What wildcard character allows you to substitute for a single, unspecified character in a command: ? 8. What wildcard character can be used to indicate a string of characters: * 9. When used with the dir command, can be used to list files using a wide format with no details: w/ 10. When used with the dir command, can be used to list files in order of name: /o:n

QUESTION 4

A vulnerability and risk manager reviews older systems that can only receive critical patches. What are these systems classified as?

ANSWER

Extended Support

QUESTION 5

The Instagram app on an Android phone will not launch. Which of the following options could fix the problem?

ANSWER

Force Stop

QUESTION 6

A technician is working with a customer who is being unreasonable. Which of the following skills should the technician use? (Select all that apply.)

ANSWER

-Do not take complaints personally -Identify early that the customer is angry -Hang up

QUESTION 7

What uses a 4-way handshake to allow a station to associate with an access point, authenticate its credential, and exchange a key to use for data encryption?

ANSWER

WPA2

QUESTION 8

The System Restore tool in Windows is used to roll back configuration changes to an earlier date or restore point. One option for creating restore points is to use Task Scheduler. What other actions will create a restore point? (Select all that apply.)

ANSWER

-Installing a program -Updating an application

QUESTION 9

A researcher calls the help desk complaining of slow computer performance. When the technician arrives and probes for clues, the researcher explains that they frequently run multiple programs simultaneously and have a significant number of browser tabs open to aid with their research. Which of the following solutions should speed up the computer's performance?

ANSWER

Add RAM

QUESTION 10

A user is buying software for their PC. Which of the following would the user be purchasing for individual use?

ANSWER

Personal license

QUESTION 11

A Linux server administrator meets with their Windows server administrator counterparts. A certain grouping of Linux and Windows servers is designated to run services that share files. What will the administrators need to enable sharing between the disparate systems?

ANSWER

samba

QUESTION 12

A technician is cleaning a computer and notices dust forming over the fan blades and ventilation slots. What can the technician use to perform dust cleanup? (Select all that apply.)

ANSWER

-compressed air blaster -natural bristle brush -pc vacuum cleaner

QUESTION 13

A technician is talking to a customer about an issue, but the customer is not sure how to locate the issue on their computer, so the technician has the customer tell them step by step to figure out the issue. What type of technique is this?

ANSWER

Ask an open-ended question.

QUESTION 14

The Snapchat app on an iOS phone will not close. The user rebooted the device, but that was unsuccessful. Which of the following options would be the best for the user to try to fix the problem?

ANSWER

Uninstall then reinstall

QUESTION 15

A company needs to set up perimeter security to control and monitor who can approach the building. Which of the following should the company use? (Select all that apply.)

ANSWER

-Guard -Fencing -access control vestibule

QUESTION 16

A technician implements a type of authentication method used on Windows machines that once users are authenticated, they are trusted by the system. What is this method?

ANSWER

Kerberos

QUESTION 17

A technician is using a tool with a secure erase function that performs a zero-filling on HDDs and marks all blocks as empty on SSDs. The SSD firmware's automatic garbage collectors then perform the actual erase of each block over time. What is this tool?

ANSWER

Low-level formatting

QUESTION 18

A teacher wishes to reform education in their school system. They are looking for low-cost operating systems to support education. Which one is best geared towards accomplishing their goal?

ANSWER

ChromeOS

QUESTION 19

A user notices that their device has a leaking component and needs to take careful measures to minimize any risk and discard the approved component at the proper waste facility. Which of the following disposal is this?

ANSWER

Battery

QUESTION 20

A network administrator troubleshoots domain name system (DNS) issues that a particular user is having. Which of the following utilities will help the administrator troubleshoot DNS specifically?

ANSWER

nslookup

QUESTION 21

A user receives a Windows dialog box pop-up that states 163 viruses were detected by antivirus software. When the user clicks on the pop-up, it states that to get rid of the viruses the user needs to purchase the software's full version. What type of antivirus does the user have in this scenario?

ANSWER

Rogue

QUESTION 22

A user experiences significant system instability on their computer. It frequently shuts down, freezes, reboots, and powers off with no accompanying error messages. Which of the following problems would cause this instability? (Select all that apply.)

ANSWER

-Failing CPU -Overheating -Misconfigured firewall

QUESTION 23

A local jewelry maker sets up a booth at a craft fair. When the first customer makes a purchase, the vendor's contactless card reader will not recognize the customer's wallet app. Which of the following could solve the problem?

ANSWER

Hold the mobile device closer to the reader and wait.

QUESTION 24

A technician suspects a computer system is infected with malware. Which of the following activities is the correct next step?

ANSWER

Sandboxing

QUESTION 25

An administrator uses a method that assigns permissions and rights to a collection of user accounts. What is this called?

ANSWER

Security group

QUESTION 26

According to CompTIA's seven-step best practices procedure for malware removal, which of the following correctly lists the first three steps?

ANSWER

1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore.

QUESTION 27

A security administrator for a defense contracting company wants to disable external devices. The administrator pushes out a group policy setting to disable such devices but worries that attackers might elevate privileges and reenable them. What other setting will help the administrator accomplish the objective?

ANSWER

Selective suspend

QUESTION 28

A remote computer administrator is managing clients in rigorous conditions. The clients keep overheating and often have issues. The administrator wants to run regular checks for damage or corruption. Which of the following will help them accomplish this?

ANSWER

sfc

QUESTION 29

A technician detected and reported an incident, resulting in the appropriate unit being notified and tasked with acting as first responders, taking charge of the situation, and formulating the appropriate response. What is this unit called?

ANSWER

CSIRT

QUESTION 30

A user calls the help desk complaining that Windows freezes to a blue screen every time it tries to boot. When the technician arrives, they boot the computer in Safe Mode. After evaluating this situation, what is the BEST reason the technician wants to enter Safe Mode to begin troubleshooting?

ANSWER

Safe Mode loads only the minimum amount of drivers and services to start the system.

QUESTION 31

A low battery charge can cause several different problems to occur on a mobile device. Which of the following issues could stem from a low battery? (Select all that apply.)

ANSWER

-weak bluetooth signal -weak wifi signal

QUESTION 32

Which of the following can prevent, detect, and remove software threats that consist of ransomware, Trojans, spyware, and rootkits?

ANSWER

anti-malware

QUESTION 33

A company has experienced a power outage, but activation of an alternative source has kicked in. What is this alternative source called?

ANSWER

UPS

QUESTION 34

What are their options when a company wants to create and deliver a custom app for their employees without using a public store? (Select all that apply.)

ANSWER

-Managed google play -Apple business manager

QUESTION 35

A user implements a technique that requires an input of 4- or 6- digits to gain access to their device. What is this technique?

ANSWER

PIN

QUESTION 36

A technician needs this skill to give full attention to the customer, so there is no disagreement or misinterpretation of what was said. What is this skill?

ANSWER

Active listening

QUESTION 37

Which of the following should generate an alert when the account is disabled or altered?

ANSWER

change default administrator account

QUESTION 38

A progressive healthcare provider sets up color-filter modes on client machines and tailors them to specific users who are color blind. Where can the healthcare administrator configure this?

ANSWER

accessibility

QUESTION 39

A user finds that their iPhone 5 starts to run slowly, and a reboot does not solve the slow performance. Which of the following issues could be causing the problem? (Select all that apply.)

ANSWER

-too many apps open -OS update -Low battery charge

QUESTION 40

A curious user looks through their local logs and sees errors in region-coding copy-protection mechanisms. What type of device is generating these logs?

ANSWER

Optical media

QUESTION 41

A security engineer researches how to make backup and antivirus apps available to their iOS mobile devices. Where should the apps be pushed?

ANSWER

Business Manager

QUESTION 42

A threat actor poses as a hiring manager for a company and asks a user for their personal credentials and to log in to a spoofed website that looks genuine. When the user confirms log-in with the spoofed website, their information is obtained. Which of the following is this attack?

ANSWER

Phishing

QUESTION 43

What is also known as a potentially unwanted application (PUA) and should be removed from the computer?

ANSWER

Untrusted source

QUESTION 44

A systems administrator wants to create a scheduled task throughout the environment, which does a basic health check at night when users are not working. Which command should the administrator use in their scheduled task?

ANSWER

chkdsk

QUESTION 45

An attacker is trying multiple times to login into a user's phone, but the phone ends up being disabled. What is this called?

ANSWER

failed attempts lockout

QUESTION 46

Which of the following uses a security shield icon for tasks that are protected under them?

ANSWER

UAC - user account control (UAC is a Windows security feature designed to protect the system against malicious scripts and attacks that could exploit the powerful privileges assigned to members of the Administrators group).

QUESTION 47

Which of the following backup procedures state that users should have three copies of their data across two media types, with one copy held off-line and off-site?

ANSWER

3-2-1 backup rule

QUESTION 48

An IT specialist found a damaging package on a client's computer disguised as something else. What did the specialist find?

ANSWER

trojan

QUESTION 49

An IT manager is setting up an image for dispatching airplanes at a major airport. They are trying to lock down the image to run only the dispatch service. One of the layers of security is to block unneeded service ports from communicating, such as email. Where should the manager start?

ANSWER

Windows firewall

QUESTION 50

An administrator uses an access control system to shuttle authentication and authorization traffic between the supplicant and the AAA that encrypts an entire authentication rather than just the password. What is this method?

ANSWER

TACACS+ (one way of implementing authentication, authorization, and accounting (AAA). TACACS+ is often used in authenticating administrative access to routers, switches, and access points).

QUESTION 51

A user calls the help desk with issues consistent with a malware infection, although the user received no alert. The technician confirms that there was no malware alert. Which of the following options would be an appropriate next step? (Select all that apply.)

ANSWER

-Scan the system using different antivirus software. -Update the antivirus software.

QUESTION 52

A user downloads a dating app from the Apple store and then gets requests for permission to access their camera; which of the following is the most likely cause of the permission requests?

ANSWER

spoofed app

QUESTION 53

Microsoft provides a repository of information about threats that Windows Defender discovers. What is the name of the repository?

ANSWER

Microsoft knowledge base

QUESTION 54

A user is conscientious about security after hearing about breaches in the news. The user wants to see if they are up to date on patches for their Apple computer. Where should the user go to check?

ANSWER

App store

QUESTION 55

A technician uses a method where each server is configured with a public/private encryption key pair and identified by a host key fingerprint. What is this method?

ANSWER

SSH

QUESTION 56

Which of the following will block untrusted application sources from running?

ANSWER

Anti-malware

QUESTION 57

Management provides employees with written policies and procedures to help them fulfill their tasks. Which of the following procedures requires employees to enroll and identify themselves using secure credentials?

ANSWER

new user setup checklist

QUESTION 58

An administrator in charge of user endpoint images wants to slipstream and use image deployment. Which boot method would best support this?

ANSWER

Network (Network boot setup means connecting to a shared folder containing the installation files, which could be slipstreamed or use image deployment).

QUESTION 59

A technician must remove all corporate accounts and files from an employee's device but leave personal applications, accounts, settings, and files untouched. What is this called?

ANSWER

Enterprise wipe

QUESTION 60

An endpoint machine administrator configures specific Apple computers designated for users with disability. Where should the administrator look to configure these settings?

ANSWER

accessibility

QUESTION 61

A customer uses their computer at a café, and an attacker watches the customer typing their login information. What is this called?

ANSWER

shoulder surfing

QUESTION 62

A technician makes sure that there is no faulty electrical equipment that can pose a risk and places extinguishers nearby. What is this called?

ANSWER

electrical fire safety

QUESTION 63

While conducting an online search for cleaning services, a homeowner clicks on the link for one of the results. When the website loads, the page says, "Warning: Potential Security Risk Ahead." What would cause this message to appear? (Select all that apply.)

ANSWER

-The certificate has expired. -Malware is trying to redirect the browser to a spoofed page. -The certificate is issued by an untrusted CA.

QUESTION 64

An employee uses a cryptographic contactless technique that allows access to a building. What is this technique?

ANSWER

badge reader

QUESTION 65

An employee uses an option to ask for help from a technician with an invitation file protected by a passcode. What is this option?

ANSWER

MSRA (Microsoft Remote Assistance (MSRA) allows a user to ask for help from a technician or co-worker by an invitation file protected by a passcode. The helper opens the invitation file to connect to the remote system).

QUESTION 66

A user disables some of the laptops' services, thinking it would speed up performance. After restarting the laptop, "One or more services failed to start" appears. When the IT specialist opens the Services snap-in, they identify the failed service and restart it, but that does not fix it. Which of the following scenarios best explains why the restart did not work?

ANSWER

the user disabled a dependent service

QUESTION 67

What component storage prevents static electricity from discharging?

ANSWER

antistatic bags

QUESTION 68

A client administrator for a video game development company wants to upgrade machines to support five primary partitions. The developers work with a lot of large files and might even need partitions larger than 2 TB. Which of the following should the administrator use?

ANSWER

GPT (One of the features of GPT is support for more than four primary partitions. Windows allows up to 128 partitions with GPT. GPT also supports larger partitions (2 TB+) and a backup copy of the partition entries.)

QUESTION 69

A forensic investigator is told that a server's processor that does not normally run high has been over-utilized lately, and they suspect possible malware. The investigator wants to start by investigating processes. Which command can they use to start the investigation? (Select all that apply.)

ANSWER

-top: The top command lists all processes running on a Linux system like ps. It acts as a process management tool by enabling users to prioritize, sort, or terminate processes interactively. -ps: The ps command invokes the process table, a record that summarizes the currently running processes on a system.

QUESTION 70

Malware encyclopedias are a resource that antivirus vendors often make available to IT professionals. What is their value for IT practitioners? (Select all that apply.)

ANSWER

-They are documentation of known malware. -They provide information about the type, symptoms, purpose, and removal of malware.

QUESTION 71

A company has hundreds of employees who use the same software on their computers, so they offer a company product key to access the software. What is this product?

ANSWER

Corporate-use license

QUESTION 72

An administrator wants to listen to music through headphones to help with productivity during work. However, the administrator is having issues connecting the headphones via Bluetooth. Where should they go first to look?

ANSWER

devices

QUESTION 73

A client administrator sets up a new system for GUID partition table (GPT) partitioning. What dependency will the administrator need to set?

ANSWER

UEFI When the disk uses GPT partitioning, the system firmware must be set to use the Unified Extensible Firmware Interface (UEFI) boot method.

QUESTION 74

A server administrator tests connectivity between two statically assigned servers in a forest with different domains. What should they check first in this case?

ANSWER

DNS Settings Because the servers are on different domains, DNS should be checked first. The administrator probably uses the hostname instead of the fully qualified domain name (FQDN). If not specified, the host will likely try to resolve to the same domain.

QUESTION 75

An administrator uses a backup rotations scheme that labels the backup tapes in generations. What is this called?

ANSWER

GFS Grandfather-father-son (GFS) is a backup rotation scheme that uses son tapes to store the most recent data and have the shortest retention period. Grandfather tapes are the oldest and have the longest retention period.

QUESTION 76

A transportation company wants to set up software that gathers statistics from the controller area network for trailers hauling loads, enabling them to adjust processes to optimize cost savings. What type of adapter will the company need to send the statistics back to their cloud network?

ANSWER

WWAN Wireless Wide Area Network (WWAN) uses a cellular adapter to connect to the internet via a provider's network. These networks are typically metered with a set data limit.

QUESTION 77

An administrator reviews a series of instructions that the workstation follows every time a user logs on. What is this called?

ANSWER

Login script Login script performs configuration or process activity when the user signs in. A login script can be defined via the user profile or assigned to an account via group policy.

QUESTION 78

A digital forensics expert investigates a laptop that was not completely powered down. They are looking for a hibernation file on the local hard drive. Which power mode would perform this?

ANSWER

Hibernate Hibernate mode suspends to disk. It saves any open but unsaved file data in memory to disk (as hiberfil.sys in the root of the boot volume) and then turns the computer off, which is also referred to as ACPI mode S4.

QUESTION 79

An employee disposes of a disk by grounding it into little pieces. What is this called?

ANSWER

shredding

QUESTION 80

A technician needs to set up a method that blocks URLs or search terms using keywords and phrases. What is this method?

ANSWER

content filtering Content filtering means that the firewall downloads curated reputation databases that associate IP address ranges, Fully Qualified Domain Names (FQDNs), and URL web addresses with sites known to host various categories of content.

QUESTION 81

A security analyst notices a critical incident that has a widespread effect on customers that can eventually involve a potential data breach. The analyst creates a ticket with the vendor and sets the importance in order to trigger a faster response time. What describes what attribute of the ticket the analyst set?

ANSWER

severity levels

QUESTION 82

A new employee is going over the site safety handbook about correct ways of carrying objects, so they do not damage the object or get injured. What is this called?

ANSWER

lifting techniques

QUESTION 83

A security analyst conducts an incident response investigation against suspected malware on a userbox. The analyst suspects a certain variant of malware known to beacon out to a command and control server. What command will help them investigate this?

ANSWER

netstat The netstat command can investigate open ports and connections on the localhost, which will help to investigate potential command and control connections established by malware on the localhost.

QUESTION 84

An IT professional helps to fix their friend's computer. The computer is running extremely slow. The IT professional notices the operating system is running Home edition. Which of the following is the only service available for the Home edition?

ANSWER

RDP Remote Desktop Protocol (RDP) allows users to connect to the machine and operate it over a network. While the Home edition has the RDP client software, it does not support an RDP server.

QUESTION 85

A marketing professional normally sends large files to other team members. The IT department recommended using a shared drive and assisted them in setting it up. The project was a very high priority, so the professional collaborated with several members but started receiving reports that some users could not access it sometimes and others could. They eventually figured out that only 20 people at a time seemed to be able to access it. What is causing the issue?

ANSWER

The share was created on a Windows desktop.

QUESTION 86

A penetration tester conducts the initial reconnaissance phase and is currently targeting externally facing servers for a certain company. Currently, they are trying to enumerate the domain name system (DNS) servers. Which built-in tool will help them perform this?

ANSWER

dig dig is a powerful tool for gathering information and testing name resolution, installed on most Linux distributions. Output is displayed in an answer section and includes the IP address mapped to the domain name.

QUESTION 87

A security engineer runs a long tail analysis to determine the frequency of services and processes communicating to the internet. After baselining a large amount of normal traffic such as updates, they encounter a suspicious communication frequency every five minutes from a particular box. They have done a thorough job investigating running processes, memory analysis, and file integrity checks but find nothing. What else could the engineer check for persistence mechanisms that could send the communications?

ANSWER

taskschd.msc The Task Scheduler (taskschd.msc) runs software and scripts according to calendar or event triggers which would not help diagnose and troubleshoot internet connectivity issues.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials