{"id":81099,"date":"2022-03-10T04:51:31","date_gmt":"2022-03-10T10:21:31","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=81099"},"modified":"2023-12-12T23:26:52","modified_gmt":"2023-12-13T04:56:52","slug":"comptia-a-220-1102-core-2-exam-questions","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/","title":{"rendered":"20+ Free Questions on CompTIA A+ (220-1102) Core 2 Certification"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This article carries Free <a href=\"https:\/\/www.whizlabs.com\/comptia-a-220-1002-core-2-course\/\">CompTIA A+ Core 2 practice test<\/a> Questions and their elaborate answers for the CompTIA A+ (220-1102) Core 2 Exam.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#About_the_Certification\" >About the Certification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#What_does_the_exam_cover\" >What does the exam cover?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#What_is_in_there_for_you\" >What is in there for you?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Security\" >Domain: Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System\" >Domain: Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-2\" >Domain : Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-3\" >Domain : Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-4\" >Domain : Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-2\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-5\" >Domain: Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-6\" >Domain: Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-3\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_System-7\" >Domain: Operating System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-4\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-5\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-6\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-7\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-8\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-9\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-10\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-11\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Software_Troubleshooting-12\" >Domain: Software Troubleshooting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operational_Procedures\" >Domain: Operational Procedures\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operational_Procedures-2\" >Domain: Operational Procedures\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operational_Procedures-3\" >Domain: Operational Procedures\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operational_Procedures-4\" >Domain: Operational Procedures\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Security-2\" >Domain: Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Security-3\" >Domain: Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.whizlabs.com\/blog\/comptia-a-220-1102-core-2-exam-questions\/#Domain_Operating_Systems\" >Domain: Operating Systems<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"About_the_Certification\"><\/span>About the Certification<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">CompTIA A+ is considered one of the major certifications for starting a career in IT. It is the Industry Standard that jet launches IT careers in the digital world. The CompTIA A+ (220-1102) Core 2 Certification enables you to perform spontaneous critical IT support tasks and end-point management.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_does_the_exam_cover\"><\/span>What does the exam cover?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The exam covers the configuration of the device operating systems, that is, Mac, Linux, Android, iOS, Chrome OS, and Windows, along with the administration of cloud and client based softwares. It comprises a total of 90 questions which includes Multiple choice, multiple response, performance based, and drag and drop questions.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_is_in_there_for_you\"><\/span>What is in there for you?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The professionals holding this certification are Quality problem solvers. They provide support for the on-demand technologies involving Cloud, Security, Data Management, and more. It enables you to demonstrate core security skills.<\/span><\/p>\n<p>Let&#8217;s start !<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Security\"><\/span><span style=\"font-weight: 400;\">Domain: Security<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q1 :<\/span><b>\u00a0<\/b><span style=\"font-weight: 400;\">You want to implement a firewall in your network. The firewall should process each request coming from an outside network and should make a rule-based decision whether to allow or deny the request. Which type of firewall should be used in this scenario?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Stateful inspection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Proxy<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Packet Filter<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Proxy firewall processes requests from outside the network and makes rule-based decisions to deny or allow a request.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because stateful inspection is a packet record kept in a state table that tracks every communication channel.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because packet filters block request(s) on application type.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/proxy-firewall\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/proxy-firewall<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System\"><\/span><span style=\"font-weight: 400;\">Domain: Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q2 <\/span><b>: <\/b><span style=\"font-weight: 400;\">Netboot technology that enables devices to boot from the network is developed by which organization?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">Cisco inspection<\/span><br \/>\n<span style=\"font-weight: 400;\">Microsoft<\/span><br \/>\n<span style=\"font-weight: 400;\">Apple<\/span><br \/>\n<span style=\"font-weight: 400;\">Google<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Netboot is developed by Apple.\u00a0<\/span><\/p>\n<figure id=\"attachment_81511\" aria-describedby=\"caption-attachment-81511\" style=\"width: 540px\" class=\"wp-caption alignnone\"><img decoding=\"async\" class=\"wp-image-81511 size-full\" title=\"NetBoot\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/netbook.gif\" alt=\"NetBoot\" width=\"540\" height=\"300\" \/><figcaption id=\"caption-attachment-81511\" class=\"wp-caption-text\">Source: netbook.xyz<\/figcaption><\/figure>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/images.apple.com\/server\/docs\/NetBoot_TB_v10.4.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/images.apple.com\/server\/docs\/NetBoot_TB_v10.4.pdf<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-2\"><\/span><span style=\"font-weight: 400;\">Domain : Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q3 <\/span><b>: <\/b><span style=\"font-weight: 400;\">Which partition standard does devices with UEFI specification use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>GPT<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>MBR<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Logical<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">:\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Devices with UEFI specification use GPT partition.\u00a0<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because the MBR partition is not used by UEFI specification devices.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because logical is not a partition type.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/www.easeus.com\/partition-master\/partition-gpt-disk.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.easeus.com\/partition-master\/partition-gpt-disk.html<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-3\"><\/span><span style=\"font-weight: 400;\">Domain : Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q4 <\/span><b>: <\/b><span style=\"font-weight: 400;\">Which of the following commands is used to connect and disconnect from a network resource in the windows operating system?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>net share<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>net use<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>netstat<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>net config<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">net use command is used to connect\/disconnect from a network resource in windows os.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because net share displays all the information about shared resources in the network.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because netstat displays an active TCP connection.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because the net config is used to manage network resources.<\/span><\/p>\n<p><strong>Reference Link : <\/strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/gg651155(v=ws.11)\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/gg651155(v=ws.11)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-4\"><\/span><span style=\"font-weight: 400;\">Domain : Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q5 <\/span><b>: <\/b><span style=\"font-weight: 400;\">You found out that there is a windows machine having a startup issue. Which utility will you use to troubleshoot this issue?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Task manager<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Registry edits<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Check disk<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>MSConfig<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">MS config is used to troubleshoot startup issues in the Windows operating system.\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because the task manager is used to display all running tasks\/applications.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because registry edit is used to edit the registry settings.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because the check disk(chkdsk) is used to repair\/recover disks.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-in\/000136771\/what-does-the-msconfig-utility-do-in-windows-8-8-1-and-10-on-your-dell-pc\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.dell.com\/support\/kbdoc\/en-in\/000136771\/what-does-the-msconfig-utility-do-in-windows-8-8-1-and-10-on-your-dell-pc<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q6 <\/span><b>: <\/b><span style=\"font-weight: 400;\">Which of the following commands is used in Windows OS to get an overview of the security policies applied to a single user or computer?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>gpupdate<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>gpedit.msc<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>gpresult<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>hostname<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">gpresult command is used to get information about security policies applied to a single user or system in windows os.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because the gpupdate command is used to enforce the group policies that are applied by an organization.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because the gpedit.msc command is used to open the policy editor in the windows operating system.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because the hostname command is used to know the name of the pc.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/gpresult\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/gpresult<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-2\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q7<\/span><b> : <\/b><span style=\"font-weight: 400;\">Which of the following bootrec commands is used to rebuild the master boot record for the system partition?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>bootrec \/fixboot.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>bootrec \/fixmbr.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>bootrec \/scanos.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>bootrec \/rebuildbcd.<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">bootrec \/fixmbr command is used to rebuild the master boot record for the system partition.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><b>Option A is incorrec<\/b><span style=\"font-weight: 400;\">t because the bootrec<\/span><span style=\"font-weight: 400;\"> \/fixboot<\/span><span style=\"font-weight: 400;\"> command is used to rebuild the boot sector for the active system partition.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because the bootrec<\/span><span style=\"font-weight: 400;\"> \/scanos<\/span><span style=\"font-weight: 400;\"> command checks for Windows installation currently not in the BCD store and shows the results..<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because the bootrec<\/span><span style=\"font-weight: 400;\"> \/rebuildbcd<\/span><span style=\"font-weight: 400;\"> command checks for windows installation currently not in the BCD store and provides an option to add them into the BCD store.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Reference Link:<\/strong> <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/client-management\/advanced-troubleshooting-boot-problems\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows\/client-management\/advanced-troubleshooting-boot-problems<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-5\"><\/span><span style=\"font-weight: 400;\">Domain: Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q8 :<\/span> <span style=\"font-weight: 400;\">Which of the following options is not true about the LILO boot manager provided in Linux?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">LILO supports the UEFI BIOS system.<\/span><br \/>\n<span style=\"font-weight: 400;\">LILO is the old default boot loader in Linux.<\/span><br \/>\n<span style=\"font-weight: 400;\">LILO is a simple and old boot loader for Linux.<\/span><br \/>\n<span style=\"font-weight: 400;\">None of the above.<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">LILO is a simple and old boot manager for Linux that does not support the UEFI BIOS system.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><strong>Reference Link : <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/LILO_(boot_loader)\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/LILO_(boot_loader)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-6\"><\/span><span style=\"font-weight: 400;\">Domain: Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q9 : A kernel panic is associated with which of the following operating systems (Select all that apply)?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\">Linux<\/span><br \/>\n<span style=\"font-weight: 400;\">MacOS<\/span><br \/>\n<span style=\"font-weight: 400;\">Windows<\/span><br \/>\n<span style=\"font-weight: 400;\">None of the above<\/span><\/p>\n<p><b>Correct Answers: A and B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Corrupted device drivers may cause issues while the system boots up. In windows, it is commonly referred to as blue screen of death(BSOD) while in Linux and MacOS it is referred to as a<\/span><span style=\"font-weight: 400;\"> kernel panic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Reference Link:<\/strong> <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Kernel_panic\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/Kernel_panic<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-3\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q10<\/span><b> : <\/b><span style=\"font-weight: 400;\">System restore uses the default image to restore the system to a specific date and state.\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>True.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>False.<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">System restores use restore points that are snapshots of the system at a given point of time to return the system to its previous state<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Kernel_panic\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/Kernel_panic<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_System-7\"><\/span><span style=\"font-weight: 400;\">Domain: Operating System<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q11<\/span><b> : <\/b><span style=\"font-weight: 400;\">Which of the following commands is used to create a file in macOS?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>touch.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>rm.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>cp.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>mv.<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">touch command is used in macOS to create a new file.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because <\/span><span style=\"font-weight: 400;\">rm is used to delete a file<\/span><span style=\"font-weight: 400;\">.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because cp is used to copy a file.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because mv is used to move a file.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Touch_(command)\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/Touch_(command)<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-4\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q12 <\/span><b>:<\/b><span style=\"font-weight: 400;\"> You want to verify if the previous system shutdown on a windows machine was successful or not. Which of the following commands should you use?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>chkdsk<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>diskpart<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>chkntfs<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">chkntfs is the command that can be used to check if the previous system shutdown was successful.<\/span><\/p>\n<p><b>Option B is incorrec<\/b><span style=\"font-weight: 400;\">t because <\/span><span style=\"font-weight: 400;\">diskpart is used to manage system drives<\/span><span style=\"font-weight: 400;\">.<\/span><br \/>\n<b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because chkdsk is used to check and fix any drive issue.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/chkntfs\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/chkntfs<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-5\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q13<\/span><b> : <\/b><span style=\"font-weight: 400;\">A user is reporting that he is able to connect to resources in the organization with the IP address but not with their name.What could be the possible issue here?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>The DNS server may be down or the dns is not configured properly.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>User credentials are not valid for making requests by name.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>User is not authorized to access the resource by their name<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>We can not access network resources by their name, they are only accessible by IP address.<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">DNS(Domain name system) resolves named resources into IP addresses that are connected in the network, so if a user is able to connect with the IP address but not with the resource name, then either dns server is down and\/or it is not properly configured in users machine.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because <\/span><span style=\"font-weight: 400;\">user credentials are not used in making a request by resource name<\/span><span style=\"font-weight: 400;\">.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because if the user is not authorized, then connectivity with the id address is also not possible.\u00a0\u00a0<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because we can access resources by name and the DNS resolver works for the same .<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/what-is-dns\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.cloudflare.com\/learning\/dns\/what-is-dns\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-6\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q14<\/span><b> : <\/b><span style=\"font-weight: 400;\">PowerShell scripts have which of the following extensions?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>.sh<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>.ps1<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>.py<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>.bat<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">PowerShell scripts have .ps1 as their extension.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because .<\/span><span style=\"font-weight: 400;\">sh is an extension of the shell script<\/span><span style=\"font-weight: 400;\">.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because .py is the extension of python.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because .bat is the extension of the batch file.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/windows-powershell\/ise\/how-to-write-and-run-scripts-in-the-windows-powershell-ise?view=powershell-7.2\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/powershell\/scripting\/windows-powershell\/ise\/how-to-write-and-run-scripts-in-the-windows-powershell-ise?view=powershell-7.2<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-7\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q15 <\/span><b>:<\/b><span style=\"font-weight: 400;\"> Mike uses a laptop for his office work and wants to connect to a network wirelessly but does not have that functionality on his machine? How would you resolve this issue?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>The operating system needs to be updated.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Connect an ethernet cable.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Attach a USB wireless card.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above.<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If a system does not have inbuilt Wi-Fi, then an external wireless card can be used to connect to the network wirelessly.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because the operating system update will not enable connecting wireless networks.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because the ethernet cable is not for wireless connection.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Wireless_USB\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/en.wikipedia.org\/wiki\/Wireless_USB<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-8\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q16<\/span><b>\u00a0: <\/b><span style=\"font-weight: 400;\">Lynda complains her mobile device is too hot to touch. What action would you take to investigate this issue?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Clean the ventilation duct with compressed air.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Replace the battery.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Adjust the screen brightness.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Make sure the mobile gets proper air circulation<\/span><b>.<\/b><\/p>\n<p><b>Correct Answers: A and D<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Devices get hot when there is no proper airflow or poor ventilation. So, options A and D are correct here.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because replacing the battery will not help resolve the hot issue.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because the device getting hot does not have any association with screen brightness.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-9\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q17 <\/span><b>: <\/b><span style=\"font-weight: 400;\">Steve complains that his print jobs are not showing in the print queue. Which of the following could be a potential issue here?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>General network problem.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Insufficient user permission.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Insufficient space on the drive containing the spool folder.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>All the above.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Print jobs not showing in the print queue may be due to any of the reasons mentioned in <strong>options A, B, C so option D is correct here.<\/strong><\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-10\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q18<\/span><b> : <\/b><\/em><span style=\"font-weight: 400;\"><em>Jack is using a laser printer for his document. He reported that the printer is producing repeating horizontal lines or white space. What could be the possible issue here?<\/em>\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Dirty or faulty transfer corona.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Poor quality paper.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Dirty fuser roller.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Fuser temperature is too low.<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Repeating horizontal lines or white space generally occurs when the fuser roller is dirty.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Option A is incorrect<\/strong> because dirty or faulty transfer corona produces a low-quality image.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>Option B is incorrect<\/strong> because poor quality paper produces low-quality images.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>Option D is incorrect<\/strong> because low fuser temperature produces smeared output.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-11\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q19 <\/span><b>: <\/b><span style=\"font-weight: 400;\">You have recently installed a new second hard drive on a workstation, but the drive is not visible in explorer. What steps would you take to fix the issue? (Select all that apply)<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Format the drive.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Partition the drive.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Initialize the drive.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>All the above.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Secondary drives need to be formatted, partitioned and initialized to work correctly, so <strong>option D is correct here.<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Software_Troubleshooting-12\"><\/span><span style=\"font-weight: 400;\">Domain: Software Troubleshooting<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q20<\/span><b> : <\/b><span style=\"font-weight: 400;\">One of the workstations on Windows 10 OS recently got its video driver updated but after the driver updated the blue screen of death (BSOD) started appearing while the system booted. Which of the following options is best suited for rolling back the driver update?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Format the system.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Boot in safe mode to rollback driver update.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Access the Windows RE command prompt.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above.<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Booting into safe mode and then using a device manager is the best option for rolling back a device drive.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because formatting the system will erase all its data.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because the Windows RE command prompt is not the most appropriate option for rolling back the driver.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operational_Procedures\"><\/span><span style=\"font-weight: 400;\">Domain: Operational Procedures\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q21<\/span><b> : <\/b><span style=\"font-weight: 400;\">Which of the following options enables you to recover a password in case of a forgotten password in Windows 10?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Write down the password manually in a notebook.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Creating a password recovery disk.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Sharing your password with your colleague.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above.<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The password recovery disc enables users to recover passwords in case a user forgot his\/her password.<\/span><\/p>\n<p><b>Option A is incorrec<\/b><span style=\"font-weight: 400;\">t because writing down the password manually in the notebook may help you in recovering the password, but it is not full proof as the notebook can also be misplaced.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because sharing your credentials is against the security policy of an organization<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operational_Procedures-2\"><\/span><span style=\"font-weight: 400;\">Domain: Operational Procedures\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q22 : A _______ plan should be there to tackle the failure of change?<\/span><b>\u00a0<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Rollout.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Risk analysis.\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Backout.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>End user acceptance.<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><span style=\"font-weight: 400;\">: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For tackling the unforeseen issue or failure of a plan, a backout should be in place to revert the environment to its previous working state.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because there is no rollout plan in the operational procedure.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because risk analysis is done before implementing a change into the environment.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because end-user acceptance is about educating the user of the change that has been completed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operational_Procedures-3\"><\/span><span style=\"font-weight: 400;\">Domain: Operational Procedures\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q23<\/span><b> : <\/b><span style=\"font-weight: 400;\">Which of the following backup levels will consider backing up all files in the system including the operating system?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>File Level.\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Image Level.\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Cloud Level.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above.<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In image level backup all the files and directories along with the operating system on a system are backed up and then can be restored on a blank drive.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because File level backup only takes backup of the files.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because cloud storage can be used in both file and image level backup.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operational_Procedures-4\"><\/span><span style=\"font-weight: 400;\">Domain: Operational Procedures\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q24 : Mike, an employee in zen corporation, is trying to update his workstation password but he is constantly getting messages stating that \u201cpassword must be minimum 12 characters long and must contain alphanumeric characters\u201d. Which policy enables an organization to set up restrictions about the minimum complexity of passwords in the organization ?\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Security policy.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Acceptable use policy.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Password policy.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Change document.<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">The password policy of an organization defines how long and complex the password should be and when it will expire along with the use of MFA.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> because security policy defines how security is implemented in an organization.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> because an acceptable user policy defines how the asset provided by the organization should be fairly used.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> because the change document is specific to changes proposed to an infrastructure.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Security-2\"><\/span><span style=\"font-weight: 400;\">Domain: Security<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q25<\/span><b>: <\/b><span style=\"font-weight: 400;\">______ enables users to encrypt files so that except the account owner no other user can see the files.\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>NTFS.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>FAT.<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>EFS<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>FAT32.<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">EFS(Encrypting file system) enables users to encrypt files, making them unviewable for other users.<\/span><\/p>\n<p><strong>Reference Link: <\/strong><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Encrypting-File-System\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.techtarget.com\/searchsecurity\/definition\/Encrypting-File-System<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Security-3\"><\/span><span style=\"font-weight: 400;\">Domain: Security<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q25<\/span><b>:\u00a0<\/b><\/em> Which of the following is part of a physical access control system that consists of a small open space and two interlocking doors?<\/h4>\n<ul>\n<li aria-level=\"1\"><b>Mantraps<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Smart Card<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Tailgating<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Biometric<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: A<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">An access control vestibule, or mantrap, is part of a physical access control system that typically provides a space between two sets of interlocking doors. Mantraps are designed to prevent unauthorized individuals from following authorized individuals into facilities with controlled access<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect. Smart cards are used to authenticate a user in an organization or network<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect. Tailgating is an action in which a non-authorized person might get access by following an authorized person<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Biometrics are typically used to authenticate a user in a secure environment using fingerprint or retina scanning<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link:<\/span> <a href=\"https:\/\/csf.tools\/reference\/nist-sp-800-53\/r5\/pe\/pe-3\/pe-3-8\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/csf.tools\/reference\/nist-sp-800-53\/r5\/pe\/pe-3\/pe-3-8\/<\/span><\/a><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q26<\/span><b>: A <\/b><\/em>company has its eCommerce web application hosted on the Microsoft Azure cloud. The users are reporting that the application working very slowly and sometimes it is unavailable. By analysis, you found out that traffic is getting generated from a single IP address. Based on your finding which of the following type of attack is being carried out on the web application?<\/h4>\n<ul>\n<li aria-level=\"1\"><b>SQL Injection\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>DDoS\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Brute-force<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Dictionary<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answer: B<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. The step to identify the slowness of any web application is to analyze the traffic on the webserver and if the traffic is coming from a single IP or IP range, then there are high chances of a DDoS attack.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. <\/span><span style=\"font-weight: 400;\">SQL injection\u00a0attack consists of insertion or \u201cinjection\u201d of a SQL query via the input data from the client to the application.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect. Brute-force is an attack in which an attacker uses a combination of letters and words to guess the password of a user.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. <\/span><span style=\"font-weight: 400;\">A dictionary attack\u00a0is an attack vector used by the attacker to break into a system, which is password protected, by putting technically every word in a dictionary as a form of password for that system<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link:<\/span> <a href=\"https:\/\/www.comptia.org\/content\/guides\/what-is-a-ddos-attack-how-it-works\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/www.comptia.org\/content\/guides\/what-is-a-ddos-attack-how-it-works<\/span><\/a> <a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/<\/span><\/a><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q27<\/span><b>: <\/b><\/em>Windows Defender Firewall can be opened using which of the following commands?<\/h4>\n<ul>\n<li aria-level=\"1\"><b>msconfig<\/b><\/li>\n<li aria-level=\"1\"><b>gpedit.msc<\/b><\/li>\n<li aria-level=\"1\"><b>wf.msc<\/b><\/li>\n<li aria-level=\"1\"><b>resmon<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: C<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">wf.msc is the command on windows to open the windows defender firewall<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. <\/span><span style=\"font-weight: 400;\">msconfig is a utility used to troubleshoot the windows start-up process.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect. gpedit.msc is used to edit the policies for different users.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect.<\/span><span style=\"font-weight: 400;\"> Resmon is used to track down the resources being used in real-time.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link :<\/span> <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/jj717254(v=ws.11)\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/jj717254(v=ws.11)<\/span><\/a><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q28<\/span><b>: <\/b><\/em><b>You want to block a specific website for specific users in your SOHO(Small Office\/Home Office) network. Which of the following options should you consider achieving this?<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>Mac filtering<\/b><\/li>\n<li aria-level=\"1\"><b>Parental control<\/b><\/li>\n<li aria-level=\"1\"><b>Enable WPS<\/b><\/li>\n<li aria-level=\"1\"><b>Disable physical ports<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: B<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">Parental control\/Content filtering allows blocking of specific sites for specific users. You can select the mac address of the particular computer and block the specific sites in the configuration.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. <\/span><span style=\"font-weight: 400;\">Mac filtering will not even allow the user to connect to the router.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect. Enabling WPS makes it easy to connect to the router and security concerns associated with it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. <\/span><span style=\"font-weight: 400;\">Disabling the physical port will not allow anyone access to the network even if they plug the computer into the router.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link: <\/span><a href=\"https:\/\/www.cnet.com\/home\/internet\/how-to-use-wifi-router-parental-controls\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/www.cnet.com\/home\/internet\/how-to-use-wifi-router-parental-controls\/<\/span><\/a><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q29<\/span><b>: <\/b><\/em><b>Which of the following social engineering attacks have a rogue, unauthorized wireless access point setup to gain sensitive information?<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>Dumpster diving<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Phishing<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Evil twin<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Tailgating<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: C<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation<\/span><span style=\"font-weight: 400;\">:\u00a0 <\/span><span style=\"font-weight: 400;\">An evil twin attack is a\u00a0spoofing cyberattack\u00a0that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. <\/span><span style=\"font-weight: 400;\">Dumpster diving <\/span><span style=\"font-weight: 400;\">is a social engineering attack in which a person scavenges for private information in garbage and recycling containers<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect. Phishing is an attempt in which fraudulent communications are sent to get sensitive information from the user.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Tailgating is an action in which a non-authorized person might get access by following an authorized person<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link:\u00a0 <\/span><a href=\"https:\/\/nordvpn.com\/blog\/evil-twin-attack\/\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/nordvpn.com\/blog\/evil-twin-attack\/<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Operating_Systems\"><\/span><strong>Domain: Operating Systems<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q30<\/span><b>: <\/b><\/em><b>Which of the following options will allow you to modify display properties like changing its resolutions or the color scheme of macOS?\u00a0<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>Control Panel<\/b><\/li>\n<li aria-level=\"1\"><b>Spotlight<\/b><\/li>\n<li aria-level=\"1\"><b>System preferences<\/b><\/li>\n<li aria-level=\"1\"><b>Finder<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: C<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">System preferences are like a control panel in the Windows operating system and can be used to change the display settings and network settings.\u00a0\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. The <\/span><span style=\"font-weight: 400;\">Control panel is accessible in the Windows operating system.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect. The spotlight in macOS is used to search apps, documents, and emails\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Finder is the default file manager in macOS and lets you interact with the files\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link:<\/span><a href=\"blank\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\"> https:\/\/support.apple.com\/en-in\/guide\/mac-help\/mh15217\/mac<\/span><\/a><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q31<\/span><b>: <\/b><\/em><b>You are working as an IT admin in a corporation. You have been asked to <\/b><b>increase the partition size of a drive in Linux.<\/b><b> The file system used in the drive is ext4. Which of the following command (if ext4 supports expansion) will work in this requirement <\/b><b>?<\/b><b>?\u00a0<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>APFS<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>resize2fs<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>NTFS<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>EXT4 file system does not support expansion once a disk is created\u00a0<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: B<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">ext2,ext3, and ext4 are the default file systems in most Linux-based systems and we can resize2fs command to enlarge or shrink the drive on it.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. APFS(Apple file system) only works on macOS.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect. NTFS(New Technology File System) is a windows file system and does not work very well on Linux-based systems.<\/span> <span style=\"font-weight: 400;\">though it does allow for dynamic resizing of disks in Windows.\u00a0<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect because the ext4(Fourth Extended System) file system does allow disk expansion.<\/span><\/li>\n<\/ul>\n<h4><em><span style=\"font-weight: 400;\">Q32<\/span><b>: <\/b><\/em><b>It is JANUARY 2023 and your company has many applications running and interacting with each other<\/b><span style=\"font-weight: 400;\">.<\/span><b> Of the following operating systems that are used in your company\u2019s infrastructure, which is a major security concern?<\/b><b>\u00a0<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>Windows 10 (21H1)\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Windows 10 (20H2)\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Chromebook (3400)<\/b><b>\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Ubuntu 20.04 LTS<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: A<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">Windows 10(21H1) have EOL(End of life) support till December 2022 and <\/span><span style=\"font-weight: 400;\">if they are not updated to something newer before that, they will cease to receive security updates.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect. Windows 10(20H2) has EOL support till May 2023 so fewer security concerns.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect. Chromebook(3400) has EOL support till June 2025 so fewer security concerns.\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Ubuntu 20.04 LTS has\u00a0 EOL support till April 2025 so fewer security concerns.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link<\/span><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/lifecycle\/products\/windows-10-home-and-pro%20\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/lifecycle\/products\/windows-10-home-and-pro<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q33<\/span><b>: <\/b><\/em><b>Annie is working in the finance department of a company and using a Windows system. She is reporting an issue that whenever she is away from her computer, she gets disconnected from the wi-fi router and needs to reconnect to the wi-fi router for getting internet access<\/b><b>. Which of the following would be the <\/b><b>best option to fix this issue?<\/b><\/h4>\n<ul>\n<li aria-level=\"1\"><b>Replace the wi-fi router with a new one\u00a0\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Update wireless driver\u00a0\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Change power setting<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Disable screensaver<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: C<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">Changing the power settings from the control panel is the best option to fix this issue because wireless connections might get time out quickly if power settings are not set up correctly<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. If the wi-fi router would have been faulty, the user will never be able to connect to it.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option B is incorrect<\/span><span style=\"font-weight: 400;\">. Updating the driver might not help here because the user is able to connect to wi-fi but only loses the connection once the system is idle.\u00a0<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Screensaver does not affect wi-fi or any network connection in any way.<\/span><\/li>\n<\/ul>\n<p><b>Question 10. You want to delete and remove all the temporary files on a Windows PC. Which of the following control panel utility will allow you to do so?<\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Event viewer\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Disk Cleanup\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Task scheduler<\/b><b>\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Netsh<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Correct Answers: B<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explanation:\u00a0 <\/span><span style=\"font-weight: 400;\">Disk Cleanup is a utility available on <\/span><b>Windows PC<\/b><span style=\"font-weight: 400;\"> that is used to remove temporary files from the system<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option A is incorrect. Event viewer is a component in <\/span><b>Windows <\/b><span style=\"font-weight: 400;\">that allows admin and other users to view event logs on local or remote machines.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option C is incorrect<\/span><span style=\"font-weight: 400;\">. Task scheduler is a service in <\/span><b>Windows <\/b><span style=\"font-weight: 400;\">that allows launching a program or script at pre-defined times or after a specified interval.\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Option D is incorrect. Netsh is a utility that allows local or remote configuration on network devices such as an interface.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reference Link<\/span><b>: <\/b><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/disk-cleanup-in-windows-8a96ff42-5751-39ad-23d6-434b4d5b9a68\" target=\"_blank\" rel=\"nofollow noopener\"><b>https:\/\/support.microsoft.com\/en-us\/windows\/disk-cleanup-in-windows-8a96ff42-5751-39ad-23d6-434b4d5b9a68<\/b><\/a><\/p>\n<p><b>Summary<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Did you get all the questions right? You are on the right trajectory. These free questions on CompTIA A+ 220-1102 (Core 2) certification must have given you the assessment on the exam and some of the concepts that need to be covered for passing the exam. Additionally, by taking CompTIA A+ core 2 practice tests, you can clear the actual exam within the first attempt.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article carries Free CompTIA A+ Core 2 practice test Questions and their elaborate answers for the CompTIA A+ (220-1102) Core 2 Exam. About the Certification CompTIA A+ is considered one of the major certifications for starting a career in IT. It is the Industry Standard that jet launches IT careers in the digital world. The CompTIA A+ (220-1102) Core 2 Certification enables you to perform spontaneous critical IT support tasks and end-point management. What does the exam cover? The exam covers the configuration of the device operating systems, that is, Mac, Linux, Android, iOS, Chrome OS, and Windows, along [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":83987,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4838,4821],"tags":[4839,4906,3694],"class_list":["post-81099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comptia","category-it-ops-certifications","tag-comptia-a-220-1002","tag-comptia-a-220-1102","tag-comptia-a-exam-preparation"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",1280,720,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",1280,720,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",1280,720,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-640x720.webp",640,720,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/CompTIA-A-220-1102-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Dharmalingam N","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/dharmalingam\/"},"uagb_comment_info":612,"uagb_excerpt":"This article carries Free CompTIA A+ Core 2 practice test Questions and their elaborate answers for the CompTIA A+ (220-1102) Core 2 Exam. About the Certification CompTIA A+ is considered one of the major certifications for starting a career in IT. It is the Industry Standard that jet launches IT careers in the digital world.&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=81099"}],"version-history":[{"count":14,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81099\/revisions"}],"predecessor-version":[{"id":92498,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81099\/revisions\/92498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/83987"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=81099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=81099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=81099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}