When a corporate laptop is connected to the company network, it can reach external websites. However, it cannot reach any internal websites, displaying the error message “Cannot reach this page.” Which of the following should a technician configure?
A. Subnet mask
B. DNS settings
C. Default gateway
D. DHCP
Explanation:
The laptop can reach external websites, meaning:
It has proper network connectivity.
The default gateway and routing are functional.
However, it cannot reach internal websites. This suggests it’s failing to resolve internal domain names (e.g. intranet.company.com).
Internal websites often use private DNS servers that resolve only internal names. If the laptop’s DNS is misconfigured (e.g. pointing only to public DNS like Google 8.8.8.8), internal names cannot be resolved, leading to “Cannot reach this page.”
So the technician should check and configure the correct DNS servers for internal name resolution.
Why the others are incorrect:
A. Subnet mask
Would impact local network communication but wouldn’t explain why external websites work while internal ones don’t.
C. Default gateway
Must be correct because external sites are reachable.
D. DHCP
DHCP might distribute DNS settings, but the issue specifically lies in DNS configuration itself, not the entire DHCP scope.
A town clerk wants to work from home and access documents on a town hall server. What should a technician set up?
A. VNC
B. RDP
C. VPN
D. SSH
Explanation:
The clerk wants to access documents on the town hall server from home.
A VPN (Virtual Private Network) creates a secure, encrypted tunnel between the clerk’s home computer and the town hall network.
Once connected, it’s as if the clerk’s device is physically on the town hall network, allowing secure access to internal servers, shared drives, or intranet resources.
VPN is the standard, secure solution for remote work where access to internal resources is required.
Why the others are incorrect:
A. VNC (Virtual Network Computing)
Used for remote desktop control, not for general network access. Less secure unless tunneled through VPN.
B. RDP (Remote Desktop Protocol)
Allows connecting to a Windows desktop session remotely. However, exposing RDP directly over the internet is a security risk unless protected via VPN.
D. SSH (Secure Shell)
Mainly used for securely accessing command-line interfaces on servers, not for accessing general document shares or internal networks.
What is the next step a technician should take after completing malware cleanup?
A. Perform a secondary antivirus scan
B. Educate the end user
C. Reimage the computer
D. Review system logs
Explanation:
Once a technician removes malware, the next step isn’t just technical — it’s about prevention. Users often get infected because of risky habits like clicking suspicious links, downloading unknown attachments, or ignoring browser warnings.
Educating the end user helps them recognize phishing attempts, avoid malicious websites, and understand safe browsing practices. This training reduces the chance of reinfection and strengthens overall security awareness in the organization.
While rescanning the system, checking logs, or even reimaging can be important depending on severity, user education is always the essential next step after cleaning up malware.
Reference:
CompTIA A+ Core 2 (220-1102) Objective 2.5: “Given a scenario, use best practices to secure a workstation.”
CompTIA A+ Official Study Guide – Malware removal process (Final Step: Educate the end user)
A technician is attempting to join a workstation to a domain but is receiving an error
message stating the domain cannot be found. However, the technician is able to ping the
server and access the internet. Given the following information:
IP Address – 192.168.1.210
Subnet Mask – 255.255.255.0
Gateway – 192.168.1.1
DNS1 – 8.8.8.8
DNS2 – 1.1.1.1
Server – 192.168.1.10
Which of the following should the technician do to fix the issue?
A. Change the DNS settings.
B. Assign a static IP address.
C. Configure a subnet mask.
D. Update the default gateway.
Explanation:
The workstation can ping the domain controller (192.168.1.10) and reach the internet, which confirms:
The IP address, subnet mask, and gateway are all correctly configured.
There’s no basic network connectivity issue.
However, the error message “domain cannot be found” means the computer cannot locate the domain controller using its domain name. Joining a domain depends on DNS to resolve domain names (like company.local) to the internal IP address of the domain controller.
Currently, the workstation is configured to use:
DNS1 → 8.8.8.8 (Google DNS, external)
DNS2 → 1.1.1.1 (Cloudflare DNS, external)
Neither of these public DNS servers knows anything about internal domain names. As a result, the workstation cannot resolve the domain name to join the domain.
The solution:
Update the workstation’s DNS settings to use the internal DNS server, typically hosted on the domain controller (in this case, likely 192.168.1.10).
Once the correct DNS server is configured, the workstation can resolve the domain name and successfully join the domain.
Why the others are incorrect:
B. Assign a static IP address
The workstation already has an IP address and can communicate with the network. The problem is DNS, not the IP itself.
C. Configure a subnet mask
The subnet mask is correct, as proven by successful pings to the server.
D. Update the default gateway
Internet access works, indicating the gateway is fine. The gateway doesn’t affect internal DNS resolution in this scenario.
An administrator must rename the administrator account on a Windows desktop. Which tool is best for this?
A. lusrmgr.msc
B. devmgmt.msc
C. gpedit.msc
D. eventvwr.msc
Explanation:
The tool lusrmgr.msc stands for Local Users and Groups Manager in Windows.
It allows an administrator to:
Create, rename, or delete local user accounts
Manage group memberships
Set or reset passwords
Adjust other user account properties
To rename the built-in Administrator account:
Open lusrmgr.msc
Navigate to Users
Right-click the Administrator account
Select Rename, and enter the new account name
This is the precise tool designed for managing local user accounts.
Why the others are incorrect:
B. devmgmt.msc
Device Manager, used for managing hardware devices and drivers—not user accounts.
C. gpedit.msc
Group Policy Editor, used for configuring policies on a system, but not for directly renaming user accounts.
D. eventvwr.msc
Event Viewer, used for viewing system logs and events, not for user account management.
Reference:
CompTIA A+ Core 2 (220-1102) Objective 1.7: “Given a scenario, use management tools in Windows.”
Microsoft Docs – Manage Local Users and Groups
Which of the following are system folders on macOS? (Select two)
A. Applications
B. Spotlight
C. Time Machine
D. Library
E. FileVault
F. iCloud
D. Library
Explanation:
A. Applications
This is a system folder in macOS that stores all installed apps. You’ll find it in the root of the Macintosh HD or in each user’s home directory. It’s a core part of how macOS organizes software.
D. Library
The Library folder contains system resources, preferences, fonts, support files, and frameworks used by macOS and applications. There are actually multiple Library folders:
1. One at the system root (for global settings)
2. One in each user’s home directory (user-specific settings)
3. One in the System folder for macOS system files
Both folders are essential for macOS to operate properly and are considered system folders.
Why the others are incorrect:
B. Spotlight → A search feature, not a folder.
C. Time Machine → A backup utility and destination, not a folder in the OS structure.
E. FileVault → A disk encryption feature, not a folder.
F. iCloud → A cloud service, not a local system folder.
Reference:
CompTIA A+ Core 2 (220-1102) Objective 1.9: “Given a scenario, configure and use macOS and Linux client/desktop operating systems.”
Apple Support Docs – macOS file system structure
A Windows 11 Home device is receiving constant pop-ups about an urgent need to update antivirus software in order to remove a detected threat. The user has been clicking the "X" button but the window keeps reappearing. The pop-up includes an "OK" button to install the update. What should the user do next?
A. Click the "OK" button to install the update
B. Reinstall the Windows Operating System
C. Run System File Checker
D. Verify the current status and settings of protection measures
Explanation:
Pop-ups urging users to urgently update antivirus software are a common tactic used in scareware or phishing attacks. Clicking “OK” could install malware or redirect the user to malicious websites.
The fact that the pop-up keeps reappearing—even when the user clicks the “X”—strongly suggests it’s not a legitimate Windows or antivirus alert. Instead, it might be caused by a malicious process, browser hijacker, or adware running on the system.
The safest next step:
Check the current security software.
1. Open Windows Security (or any installed antivirus) and verify whether there are real alerts about infections or outdated definitions.
2. Update antivirus signatures directly through the software interface—not by clicking suspicious pop-ups.
Run a full malware scan to detect and remove potential threats causing these pop-ups.
This approach avoids falling victim to the scam and ensures the system’s security posture is intact.
Why the others are incorrect:
A. Click the "OK" button to install the update → Dangerous! This could install malware.
B. Reinstall the Windows Operating System → Extreme measure; not the first troubleshooting step.
C. Run System File Checker → Useful for repairing Windows files, but it doesn’t address malicious pop-ups or verify antivirus status directly.
A technician is 3-D printing high-strength, carbon fiber-based filament parts for a customer order. Which of the following is the most important for the technician to use?
A. Steel-toed boots
B. Air filter mask
C. ESD mat
D. Antistatic bags
Explanation:
When 3-D printing with high-strength carbon fiber-based filaments, the printing process involves heating thermoplastics mixed with fine carbon fibers. This heating releases ultrafine particles and potentially harmful fumes into the air.
Inhalation hazards include:
1. Tiny carbon fiber dust particles that can irritate the lungs
2. Volatile organic compounds (VOCs) released by melting plastic materials
3. Microscopic particles that may remain suspended in the air
An air filter mask (respirator) is critical because it protects the technician from inhaling these airborne contaminants, ensuring health and safety during the printing process.
Why the others are incorrect:
A. Steel-toed boots → Useful for physical protection, but not critical for airborne hazards associated with 3-D printing.
C. ESD mat → Relevant for electronics work, but not for protecting a technician from printing fumes or particles.
D. Antistatic bags → Used for storing electronic components, unrelated to 3-D printing health hazards.
Reference:
CompTIA A+ Core 2 (220-1102) Objective 3.5: “Given a scenario, apply environmental impacts and safety procedures.”
OSHA and NIOSH guidelines on 3-D printing emissions
An end user wants to have a sales printer added to their computer. The printer is on the domain. Which of the following is the best method for the technician to add the printer?
A. Go to the print server and select the printer name
B. Connect the laptop to the printer via USB
C. Connect to the printer via Bluetooth
D. Go to Local Users and Groups to add the printer
Explanation:
✅ Correct Answer: A. Go to the print server and select the printer name
In a domain environment, printers are managed through a centralized print server, which allows users to easily locate and install network printers by browsing the list of shared devices on the server. This ensures that the proper drivers and configurations are automatically applied, maintaining consistency and reducing manual errors across the organization. It’s the most efficient and reliable method for adding a domain-connected printer because it integrates seamlessly with network permissions and policies.
❌ Why the other options are incorrect:
B. Connect the laptop to the printer via USB is only suitable for local, directly attached printers. It doesn’t apply to networked printers shared over a domain, and it would require manually installing drivers and managing individual connections, which is inefficient for a corporate environment.
C. Connect to the printer via Bluetooth is rarely used in enterprise environments because most business-class printers don’t rely on Bluetooth for shared network printing. It’s typically meant for quick, personal printing rather than domain-level printer access.
D. Go to Local Users and Groups to add the printer is incorrect because that tool is used for managing user and group accounts on a Windows system, not for adding or configuring printers. It has nothing to do with printer installation or network device management.
A company recently transitioned to a cloud-based productivity suite and wants to secure the environment from external threat actors. Which of the following is the most effective method?
A. Multifactor authentication
B. Encryption
C. Backups
D. Strong passwords
Explanation:
✅ Correct Answer: A. Multifactor authentication
When a company moves to a cloud-based productivity suite, its users and data become accessible over the internet, increasing the risk of external attacks such as credential theft and account compromise. Multifactor authentication (MFA) is the most effective way to secure this environment because it requires users to present at least two forms of verification—something they know (like a password) and something they have (like a smartphone app or hardware token). Even if an attacker steals a password, MFA prevents unauthorized access by requiring the second factor. This significantly reduces the risk of breaches and is considered one of the strongest defenses for cloud services.
❌ Why the other options are incorrect:
B. Encryption is crucial for protecting data privacy and ensuring that information remains secure during storage and transmission. However, encryption alone doesn’t stop attackers from logging into accounts if they have valid credentials.
C. Backups are essential for recovering data in case of accidental deletion, ransomware, or system failures, but they don’t prevent external threat actors from accessing cloud accounts in real time.
D. Strong passwords improve security, but many users still reuse or share them, and they can be stolen through phishing or malware. Strong passwords are helpful but insufficient on their own compared to the protection provided by MFA.
| Page 4 out of 21 Pages |