Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

Which of the following methods involves requesting a user's approval via a push notification to verify the user's identity?

A. Call

B. Authenticator

C. Hardware token

D. SMS

B.   Authenticator

Explanation:

✅ Correct Answer: B. Authenticator
An authenticator app is a common tool used in multifactor authentication (MFA) that can generate time-based codes or send push notifications to a user’s mobile device. When using push notifications, the app sends an alert asking the user to approve or deny a login attempt, providing a fast and secure way to verify the user’s identity. This method helps protect accounts by requiring user interaction rather than relying solely on passwords or codes.

❌ Why the other options are incorrect:

A. Call refers to receiving a phone call with a spoken verification code or prompt, not a push notification.

C. Hardware token generates physical codes on a separate device but does not deliver push notifications.

D. SMS sends a text message with a code, but again, it’s not a push notification that prompts for user approval in an app.

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

A. BIOS password

B. Guest account

C. Screen lock

D. AutoRun setting

A.   BIOS password

Explanation:

✅ Correct Answer: A. BIOS password
Virtualization technology is a hardware feature controlled through the computer’s BIOS or UEFI firmware settings. To ensure that only administrators can enable or disable virtualization, the technician should set a BIOS password. This prevents unauthorized users from entering the BIOS setup utility and changing critical system configurations, such as enabling virtualization support. Setting a BIOS password is an effective security measure for protecting hardware-level settings on laptops and desktops.

❌ Why the other options are incorrect:

B. Guest account controls user access within the operating system, not hardware-level settings in the BIOS.

C. Screen lock secures the operating system session but has no effect on BIOS or virtualization settings.

D. AutoRun setting relates to how the operating system handles media like CDs or USB drives, not BIOS configurations.

Reference:
CompTIA A+ Core 2 (220-1102) Objective 2.3: “Given a scenario, apply security best practices.”
CompTIA A+ Official Study Guide – BIOS/UEFI security settings

A Chief Executive Officer wants to meet with remote employees in a way that will allow for communication and training. Which of the following software technologies is the best for this situation?

A. Videoconferencing

B. Screen sharing

C. Remote Desktop

D. Virtual desktop infrastructure

A.   Videoconferencing

Explanation:

✅ Correct Answer: A. Videoconferencing
For a Chief Executive Officer who wants to meet with remote employees, communicate, and provide training, videoconferencing is the best software technology for the situation. Videoconferencing tools enable real-time audio and video communication, creating an interactive environment where participants can see and hear each other, ask questions, and share feedback. Many videoconferencing platforms also integrate features like screen sharing, chat, and recording, making them ideal for training sessions and collaborative discussions with remote staff.

❌ Why the other options are incorrect:

B. Screen sharing allows someone to show their screen to others, which is useful for presentations or demos, but it doesn’t provide a full meeting experience with two-way audio/video communication on its own.

C. Remote Desktop is used for connecting to and controlling another computer, not for hosting collaborative meetings or training sessions with multiple participants.

D. Virtual desktop infrastructure (VDI) provides users with virtualized desktop environments but isn’t a communication or meeting tool—it’s used for accessing desktops and applications remotely.

A user reports that their corporate mobile phone is lost. Which of the following protects the data locally on the phone from unauthorized access?

A. Password manager

B. Degaussing

C. Remote wipe

D. Antivirus

C.   Remote wipe

Explanation:

✅ Correct Answer: C. Remote wipe
If a corporate mobile phone is lost, the best way to protect the data locally on the phone from unauthorized access is to perform a remote wipe. Remote wipe allows IT administrators or security tools to send a command that erases all data on the lost device, including emails, contacts, documents, and app data. This ensures that even if someone finds or steals the phone, they cannot access sensitive corporate information. It’s a critical security feature for managing mobile devices, especially in corporate environments.

❌ Why the other options are incorrect:

A. Password manager protects stored passwords but does not erase all data from a lost phone.

B. Degaussing erases magnetic storage media like hard drives but has no relevance for modern mobile phones, especially those with flash storage.

D. Antivirus protects against malware but doesn’t erase data or secure a device once it’s physically lost.

Reference:
CompTIA A+ Core 2 (220-1102) Objective 2.7: “Given a scenario, implement mobile device security.”
CompTIA A+ Official Study Guide – Mobile security tools and remote wipe

A user is experiencing issues with outdated images while browsing websites. Which of the following settings should a technician use to correct this issue?

A. Administrative Tools

B. Windows Defender Firewall

C. Internet Options

D. Ease of Access

C.   Internet Options

Explanation:

✅ Correct Answer: C. Internet Options
If a user is seeing outdated images while browsing websites, it usually means that cached data stored by the web browser is being loaded instead of fresh content from the website. To resolve this issue, a technician should go into Internet Options, where they can clear the browser cache (temporary internet files) and configure settings to check for newer versions of stored pages automatically. This ensures that when the user visits websites, the most up-to-date images and content are displayed, preventing confusion and improving the browsing experience.

❌ Why the other options are incorrect:

A. Administrative Tools contains system management utilities like Event Viewer and Services but doesn’t deal with browser settings or cache.

B. Windows Defender Firewall manages network traffic rules but doesn’t affect how images are stored or displayed in a browser.

D. Ease of Access includes accessibility features for users with disabilities but has no impact on website images or browser cache.

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

A. 16GB RAM

B. Intel i7 CPU

C. 500GB HDD

D. 1Gbps Ethernet

A.   16GB RAM

Explanation:

✅ Correct Answer: A. 16GB RAM
The decision between installing a 32-bit or 64-bit operating system primarily depends on how much memory (RAM) the system needs to support. A 32-bit OS can only address up to approximately 4GB of RAM, regardless of how much physical memory is installed. Since the new computer has 16GB of RAM, the support specialist should install a 64-bit operating system to ensure that the entire 16GB is usable by the system and applications. A 64-bit OS can also handle larger data sets and run more modern software efficiently.

❌ Why the other options are incorrect:

B. Intel i7 CPU is a modern processor that supports both 32-bit and 64-bit architectures, but the CPU type alone doesn’t dictate which OS to choose—it’s the RAM requirement that is crucial.

C. 500GB HDD refers to storage space, which doesn’t affect whether the OS should be 32-bit or 64-bit.

D. 1Gbps Ethernet is a network speed specification, unrelated to OS architecture decisions.

Reference:
CompTIA A+ Core 2 (220-1102) Objective 1.3: “Given a scenario, install and configure the operating system using the appropriate methods.”
Microsoft Docs – 32-bit and 64-bit Windows differences

Which of the following filesystems supports read and write operations for Windows, macOS, and Linux?

A. exFAT

B. ReFS

C. NTFS

D. APFS

E. ext4

A.   exFAT

Explanation:

✅ Correct Answer: A. exFAT
The exFAT (Extended File Allocation Table) file system is specifically designed to provide compatibility across multiple operating systems, including Windows, macOS, and Linux. It supports large file sizes (over 4GB), making it suitable for modern storage needs like USB flash drives, SD cards, and external hard drives used across different platforms. Unlike older file systems like FAT32, exFAT does not have restrictive file size limits, and modern versions of Windows and macOS have built-in support for both reading and writing exFAT drives. Linux systems can also support exFAT with the appropriate drivers installed.

❌ Why the other options are incorrect:

B. ReFS (Resilient File System) is a Windows-specific file system used mostly for servers and is not supported on macOS or Linux for read/write operations.

C. NTFS is fully supported on Windows, and macOS can read NTFS by default but cannot write to it without third-party tools. Linux can read and write NTFS with certain drivers, but it’s not natively universal.

D. APFS (Apple File System) is proprietary to macOS and iOS devices and is not supported for read/write operations on Windows or Linux without specialized software.

E. ext4 is a popular file system for Linux but is not supported natively by Windows or macOS for full read/write functionality.

An employee is trying to connect their company laptop to airport Wi-Fi. A pop-up with the airport logo appeared and was closed quickly. The internet does not work. What should a help desk technician suggest?

A. Look for a wall socket with RJ45 and try to connect

B. Contact the airport IT department

C. Tell the employee that company policy prohibits connection to public Wi-Fi

D. Reconnect to the network and read the pop-up carefully

D.   Reconnect to the network and read the pop-up carefully

Explanation:

✅ Correct Answer: D. Reconnect to the network and read the pop-up carefully
At many public locations, including airports, Wi-Fi networks use a captive portal to control access. After connecting to the Wi-Fi network, the user typically must accept terms and conditions or enter login details on a pop-up web page before gaining internet access. If the employee accidentally closed this pop-up without completing the login or acceptance process, their device will remain connected to the Wi-Fi signal but won’t have actual internet connectivity. The help desk technician should advise the employee to disconnect and reconnect to the airport Wi-Fi, then carefully read and follow the instructions on the pop-up page to complete the connection.

❌ Why the other options are incorrect:

A. Look for a wall socket with RJ45 and try to connect may not be practical or available in public areas like airports and doesn’t solve the captive portal issue.

B. Contact the airport IT department is unnecessary at this stage because the issue is a common captive portal process that the user can resolve themselves.

C. Tell the employee that company policy prohibits connection to public Wi-Fi might apply in some companies, but this scenario assumes they are allowed to connect and simply need help finishing the process.

A network technician notices that most of the company's network switches are now end-oflife and need to be upgraded. Which of the following should the technician do first?

A. Implement the change

B. Approve the change

C. Propose the change

D. Schedule the change

C.   Propose the change

Explanation:

✅ Correct Answer: C. Propose the change
When a network technician identifies that most of the company’s switches are end-of-life and need upgrading, the first step is to formally propose the change. This involves preparing a proposal or change request that details the reason for the upgrade, the benefits, estimated costs, required resources, risks, and the impact on business operations. Proposing the change ensures that management and stakeholders are informed and can review, discuss, and decide whether to approve and allocate budget for the project. It’s a key part of the change management process to ensure that large infrastructure updates are carefully planned and documented before any actions are taken.

❌ Why the other options are incorrect:

A. Implement the change should only happen after the proposal is reviewed, approved, and scheduled. Acting without approval could cause business disruption or violate company policies.

B. Approve the change is a decision made by management or a change advisory board, not by the technician. The technician’s role is to propose the change, not approve it.

D. Schedule the change comes later in the process, once the proposal has been approved and plans have been finalized.

After using a third-party disk optimization software package, a technician restarts a laptop and receives the message “No operating system found.” The technician verifies that the BIOS properly recognizes the SSD. Which of the following should the technician do next?

A. Update BitLocker settings in the BIOS

B. Replace the CMOS battery

C. Boot from installation media and repair the MBR

D. Isolate the system from the corporate network

C.   Boot from installation media and repair the MBR

Explanation:

✅ Correct Answer: C. Boot from installation media and repair the MBR
If the laptop displays “No operating system found” after using third-party disk optimization software, it strongly suggests that the software may have damaged or corrupted the Master Boot Record (MBR) or altered the partition structure. Even though the BIOS can still detect the SSD, the system cannot locate the necessary boot information to load the operating system. The appropriate next step is to boot the laptop from Windows installation media and use the recovery tools to repair the MBR or fix the boot configuration. This process can restore the boot records and allow the system to recognize and start the operating system again without needing a full reinstall.

❌ Why the other options are incorrect:

A. Update BitLocker settings in the BIOS would only be relevant if the system were encrypted with BitLocker and prompting for a recovery key or related errors, but that’s not indicated here.

B. Replace the CMOS battery addresses BIOS settings retention issues, which isn’t the problem since the BIOS already recognizes the SSD.

D. Isolate the system from the corporate network would be a step for dealing with malware or network threats, not a boot error caused by disk software.

Page 6 out of 21 Pages