220-802 CompTIA A+ Certification Practice Exam Set 10

After gaining administrative access, a malicious intruder might leave which of the following behind

on a compromised system to allow for continued monitoring and access?


Options are :

  • Spyware
  • Logic bomb
  • Rootkit (Correct)
  • Trojan horse

Answer : Rootkit

A customer wants to setup a SOHO wired network. The customer needs assistance in setting up astatic IP address on three computers on the network. Which of the following is the BEST solution

for the technician to implement?


Options are :

  • Internet Options > Advanced tab > LAN settings, type in the IP address
  • Internet Options >Connection > Network > LAN settings > choose Proxy server, type in the IP address
  • Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address (Correct)
  • Windows Firewall > the Connections tab > Add Exception > Change Scope, type in the IP address

Answer : Local Area Connections >Properties > TCP/IP > Properties > General > Specify, type in the IP address

A client reports that their VoIP phone screen displays duplicate IP address. Which of the following

is the FIRST action to try to resolve this problem?


Options are :

  • Reboot the phone (Correct)
  • Change MAC address settings
  • Call the vendor
  • Try another LAN connection

Answer : Reboot the phone

Which of the following BEST describes the security term known as tailgating?


Options are :

  • Removing files from a site using a hidden USB drive
  • Following behind someone when entering a secure area (Correct)
  • Using someone else’s logged in computer to access files
  • Propping open a secure entrance to gain later access

Answer : Following behind someone when entering a secure area

IT suspects that other people are frequently making changes to a computer when a user leaves

their desk. Which of the following security policies can be implemented in order to prevent this

situation?


Options are :

  • Auto-lock (Correct)
  • Change the default username
  • Disable the guest account
  • Password complexity

Answer : Auto-lock

Which of the following is the BEST definition of what an accelerometer does?


Options are :

  • Makes the device run with more speed
  • Prolongs battery life
  • Calculates the rotation of a device
  • Measures velocity in a given direction (Correct)

Answer : Measures velocity in a given direction

A user is reporting that they are clicking on search results and being redirected to the wrong sites.

Which of the following should a technician check FIRST?


Options are :

  • Proxy Settings (Correct)
  • Temporary Internet Files
  • Windows Firewall
  • Cookies

Answer : Proxy Settings

When setting up a new wireless router, which of the following actions should the technician take

FIRST in order to secure the network? (Select TWO).

A. Disable unused ports

B. Change the SSID

C. Position the antennas to prevent outside access

D. Enable MAC filtering

E. Change the default user name


Options are :

  • C,D
  • B,C
  • A,B
  • B,E (Correct)

Answer : B,E

An administrator is asked to review a file on a local drive. The file contains what appear to be

multiple conversations from emails, chat sessions, and various word processing files that were

accessed during the past several days. Ann, the user, advises the administrator this was not a file

she had created. The file is MOST likely created by which of the following?


Options are :

  • Phishing
  • Social engineering
  • Keylogger (Correct)
  • Malware

Answer : Keylogger

Which of the following features allows for easier navigation of long lists on a tablet device?


Options are :

  • Touch flow (Correct)
  • Multitouch
  • Pinch-zoom
  • Scrollbars

Answer : Touch flow

Which of the following data types can be synchronized to a mobile device by default? (Select

TWO).

A. Biometric information

B. Pictures

C. Contacts

D. Credentials

E. SMS


Options are :

  • D,E
  • B,C (Correct)
  • C,D
  • A,B

Answer : B,C

Which of the following should a technician do FIRST to secure a mobile device?


Options are :

  • Assign a passcode (Correct)
  • Download updates
  • Install antivirus
  • Disable GPS

Answer : Assign a passcode

A user has highly confidential information on an old hard drive. Which of the following methods

would BEST ensure that the data can never be recovered?


Options are :

  • Degaussing tool (Correct)
  • FORMAT /Q
  • Low level format
  • Overwrite program

Answer : Degaussing tool

To which of the following security methods does "User authentication/strong passwords" belong?


Options are :

  • Physical security
  • User education
  • Digital security (Correct)
  • Principle of least privilege

Answer : Digital security

Which of the following security threats are typically designed to get the user to make a purchase?

(Select TWO).

A. Worm

B. Virus

C. Adware

D. Spam

E. Trojan

F. Phishing


Options are :

  • A,B
  • C,D (Correct)
  • E,F
  • B,C

Answer : C,D

Which of the following home computer synchronization methods are possible with an iOS device?

(Select TWO).

A. Infrared

B. USB

C. FireWire

D. Wi-Fi

E. ParallelA


Options are :

  • A,B
  • B,C
  • B,D (Correct)
  • D,E

Answer : B,D

A technician needs to configure their neighbor’s iPad. The neighbor wants to access their work

email. The technician requires some information from their neighbor’s work IT department. Which

of the following information does the technician need?


Options are :

  • Server and domain (Correct)
  • IP address and domain
  • IP address and DNS
  • Server and gateway

Answer : Server and domain

A technician sends an email to an employee in the finance office telling them they need to change

their password right away. The technician then walks into the employee's office to observe as the

password is being changed. Later, the employee in the finance office reports that their password

was compromised. Which of the following is the MOST likely cause?


Options are :

  • Shoulder surfing (Correct)
  • Malware
  • Phishing
  • SPAM

Answer : Shoulder surfing

Which of the following is one of the major differences between a new tablet and a new laptop

computer?


Options are :

  • Tablet has no field serviceable parts. (Correct)
  • Tablet has faster Ethernet capability.
  • Laptop has less field functionality.
  • Laptops have slower responsiveness than tablets.

Answer : Tablet has no field serviceable parts.

Which of the following is a device intended to prevent physical access to a facility?


Options are :

  • Mantrap (Correct)
  • Tailgate
  • Firewall
  • Bollards

Answer : Mantrap

A technician is hardening the security on a wired SOHO router and needs the router to still be able

to connect to the Internet. Which of the following methods would the technician do to achieve this?


Options are :

  • Disable the SSID broadcast
  • Enable WPA2
  • Disable unused ports (Correct)
  • Disable NAT

Answer : Disable unused ports

After performing a wireless survey, a technician reports the following data:

WAP Name Channel

WAP1 6

WAP2 8

WAP3 9


Which of the following channels should the technician use for the SOHO WAP to be installed

next?


Options are :

  • 3
  • 1 (Correct)
  • 7
  • 11

Answer : 1

Which of the following is the correct path to determine the IP address on an iOS device?


Options are :

  • Wi-Fi> SSID Name> Network> IP address
  • General> Settings> Wi-Fi> SSID Name> Network> IP address
  • Settings> General> Network> Wi-Fi> SSID Name> IP address (Correct)
  • Location Services> Settings> Wi-Fi> SSID Name> Network> IP address

Answer : Settings> General> Network> Wi-Fi> SSID Name> IP address

client has asked a technician about drive sanitation and wants to know what the difference is

between overwriting a drive and formatting a drive. Which of the following would be the BEST

response from the technician?


Options are :

  • “Overwriting replaces all the data with a single file that fills the hard drive destroying the data, while formatting erases all the data.”
  • “Overwriting writes 1s and 0s to the drive replacing only the user’s data but not the OS data, while formatting destroys the hard drive.”
  • “Nothing is different. They both destroy the data so no one can recover it.”
  • “Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used.” (Correct)

Answer : “Overwriting writes 1s and 0s to a hard drive replacing the data, while formatting only clears the reference to the data and only overwrites as space is used.”

A technician has upgraded an internal Wi-Fi card on a laptop and now the signal power to connectA technician has upgraded an internal Wi-Fi card on a laptop and now the signal power to connect


Options are :

  • WIFI card drivers are not installed.
  • The laptop’s battery is dead.
  • The laptop’s memory is faulty.
  • One of the antenna wires is unplugged. (Correct)

Answer : One of the antenna wires is unplugged.

Which of the following protocols could a technician use to connect a smartphone to an email

server? (Select TWO).

A. SMTP

B. POP3

C. HTTP

D. SNTP

E. ICMP


Options are :

  • C,D
  • B,C
  • A,B (Correct)
  • D,E

Answer : A,B

A user realizes they left their mobile phone in a taxi minutes after the car departs. Which of the

following should be done to BEST ensure none of the private data on the phone is accessed?


Options are :

  • Remote Wipe (Correct)
  • Passcode Lock
  • Remote Backup
  • GPS Tracking

Answer : Remote Wipe

Which of the following allows a hidden backdoor to be used for access to workstations on the

Internet?


Options are :

  • Cross-side scripting
  • SQL injection
  • Rootkits (Correct)
  • Firmware

Answer : Rootkits

A user calls the help desk to report about their smartphone not being able to make any phone

calls. The user admits that the smartphone can still send/receive email, browse all websites, and

utilize all Internet-capable applications. Which of the following issues is MOST likely affecting the

smartphone?


Options are :

  • The user forgot to turn off Bluetooth before trying to make a call.
  • Wi-Fi is turned off; the cellular antenna is turned on.
  • The cellular antenna is turned off; Wi-Fi is still on. (Correct)
  • The user has 4G capability turned off, and is only on 2G.

Answer : The cellular antenna is turned off; Wi-Fi is still on.

Which of the following will allow a company to implement the MOST cost-efficient way to easily

identify whether a user has secure access to particular areas of a building?


Options are :

  • Install retina scanners
  • Require badges (Correct)
  • Install firewalls
  • Require key fobs

Answer : Require badges

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions