Topic 5: Exam Pool E
A technician was assigned a help desk ticket and resolved the issue. Which of the following should the technician update to assist other technicians in resolving similar issues? End user training
A. Progress notes
B. Knowledge base
C. Acceptable use policy document
Explanation: A knowledge base is a centralized repository of information that can be used by technicians to find solutions to common problems, best practices, troubleshooting guides, and other useful resources12. Updating the knowledge base with the details of the issue and the resolution can help other technicians who encounter similar issues in the future. It can also reduce the number of tickets and improve customer satisfaction3. References1: The Official CompTIA A+ Core 2 Student Guide (Exam 220-1102), page 10- 11 2: CompTIA A+ Certification Exam Core 2 Objectives, page 13 3: CompTIA A+ Core 2 (220-1102) Certification Study Guide, page 10-12
An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts? SSID
A. DHCP
B. Firewall
C. SSD
Which of the following combinations meets the requirements for mobile device multifactor authentication?
A. Password and PIN
B. Password and swipe
C. Fingerprint and password
D. Swipe and PIN
Explanation: Mobile device multifactor authentication (MFA) is a method of verifying a user’s identity by requiring two or more factors, such as something the user knows (e.g., password, PIN, security question), something the user has (e.g., smartphone, OTP app, security key), or something the user is (e.g., fingerprint, face, iris)12. The combination of fingerprint and password meets the requirements for mobile device MFA because it uses two different factors: something the user is (fingerprint) and something the user knows (password). The other combinations do not meet the requirements because they use only one factor: something the user knows (password or PIN) or something the user does (swipe). References1: Set up the Microsoft Authenticator app as your verification method2: What is Multi-Factor Authentication (MFA)? | OneLogin
A technician is investigating an employee's smartphone that has the following symptoms
A. Turn on autorotation
B. Activate airplane mode.
C. Close unnecessary applications
D. Perform a factory reset
E. Update the device's operating system
F. Reinstall the applications that have crashed.
Explanation: The technician can close unnecessary applications and turn on autorotation to resolve these issues with minimal impact. Autorotation can help the device to switch between portrait and landscape modes automatically. Closing unnecessary applications can help to free up the device’s memory and reduce the device’s temperature1.
A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?
A. Ask the user for the model number of the hardware.
B. Offer a temporary replacement device to the user.
C. Submit the issue to the manufacturer.
D. Remotely install updates to the device driver.
Explanation: The first step in troubleshooting a hardware issue is to identify the hardware device that is causing the problem. Asking the user for the model number of the hardware can help the help desk technician to find the specifications, manuals, drivers, and other relevant information for the device. This can also help the technician to determine if the device is compatible with the user’s system, if it has any known issues or defects, and if it is covered by warranty or support contract. Asking the user for the model number of the hardware is a help desk best practice that can save time and effort in resolving the issue
Upon downloading a new ISO, an administrator is presented with the following string:
59d15a16ce90cBcc97fa7c211b767aB
Which of the following BEST describes the purpose of this string?
A. XSS verification
B. AES-256 verification
C. Hash verification
D. Digital signature verification
Explanation:
Hash verification is a process that verifies the integrity of a file by comparing the hash value
of the downloaded file to the hash value provided by the source1.
Malware is installed on a device after a user clicks on a link in a suspicious email. Which of the following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.
Explanation: Recovery mode is a special boot option that allows the user to access advanced tools and features to troubleshoot and remove malware from the device. Recovery mode can also restore the system to a previous state or reset the device to factory settings. Running System Restore, scheduling a scan, or restarting the PC may not be effective in removing the malware, as it may still be active or hidden in the system files.
A user reports a computer is running slow. Which of the following tools will help a technician identity the issued.
A. Disk Cleanup
B. Group Policy Editor
C. Disk Management
D. Resource Monitor
Explanation:
Resource Monitor will help a technician identify the issue when a user reports a computer
is running slow1.
Which of the following operating systems is most commonly used in embedded systems?
A. Chrome OS
B. macOS
C. Windows
D. Linux
Explanation: Linux is the most commonly used operating system in embedded systems because it is open source, free, customizable, and supports a wide range of architectures and devices. Linux also offers many advantages for embedded development, such as real-time capabilities, modularity, security, scalability, and reliability. Linux can run on embedded systems with limited resources, such as memory, storage, or power, and can be tailored to the specific needs of the application. Linux also has a large and active community of developers and users who contribute to its improvement and innovation. Some examples of embedded systems that use Linux are smart TVs, routers, drones, robots, smart watches, and IoT devices
A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?
A. VNC
B. SSH
C. VPN
D. RMM
Page 15 out of 74 Pages |
Previous |