Which of the following methods would make data unrecoverable but allow the drive to be repurposed?
Correct Answer:C
Comprehensive and Detailed Explanation From Exact Extract:
A low-level format (also referred to as a zero-fill or full format) writes over every sector on a storage device, effectively destroying the existing data and making recovery nearly impossible. Unlike degaussing, which renders the drive unusable, a low-level format maintains the integrity of the device, allowing it to be repurposed or reused.
* A. Deleting partitions does not fully erase data; it only removes references in the partition table.
* B. EFS (Encrypting File System) encrypts files but does not securely wipe them.
* D. Degaussing destroys the magnetic structure of a drive, making it inoperable and not reusable.
Reference:
CompTIA A+ 220-1102 Objective 4.3: Given a scenario, implement basic change management best practices.
Study Guide Section: Drive sanitation methods — low-level format vs. degaussing vs. deletion
===========================
A customer wants to be able to work from home but does not want to be responsible for bringingcompany equipment back and forth. Which of the following would allow the user to remotely access and use a Windows PC at the main office? (Choose two.)
Correct Answer:CD
Comprehensive and Detailed Explanation From Exact Extract: To work remotely without physically transporting a workstation, the user needs:
✑ C. RDP (Remote Desktop Protocol): Allows graphical remote access to a Windows
PC at the office.
✑ D. VPN (Virtual Private Network): Establishes a secure tunnel to access the corporate network remotely, making the internal PC reachable.
* A. SPICE is used in virtual machine environments and is not typically used for end-user remote desktop access.
* B. SSH is a text-based remote access tool used mostly for Linux systems.
* E. RMM (Remote Monitoring and Management) is used by IT administrators for support — not end-user remote access.
* F. WinRM is used for Windows remote management via PowerShell, not for full desktop access.
Reference:
CompTIA A+ 220-1102 Objectives 2.2 & 4.4: Compare and contrast security tools and remote access methods.
Study Guide Section: Remote access tools — RDP and VPN for secure remote work
A company would like to deploy baseline images to new computers as they are started up on the network. Which of the following boot processes should the company use for this task?
Correct Answer:D
Comprehensive and Detailed Explanation From Exact Extract:
PXE (Preboot Execution Environment) allows workstations to boot over the network and download an OS image from a server. It is ideal for automating mass deployments using
baseline images across many machines without the need for physical media.
* A. An ISO is a disk image file but requires mounting or physical media.
* B. Secure Boot is a security feature, not a method of deploying OS images.
* C. USB requires manual installation and is not suitable for automated deployment at scale. Reference:
CompTIA A+ 220-1102 Objective 1.4: Given a scenario, use appropriate Microsoft operating system installation methods.
Study Guide Section: Remote installation methods — PXE boot deployment
===========================
A company executive is currently attending a major music festival with a large number of attendees and is having trouble accessing a work email account. The email application is not downloading emails and also appears to become stuck during connection attempts. Which of the following is most likely causing the disruption?
Correct Answer:C
Comprehensive and Detailed Explanation From Exact Extract:
At large events such as music festivals, cellular towers may become congested due to the high volume of users attempting to connect simultaneously. This congestion causes slow or failed data connections, which explains the email application being unable to sync or connect. This is a common real-world mobile connectivity issue in crowded areas.
* A. Lack of storage would prevent saving attachments, not prevent connection attempts.
* B. Company firewalls usually don??t affect mobile access unless specific device restrictions are enforced.
* D. Organizers do not have the ability to block the internet signal; only carriers manage mobile bandwidth.
Reference:
CompTIA A+ 220-1102 Objective 3.3: Troubleshoot mobile OS and connectivity issues. Study Guide Section: Mobile network limitations — signal congestion and bandwidth issues
===========================
Which of the following file types would a desktop support technician most likely use to automate tasks for a Windows user log-in?
Correct Answer:A
Comprehensive and Detailed Explanation From Exact Extract:
* A .bat file (batch file) is a script file in DOS, OS/2, and Microsoft Windows. It contains a series of commands that are executed by the command-line interpreter. In Windows environments, batch files are commonly used to automate log-in tasks, such as mapping network drives, launching applications, or setting environment variables during the user's logon process.
* B. .sh is a shell script used in Linux/Unix environments.
* C. .py is a Python script, which can be used for automation but is not commonly run directly at user logon in standard Windows environments.
* D. .js is JavaScript, used mainly in web development and not for system-level scripting in Windows logon automation.
Reference:
CompTIA A+ 220-1102 Objective 1.3: Use appropriate Microsoft operating system features and tools.
Study Guide Section: Scripting basics and file types for automation — .bat for Windows
===========================
An organization is experiencing an increased number of issues. A technician notices applications that are not installed by default. Users are reporting an increased number of system prompts for software licensing. Which of the following would the security team most likely do to remediate the root cause?
Correct Answer:B
Comprehensive and Detailed Explanation From Exact Extract:
If unauthorized or non-standard applications are appearing on systems and users are receiving licensing prompts, it??s likely users are installing software themselves. Removing users from the local administrators group will prevent them from installing software without approval and reduce the likelihood of introducing unapproved or malicious programs.
* A. Deploying a PKI helps with secure communications but doesn??t address user software installation rights.
* C. Blocking suspicious websites is helpful but doesn??t prevent local installations.
* D. Stricter UAC may add prompts but can still be bypassed by admin users. Reference:
CompTIA A+ 220-1102 Objective 2.2: Compare and contrast access control methods and user privilege settings.
Study Guide Section: Principle of least privilege and managing local admin rights
===========================