A customer is accessing a public kiosk in a company's lobby. Which of the following should be enforced to mitigate the risk of customer data being accidentally saved to the kiosk?
Correct Answer:
B
Private-browsing mode is the best option to mitigate the risk of customer data being accidentally saved to the kiosk. Private-browsing mode prevents the browser from storing cookies, history, passwords, and other data that could reveal the customer’s identity or preferences. Manually clearing browsing data is not a reliable option, as it depends on the customer’s awareness and willingness to do so. Browser data synchronization and password manager are features that could actually increase the risk of customer data being exposed, as they could sync or autofill sensitive information across devices or accounts. References:
✑ Official CompTIA learning resources CompTIA A+ Core 1 and Core 2, page 12
✑ Certification Study Guides and Books | CompTIA IT Certifications, CompTIA A+ Core 1 220-1101 Certification Study Guide, page 234
A technician is creating a location on a Windows workstation for a customer to store meeting minutes. Which of the following commands should the technician use?
Correct Answer:
D
The command md stands for make directory and is used to create a new directory or folder in the current location. In this case, the technician can use md minutes to create a folder named minutes in the C: drive. The other commands are not relevant for
this task. c: \minutes is not a command but a path to a folder. dir is used to display a list of files and folders in the current directory. rmdir is used to remove or delete an existing directory or folder.
A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).
Correct Answer:
BE
Drilling and incinerating are physical destruction methods that make the data on hard drives unrecoverable. Standard formatting, erasing and low-level formatting are logical methods that can be reversed with data recovery tools. Recycling is not a destruction method at all. Verified References: https://www.comptia.org/blog/what-is-a- certificate-of-destruction https://www.comptia.org/certifications/a
A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?
Correct Answer:
B
A change request form is a document that describes the proposed change, the reason for the change, the impact of the change, and the approval process for the change. A change request form is required for any planned changes to the network, such as adding a new network printer, to ensure that the change is authorized, documented, and communicated to all stakeholders. Submitting a change request form should happen immediately before network use is authorized, as stated in the Official CompTIA A+ Core 2 Study Guide. The other options are either too late (documenting the date and time of thechange) or too early (determining the risk level of the change and requesting an unused IP address) in the change management process.
A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?
Correct Answer:
A
Disk Cleanup is a tool that can free up some space on a system drive that is nearly full. It can delete temporary files, cached files, recycle bin files, old system files and other unnecessary data. Resource Monitor is a tool that shows the network activity of each process on a Windows machine. Disk Defragment is a tool that optimizes the performance of a hard drive by rearranging the data into contiguous blocks. Disk Management is a tool that allows creating, formatting, resizing and deleting partitions on a hard drive. Verified References: https://www.comptia.org/blog/how-to-use-disk-cleanup https://www.comptia.org/certifications/a