A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?
Correct Answer:
B
Full disk encryption is a security mechanism that encrypts the entire data on a hard drive, making it unreadable without the correct decryption key or password. It can prevent the stored data from being recovered by unauthorized persons who steal or access the laptop. Biometrics, enforced strong system password and two-factor authentication are other security mechanisms, but they only protect the login access to the laptop, not the data on the hard drive. Verified References: https://www.comptia.org/blog/what-is-full-disk- encryption https://www.comptia.org/certifications/a
Which of the following script types is used with the Python language by default?
Correct Answer:
D
The script type that is used with the Python language by default is .py. .py is a file extension that indicates a Python script file that contains Python code that can be executed by a Python interpreter or compiler. Python is a high-level, general-purpose and interpreted programming language that can be used for various applications, such as web development, data analysis, machine learning and automation. .ps1 is a file extension that indicates a PowerShell script file that contains PowerShell code that can be executed by a PowerShell interpreter or compiler. PowerShell is a task-based, command-line and scripting language that can be used for system administration and automation on Windows systems. .vbs is a file extension that indicates a VBScript file that contains VBScript code that can be executed by a VBScript interpreter or compiler. VBScript is an Active Scripting language that can be used for web development and automation on Windows systems. .bat is a file extension that indicates a batch file that contains a series of commands that can be executed by a command-line interpreter or shell on Windows systems. Batch files can be used for system administration and automation on Windows systems. References: CompTIA A+ Core 2 (220-1002) Certification Exam Objectives Version 4.0, Domain 4.3
A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?
Correct Answer:
D
The filesystem that is supported by both Macs and Windows PCs is D. exFAT. exFAT is a file system that is designed to be used on flash drives like USB sticks and SD cards. It is supported by both Macs and Windows PCs, and it can handle large files and volumes
https://www.diskpart.com/articles/file-system-for-mac-and-windows-0310.html
A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.
Which of the following security measures should the user take to ensure security and privacy?
Correct Answer:
A
This is a scenario of a potential tech support scam, where a fraudster pretends to be a technical support agent and tries to trick the user into giving them access to the computer, personal information, or money. The user should not trust any unsolicited calls from unknown people claiming to be from tech support, as they might be trying to install malware, steal data, or charge for fake services. The user should only accept calls from known people, such as their IT department, their service provider, or their software vendor, and verify their identity before logging in to the computer. The user should also report any suspicious calls to the appropriate authorities or organizations.
References:
✑ How to protect against tech support scams1
✑ Avoid and report Microsoft technical support scams2
✑ How to Protect Against Technical Support Scams3
✑ How To Recognize and Avoid Tech Support Scams4
Which of the following items require special e-waste recycling? (Select two).
Correct Answer:
DE
Some electronic items require special e-waste recycling because they contain hazardous materials that can harm the environment and human health if disposed of improperly12. Laptop batteries and CRT monitors are examples of such items.
Laptop batteries are usually made of lithium-ion or nickel-metal hydride, which are both toxic and flammable substances34. If laptop batteries are thrown in the trash, they can leak, catch fire, or explode, causing pollution and injuries5 . Therefore, laptop batteries should be recycled at authorized collection centers or through manufacturer take-back programs .
CRT monitors are old types of display devices that use cathode ray tubes, which are glass tubes that emit electrons to create images on the screen . CRT monitors contain lead, mercury, cadmium, and phosphor, which are all harmful metals that can contaminate the soil, water, and air if dumped in landfills . Therefore, CRT monitors should be recycled at certified e-waste facilities or through retailer or manufacturer trade-in programs . References1: CompTIA A+ Certification Exam Core 2 Objectives, page 13 2: Environmental Impacts – CompTIA A+ 220-1102 – 4.53 3: The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10-12 4: CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key5 5: [Why You Should Recycle Your Old Laptop Battery]
: [How to Recycle Laptop Batteries] : [Laptop Battery Recycling] : [How to Recycle Laptop Batteries] : The Official CompTIA A+ Core 2 Instructor Guide (Exam 220-1102), page 10- 12 : CompTIA CertMaster Learn for A+ Core 2 (220-1102) - Student Access Key : [What is a CRT Monitor?] : [How to Recycle CRT Monitors] : [CRT Monitor Recycling] : [How to Recycle CRT Monitors]