Book Image

CompTIA A+ Practice Test Core 2 (220-1102)

By : Mark Birch, Ian Neil
Book Image

CompTIA A+ Practice Test Core 2 (220-1102)

By: Mark Birch, Ian Neil

Overview of this book

The CompTIA A+ Core 2 certification validates the knowledge you need to support common operating systems and software installations. This book tests the skills essential for you to secure computing environments and troubleshoot common computing issues, while adhering to operational procedures through practice questions. Using proven techniques to test a candidate's knowledge of Core 2 (220-1102) exam objectives, this book will ensure that you're well-prepared to pass the exam on your first attempt. The chapters in this book comprise multiple-choice questions at the same level of difficulty as those you’ll find in the official exam. All the questions are broken down into different chapters according to each exam domain, finishing with a 90-question mock exam to prepare you to confidently take the real exam. The chapters are designed in a way to not only test your knowledge, but also your ability to handle pressure during the exam. By the end of this practice test book, you’ll be well-prepared to pass the CompTIA A+ Core 2 exam with confidence.
Table of Contents (10 chapters)

Chapter 2: Security

2.1 Summarize various security measures and their purposes

  1. Answer: A

Explanation: Motion sensors are primarily designed to detect any movement within their range. They are commonly used in security systems to identify the presence of unauthorized individuals or objects, trigger an alarm, or activate other security measures.

Incorrect: Option B describes HVAC systems. Option C describes audio detection. Option D describes a photosensor.

  1. Answer: B

Explanation: Soft tokens are software-based security tokens that generate one-time passwords (OTPs) to authenticate the user’s identity during the login process. They are commonly used in logical security systems to provide an additional layer of security. Soft tokens generate unique passwords that are valid for a short period of time, ensuring that only authorized users can access sensitive information or perform specific actions.

Incorrect: Option A, generating secure passwords...