Just came on here to say before I watched your videos I didn't make over a 660 on the Comptia A+ 1102. I started watching your videos and made a 725 today. I truly appreciate you and your videos and will be coming back for all my courses.
Wanted to give you a huge thank you, I passed both my Core 1 and 2 and I credit you 95% of what I learned, I learned the best from your videos and practice questions, I absolutely wouldn't have done it without you keep doing what you do!
I finally passed my A+ 1101 & 1102 at around 750 each. Your test question videos and all the explanations really helped me grasp many of the concepts and the thought processes behind them! Very grateful, your channel is a gem.
This was very useful to listen to. Pay attention not only to the answers but listen to his explanations on the other answer choices and why they could or could not be an answer. Just passed my core 2.
@7:24 For question 2, "You have a user who installed an application on their device that claims to optimize performance. The user says they installed these applications directly from the vendor's website. The device now has extremely high network utilization. What should you do first?" Wouldnt the first thing you would want to do is disconnect from the network? As per the Comptia+ 1102 Core Objective Standards 3.3 'Given a scenario, use best practice procedures for malware removal', the second step after identifying signs of malware, which in this case would be the high network utilization would be to quarantine the network? Also in terms of changes to the system, disconnecting from the network is the least drastic change. Maybe it was the language of the question that was tricky for me, idk
You are the best online teacher i've encountered in my whole life. you explain every answers in detail. better than any computer professor during my college days.
For Question 2 I would say A -- if you have a limited data plan then you certainly want to kill your network connection to keep your data from getting drained -- and then you can uninstall at your leisure afterwards. It's easier to turn wifi back on than to uninstall/reinstall software. And it's not on the list, but I would also check Task Manager (CTRL + SHIFT + ESC) to see if that program installed other programs that are running in the background and causing the high network utilization.
Same. I've dealt with enough malware in the past to learn that sometimes attempting to delete the files can trigger even more adverse reactions from the malware. I'd make sure to completely disconnect from the network before attempting anything.
I just passed core 2 this morning, and it is absolutely all thanks to your incredible videos! Thank you so much for your hard work and I promise I'll be back for core 1 soon :)
Just passed my core 2 so now I’m certified! Came here to say that you’re a big reason! So much focus on pay attention to what the question is asking! It’s so easy to misinterpret and get it wrong. Take it slow when reading eh questions. Thank you! Easter egg
Just passed the core1 exam last oct19 and currently reviewing for core2. The questions on the actual exam are most situational and asks for specific answer. Great content btw. Thanks!
Thank you so much!! I listened to both parts 1 and 2 today before my exam and it solidified a lot of things for me! I am now A+ certified and I don’t think i could’ve done it without these videos!
Thank you so much for this video I passed my exam and I received my certification, i’ve got my certification in hand 🎉 I watched this on 2x speed the morning of the exam and made an 85
I just passed my Core 1 the other day and I learned a lot from listening to you everywhere I go. Thank you very much! I am now preparing for Core 2 and will take your voice everywhere . I like how you are very lively and actually has a personality, it makes the video more interesting and the information easy to remember. I love when you say "what is it boys and girls??? It's APIPA..." I will never forget APIPA ever again, even in afterlife 😄
Passed A+ . I appreciate your videos. The details about the questions are paramount and logical break down of each answer. Thank you for your help. On to net +
Just passed my Core 1 and Core 2. I genuinely was slacking all semester and me passing is almost entirely due to speeding through these videos today. Thank you!!!
@chasityr8275 Skip them and come back after you finish the rest of the questions. in my experience they were really vague, and while i was confident in what i was doing, I wasn’t sure if I was doing what they actually wanted me to do. Like for example there was a pbq where you place access points in an office to offer maximum coverage for everyone with minimal interference. There were about 3 or 4 different ways that would be ideal so I kind of had to guess which one the test would actually consider correct. Waiting til the end to do them helps you not waste too much time to finish the questions, and also the questions might help you get a better idea of what you’re supposed to be doing in the pbq’s. Sorry for being vague i was in a fugue state when I took them so i dont remember much lol Good luck!
Just wanted to drop by and show appreciation for all your videos. I took the core 1 exam and passed a month ago and I just got home today from my core 2 exam with a pass as well. I used a exam prep program offered through a reputable college prior to finding your channel and even though I passed...I found that their level and style training was nowhere near the level of detail and explanations you provided. I actually feel like that's money I could have saved, lol. Either way, it's done and now I can move on and begin my learning for Net, Security and Cloud.
I really appreciated the 50 Questions and how you explained each answer option thoroughly. My understanding of many, many concepts has been greatly increased.
Again bro, just like with my core 1101 exam I can't thankyou enough, I just passed the 1102 exam, and your two videos on this matter where my most watched youtube study. Thankyou so much. 👌
Thanks for everything man. I really appreciate all the work you have put in to help us all out. Once I have landed a good job after the certifications I will come back and donate to show my appreciation ❤😊 for now just know that there are lots of us who appreciate you helping us change our lives!
Question 43- wouldn’t a botnet that creates zombies be a type of virus that spreads like a worm? A worm doesn’t necessarily have to display images, it is about how it spreads without user input. And a virus doesn’t have to only do damage.
I work at an airport in the United States and we have installed a mantrap for people entering and leaving terminal access. Answering to comments brought up on question 48.
Im sorry but if the Question 13 is on the test that is a really crappy thing. The real term is Vishing (Voice phishing, or vishing, is the use of telephony to conduct phishing attacks). Spoofing is where an email address is faked to look legit in order to gather information or credentials typically. Maybe im splitting hairs but I think that would need to be reworded for those pursuing Sec+ in the future.
hey bud, Sadly there will be questions in the real exam which are annoying like this one. They generally give you 4 possible answers with most of their questions and sometimes you'll see none of them are truly 100% correct. You will then have to choose the MOST correct answer or the BEST answer. You will see in the exam that with a lot of their questions they will mentioned the words "best" or "most" in the question. You'll also see that it's often highly in caps and even in bold sometimes. That means there is more than one correct answer or that none are 100% truly correct but that you have to choose the closest thing to being correct. It's a very frustrating thing in these exams but A+ exams are famous for this
Social engineering is a technique that uses psychological manipulation to trick people into taking a desired action, while spoofing is a category of attacks that involves pretending to be someone or something else:
I was thinking the same thing. Like yeah, just flipping that switch isn't good enough, but its asking what to do FIRST. Any time ive been working with something with a PSU like that, we always flip the switch and then disconnect after that.
I don't see the performance based question video anymore, did it get taken down? Any chance I could get a link to the video through a different site that isnt youtube?
3:32 you don’t need special software to do that you can in windows go to command prompt type diskpart select the disk and type clean all and it’ll overwrite the whole disk with zeros you can do it once twice three times your choice I think the Linux environment is the dd (data destroyer) command
@@Gucci5175 I wouldn't say they are worded similar as the test is actually a bit harder, but every one of the concepts in these practice questions do show up in one way or another on the test.
Q15, you mention rainbow tables. That's used when a hacker has compromised a server and obtained the encrypted passwords (the hashes) of all accounts. Encryption is not normally reversible to find the original password. The rainbow table is a brute-force pre-computed list of every possible password character combination and the encrypted hash associated with it. The hacker can then can work backwards from the encrypted hash to find the original password. The known username and password can then be used to access other systems that use the same credentials. Building rainbow tables involves terabytes of storage and multiple CPUs generating the hashes as fast as possible. Salting can defeat it, as each randomly chosen salt value requires its entire own separate rainbow table.
This is very helpeful please do this more often for future courses like network and security. Thanks. I liked all your videos. maybe i forgot some videos.
Question 1: The answer is obviously B. Utilizing diskpart and format /p:6 are the ONLY federally accepted way to properly erase sensitive data, with the exception of physical destruction or Deguassing (electromagnetic sterilization). You can use pre-boot recovery tools CLI on primary drive, or in the active OS (cmd / powershell) if the hdd is installed as a secondary drive. Third party software cant always be trusted.
Although I agree with your reasoning, the phrasing of this question and it's answers are meant to confuse us. When it comes to data removal, we need to evaluate the security concern imposed and what level of precaution we should use in the data's removal. If we follow the way the DoD gets rid of data, we see that they use the standard for media removal outlined by the National Institute of Science and Technology (NIST). In the documentation "Guidelines for Media Sanitization" by the NIST, we can see that the steps to follow for media data removal for an organization is outlined in a given flow chart. Now getting back to Question 1, the keyword to look at is that it says the company wants to "re-use" their own HDD. This implies the data on the HDD will not be leaving their company, therefore, imposing little security concern to the org. Knowing this, we can follow the flow chart for removal which means we only need to "clear" the hard drive. The keyword "clear" basically means at least one written pass over on the data needs to happen. This can be done via "using organizationally approved and validated overwriting technologies/methods/tools". Now for the answers. Answers A and B are effectively doing the same things. Deleting files or quick formatting don't actually overwrite anything, only marking areas as open. Using the command line as you explain in your comment would work for this scenario. However, answer B isn't actually implying a full format in the way you explain. Question B is basically saying use the command line to "delete" data, not wipe it as a full format would. Deleting data via the command line would just consist of using the rm command on given files/directories. The only possible answer left would be C) Disk Wiping Software. The vague mention of disk wiping software doesn't imply that it would have to be some untrusted 3rd party software, it could just be some validated and trusted software used by the orgs. Hopefully this clears up some misunderstandings. I didn't plan on writing all this but I encountered something very similar on Prof. Dion's practice exams and had to do a bit of digging to understand the correct answer for one of the practice problems. Figured I'd write this up to clear up anyone else's confusion as well. If your curious to know more or I just explained it poorly you can get the information directly from the source "Guidelines for Media Sanitization".
i swear I heard question 5 before and the answer for it was C not D on another site. This sort of "BEST CHOICE" inconsistency is what makes this shit so hard. To be clear, I agree with your answer not theirs which is why I remember it because I got it wrong.
i work at best buy geeksquad. the most unrealistic thing about all of these question is the client knowing what anything is genuinely called, instead of doo-dad or thingy.
⚠Question 13: If Visihing was a possible choice, that would be a better answer. Vishing is when cybercriminals use Voice over IP (VoIP) to make phone calls or leave voice messages pretending to be from a reputable company in order to trick victims. Again, because the cybercriminal is making a CALL, Vishing is better answer.
hello! love your channel and all the info. Concerning question 27 about upgrading from a 32-bit version of Windows 7 to Windows 10 (64-bit): your answer is D (a clean install with the 64-bit version). Is that always the case? If the client had a 32-bit version of Windows couldn't you assume that they have a 32-bit operating system? My first instinct would have been to answer C. Do we know what processor they are running when we take the test? Thanks again!!!
Question 18 asks: which step should be done first? chose all that apply. How can you do more than one thing first? One will be first and another second, and so the second item will not be first and should not apply. Right?
Question 22 maybe since the question asks what would you do FIRST, you would first turn off PSU power switch and then you would disconnect the PC from power socket?? it says would you should do first, not what is the only thing you should do...
Why would the first thing you do in Question 2 not be unplug the network cables/disable WiFi? Wouldn't you want to stop the potential data breach as quick as possible?
My guess is why that’s not right is because it says unplug network cable. In the question it just said device. It could be a laptop, phone, tablet, or desktop. So from there the next best choice would be uninstall it. I could be wrong but I think that’s why.
I agree- it is the same as the ransomware question. Both are about malware compromising data. Data being transmitted out is probably more damaging than locked data, especially if you have off-site backups.
Question 13. Isn't spoofing a term just for computer-related faking? Such as IP spoofing or ARP spoofing. While impersonation is for physical faking like a UPS uniform? In which case, why didn't we choose Social Engineering, D?
Hi buddy, I have a question for you. I see that there are 2 separate playlists for the A+ certificate and the content of the videos in them is different. Which one should I finish first or should I finish one of the two? I will be glad if you answer, have a good day.
7:17 I am sorry but question 2; why aren’t we isolating the device first from the network? I mean we know that the device is eating resources (network) of the device, what if after uninstalling the app the device is still record high network utilisation, what next?
Would MAC or Content filtering work as a possible solution to 45 if you identify and blacklist devices or websites your neighbors are using? I understand why reducing broadcast power is the best option, but I am curious if these approaches have downsides I'm not thinking of (needs repeated updating to eliminate new devices or sites if the neighbors' behavior or devices change).
I was asked to remove them due to them looking to close like the real thing according to CompTIA. They were fully custom made though lol If you need assistance though, you can join the Discord server of the channel and ask for assistance there. Will do my best to assist where I'm able to
I feel so confident watching these test preps because I seem to know all of the answers but a handful of them. However, the prep course I am in has practice tests and I get destroyed in those. Do they make these “for profit” test preps purposely harder so they can guarantee pass rates or am I just not there yet?
Yes and No. In most cases the practice tests are made with profit in mind and I don't like that which is why I give everything away for free. I can't say for sure though if they make them hard on-purpose to get people to spend more money. I suppose some might but we probably can't through them all in the same box since some of them by honest and innocent.
Yea that makes sense. What I mean is some of the for profit places guarantee a 98% pass rate or whatever so in my mind, the only way to guarantee that is to make the tests really hard so that they can be sure you know your stuff before they pay for your test. And thanks man!! A+ first then Sec+ and Net+, all before the new year if I can haha
Hello, I've completed an IT Support course and now preparing for a comptia A+ certification. I have a question. Do I just review 220-1101 and 220-1102? Can you please guide me through. Thank you so much.
Couldn't question number 23 answer be also B as well? If something like short message service (SMS) is considered to be under the Multifactor authentication category isn't it similar? You would obviously login with a username/email + password and then they would send you a PIN/SMS as a way to authenticate yourself? Because pin could be also meant in other ways...
I think it's referring to a PIN you know, such as the one for your bank card, not a verification code that is send via SMS or email. Here they are essentially saying a PIN IS a password and they are basically the same thing. It's A because you physically HAVE your card on you and you KNOW the PIN. Two factors.
The extremely high network utilisation is sussy, I'd expect an RDP "trojan" so disconnecting the device from the network would prevent the peep on the other side seeing what's about to happen... So define high...
For more "practical-based" questions, check out my Patreon which is the last link in the video description
Just came on here to say before I watched your videos I didn't make over a 660 on the Comptia A+ 1102. I started watching your videos and made a 725 today. I truly appreciate you and your videos and will be coming back for all my courses.
Congrats on passing your exam.
how was the core 2? and did you get any printer questions.
Any tips? Just pass my comptia A+ 1101 today and taking 1102 tomorrow
@@Euphoric-tracks no I didn’t get any printer questions.
@@theposeyfamily ok thanks. I was worried about printers appearing.
Taking 1102 today…struggling with command line, Linux and windows. But here we go!
Wanted to give you a huge thank you, I passed both my Core 1 and 2 and I credit you 95% of what I learned, I learned the best from your videos and practice questions, I absolutely wouldn't have done it without you keep doing what you do!
How close is it to the real exam? Do you this practice exam would help
Congratulations! One question, do we have to take core 1 and 2? both? I thought we just choose one only.
how did you study for the PBQs?
@@GuangtingLi You have to take both core 1 and 2 to obtain the A+ Cert.
@@badhasa431 Yes it will help, I used his core 1 exam practice videos to pass
I passed core 2 today, I now have the A+ certification! Thank you so very much for all your videos!
That's great news. Congrats on your pass! :)
Awesome, I take the core 2 tomorrow morning. Congrats on passing.
I finally passed my A+ 1101 & 1102 at around 750 each. Your test question videos and all the explanations really helped me grasp many of the concepts and the thought processes behind them!
Very grateful, your channel is a gem.
This was very useful to listen to.
Pay attention not only to the answers but listen to his explanations on the other answer choices and why they could or could not be an answer.
Just passed my core 2.
@7:24 For question 2, "You have a user who installed an application on their device that claims to optimize performance. The user says they installed these applications directly from the vendor's website. The device now has extremely high network utilization. What should you do first?"
Wouldnt the first thing you would want to do is disconnect from the network? As per the Comptia+ 1102 Core Objective Standards 3.3 'Given a scenario, use best practice procedures for
malware removal', the second step after identifying signs of malware, which in this case would be the high network utilization would be to quarantine the network? Also in terms of changes to the system, disconnecting from the network is the least drastic change. Maybe it was the language of the question that was tricky for me, idk
Thank you, B.I.T. for all your teaching. PASSED I am A+ certified! Actually, dual now with Google and Comptia. Thanks, bro!
I pass core 2 today, im officially A+ certified, thank you so much for your time to help us
Any suggestions on the pbqs ?
Passed my 1101 now on to 1102 🎉🔥
Same here! Congrats!
same!
I just passed the 1102 exam and your videos (this one in particular) were all very helpful! Thank you so much for making them!
You are the best online teacher i've encountered in my whole life. you explain every answers in detail. better than any computer professor during my college days.
For Question 2 I would say A -- if you have a limited data plan then you certainly want to kill your network connection to keep your data from getting drained -- and then you can uninstall at your leisure afterwards. It's easier to turn wifi back on than to uninstall/reinstall software.
And it's not on the list, but I would also check Task Manager (CTRL + SHIFT + ESC) to see if that program installed other programs that are running in the background and causing the high network utilization.
also agree. I was looking for him to say "isolation"
Same. I've dealt with enough malware in the past to learn that sometimes attempting to delete the files can trigger even more adverse reactions from the malware. I'd make sure to completely disconnect from the network before attempting anything.
This is absolutely the right answer, A. Even CompTIA objectives state this. First step after verifying malware is to quarantine the system.
Exactly, it’s all in Comptia’s 7-step process. The correct answer is A
Came here looking for this!! Thank you I was so thrown off I’m glad I wasn’t wrong!
I just passed core 2 this morning, and it is absolutely all thanks to your incredible videos! Thank you so much for your hard work and I promise I'll be back for core 1 soon :)
Which vids from him did you watch?
Just passed my core 2 so now I’m certified! Came here to say that you’re a big reason! So much focus on pay attention to what the question is asking! It’s so easy to misinterpret and get it wrong. Take it slow when reading eh questions. Thank you! Easter egg
Congrats on your pass and thank you for the feedback! :)
I cant tell if these questions are easy or if I'm actually starting to grasp the material either way thank you !
Just passed the core1 exam last oct19 and currently reviewing for core2. The questions on the actual exam are most situational and asks for specific answer. Great content btw. Thanks!
Are you still studying your core 2? And if you are what are you using to study
Thank you so much!! I listened to both parts 1 and 2 today before my exam and it solidified a lot of things for me! I am now A+ certified and I don’t think i could’ve done it without these videos!
Congrats on your pass!! :)
Hi Warreeeeenn, remember me, I passed my core 1 now want to pass my core 2 exams before new year! wish me luck
Thank you so much for this video I passed my exam and I received my certification, i’ve got my certification in hand 🎉
I watched this on 2x speed the morning of the exam and made an 85
Most welcome! Congrats on the pass, that's so awesome! :) Very happy for you
I just passed my Core 1 the other day and I learned a lot from listening to you everywhere I go. Thank you very much! I am now preparing for Core 2 and will take your voice everywhere . I like how you are very lively and actually has a personality, it makes the video more interesting and the information easy to remember. I love when you say "what is it boys and girls??? It's APIPA..." I will never forget APIPA ever again, even in afterlife 😄
Passed A+ . I appreciate your videos. The details about the questions are paramount and logical break down of each answer. Thank you for your help. On to net +
Just passed my Core 1 and Core 2. I genuinely was slacking all semester and me passing is almost entirely due to speeding through these videos today. Thank you!!!
Your most welcome!
I'm really glad the videos helped you out :) Makes it worth the effort for me to make
any suggestions on the pbqs? For core 2
@chasityr8275 Skip them and come back after you finish the rest of the questions. in my experience they were really vague, and while i was confident in what i was doing, I wasn’t sure if I was doing what they actually wanted me to do. Like for example there was a pbq where you place access points in an office to offer maximum coverage for everyone with minimal interference. There were about 3 or 4 different ways that would be ideal so I kind of had to guess which one the test would actually consider correct. Waiting til the end to do them helps you not waste too much time to finish the questions, and also the questions might help you get a better idea of what you’re supposed to be doing in the pbq’s. Sorry for being vague i was in a fugue state when I took them so i dont remember much lol
Good luck!
I just passed core 2 thanks to you! You made the learning process enjoyable and engaging, THANK YOU for what you do!
Congrats on that pass! :) Well done
Just wanted to drop by and show appreciation for all your videos. I took the core 1 exam and passed a month ago and I just got home today from my core 2 exam with a pass as well. I used a exam prep program offered through a reputable college prior to finding your channel and even though I passed...I found that their level and style training was nowhere near the level of detail and explanations you provided. I actually feel like that's money I could have saved, lol. Either way, it's done and now I can move on and begin my learning for Net, Security and Cloud.
Passed Core 2 today, thanks for the videos!
Congrats, well done!
Thank you so much for the help!
Thank you to you to for the tip :) appreciate it
I really appreciated the 50 Questions and how you explained each answer option thoroughly. My understanding of many, many concepts has been greatly increased.
Made a 650 on my core 2 test the first time just passed with 705. Thanks dude!
did u only use this channel or what others did u use to study?
@@Foodyies a lot of these questions are going to help you on the test. make sure you the port numbers and what they do. I took practice exams too.
@@ramdbzdude0_0 ok thank you
Again bro, just like with my core 1101 exam I can't thankyou enough, I just passed the 1102 exam, and your two videos on this matter where my most watched youtube study. Thankyou so much. 👌
Oh wow I feel flattered. Thank you for the feedback.
It's flippen awesome that you passed, congrats! :)
Really makes my day when I see people passing
Thanks for everything man. I really appreciate all the work you have put in to help us all out. Once I have landed a good job after the certifications I will come back and donate to show my appreciation ❤😊 for now just know that there are lots of us who appreciate you helping us change our lives!
As long as it's helping people out I'm happy :)
I wish I saw this video before my test... I failed last week.. studing again and most of the questions are here!!!!
I’m about to take my test next week anything you would recommend on sharpening up on?
@@ralphcelidor7155did you pass?
Question 43- wouldn’t a botnet that creates zombies be a type of virus that spreads like a worm? A worm doesn’t necessarily have to display images, it is about how it spreads without user input. And a virus doesn’t have to only do damage.
great stuff i am felling more confident about my exam.
I work at an airport in the United States and we have installed a mantrap for people entering and leaving terminal access. Answering to comments brought up on question 48.
Your explanations are clear and concise thank you💯✔️
Im sorry but if the Question 13 is on the test that is a really crappy thing. The real term is Vishing (Voice phishing, or vishing, is the use of telephony to conduct phishing attacks). Spoofing is where an email address is faked to look legit in order to gather information or credentials typically. Maybe im splitting hairs but I think that would need to be reworded for those pursuing Sec+ in the future.
hey bud,
Sadly there will be questions in the real exam which are annoying like this one. They generally give you 4 possible answers with most of their questions and sometimes you'll see none of them are truly 100% correct.
You will then have to choose the MOST correct answer or the BEST answer. You will see in the exam that with a lot of their questions they will mentioned the words "best" or "most" in the question. You'll also see that it's often highly in caps and even in bold sometimes.
That means there is more than one correct answer or that none are 100% truly correct but that you have to choose the closest thing to being correct. It's a very frustrating thing in these exams but A+ exams are famous for this
@@BurningIceTech how is it not social engineering since the question involves talking to another human???
Social engineering is a technique that uses psychological manipulation to trick people into taking a desired action, while spoofing is a category of attacks that involves pretending to be someone or something else:
Passes the 1102 today =) thank you.
Awesome! :D
Great video. I'm studying for this exam right now.
1:08:52 (Q. 22) Not doubting your answer I thought you would have hit the switch first then unplug it but maybe that would just be redundant.
I was thinking the same thing. Like yeah, just flipping that switch isn't good enough, but its asking what to do FIRST. Any time ive been working with something with a PSU like that, we always flip the switch and then disconnect after that.
About to do my test tomorrow thanks for this upload !!
question 13 can also be social engineering
"is the answer C? No because I just told you it is B" 🤣
Haha
Thanks to you and your videos I passed A+
Thank you so much for all the information you gave us in this video!
I don't see the performance based question video anymore, did it get taken down? Any chance I could get a link to the video through a different site that isnt youtube?
That’s what I was thinking as well. It’s unfortunate, they were very helpful
Super content, as always.. thank you so much!
Apologies if im wrong but I think question 13 (d) explanation is closer to tailgating rather than social engineering.
I felt it was closer to Vishing
3:32 you don’t need special software to do that you can in windows go to command prompt type diskpart select the disk and type clean all and it’ll overwrite the whole disk with zeros you can do it once twice three times your choice I think the Linux environment is the dd (data destroyer) command
YOU ROCK! Love these, they are very informative!
Superb content! Thank you for all your insight, guidance & dedication to teaching IT!
Passed my Core 1 and Core 2! Thanks BurningIceTech!
Would you say these qurestions are similar or not close?
@@Gucci5175 I wouldn't say they are worded similar as the test is actually a bit harder, but every one of the concepts in these practice questions do show up in one way or another on the test.
Passed both tests. Thanks dude
This video was extremely helpful!
Amazing work! Thank you
Q15, you mention rainbow tables. That's used when a hacker has compromised a server and obtained the encrypted passwords (the hashes) of all accounts. Encryption is not normally reversible to find the original password. The rainbow table is a brute-force pre-computed list of every possible password character combination and the encrypted hash associated with it. The hacker can then can work backwards from the encrypted hash to find the original password. The known username and password can then be used to access other systems that use the same credentials. Building rainbow tables involves terabytes of storage and multiple CPUs generating the hashes as fast as possible. Salting can defeat it, as each randomly chosen salt value requires its entire own separate rainbow table.
This is very helpeful please do this more often for future courses like network and security. Thanks. I liked all your videos. maybe i forgot some videos.
Good analogies for Question 26!
Question 1: The answer is obviously B. Utilizing diskpart and format /p:6 are the ONLY federally accepted way to properly erase sensitive data, with the exception of physical destruction or Deguassing (electromagnetic sterilization).
You can use pre-boot recovery tools CLI on primary drive, or in the active OS (cmd / powershell) if the hdd is installed as a secondary drive.
Third party software cant always be trusted.
Although I agree with your reasoning, the phrasing of this question and it's answers are meant to confuse us. When it comes to data removal, we need to evaluate the security concern imposed and what level of precaution we should use in the data's removal. If we follow the way the DoD gets rid of data, we see that they use the standard for media removal outlined by the National Institute of Science and Technology (NIST). In the documentation "Guidelines for Media Sanitization" by the NIST, we can see that the steps to follow for media data removal for an organization is outlined in a given flow chart.
Now getting back to Question 1, the keyword to look at is that it says the company wants to "re-use" their own HDD. This implies the data on the HDD will not be leaving their company, therefore, imposing little security concern to the org. Knowing this, we can follow the flow chart for removal which means we only need to "clear" the hard drive. The keyword "clear" basically means at least one written pass over on the data needs to happen. This can be done via "using organizationally approved and validated overwriting
technologies/methods/tools".
Now for the answers. Answers A and B are effectively doing the same things. Deleting files or quick formatting don't actually overwrite anything, only marking areas as open. Using the command line as you explain in your comment would work for this scenario. However, answer B isn't actually implying a full format in the way you explain. Question B is basically saying use the command line to "delete" data, not wipe it as a full format would. Deleting data via the command line would just consist of using the rm command on given files/directories. The only possible answer left would be C) Disk Wiping Software. The vague mention of disk wiping software doesn't imply that it would have to be some untrusted 3rd party software, it could just be some validated and trusted software used by the orgs. Hopefully this clears up some misunderstandings.
I didn't plan on writing all this but I encountered something very similar on Prof. Dion's practice exams and had to do a bit of digging to understand the correct answer for one of the practice problems. Figured I'd write this up to clear up anyone else's confusion as well. If your curious to know more or I just explained it poorly you can get the information directly from the source "Guidelines for Media Sanitization".
Wow! Great Course Thanks a lot!
learning lots here thanks!
Thank you SO MUCH!
i swear I heard question 5 before and the answer for it was C not D on another site. This sort of "BEST CHOICE" inconsistency is what makes this shit so hard. To be clear, I agree with your answer not theirs which is why I remember it because I got it wrong.
Comedy with learning >perfect 😂
i work at best buy geeksquad. the most unrealistic thing about all of these question is the client knowing what anything is genuinely called, instead of doo-dad or thingy.
⚠Question 13: If Visihing was a possible choice, that would be a better answer. Vishing is when cybercriminals use Voice over IP (VoIP) to make phone calls or leave voice messages pretending to be from a reputable company in order to trick victims. Again, because the cybercriminal is making a CALL, Vishing is better answer.
Correct
I was curious as to how close the format of this video compares to the format of the test?
hello! love your channel and all the info. Concerning question 27 about upgrading from a 32-bit version of Windows 7 to Windows 10 (64-bit): your answer is D (a clean install with the 64-bit version). Is that always the case? If the client had a 32-bit version of Windows couldn't you assume that they have a 32-bit operating system? My first instinct would have been to answer C. Do we know what processor they are running when we take the test? Thanks again!!!
Question 18 asks: which step should be done first? chose all that apply. How can you do more than one thing first? One will be first and another second, and so the second item will not be first and should not apply. Right?
pretty much means, choose all that apply that you " could " do first.
Could you make more pbqs videos for core 2?
Great stuff
Question 22 maybe since the question asks what would you do FIRST, you would first turn off PSU power switch and then you would disconnect the PC from power socket?? it says would you should do first, not what is the only thing you should do...
Why would the first thing you do in Question 2 not be unplug the network cables/disable WiFi? Wouldn't you want to stop the potential data breach as quick as possible?
My guess is why that’s not right is because it says unplug network cable. In the question it just said device. It could be a laptop, phone, tablet, or desktop. So from there the next best choice would be uninstall it. I could be wrong but I think that’s why.
@@Shebrew144the second part of the answer is turning off wifi on the device.
I agree- it is the same as the ransomware question. Both are about malware compromising data. Data being transmitted out is probably more damaging than locked data, especially if you have off-site backups.
I agree. You isolate the device from the network first
So you never got a real answer for this? I would have personally gone with disable network first as well XD.
Good refresher, but almost zero questions about Windows commands and tools? I heard that's a pretty big chunk of the exam.
Thank you, sir. This video was a lifesaver, along with the core 1 vids!
For question 11, wouldn't the best solution be going to Task Manager? Especially to be user friendly?
I have a question on Q8. Why the answer is "Offsite backup" instead of "Full Backup"?
Number 13 should be listed as Vishing or did I not learn it right ?
Question 13.
Isn't spoofing a term just for computer-related faking? Such as IP spoofing or ARP spoofing. While impersonation is for physical faking like a UPS uniform?
In which case, why didn't we choose Social Engineering, D?
Hi ,is there any chance to have more content with PBQ questions for Core2 ?
Hi buddy, I have a question for you. I see that there are 2 separate playlists for the A+ certificate and the content of the videos in them is different. Which one should I finish first or should I finish one of the two? I will be glad if you answer, have a good day.
Ty for the review
Hey thanks a lot friend!
7:17 I am sorry but question 2; why aren’t we isolating the device first from the network? I mean we know that the device is eating resources (network) of the device, what if after uninstalling the app the device is still record high network utilisation, what next?
I passed my 1101…and 1102 is be giving me sleepless nights
Wrote twice and didn’t pass it yet 😔
I failed core 2 last month, by 26 points.
Would MAC or Content filtering work as a possible solution to 45 if you identify and blacklist devices or websites your neighbors are using? I understand why reducing broadcast power is the best option, but I am curious if these approaches have downsides I'm not thinking of (needs repeated updating to eliminate new devices or sites if the neighbors' behavior or devices change).
bro is a professional yapper
haha
@@BurningIceTech nice video man
amazing!
BurningIceTech did you perhaps remove the PBQs? I cant find them on your channel anymore
I have the same issue!
I was asked to remove them due to them looking to close like the real thing according to CompTIA. They were fully custom made though lol
If you need assistance though, you can join the Discord server of the channel and ask for assistance there. Will do my best to assist where I'm able to
Had to remove the videos but if you need assistance with your studies, feel free to join the discord. Will try to assist where I can
weldone
I feel so confident watching these test preps because I seem to know all of the answers but a handful of them. However, the prep course I am in has practice tests and I get destroyed in those. Do they make these “for profit” test preps purposely harder so they can guarantee pass rates or am I just not there yet?
Yes and No. In most cases the practice tests are made with profit in mind and I don't like that which is why I give everything away for free.
I can't say for sure though if they make them hard on-purpose to get people to spend more money. I suppose some might but we probably can't through them all in the same box since some of them by honest and innocent.
Yea that makes sense. What I mean is some of the for profit places guarantee a 98% pass rate or whatever so in my mind, the only way to guarantee that is to make the tests really hard so that they can be sure you know your stuff before they pay for your test.
And thanks man!! A+ first then Sec+ and Net+, all before the new year if I can haha
❤️❤️❤️
nice work!
Let's hope It gonna help me I'm writing my exam next week 😢
How did it go? Taking my core 1 next week. And starting to study for core 2 as of today. Any tips or suggestions. Cheers!
Need some PBQ for core 2. Thanks
Patreon
Hello, I've completed an IT Support course and now preparing for a comptia A+ certification. I have a question. Do I just review 220-1101 and 220-1102? Can you please guide me through. Thank you so much.
where are the pbqs? I need to study those
Couldn't question number 23 answer be also B as well? If something like short message service (SMS) is considered to be under the Multifactor authentication category isn't it similar? You would obviously login with a username/email + password and then they would send you a PIN/SMS as a way to authenticate yourself? Because pin could be also meant in other ways...
I think it's referring to a PIN you know, such as the one for your bank card, not a verification code that is send via SMS or email. Here they are essentially saying a PIN IS a password and they are basically the same thing.
It's A because you physically HAVE your card on you and you KNOW the PIN. Two factors.
@mydnyghtamethyst dang I forgot about this... now that I am a+ certified, I understand where I went wrong, lol regardless thanks for your help
I'm taking my 1102 on the 1st. I'm nervous this one going to tougher than the 1101
Did you end up taking the exam?
The extremely high network utilisation is sussy, I'd expect an RDP "trojan" so disconnecting the device from the network would prevent the peep on the other side seeing what's about to happen...
So define high...