Core 2 PBQ: Configuring User Accounts and Desktop Settings Performance-based Question
Instructions
Based on the scenario, use the dropdown selectors to complete the workstation settings that require manual setup, then use the checkboxes to select the required settings to provide a fully functional workstation for the new employee.
The Correct Answer And Explanation is:
To provide the correct response for the CompTIA A+ Core 2 (220-1102) PBQ: Configuring User Accounts and Desktop Settings, we’ll walk through a typical scenario, outline the correct settings, and provide a detailed explanation.
Sample Scenario (Common Format)
A new employee has joined the company. You are tasked with setting up their Windows workstation. The employee needs access to network resources, a secure and personalized environment, and appropriate permissions for daily tasks. Complete the configuration using dropdowns and checkboxes.
Correct Answers
Dropdown Selectors
- Account Type → Standard User
- Computer Name → Assign unique hostname (e.g., Workstation23)
- Domain/Workgroup → Domain
- Desktop Background → Company-approved wallpaper
- Time Zone → Correct local time zone (e.g., Eastern Standard Time)
Checkbox Selections
☑ Create user account
☑ Require password at sign-in
☑ Enable automatic screen lock after inactivity
☑ Install approved software
☑ Set desktop shortcuts for required applications
☑ Apply security group policies
☑ Map network drives
☑ Configure antivirus and firewall settings
Explanation (300+ words)
Configuring a new workstation correctly ensures that the employee can work productively and securely. Let’s break down why each of the chosen options is critical:
1. Account Type – Standard User:
Granting a Standard User account is a best practice in enterprise environments. It limits the user’s ability to install unauthorized software or change critical system settings, thereby reducing the risk of malware infections or accidental system misconfigurations.
2. Computer Name and Domain:
Assigning a unique Computer Name helps the IT department manage devices more efficiently. Joining the workstation to the company Domain allows centralized authentication, policy enforcement, and access to shared resources via Active Directory.
3. Desktop and Time Settings:
Setting the desktop background to a company-approved image ensures a professional and consistent appearance. Configuring the correct Time Zone is necessary for time-stamping emails, scheduling, and logging system events accurately.
4. Checkboxes – Key Functionalities:
- Creating a user account is essential for login and personalization.
- Requiring a password strengthens security by preventing unauthorized access.
- Enabling screen lock after inactivity helps protect sensitive information when users step away.
- Installing only approved software ensures compliance with licensing and avoids vulnerabilities.
- Adding shortcuts to required applications boosts user efficiency.
- Applying security group policies allows enforcement of IT standards, such as disabling USB drives or setting password complexity.
- Mapping network drives gives quick access to shared folders and files.
- Configuring antivirus and firewall settings protects against malware and unauthorized access.
These settings align with the principle of least privilege, enhance productivity, and ensure adherence to IT policies and cybersecurity best practices. Ensuring each component is properly configured reduces downtime, IT overhead, and exposure to threats.