Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

Note! The 220-1002 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the 220-1102 Exam.

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Questions 4

Which of the following file types should be opened when executing a PowerShell script?

Options:

A.

.bat

B.

.vbs

C.

.sh

D.

.ps1

E.

.psd

Buy Now
Questions 5

A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal. Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

Options:

A.

Pad and chmod

B.

Node and vi

C.

Is an chown

D.

Ps and kill

E.

Op and rm

Buy Now
Questions 6

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Options:

A.

Driver detection

B.

Metro interface

C.

Account control

D.

PXE installation

Buy Now
Questions 7

Which of the following Windows Enterprise OS version Offers BitLocker as a feature that can be enabled?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 8

Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.

Which of the following is the FIRST step the technician should take to correct this issue?

Options:

A.

See if Joe’s email address has been blacklisted

B.

Change the password on Joe’s email account

C.

Update the antivirus and perform a full scan on the PC

D.

Isolate Joe’s computer from the network

Buy Now
Questions 9

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

Options:

A.

Air filters

B.

Privacy screens

C.

Vacuums

D.

ESD mats

Buy Now
Questions 10

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

Options:

A.

Devices and Printer

B.

Sync Center

C.

Device Manager

D.

Power Option

Buy Now
Questions 11

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Reset the device’s network settings

B.

Check the data usage statistics on the device

C.

Verify the SSID with which the device is associated

D.

Run any pending application or OS updates

Buy Now
Questions 12

A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

Options:

A.

Delete the user’s AD account.

B.

Decrease the user’s AD privileges.

C.

Disable the user’s AD account.

D.

Reset the password on the user’s AD account.

Buy Now
Questions 13

A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem. Which of the following should the technician do NEXT?

Options:

A.

Reboot the computer

B.

Restart the network services

C.

Roll back the device drivers

D.

Rebuild the Windows profiles

Buy Now
Questions 14

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

Options:

A.

ping

B.

nslooking

C.

net use

D.

ipconfig

Buy Now
Questions 15

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

Options:

A.

Unattended installation

B.

Refresh upgrade

C.

Clean installation

D In-place upgrade

Buy Now
Questions 16

Which of the following is the MOST secure wireless security protocol?

Options:

A.

AES

B.

WPA

C.

WPA2

D.

WEP

Buy Now
Questions 17

A technician has installed a second monitor for a customer, but the desktop font sizes do not match. Which of the following display settings should be technician adjust to correct this issue?

Options:

A.

Resolution

B.

Refresh rate

C.

Extended monitor

D.

Color depth

Buy Now
Questions 18

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Options:

A.

Create a risk analysis report for review

B.

Submit a change order for approval

C.

Insist the worker accepts the standard desktop

D.

Document the request and place the order

Buy Now
Questions 19

A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns. Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

Options:

A.

Default SSID

B.

MAC filtering

C.

NAT

D.

QoS

E.

Signal strength

F.

Encryption

Buy Now
Questions 20

Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized. Which of the following messages will be displayed?

Options:

A.

NTLDR not found

B.

No boot device available

C.

Operating system not found

D.

BIOS ROM checksum error

Buy Now
Questions 21

A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses Which of the following is MOST likely the problem?

Options:

A.

Rootkit

B.

Zero-day malware

C.

Rogue antivirus

D.

Old virus definitions

Buy Now
Questions 22

Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

Options:

A.

Access control lists

B.

Multifactor authentication

C.

Organizational unit

D.

Trusted software sources

E.

Data loss prevention

F.

Pre-shared key

Buy Now
Questions 23

Which of the following BEST describes the Guest account on a Windows system?

Options:

A.

This account is designed to have the ability to set permissions for other users on the system. Users of this account have the capability to perform any operation or task on the system.

B.

This account is designed to provide basic permission for completing common daily tasks. Users of this account are restricted from performing things like installing new software.

C.

This account is designed for users who require specific administrator rights or permissions. Users of this account are restricted from installing software but can change time zones.

D.

This account is designed for users who require temporary access to a computer and do not need to store user-specific settings. Users of this account have very limited permissions.

Buy Now
Questions 24

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

Options:

A.

spoofing

B.

brute force

C.

man-in-the-middle

D.

a botnet

Buy Now
Questions 25

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?

Options:

A.

PSU alarm

B.

Humidity alarm

C.

Temperature alarm

D.

Motion alarm

Buy Now
Questions 26

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

Options:

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Buy Now
Questions 27

A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which

of the following should the user check to troubleshoot the cause of the issue?

Options:

A.

The existing wireless network connection

B.

The signal strength from the ISP regional satellite

C.

The data speeds from the user’s ISP

D.

The user’s default gateway settings

Buy Now
Questions 28

A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside. Which of the following should the technician use to remove the excess dust and dirt?

Options:

A.

A brush

B.

A vacuum

C.

Compressed air

D.

A damp cloth

Buy Now
Questions 29

Which of the following OS installation types would a technician use for multiple workstations at the same time?

Options:

A.

Image deployment

B.

Clean install

C.

Multiboot

D.

In-place upgrade

Buy Now
Questions 30

A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

Options:

A.

Antistatic bags

B.

Needle-nose pliers

C.

Safety goggles

D.

ESD straps

Buy Now
Questions 31

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

Options:

A.

File attributes

B.

Share permissions

C.

Local share

D.

Inheritance

Buy Now
Questions 32

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a

hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for

subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent

any further emails from this organization?

Options:

A.

Click the “Unsubscribe” button on each unwanted email

B.

Send the unwanted items to the spam or junk folder

C.

Deploy an email address whitelist

D.

Create domain-based filters

Buy Now
Questions 33

Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

Options:

A.

Shoulder surfing

B.

Phishing

C.

Tailgating

D.

Dumpster diving

Buy Now
Questions 34

A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page The technician tries with a third-party browser and connects without error The technician needs to make sure the old certificate is no longer used in Internet Explorer. Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

Options:

A.

Advanced

B.

Clear SSL state

C.

Publishers

D.

Certificates

Buy Now
Questions 35

A customer recently lost data because it was accidentally deleted The customer calls a technician and asks to have a Windows backup solution installed The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO)

Options:

A.

File level

B.

Bare metal

C.

Snapshot

D.

Shadow Copy

E.

Critical applications

F.

Image level

Buy Now
Questions 36

A user installed a new company-approved application on a Windows PC. The installation required a reboot. After the reboot and logon, the system froze. A technician has been called to fix the problem. Which of the following should the technician do FIRST?

Options:

A.

Contact the application vendor support staff for more information

B.

Boot into safe mode, and then load the ERD and restore the most recent files

C.

Boot the PC, run misconfig, check the safe boot box under the Boot tab, and then restart

D.

Log in as an administrative user and determine if the problem persists

Buy Now
Questions 37

When users turn on or reboot their machines, many of the computers on the network are non-responsive and unable to access the Internet. The users who left their computers on or have not rebooted are not experiencing this issue A technician confirms all the network switches and routers are working, and no servers are having any issues The network administrator notices abnormally high network utilization Which of the following is the MOST likely issue the company is experiencing?

Options:

A.

Malware infection

B.

Rogue antivirus

C.

Browser redirection

D.

OS update failures

Buy Now
Questions 38

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

Options:

A.

Image deployment

B.

Multiboot

C.

PXE

D.

Unattended installation

E.

USB

F.

Wake-on-LAN

Buy Now
Questions 39

Joe, a user, notifies Ann, a technician, of a message that is displaying on his screen. The message has taken over the entire screen, and no icons are displayed. Joe, further explains that the message still appears after several reboot attempts. Upon further inspection of the affected PC, Ann notices a request for cryptocurrency payment to obtain the unlock key.

Which of the following is MOST likely the cause?

Options:

A.

Ransomware

B.

Cryptomining

C.

Rootkit

D.

Keylogger

Buy Now
Questions 40

A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?

Options:

A.

Proxy settings

B.

Default gateway

C.

Firewall exceptions

D.

DNS

E.

QoS

Buy Now
Questions 41

A technology team is creating limits and guidelines for the use of company-provided software, equipment, and

Internet access. Which of the following policies is needed?

Options:

A.

Password policy

B.

Acceptable use policy

C.

Regulatory policy

D.

Compliance policy

Buy Now
Questions 42

A user wants to see the workstations present on the LAN in a workgroup environment. Which of the following

settings must be enabled to make this possible?

Options:

A.

Turn off public folder sharing

B.

Turn on network discovery

C.

Use 128-bit encryption

D.

Turn on file and folder sharing

Buy Now
Questions 43

Company policy states that users must secure their laptops before leaving the office for the evening Which of the following physical security measures should be used?

Options:

A.

Cable lock

B.

Windows key + L

C.

Smart card removal

D.

Key fob

E.

BIOS password

Buy Now
Questions 44

An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work. Which of the following is the BEST solution for the technician to recommend?

Options:

A.

Add more redundancy to the power cabling

B.

Purchase more battery backups for individual users

C.

Implement desktop virtualization

D.

Increase the capacity of the backup generator

Buy Now
Questions 45

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Buy Now
Questions 46

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

Options:

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Buy Now
Questions 47

Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Options:

A.

Install the third-party driver from the manufacturer's website.

B.

Update the included Windows driver from Windows Update

C.

Flash the firmware on the BIOS to the latest version.

D.

Replace the video card with one that is supported by Windows natively.

Buy Now
Questions 48

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

Options:

A.

Download antivirus updates

B.

Update the device drivers

C.

Quarantine the affected systems

D.

Perform hardware diagnostics

Buy Now
Questions 49

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates.

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Buy Now
Questions 50

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

Options:

A.

Reimage the machine from a network share

B.

Change the boot order and boot to an external drive

C.

Remove and then replace the CMOS battery

D.

Use the BIOS user password to reset the supervisor password

Buy Now
Questions 51

Which of the following forms of regulated data is MOST important to consider when browsing e-commerce sites on the Internet?

Options:

A.

GDPR

B.

PII

C.

PCI

D.

PHI

Buy Now
Questions 52

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

Options:

A.

MAC filtering

B.

Default SSID

C.

Radio power levels

D.

Content filtering

E.

Physical security

Buy Now
Questions 53

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 54

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

Options:

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Buy Now
Questions 55

A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs. Which of the following would be the MOST effective method to accomplish this task?

Options:

A.

Drill

B.

Hammer

C.

Low-level format

D.

Degaussing

Buy Now
Questions 56

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Options:

A.

Acceptable use policy violations

B.

Server configuration

C.

Chain of custody

D.

Data loss incidents

Buy Now
Questions 57

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

Options:

A.

Check the contents of the hosts file

B.

Do a System Restore to a date before the infection

C.

Rerun the antivirus scan with higher sensitivity

D.

Rebuild the OS on the machine

Buy Now
Questions 58

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

Options:

A.

Installation method

B.

System requirements

C.

OS compatibility

D.

File permissions

Buy Now
Questions 59

A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage?

Options:

A.

A keylogger is running

B.

The computer is part of a botnet.

C.

The computer is receiving a DDOS attack

D.

A software is blocking traffic

Buy Now
Questions 60

A user is requesting a solution that will prevent file corruption and ensure a graceful shutdown while providing at least one hour of uptime in case of extreme weather conditions. Which of the following should a technician recommend?

Options:

A.

Uninterruptible power supply

B.

Surge protector

C.

Power strip

D.

Power distribution unit

Buy Now
Questions 61

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Options:

A.

Remove any proxy servers configured on the user’s browsers.

B.

Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C.

Disable the SPI firewall on the office’s gateway and any other routers.

D.

Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E.

Create an outbound rule in Windows Firewall named after the user’s homepage.

F.

Run anti-malware scans and download the latest Windows updates.

Buy Now
Questions 62

A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable. Which of the following is the BEST method of securing the phone?

Options:

A.

Fingerprint lock

B.

Passcode lock

C.

Swipe lock

D.

PIN lock

Buy Now
Questions 63

The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen. Which of the following BEST describes this email?

Options:

A.

Spear phishing

B.

Impersonation

C.

Dumpster diving

D.

Whaling

Buy Now
Questions 64

Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN The technician received alerts of devices failing throughout the network due to a power outage Which of the following is MOST likely causing the wireless issues?

Options:

A.

SSID is configured to not broadcast.

B.

The system locked out for all wireless users.

C.

The DHCP scope for WLAN is full

D.

The WAP in the warehouse is down

Buy Now
Questions 65

What a user is allowed to do on a computer network would be addressed in:

Options:

A.

a user acceptance policy

B.

regulatory and compliance policy

C.

a password policy

D.

an acceptable use policy

Buy Now
Questions 66

A technician configures a switch for an enterprise to use 802.1X. Which of the following logical security concepts uses 802.1X?

Options:

A.

Access control list

B.

MAC address filtering

C.

MDM policies

D.

Port security

Buy Now
Questions 67

A company recently implemented a new Linux server. Remote access to the terminal is required to provide easier server administrator. Which of the following feature or services will provide the MOST secure remote access solution?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

SCP

Buy Now
Questions 68

A technician is decommissioning a workstation that contains Pll The HDDs cannot be used in another device, and all data must be destroyed Which of the following actions would BEST fulfill these requirements? (Select TWO)

Options:

A.

Physically damage the drives.

B.

Leave the drives in the workstation since it will be decommissioned

C.

Take a picture of the drives individually and their serial numbers

D.

Send the drives to a certified third-party vendor for destruction.

E.

Perform a low-level format before removal

F.

Set a complex hard drive password.

Buy Now
Questions 69

Which of the following operating systems has mandatory update installation built in?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 70

Accompany is concerned about the amount of time employees spend browsing the Internet for personal purposes. Which of the following should be put in place to address the company’s concerns?

Options:

A.

Acceptable use policy

B.

Stateful firewall

C.

Video surveillance

D.

Logon time restrictions

Buy Now
Questions 71

A user is unable to get to any internal websites but can access some external websites. Which of the following will MOST likely resolve this issue?

Options:

A.

Uninstall and reinstall the browser.

B.

Confirm the proper proxy settings

C.

Disable the firewall

D.

Disable and re-enable the network adapter.

Buy Now
Questions 72

An end user submits a request for the IT specialist to install new software on a workstation The workstation has the following specifications.

220-1002 Question 72

The minimum software requirements for the new application are a dual-core. 64-btt OS with 4GB of RAM and 60GB storage Which of the following conditions will the technician encounter when attempting to install the software?

Options:

A.

Insufficient RAM

B.

Incompatible processor

C.

Insufficient storage

D.

Incompatible system architecture

E.

Insufficient network bandwidth

Buy Now
Questions 73

A technician is helping a remote user who has a Windows issue. The user is working from a shared office space and is not on the corporate network. Which of the following remote access methods is MOST to be successful in this case?

Options:

A.

Telnet

B.

Remote desktop

C.

Third-party screen sharing

D.

Secure shell

Buy Now
Questions 74

A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus. Which of the following steps should the technician take NEXT?

Options:

A.

Disable the restore points.

B.

Remediate the affected system.

C.

Educate the user.

D.

Quarantine the affected system.

Buy Now
Questions 75

Which of the following would be used to protect technicians from dust particles when they are entering a datacenter located near a construction site?

Options:

A.

A surge suppressor

B.

Compressed air

C.

Vacuums

D.

ESD gloves

E.

Air filters

Buy Now
Questions 76

Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

Options:

A.

macOS

B.

Windows

C.

Linux

D.

Chrome

Buy Now
Questions 77

Which of the following should a technician do to ensure static electricity does not damage the internal components of a PC while troubleshooting the motherboard?

Options:

A.

Use ESD straps

B.

Remove all jewelry.

C.

Disconnect the power.

D.

Remove the power supply.

Buy Now
Questions 78

Joe. a technician, imaged a laptop using third-party software, but the drive is now showing a smaller partition size than the installed disk space. Which of the following utilities will allow Joe to resize the partition using a graphical interface?

Options:

A.

Device Manager

B.

DxDiag

C.

DiskPart

D.

Disk Management

Buy Now
Questions 79

A technician needs to adjust the folder permissions for the human resources department’s fileshares. The technician must ensure users in the marketing group cannot be granted access to the folders, even if the folders inherit permissions from a parent folder. Which of the following should the technician use to accomplish this task?

Options:

A.

Encrypting File System

B.

Administrative shares

C.

BitLocker

D.

Deny permissions

Buy Now
Questions 80

When a user logs in to a computer, desktop icons and documents are missing. The user only has one account, 2and none of the personalized settings are there. Everything worked fine the previous day. Which of the following should a technician do to resolve the issue?

Perform a system refresh.

B. Change the account permissions.

C. Repair the profile.

D. Restore the data from backup.

Options:

Buy Now
Questions 81

A user in a SOHO wants to allow Joe, a remote technician, to connect securely to the user's workstation Joe informs the user that the VPN was successful, but he still cannot connect. Which of the following settings in the SOHO router MOST likely need to be adjusted?

Options:

A.

Encryption

B.

Firewall

C.

DHCP

D.

DNS

E.

NAT

Buy Now
Questions 82

A vendor requires remote access to a specific server to maintain a proprietary software system. Security policy restricts the use of port 3389 to employees but does allow command-line access to non-employees. Which of the following would MOST likely need to be enabled?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

FTP

Buy Now
Questions 83

Which of the following should be replaced after a voltage spike?

Options:

A.

Surge suppressor

B.

Battery backup

C.

Power supply

D.

Electrical cable

Buy Now
Questions 84

A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately. Which of the following should the technician perform FIRST?

Options:

A.

Risk analysis

B.

Back-out plan

C.

Change board

D.

Implementation plan

Buy Now
Questions 85

A technician is installing an application on a Linux system using the Bash shell console. Which of the following extensions should the technician select to install the application?

Options:

A.

.Exe

B.

.Apk

C.

.Sh

D.

.app

Buy Now
Questions 86

After receiving a replacement smartphone. a corporate user is able to open some emails but is unable to open encrypted emails. Which of the following troubleshooting steps should a technician take NEXT?

Options:

A.

Place the previous certificate in escrow.

B.

Verity the installation of S/MIME on the phone

C.

Ensure the users public Key is in the global address list

D.

Instruct the user to wait for synchronization to complete.

Buy Now
Questions 87

A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access. Which of the following permissions will the administrators group effectively have? (Select TWO)

Options:

A.

Write

B.

Read

C.

Full control

D.

Modify

E.

Execute

F.

Special permissions

Buy Now
Questions 88

A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read. Which of the following would be the MOST effective permissions for someone who is accessing

the folder via the share?

Options:

A.

Read

B.

Change

C.

Write

D.

Modify

Buy Now
Questions 89

A technician has installed two new drives in a computer in the computer lab. Disk1 will be utilized for user and application data. > Disk2 has already been properly configured and has production data on it The technician has been unable to format the appropriate disk from the command prompt.

The lab requirements state that Disk1 should be a dynamic disk that contains two partitions. The first partition needs to be 256.000 MB and mapped to drive F. The , second partition needs to be 512.000 MB , and mapped to drive G.

The new partitions must be formatted to prevent each user's files from being accessed by other users, and the disk must be configured to account for future redundancy.

A consistent file system must be maintained on the machine.

220-1002 Question 89

INSTRUCTIONS

Conduct the necessary steps within the Disk Manager to accomplish these tasks

If at any time you would like to bring back the initial state of the simulation, please click the Reset Alt button

Options:

Buy Now
Questions 90

A technician is installing new software on an older laptop that has a current OS. The software contains a database back end that also requires installation. Which of the following should the technician review to ensure the software will run before installing it? (Choose two.)

Options:

A.

Memory usage

B.

Display settings.

C.

Network utilization

D.

Storage capacity

E.

Firewall rules

F.

Antivirus signatures

Buy Now
Questions 91

A company recently performed malware cleanup on a large number of workstations. The Chief Security Officer (CSO) is concerned about malicious reaching the organization through email. Which of the following should a technician recommend to the CISCO?

Options:

A.

Upgrading the local antivirus to an anti-malware solution

B.

Configuring host-based firewall for each PC

C.

Updating the mat server to the latest version

D.

Installing robust spem filters

Buy Now
Questions 92

A technician is planning a new desktop rollout project for a company. The company wants to donate systems to the library for reuse. The company does not store sensitive material on the desktops, but it does want all the data to be deleted and not easily recoverable. Which of the following methods would be BEST for the technician to perform to prepare the system for donation?

Options:

A.

Low-level formatting

B.

Degaussing

C.

Encrypting

D.

Drive wiping

Buy Now
Questions 93

A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command. Which of the following script file types is the technician writing.

Options:

A.

bat

B.

.sh

C.

py

D.

.js

Buy Now
Questions 94

A user received a call from a bank to confirm a wire transfer; however, the user created no such request. While

troubleshooting, a technician discovers there are rules on the user’s account that are forwarding the emails to

an external email address and deleting the emails from the bank.

This is an example of:

Options:

A.

spam email.

B.

invalid certificates.

C.

hijacked email.

D.

browser pop-ups.

Buy Now
Questions 95

Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage. Which of the following change management practices would MOST likely have prevented this outage?

Options:

A.

Risk analysis

B.

Change board approval

C.

Scoping the change

D.

End-user acceptance

Buy Now
Questions 96

A company seized an employee's laptop due to illegal activity. The computer has been locked in an office until it can be turned over to authorities. and no one is allowed to log on to it Which of the following policies is this an example of?

Options:

A.

PCI compliance

B.

Proper reporting

C.

Data preservation

D.

Chain of custody

Buy Now
Questions 97

A technician just finished using BiteLocker to Go. The technician MOST likely encrypted:

Options:

A.

A CD-RW disk.

B.

the network drive.

C.

the internal disk drive.

D.

A USB drive

Buy Now
Questions 98

A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver malicious payloads across the network. Which of the following security measures would have been BEST to prevent the attack from being executed in the first place' (Select TWO)

Options:

A.

Using a host-based antivirus with real-time scanning

B.

Implementing automatic screen locks after 60 seconds of inactivity

C.

Creating a strong BIOS'UEFI password

D.

Disabling AutoRun for USB devices

E.

Enabling the Secure Boot option

F.

Changing the default administrator credentials

Buy Now
Questions 99

Which of the following is the memory limitation of a 32-bit OS?

Options:

A.

16MB

B.

2048MB

C.

4GB

D.

1024GB

E.

2TB

F.

8TB

Buy Now
Exam Code: 220-1002
Exam Name: CompTIA A+ Certification Exam: Core 2
Last Update: Nov 29, 2023
Questions: 665
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Apr 2024