Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The 220-1002 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the 220-1102 Exam.

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Questions 4

An office manager emails a technical support contractor about a new desktop for one of the workers. The office manager provides a specific configuration for the desktop. The technician notes the request will require the purchase of a new system. New system purchases are not in the scope of the support agreement. Which of the following should the technician do NEXT?

Options:

A.

Create a risk analysis report for review

B.

Submit a change order for approval

C.

Insist the worker accepts the standard desktop

D.

Document the request and place the order

Buy Now
Questions 5

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Buy Now
Questions 6

Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

Options:

A.

SSO

B.

Permission propagation

C.

Inheritance

D.

MFA

Buy Now
Questions 7

A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server. Which of the following Control Panel utilities should the technician use to configure the setting?

Options:

A.

Internet Options – Advanced

B.

Internet Options – Connections

C.

Internet Options – Security

D.

Internet Options – Content

E.

Internet Options – Privacy

Buy Now
Questions 8

A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP. Which of the following would be the NEXT appropriate act?

Options:

A.

Promptly notify the administrator’s immediate supervisor

B.

Rename the folder on the server, and notify the information security officer

C.

Move the folder to another location on the server, and notify the local authorities

D.

Ask the owner to move the files from the server to a local computer

Buy Now
Questions 9

A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

Options:

A.

The computer has GRUB Legacy installed

B.

Windows Startup services are not running

C.

An incompatible partition is marked as active

D.

An unsupported version of Windows is installed

Buy Now
Questions 10

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

Options:

A.

Provide documentation of the repair to the customer

B.

Allow the customer to voice concerns and post the story to social media later

C.

Inform the customer the job is done and return to the office

D.

Defend each step and why it was necessary

Buy Now
Questions 11

A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

Options:

A.

System memory

B.

Surge protector

C.

Hard drives

D.

Battery backup

Buy Now
Questions 12

Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

Options:

A.

AES

B.

TKIP

C.

S/MIME

D.

3DES

Buy Now
Questions 13

Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

Options:

A.

An IP conflict is present

B.

A corporate VPN is enabled

C.

A firewall exception must be set

D.

HomeGroup must be enabled

Buy Now
Questions 14

Which of the following file types should be opened when executing a PowerShell script?

Options:

A.

.bat

B.

.vbs

C.

.sh

D.

.ps1

E.

.psd

Buy Now
Questions 15

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

Options:

A.

Devices and Printer

B.

Sync Center

C.

Device Manager

D.

Power Option

Buy Now
Questions 16

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

Options:

A.

BranchCache

B.

Swap partition

C.

Domain access

D.

Proxy server

Buy Now
Questions 17

A user’s computer is running slow even when only one program is open. A technician discovers the CPU is running at 100%, and there is a significant amount of outgoing network traffic. Which of the following is MOST likely causing the high resource usage?

Options:

A.

A keylogger is running

B.

The computer is part of a botnet.

C.

The computer is receiving a DDOS attack

D.

A software is blocking traffic

Buy Now
Questions 18

Which of the following built-in accounts was removed in Windows 10?

Options:

A.

Power User

B.

Administrator

C.

Guest

D.

Standard User

Buy Now
Questions 19

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:

Two 1GHz CPUs

2GB of memory

15GB hard drive

800x600 screen resolution

Which of the following should the technician do to resolve the problem?

Options:

A.

Increase the number of CPUs

B.

Increase the amount of memory

C.

Increase the amount of hard drive space

D.

Increase the screen resolution

Buy Now
Questions 20

Following an incident, an administrator is gathering forensic evidence from a server for a human resources investigation. Which of the following best practices is MOST important to document throughout the process to maintain integrity of the findings?

Options:

A.

Acceptable use policy violations

B.

Server configuration

C.

Chain of custody

D.

Data loss incidents

Buy Now
Questions 21

A technician has set up a new computer for a customer and needs to add a login with administrative privileges. Which of the following tools should the technician use?

Options:

A.

Component Services

B.

System Configuration

C.

Security Policy

D.

Local Users and Groups

Buy Now
Questions 22

An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet. Which of the following actions should the user take?

Options:

A.

Update antivirus definitions

B.

Install anti-malware software

C.

Enable the pop-up blocker

D.

Reboot the PC

Buy Now
Questions 23

After a virus has been spread unknowingly via USB removable hard drives, a technician is tasked with limiting removable hard drive access to certain network users. USB ports are used for many devices, including scanners, printers, and signature pads, so a policy is created to deny access to removable hard drives only.

When testing the policy, a removable drive is plugged in but can still be accessed. Which of the following command-line tools should the technician use to apply the new policy?

Options:

A.

gpupdate

B.

diskpart

C.

gpresult

D.

net use

Buy Now
Questions 24

A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors. Which of the following Is MOST likely the Issue?

Options:

A.

PSU alarm

B.

Humidity alarm

C.

Temperature alarm

D.

Motion alarm

Buy Now
Questions 25

A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop. Which of the following is the most likely NEXT step?

Options:

A.

Disable System Restore.

B.

Create a restore point.

C.

Apply system updates.

D.

Restart into safe mode.

Buy Now
Questions 26

A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Buy Now
Questions 27

A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop. Which of the following should a technician do to resolve the issue and avoid recurrence?

Options:

A.

Activate real-time protection on both antivirus software programs

B.

Uninstall one antivirus software program and install a different one

C.

Run OS updates

D.

Enable the quarantine feature on both antivirus software programs

E.

Remove the user-installed antivirus software

Buy Now
Questions 28

A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

Options:

A.

Guest

B.

Administrator

C.

Power User

D.

Remote Desktop User

Buy Now
Questions 29

A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved. Which of the following methods would the technician MOST likely perform on the computer?

Options:

A.

Unattended installation

B.

Refresh upgrade

C.

Clean installation

D In-place upgrade

Buy Now
Questions 30

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

Options:

A.

sudo

B.

chmod

C.

grep

D.

pwd

Buy Now
Questions 31

A customer purchased a 3TB HDD to use with a Windows 7 PC and wants to have letter “J” assigned only to the drive. Which of the following types of partitioning should be performed to give the customer full use of the 3 TB drive?

Options:

A.

GPT

B.

Dynamic

C.

Basic

D.

Extended

Buy Now
Questions 32

Which of the following installation types would require the use of an answer file to install the OS?

Options:

A.

Unattended

B.

Clean

C.

Repair

D.

Upgrade

Buy Now
Questions 33

An employee is unable to view in-office network folders while working at home. Which of the following is the MOST likely cause of the problem?

Options:

A.

Untrusted software

B.

Outdated antivirus

C.

MDM policies

D.

Inactive VPNs

Buy Now
Questions 34

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

Options:

A.

Use an antivirus product capable of performing heuristic analysis

B.

Use a host-based intrusion detection system on each computer

C.

Disallow the password caching of accounts in the administrators group

D.

Install a UTM in between PC endpoints to monitor for suspicious traffic

E.

Log all failed login attempts to the PCs and report them to a central server

Buy Now
Questions 35

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some

websites, and web services are not responding from any of the web browsers, although Joe can access these

services from his smartphone without issue. The computer’s malware scanner has the latest definitions

installed. Which of the following would BEST explain why the computer is functioning this way?

Options:

A.

Expired root certificate

B.

OS update failures

C.

Pop-up blocker

D.

Hijacked email

Buy Now
Questions 36

Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

Options:

A.

Generator

B.

Battery backup

C.

Surge suppressor

D.

Line conditioner

Buy Now
Questions 37

A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?

Options:

A.

robocopy

B.

copy

C.

xcopy

D.

cp

Buy Now
Questions 38

A technician determines a newly installed service is keeping a device from functioning in Windows. Which of the following tools should the technician use to keep the service from being loaded on the PC reboot?

Options:

A.

Task Scheduler

B.

MSINFO32

C.

System Restore

D.

MSConfig

Buy Now
Questions 39

A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device. Which of the following should the technician perform NEXT? (Select TWO)

Options:

A.

Roll back the OS update

B.

Update the PRL.

C.

Force stop running applicabons

D.

Enable airplane mode

E.

Perform a factory reset

F.

Run application updates

G.

Reset network settings

Buy Now
Questions 40

A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website. Which of the following should the technician do NEXT?

Options:

A.

Check the contents of the hosts file

B.

Do a System Restore to a date before the infection

C.

Rerun the antivirus scan with higher sensitivity

D.

Rebuild the OS on the machine

Buy Now
Questions 41

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

Options:

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Buy Now
Questions 42

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Buy Now
Questions 43

A new user has joined a company, and human resources has given the user several documents to sign regarding compliance and regulations for company computers. The user has also received web links to documentation for applications, as well as processes and procedures to do jobs in accordance with those programs. Which of the following types of documentation has the user MOST likely received? (Choose two.)

Options:

A.

Inventory management policy

B.

Knowledge base articles

C.

End-user acceptance document

D.

Acceptable use policy

E.

Incident documentation

F.

Network diagrams

Buy Now
Questions 44

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

Options:

A.

After granting these permissions, disable the camera and GPS

B.

Install the application and change the permissions later

C.

Cancel installation of the application and report it to the application source

D.

Accept these permission requests and install the application

Buy Now
Questions 45

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

Options:

A.

Incompatibility

B.

Impact to the network

C.

Impact to the user

D.

Impact to the device

Buy Now
Questions 46

A corporate fileshare holds files for multiple departments. Individual users in each department create reports

that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that

encrypted all of the documents on the fileshare. The software asked for money to be transferred via

cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the

ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

Options:

A.

Enable System Restore on the file server and make frequent restore points.

B.

Disable full disk encryption on the file server.

C.

Install a next-generation firewall at the network edge.

D.

Use a host-based intrusion detection system and continuously monitor filesystem changes.

E.

Use granular file permissions on the share and follow the principle of least privilege.

Buy Now
Questions 47

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified

local destination. Which of the following utilities should the technician use to BEST accomplish the task?

Options:

A.

Regedit

B.

services.msc

C.

Msinfo32

D.

Notepad

E.

MMC

Buy Now
Questions 48

A systems administrator is configuring a new workstation. Which of the following will MOST likely be the administrator's FIRST step?

Options:

A.

Set the screen timeout lock

B.

Change the default administrator account

C.

Require a BIOS/UEFI password.

D.

Enable full-disk encryption.

Buy Now
Questions 49

A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone. Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

Options:

A.

Reboot into safe mode

B.

Clear the application data

C.

Contact the application’s developer

D.

Reinstall the application

E.

Do a force stop

F.

Clear the application cache

Buy Now
Questions 50

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s laptop is

currently using the corporate network for access to network resources as well as the cloud. Which of the

following should the help desk recommend performing prior to using the hotel network?

Options:

A.

Add a country code exception to the firewall

B.

Unmap all network drives

C.

Change the proxy settings

D.

Enable Remote Assistance

Buy Now
Questions 51

A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)

Options:

A.

Change management policy

B.

EULA

C.

BYOD policy

D.

Risk analysis

E.

MDM policy

F.

Time-based login policies

Buy Now
Questions 52

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

Options:

A.

File attributes

B.

Share permissions

C.

Local share

D.

Inheritance

Buy Now
Questions 53

Which of the following OS installation types would a technician use for multiple workstations at the same time?

Options:

A.

Image deployment

B.

Clean install

C.

Multiboot

D.

In-place upgrade

Buy Now
Questions 54

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

Options:

A.

spoofing

B.

brute force

C.

man-in-the-middle

D.

a botnet

Buy Now
Questions 55

A Windows user is trying to print a large number of documents to a network printer, but the printer is no longer printing. A technician investigates and notices all the jobs are stuck in the print queue. Which of the following should the technician perform to resolve the issue?

Options:

A.

Restart the WMI service

B.

Restart the Network Connection service.

C.

Restart the spooker service.

D.

Restart the Windows Update service

Buy Now
Questions 56

An office location regularly experiences brownouts. Which of the following would be the MOST appropriate solution to protect the office computers?

Options:

A.

Uninterruptible power supply

B.

Voltage regulator

C.

Surge suppressor

D.

Generator

Buy Now
Questions 57

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

Options:

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Buy Now
Questions 58

Which of the following must be enabled to configure 20 new machines to be booted over a network?

Options:

A.

Multi-boot

B.

Dynamic

C.

PXE

D.

GPT

Buy Now
Questions 59

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 60

A technician is PXE booting a computer. Which of the following is the technician MOST likely performing on the computer?

Options:

A.

Image deployment

B.

Multiboot configuration

C.

In-place upgrade

D.

System repair

Buy Now
Questions 61

A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem Which of the following would MOST likely fix the issue?

Options:

A.

Roll back updates.

B.

Disable the Windows Update service

C.

Check for updates

D.

Restore hidden updates

Buy Now
Questions 62

Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?

Options:

A.

Services

B.

Device Manager

C.

Event Viewer

D.

Programs and Features

Buy Now
Questions 63

A SOHO user is working on a laptop, but the wireless connection indicator is showing a limited connection. Each time the user tries to access a website, the browser redirects to an unfamiliar authentication page. Which

of the following should the user check to troubleshoot the cause of the issue?

Options:

A.

The existing wireless network connection

B.

The signal strength from the ISP regional satellite

C.

The data speeds from the user’s ISP

D.

The user’s default gateway settings

Buy Now
Questions 64

A desktop technician needs to replace a laptop’s SSD. Which of the following must the technician use to prevent damage to the SSD during the replacement?

Options:

A.

Antistatic bags

B.

Needle-nose pliers

C.

Safety goggles

D.

ESD straps

Buy Now
Questions 65

While preparing a computer that will be issued to a new user, the technician discovers the computer’s former user configured a supervisor password in the BIOS. Which of the following can the technician do to allow the password to be removed?

Options:

A.

Reimage the machine from a network share

B.

Change the boot order and boot to an external drive

C.

Remove and then replace the CMOS battery

D.

Use the BIOS user password to reset the supervisor password

Buy Now
Questions 66

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Buy Now
Questions 67

Which of the following employs content filtering to prevent data leaks within an organization?

Options:

A.

DLP

B.

IPS

C.

ACL

D.

VPN

Buy Now
Questions 68

A user's computer has been performing sluggishly The user reports the computer lakes a long time to be ready to use after powering it on A technician decides to use MSConfig to review the applications that might be causing the slowdown On which of the following should the technician focus'? (Select TWO).

Options:

A.

Startup

B.

Disk Defragmenter

C.

Windows Updates

D.

Services

E.

Disk Cleanup

F.

Event Viewer

Buy Now
Questions 69

A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks. Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).

Options:

A.

Failed attempts lockout policy

B.

Restricting user permissions

C.

Login time restrictions

D.

Setting strong passwords

E.

Patch/update management

Buy Now
Questions 70

Which of the following security tools can leverage the onboard TPM to protect data at rest?

Options:

A.

Encrypted file system

B.

Access control list

C.

BitLocker

D.

Secure file transfer protocol

Buy Now
Questions 71

A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users. Which of the following should the technician add to meet the multifactor requirement?

Options:

A.

Passphrase

B.

Knowledge-based authentication

C.

PIN

D.

Thumbprint

Buy Now
Questions 72

A Chief Information Officer (CIO) recently learned a critical update is required to secure several servers within the organization. The CIO asks a technician to:

  • Deploy the patches to the environment following best practice protocols.
  • Ensure the servers and applications are functioning properly after the deployment.

Which of the following steps will the technician most likely take NEXT?

Options:

A.

Document the business processes.

B.

Scope the change.

C.

Perform a risk analysis.

D.

Develop a back-out plan.

E.

Document the changes.

Buy Now
Questions 73

A user visited a website and infected a Windows 10 computer with a virus. A technician troubleshoots the issue, but the virus runs every time the computer is restarted. Which of the following should the technician try NEXT to resolve the issue?

Options:

A.

Use Advanced Startup to run a System Image Recovery.

B.

Boot to safe mode and run System File Checker.

C.

Boot to safe mode and run Task Manager.

D.

Use Advanced Startup to run Windows System Restore.

Buy Now
Questions 74

A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task''

Options:

A.

SSH

B.

RDP

C.

FTP

D.

Telnet

Buy Now
Questions 75

A user's mobile device has slow data speeds. The user first noticed the stow speeds after downloading a large application to the device. The application download MOST likely caused.

Options:

A.

a hardware issue on the device.

B.

the device to run more slowly

C.

the user to exceed the monthly data limit

D.

the device to change to WiFi settings

Buy Now
Questions 76

Which of the following physical security measures can be combined with a badge reader to create an MFA system to control physical access?

Options:

A.

Hardware token

B.

Biometric locks

C.

Key jobs

D.

Smart cards

Buy Now
Questions 77

An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols. Which of the following will the administrator MOST likely use to log in to these servers?

Options:

A.

SSL

B.

RDP

C.

SSH

D.

Telnet

Buy Now
Questions 78

A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected. II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

Options:

A.

Update all antivirus definitions and run a full scan on all networked computers.

B.

Make sure the operating systems on all networked computers are fully patched and up to date

C.

Update all software drivers and firmware on all the affected computers.

D.

Enable geofiltering on the network firewall to stop unwanted communications.

Buy Now
Questions 79

Joe. a user, is gelling replies lo an email message he never sent Joe contacts the help desk to ask what he should do. Which of the following should the help desk technician recommend FIRST to Joe? A. Delete the replies

B. Change his password

C. Notify his contacts that his account was compromised

D. Forward the email to the technician.

Options:

Buy Now
Questions 80

Which of the following should a technician do FIRST before opening a computer case to replace a part?

Options:

A.

Remove all jewelry.

B.

Put on an ESD strap.

C.

Perform self-grounding.

D.

Disconnect the power.

Buy Now
Questions 81

Users are reporting slow connections on their mobile devices when trying to download large data files from the network servers, but users on wired connections are not having any issues. A network technician notices multiple alerts about wireless access points going offline, and several devices connecting to the WLAN are unable to authenticate successfully. Which of the following issues are the mobile users experiencing?

Options:

A.

Over-limit data transmission

B.

Unauthorized account access

C.

Leaked personal data

D.

Dropped signals

Buy Now
Questions 82

A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

Options:

A.

Remote wipe

B.

Device encryption

C.

Biometric authentication

D.

Enterprise sandbox

Buy Now
Questions 83

A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found Which of the following is the MOST likely cause of the issue?

Options:

A.

An invalid certificate is on the mail server

B.

The user's email was hijacked

C.

The user's address book was corrupted

D.

The user's system time is different from the mail server.

Buy Now
Questions 84

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and

Linux OSs.

Which of the following should the technician suggest the customer use?

Options:

A.

Ext4

B.

exFAT

C.

NFS

D.

FAT32

E.

CDFS

Buy Now
Questions 85

A technician needs to update the network firewall, which will cause a temporary outage. The technician submits a change management request to perform the required maintenance. Which of the following provides details about what the technician will need to do if the update fails?

Options:

A.

Back-out plan

B.

Scope of the change

C.

Risk analysis

D.

End-user acceptance

Buy Now
Questions 86

A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a 1TB SSD. and a high-end GPU The technician installed the OS and a new game but noticed the frame-rate performance was much lower than expected Which of the following should the technician do NEXT to address the performance issues?

Options:

A.

Install a higher wattage PSU.

B.

Download security patches

C.

Defragment the drive

D.

Update the device drivers

Buy Now
Questions 87

Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues. Which of the following should a technician use to continue troubleshooting the issue?

Options:

A.

passwd

B.

FileVault

C.

Keychain

D.

Gatekeeper

Buy Now
Questions 88

A technician recently upgrade a leptop a replo’s RAM from 2GB to 4hb. However , the operating system only recognizes the RAM as 3.5GB. Which of the following is the MOST likely reason the leptop does not recognize the full amount of RAM?

Options:

A.

The RS-232 connector pins are damaged.

B.

A 32-bit operating system is installed.

C.

The msinfo32 executable is compute.

D.

A FAT32 filesystem is configured.

Buy Now
Questions 89

Which of the following account types account types enables and end user to install software without restrictions?

Options:

A.

Administrator

B.

Power user

C.

Standard

D.

Guest

Buy Now
Questions 90

A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files. After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

Options:

A.

xcopy

B.

chkdsk

C.

sfc

D.

gpupdate

Buy Now
Questions 91

A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin. Which of the following BEST describes this scenario?

Options:

A.

Principle of least privilege

B.

Password expiration

C.

Single sign-on

D.

Permission inheritance

Buy Now
Questions 92

A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver malicious payloads across the network. Which of the following security measures would have been BEST to prevent the attack from being executed in the first place' (Select TWO)

Options:

A.

Using a host-based antivirus with real-time scanning

B.

Implementing automatic screen locks after 60 seconds of inactivity

C.

Creating a strong BIOS'UEFI password

D.

Disabling AutoRun for USB devices

E.

Enabling the Secure Boot option

F.

Changing the default administrator credentials

Buy Now
Questions 93

A technician needs to open a laptop chassis to perform an upgrade. Which of the following procedures must be technician follow FIRST? (Select Two.)

Options:

A.

Attach an ESD strap

B.

Use proper lifting techniques.

C.

Put on safely goggles.

D.

Disconnect the power from the PC.

E.

Remove all jewelry

F.

Wear an air filter mask

Buy Now
Questions 94

A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected. Which of the following is the BEST method for the technician to use to scan the boot sector?

Options:

A.

Mount the drive using a forensic platform

B.

Boot into safe mode

C.

Boot to last known good configuration

D.

Boot the drive in another computer.

Buy Now
Questions 95

Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting

email issues. Which of the following is MOST likely the cause of the issue?

Options:

A.

There is an OS update failure.

B.

Out-of-office is turned on.

C.

There is an Internet connectivity issue.

D.

SMTP services are not running.

Buy Now
Questions 96

A junior technician needs to obtain a list of all the processes that are running on Linux system. Which of the following commands should the technician use to obtain the information?

Options:

A.

Nv

B.

Is

C.

Ps

D.

V1

Buy Now
Questions 97

A user reports unwanted pop-ups are appearing on a computer’s screen, and the system is performing slowly. Which of the following should a technician do FIRST to troubleshoot the threat? (Choose two.)

Options:

A.

Kill all processes that are not related to Windows.

B.

Restart the computer in safe mode.

C.

Run antivirus and anti-malware scans.

D.

Search for software related to the pop-ups.

E.

Uninstall the network driver from the Device Manager.

F.

Disable all non-Microsoft services.

Buy Now
Questions 98

A company recently implemented a new Linux server. Remote access to the terminal is required to provide easier server administrator. Which of the following feature or services will provide the MOST secure remote access solution?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

SCP

Buy Now
Questions 99

A technician is decommissioning a workstation that contains Pll The HDDs cannot be used in another device, and all data must be destroyed Which of the following actions would BEST fulfill these requirements? (Select TWO)

Options:

A.

Physically damage the drives.

B.

Leave the drives in the workstation since it will be decommissioned

C.

Take a picture of the drives individually and their serial numbers

D.

Send the drives to a certified third-party vendor for destruction.

E.

Perform a low-level format before removal

F.

Set a complex hard drive password.

Buy Now
Exam Code: 220-1002
Exam Name: CompTIA A+ Certification Exam: Core 2
Last Update: Dec 10, 2023
Questions: 665