Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

Options:

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Buy Now
Questions 5

A technician needs to document who had possession of evidence at every step of the process. Which of the following does this process describe?

Options:

A.

Rights management

B.

Audit trail

C.

Chain of custody

D.

Data integrity

Buy Now
Questions 6

A technician needs to format a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Buy Now
Questions 7

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Buy Now
Questions 8

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Buy Now
Questions 9

A company installed a new backup and recovery system. Which of the following types of backups should be completed FIRST?

Options:

A.

Full

B.

Non-parity

C.

Differential

D.

Incremental

Buy Now
Questions 10

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Options:

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Buy Now
Questions 11

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

Options:

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Buy Now
Questions 12

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Buy Now
Questions 13

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Options:

A.

Reset the phone to factory settings

B.

Uninstall the fraudulent application

C.

Increase the data plan limits

D.

Disable the mobile hotspot.

Buy Now
Questions 14

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Buy Now
Questions 15

Which of the following provide the BEST way to secure physical access to a data cento server room? (Select TWO).

Options:

A.

Biometric lock

B.

Badge reader

C.

USB token

D.

Video surveillance

E.

Locking rack

F.

Access control vestibule

Buy Now
Questions 16

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 17

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 18

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.

Network and Sharing Center

B.

Programs and Features

C.

Default Apps

D.

Add or Remove Programs

Buy Now
Questions 19

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

220-1102 Question 19

220-1102 Question 19

Options:

Buy Now
Questions 20

A user reports that the hard drive activity light on a Windows 10 desktop computer has been steadily lit for more than an hour, and performance is severely degraded. Which of the following tabs in Task Manager would contain the information a technician would use to identify the cause of this issue?

Options:

A.

Services

B.

Processes

C.

Performance

D.

Startup

Buy Now
Questions 21

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Buy Now
Questions 22

Which of the following Linux commands would be used to install an application?

Options:

A.

yum

B.

grep

C.

Is

D.

sudo

Buy Now
Questions 23

An architecture firm is considering upgrading its computer-aided design (CAD) software to the newest version that forces storage of backups of all CAD files on the software's cloud server. Which of the following is MOST likely to be of concern to the IT manager?

Options:

A.

All updated software must be tested with alt system types and accessories

B.

Extra technician hours must be budgeted during installation of updates

C.

Network utilization will be significantly increased due to the size of CAD files

D.

Large update and installation files will overload the local hard drives.

Buy Now
Questions 24

A technician wants to enable BitLocker on a Windows 10 laptop and is unable to find the BitLocker Drive Encryption menu item in Control Panel. Which of the following explains why the technician unable to find this menu item?

Options:

A.

The hardware does not meet BitLocker's minimum system requirements.

B.

BitLocker was renamed for Windows 10.

C.

BitLocker is not included on Windows 10 Home.

D.

BitLocker was disabled in the registry of the laptop

Buy Now
Questions 25

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Buy Now
Questions 26

An employee has been using the same password for multiple applications and websites for the past several years. Which of the following would be best to prevent security issues?

Options:

A.

Configuring firewall settings

B.

Implementing expiration policies

C.

Defining complexity requirements

D.

Updating antivirus definitions

Buy Now
Questions 27

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Buy Now
Questions 28

Which of the following environmental controls is most important to maintain the safety of a data center?

Options:

A.

Temperature control

B.

Humidity control

C.

Fire suppression control

D.

Power managementcontrol

Buy Now
Questions 29

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Buy Now
Questions 30

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.

Ask the user for clarification.

B.

Keep the user updated on the progress.

C.

Document the root cause.

D.

Follow the system’s escalation process.

Buy Now
Questions 31

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Buy Now
Questions 32

Which of the following Linux commands would help to identify which directory the user is currently operating in?

Options:

A.

pwd

B.

dig

C.

find

D.

cat

Buy Now
Questions 33

Which of the following security methods supports the majority of current Wi-Fi-capable devices without sacrificing security?

Options:

A.

WPA3

B.

MAC filleting

C.

RADIUS

D.

TACACS+

Buy Now
Questions 34

Which of the following commands lists running processes in Linux?

Options:

A.

top

B.

apt-get

C.

Is

D.

cat

Buy Now
Questions 35

Which of the following operating systems were designed for smartphones? (Select two).

Options:

A.

Ubuntu

B.

CentOS

C.

macOS

D.

Chrome OS

E.

iOS

F.

Android

Buy Now
Questions 36

A user reports that an Android mobile device takes a long time to boot, and all applications crash when launched. The user installed the applications from a third-party website. Which of the following steps should the technician complete to diagnose the issue?

Options:

A.

Scan the system for malware.

B.

Clear the web browser cache.

C.

Enroll the device in an MDM system.

D.

Confirm the compatibility of the applications with the OS.

Buy Now
Questions 37

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

Options:

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Buy Now
Questions 38

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 39

Which of the following file types should be used to install software on a macOS computer? (Select two).

Options:

A.

.yum

B.

.pkg

C.

.msi

D.

.ps1

E.

.exe

F.

.dmg

Buy Now
Questions 40

Which of the following does MFA provide?

Options:

A.

Security enhancement

B.

Encryption

C.

Digital signature

D.

Public key infrastructure

Buy Now
Questions 41

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Buy Now
Questions 42

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

Options:

A.

Startup

B.

Performance

C.

Application history

D.

Processes

Buy Now
Questions 43

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?

Options:

A.

nslookup

B.

tracert

C.

hostname

D.

gpresult

Buy Now
Questions 44

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Buy Now
Questions 45

An employee using an Apple MacBook is receiving frequent, random pop-up requests from other Apple devices wanting to share photos and videos and asking whether the user would like to accept the request Which of the following configurations should the technician advise the user to change first"?

Options:

A.

Wi-Fi

B.

iCloud

C.

Antivirus

D.

AirDrop

Buy Now
Questions 46

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Buy Now
Questions 47

An administrator needs to back up the following components of a single workstation:

•The installation of the operating system

•Applications

•User profiles

•System settings

Which of the following backup methods can the administrator use to ensure the workstation is properly backed up?

Options:

A.

Differential

B.

Image

C.

Synthetic

D.

Archive

Buy Now
Questions 48

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 49

Which of the following file types would be used in the Windows Startup folder to automate copying a personal storage table (.pst file) to a network drive at log-in?

Options:

A.

.bat

B.

.dll

C.

.ps1

D.

.txt

Buy Now
Questions 50

A technician needs to upgrade a legacy system running on a 32-bit OS with new applications that can work both on a 32-bit and a 64-bit system. The legacy system is critically important to the organization. The IT manager cautions that the new applications must not have a detrimental effect on company finances. Which of the following impacts is the IT manager most concerned with?

Options:

A.

Device

B.

Business

C.

Network

D.

Operation

Buy Now
Questions 51

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Buy Now
Questions 52

Which of the following features can be used to ensure a user can access multiple versions of files?

Options:

A.

Multiple desktops

B.

Remote Disc

C.

Time Machine

D.

FileVault

Buy Now
Questions 53

Multiple users routinely record log-in information in readily accessible areas. Which of the following is the best way to mitigate this issue?

Options:

A.

Trusted sources

B.

Valid certificates

C.

User training

D.

Password manager

Buy Now
Questions 54

While browsing the internet, a customer sees a window stating antivirus protection is no longer functioning Which of the following steps should a technician take next? (Select two).

Options:

A.

Isolate the computer from the network

B.

Enable the firewall service.

C.

Update the endpoint protection software

D.

Use System Restore to undo changes.

E.

Delete the browser cookies

F.

Run sfc /scannow.

Buy Now
Questions 55

When a user attempts to open an email using a company-issued smartphone, the user receives a message stating the email is encrypted and cannot be opened. The user forwards the email to a personal account and receives the same message. The user then contacts the IT department for assistance. The technician instructs the user to contact the sender to exchange information in order to decode the message. Which of the following will the user receive from the sender?

Options:

A.

Keys

B.

Token

C.

Password

D.

RootCA

Buy Now
Questions 56

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Buy Now
Questions 57

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Options:

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Buy Now
Questions 58

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Buy Now
Questions 59

A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?

Options:

A.

The user is in a poor signal area.

B.

The user has too many processes running.

C.

The smartphone has malware on it.

D.

The smartphone has been jailbroken.

Buy Now
Questions 60

Which of the following items require special e-waste recycling? (Select two).

    Solid-state drive

Options:

A.

A/C adapter

B.

Surge protector

C.

Laptop battery

D.

CRT monitor

E.

Power supply

Buy Now
Questions 61

A technician wants to securely dispose of storage drives. Which of the following is the best way to eliminate data on SSDs?

Options:

A.

Degaussing

B.

Shredding

C.

Erasing

D.

Drilling

Buy Now
Questions 62

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Buy Now
Questions 63

A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?

Options:

A.

Run one scan and schedule future scans.

B.

Back up the uninfected files and reimage the computer.

C.

Restore the clean backup copies of the infected files.

D.

Run repeated remediation scans until the malware is removed.

Buy Now
Questions 64

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 65

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Buy Now
Questions 66

A manager reports that staff members often forget the passwords to their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?

Options:

A.

Enable multifactor authentication.

B.

Increase the failed log-in threshold.

C.

Remove complex password requirements.

D.

Implement a single sign-on with biometrics.

Buy Now
Questions 67

A user is attempting to make a purchase at a store using a phone. The user places the phone on the payment pad, but the device does not recognize the phone. The user attempts to restart the phone but still has the same results. Which of the following should the user do to resolve the issue?

Options:

A.

Turn off airplane mode while at the register.

B.

Verify that NFC is enabled.

C.

Connect to the store's Wi-Fi network.

D.

Enable Bluetooth on the phone.

Buy Now
Questions 68

Which of the following are mobile operating systems used on smartphones? (Select two).

Options:

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Buy Now
Questions 69

Which of the following is the most likely reason a filtration system is critical for data centers?

Options:

A.

Plastics degrade over time.

B.

High humidity levels can rust metal.

C.

Insects can invade the data center.

D.

Dust particles can clog the machines.

Buy Now
Questions 70

A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?

Options:

A.

Disable System Restore.

B.

Remediate the system.

C.

Educate the system user.

D.

Quarantine the system.

Buy Now
Questions 71

A large company is changing its password length requirements. The Chief Information Officer is mandating that passwords now be at least 12 characters long, instead of 10. Which of the following should be used to adjust this setting?

    Group Policy

Options:

A.

User accounts

B.

Access control lists

C.

Authenticator applications

Buy Now
Questions 72

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Buy Now
Questions 73

A technician receives an invalid certificate error when visiting a website. Other workstations on the same local network are unable to replicate this issue. Which of the following is most likely causing the issue?

Options:

A.

Date and time

B.

User access control

C.

UEFI boot mode

D.

Log-on times

Buy Now
Questions 74

Remote employees need access to information that is hosted on local servers at the company. The IT department needs to find a solution that gives employees secure access to the company's resources as if the employees were on premises. Which of the following remote connection services should the IT team

implement?

Options:

A.

SSH

B.

VNC

C.

VPN

D.

RDP

Buy Now
Questions 75

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Buy Now
Questions 76

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

Options:

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Buy Now
Questions 77

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

Options:

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Buy Now
Questions 78

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 79

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

Options:

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Buy Now
Questions 80

Which of the following is the most likely to use NTFS as the native filesystem?

Options:

A.

macOS

B.

Linux

C.

Windows

D.

Android

Buy Now
Questions 81

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Buy Now
Questions 82

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Buy Now
Questions 83

A user's antivirus software reports an infection that it is unable to remove. Which of the following is the most appropriate way to remediate the issue?

Options:

A.

Disable System Restore.

B.

Utilize a Linux live disc.

C.

Quarantine the infected system.

D.

Update the anti-malware.

Buy Now
Questions 84

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi.

B.

All Wi-Fi traffic will be encrypted in transit.

C.

Eavesdropping attempts will be prevented.

D.

Rogue access points will not connect.

Buy Now
Questions 85

Which of the following file extensions are commonly used to install applications on a macOS machine? (Select THREE).

Options:

A.

.mac

B.

.Pkg

C.

.deb

D.

.dmg

E.

.msi

F.

.appx

G.

.app

Buy Now
Questions 86

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed first to prevent further damage to the host and other systems?

    Turn off the machine.

Options:

A.

Run a full antivirus scan.

B.

Remove the LAN card.

C.

Install a different endpoint solution.

Buy Now
Questions 87

A technician receives a high-priority ticket about sensitive information collected from an end user’s workstation. Which of the following steps should a technician take to preserve the chain of custody for a forensic investigation?

Options:

A.

Reimage the workstation.

B.

Inform the user of the investigation.

C.

Recover and secure the workstation.

D.

Back up the workstation

Buy Now
Questions 88

A technician needs to implement a system to handle both authentication and authorization Which of the following meets this requirement?

Options:

A.

WPA3

B.

MFA

C.

TACACS+

D.

RADIUS

Buy Now
Questions 89

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Buy Now
Questions 90

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

Options:

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Buy Now
Questions 91

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

    ext3

Options:

A.

FAT32

B.

exFAT

C.

NTFS

Buy Now
Questions 92

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Buy Now
Questions 93

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Buy Now
Questions 94

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

Options:

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Buy Now
Questions 95

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Buy Now
Questions 96

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

Options:

A.

format

B.

netstat

C.

diskpart

D.

net use

E.

rmdir

Buy Now
Questions 97

A laptop that was in the evidence room of a police station is missing. Which of the following is the best reason to refer to chain of custody documentation?

Options:

A.

To determine which party had the machine and when.

B.

To remotely wipe sensitive data from the machine.

C.

To gather the information needed to replace the machine.

D.

To alert the owner that the password needs to be changed.

Buy Now
Questions 98

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

Options:

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

Buy Now
Questions 99

A user is trying to limit the amount of time their children spend on the internet. Which of the following Windows 10 settings should be enabled to accomplish this objective?

Options:

A.

Family Options

B.

Update & Security

C.

Ease of Access

D.

Network & Internet

E.

Privacy

Buy Now
Questions 100

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Buy Now
Questions 101

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Buy Now
Questions 102

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Options:

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Buy Now
Questions 103

A user reports an issue when connecting a mobile device to Bluetooth. The user states the mobile device's Bluetooth is turned on. Which of the following steps should the technician take NEXT to resolve the issue?

Options:

A.

Restart the mobile device.

B.

Turn on airplane mode.

C.

Check that the accessory is ready to pair.

D.

Clear all devices from the phone's Bluetooth settings.

Buy Now
Questions 104

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

Options:

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

Buy Now
Questions 105

A technician downloaded software from the Internet that required the technician to scroll through a text box and at the end of the text box, click a

button labeled Accept Which of the following agreements IS MOST likely in use?

Options:

A.

DRM

B.

NDA

C.

EULA

D.

MOU

Buy Now
Questions 106

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Buy Now
Questions 107

A technician is troubleshooting a PC because the user has reported strange pop-up windows and computer performance issues. Which of the following actions should the technician take next?

Options:

A.

Isolate the machine from the network.

B.

Scan the system for hidden files.

C.

Disable unused ports.

D.

Install antivirus software.

E.

Reconfigure the firewall.

Buy Now
Questions 108

A user connected a laptop to a wireless network and was tricked into providing login credentials for a website. Which of the following threats was used to carry out the attack?

Options:

A.

Zero day

B.

Vishing

C.

DDoS

D.

Evil twin

Buy Now
Questions 109

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

Options:

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

Buy Now
Questions 110

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Buy Now
Questions 111

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 112

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?

Options:

A.

ipconfig

B.

ifconfig

C.

arpa

D.

ping

Buy Now
Questions 113

Which of the following data is MOST likely to be regulated?

Options:

A.

Name in a Phone book

B.

Name on a medical diagnosis

C.

Name on a job application

D.

Name on a employer's website

Buy Now
Questions 114

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Buy Now
Questions 115

A user has a license for an application that is in use on a personal home laptop. The user approaches a systems administrator about using the same license on

multiple computers on the corporate network. Which of the following BEST describes what the systems administrator should tell the user?

Options:

A.

Use the application only on the home laptop because it contains the initial license.

B.

Use the application at home and contact the vendor regarding a corporate license.

C.

Use the application on any computer since the user has a license.

D.

Use the application only on corporate computers.

Buy Now
Questions 116

While browsing a website, a staff member received a message that the website could not be trusted. Shortly afterward, several other colleagues reported the same issue across numerous other websites. Remote users who were not connected to corporate resources did not have any issues. Which of the following is MOST likely the cause of this issue?

Options:

A.

A bad antivirus signature update was installed.

B.

A router was misconfigured and was blocking traffic.

C.

An upstream internet service provider was flapping.

D.

The time or date was not in sync with the website.

Buy Now
Questions 117

A user is having issues with document-processing software on a Windows workstation. Other users that log in to the same device do not have the same issue.

Which of the following should a technician do to remediate the issue?

Options:

A.

Roll back the updates.

B.

Increase the page file.

C.

Update the drivers.

D.

Rebuild the profile.

Buy Now
Questions 118

Following a recent power outage, several computers have been receiving errors when booting. The technician suspects file corruption has occurred. Which of the following steps should the technician try FIRST to correct the issue?

Options:

A.

Rebuild the Windows profiles.

B.

Restore the computers from backup.

C.

Reimage the computers.

D.

Run the System File Checker.

Buy Now
Questions 119

Security software was accidentally uninstalled from all servers in the environment. After requesting the same version of the software be reinstalled, the security analyst learns that a change request will need to be filled out. Which of the following is the BEST reason to follow the change management process in this scenario?

Options:

A.

Owners can be notified a change is being made and can monitor it for performance impact. Most Voted

B.

A risk assessment can be performed to determine if the software is needed.

C.

End users can be aware of the scope of the change.

D.

A rollback plan can be implemented in case the software breaks an application.

Buy Now
Questions 120

A technician has just used an anti-malware removal tool to resolve a user's malware issue on a corporate laptop. Which of the following BEST describes what the technician should do before returning the laptop to the user?

Options:

A.

Educate the user on malware removal.

B.

Educate the user on how to reinstall the laptop OS.

C.

Educate the user on how to access recovery mode.

D.

Educate the user on common threats and how to avoid them.

Buy Now
Questions 121

A user receives a notification indicating the data plan on the user's corporate phone has reached its limit. The user has also noted the performance of the phone is abnormally slow. A technician discovers a third-party GPS application was installed on the phone. Which of the following is the MOST likely cause?

Options:

A.

The GPS application is installing software updates.

B.

The GPS application contains malware.

C.

The GPS application is updating its geospatial map data.

D.

The GPS application is conflicting with the built-in GPS.

Buy Now
Questions 122

A technician connects an additional monitor to a PC using a USB port. The original HDMI monitor is mounted to the left of the new monitor. When moving the mouse to the right from the original monitor to the new monitor, the mouse stops at the end of the screen on the original monitor. Which

of the following will allow the mouse to correctly move to the new monitor?

Options:

A.

Rearranging the monitor's position in display settings

B.

Swapping the cables for the monitors

C.

Using the Ctrl+AIt+> to correct the display orientation

D.

Updating the display drivers for the video card

Buy Now
Questions 123

An administrator has received approval for a change request for an upcoming server deployment. Which of the following steps should be completed NEXT?

Options:

A.

Perform a risk analysis.

B.

Implement the deployment.

C.

Verify end user acceptance

D.

Document the lessons learned.

Buy Now
Questions 124

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

Options:

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Buy Now
Questions 125

Which of the following best describes XFS?

Options:

A.

A filesystem used by the Linux OS

B.

A filesystem used by iOS

C.

A filesystem used by the Windows OS

D.

A filesystem used by macOS

Buy Now
Questions 126

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Buy Now
Questions 127

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.

Transaction log

B.

Incremental

C.

Synthetic

D.

Differential

Buy Now
Questions 128

Which of the following is MOST likely contained in an EULA?

Options:

A.

Chain of custody

B.

Backup of software code

C.

Personally identifiable information

D.

Restrictions of use

Buy Now
Questions 129

A help desk technician runs the following script: Inventory.py. The technician receives the following error message:

How do you want to Open this file?

Which of the following is the MOST likely reason this script is unable to run?

Options:

A.

Scripts are not permitted to run.

B.

The script was not built for Windows.

C.

The script requires administrator privileges,

D.

The runtime environment is not installed.

Buy Now
Questions 130

Which of the following is an example of MFA?

Options:

A.

Fingerprint scan and retina scan

B.

Password and PIN

C.

Username and password

D.

Smart card and password

Buy Now
Questions 131

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Buy Now
Questions 132

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

Options:

A.

Unplug the extra hardware.

B.

Delete unnecessary files.

C.

Update the driver software.

D.

Restore the system files.

E.

Uninstall unused desktop applications.

F.

Add additional memory.

Buy Now
Questions 133

A user reports that a device with a statically defined IP is unable to connect to the internet. The technician runs the ipconfig /all command and sees the following output:

IPv4 Address............ 192.168.0.74

Subnet Mask.............255.255.255.255

Default Gateway......... 192.168.0.1

Which of the following is most likely the reason for the issue?

Options:

A.

The default gateway is up.

B.

The user has an APIPA IP address.

C.

The IP address is on the wrong subnet

D.

The subnet mask is incorrect.

Buy Now
Questions 134

Which of the following provides disk encryption on computers running a Windows OS?

Options:

A.

FileVault

B.

BitLocker

C.

Private Key

D.

PowerShell

Buy Now
Questions 135

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

Options:

A.

End-user license agreement

B.

Non-disclosure agreement

C.

Regulatory compliance

D.

Acceptable use policy

Buy Now
Questions 136

After a computer upgrade at an imaging lab. the upgraded computers are not able to obtain an IP address. Which of the following is most likely the issue?

Options:

A.

TheswitchIs only providing IPv6 addresses.

B.

TheOS must be updated to be compatible with the imaging software.

C.

Theswitchhas port security enabled.

D.

Theswitchdoes not support multicast traffic.

Buy Now
Questions 137

A customer recently upgraded their computer to the latest Windows version and is now having issues with the display. The icons and text are too large, and the colors are not accurate. Which of the following Control Panel options should the technician adjust to help the customer?

Options:

A.

Ease of Access

B.

Device Manager

C.

Network and SharingCenter

D.

Programs and Features

Buy Now
Questions 138

A technician is troubleshooting a PC that will not run Windows Defender. Windows Defender has been disabled, and no other antivirus is installed on the PC. Which of the following would have caused this issue?

Options:

A.

Ransomware

B.

Rootkit

C.

Spyware

D.

Keylogger

Buy Now
Questions 139

A business lost all data and equipment after a disaster. Due to the disaster, the business no longer maintains system backups. Which of the following should the business implement to prevent future losses?

Options:

A.

Test environment

B.

Local backups

C.

Cold site

D.

Cloud storage

Buy Now
Questions 140

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?

Options:

A.

Obtained root access

B.

Upgraded the OS

C.

Installed a VPN

D.

Uninstalled the MDM software

Buy Now
Questions 141

A computer is restarting automatically and displaying the following error message: "Your PC ran into a problem and needs to restart. We're just collecting some error info, and then we'll restart for you. (0% complete)." Which of the following should the technician do first to diagnose the issue?

Options:

A.

Check the system event logs.

B.

Verify the hardware driver versions.

C.

Install Windows updates.

D.

Perform a RAM diagnostic.

Buy Now
Questions 142

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

Options:

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

Buy Now
Questions 143

A technician is installing a new SOHO wireless router and wants to ensure it is secure and uses the latest network features. Which of the following should the technician do first?

Options:

A.

Disable the unused ports.

B.

Enable DHCP reservations.

C.

Update the firmware.

D.

Disable the guest account.

Buy Now
Questions 144

Which of the following should be considered when maintaining the environment of a server room?

Options:

A.

Circuit breaker capacity

B.

Power distribution unit placement

C.

RAID configurations

D.

Virtualization

Buy Now
Questions 145

A developer installed a new software package that has stopped all file server access. Which of the following change management practices should have been followed?

Options:

A.

End-user acceptance

B.

Staff delegation

C.

Appropriate scoping

D.

Sandbox testing

Buy Now
Questions 146

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Buy Now
Questions 147

A user's new laptop, which was advertised as gaming-ready, is performing slowly when the user is playing a modern game. However, when the user is playing a less resource-demanding game, the user does not see any lag. Which of the following should a technician do to resolve the issue?

Options:

A.

Overclock the RAM

B.

Enable NIC teaming

C.

Select dedicated graphics

D.

Activate CPU hyperthreading

Buy Now
Questions 148

A support specialist needs to decide whether to install a 32-bit or 64-bit OS architecture on a new computer. Which of the following specifications will help the specialist determine which OS architecture to use?

Options:

A.

16GB RAM

B.

Intel i7 CPU

C.

500GB HDD

D.

1Gbps Ethernet

Buy Now
Questions 149

A technician has been tasked with installing a workstation that will be used for point-of-sale transactions. The point-of-sale system will process credit cards and loyalty cards. Which of the following encryption technologies should be used to secure the workstation in case of theft?

Options:

A.

Data-in-transit encryption

B.

File encryption

C.

USB drive encryption

D.

Disk encryption

Buy Now
Questions 150

A technician needs to configure laptops so that only administrators can enable virtualization technology if needed. Which of the following should the technician configure?

Options:

A.

BIOS password

B.

Guest account

C.

Screen lock

D.

AutoRun setting

Buy Now
Questions 151

A technician receives a help desk ticket regarding a software issue on a workstation. The workstation provides the only access to a corporate database, and the technician needs to recover the workstation quickly. Which of the following actions should the technician take?

Options:

A.

Restore the workstation from the last backup.

B.

Reinstall the operating system.

C.

Run the System File Checker.

D.

Run the Hardware Diagnostics tool.

Buy Now
Questions 152

When a user is browsing a website on a smartphone, a pop-up appears. The pop-up states that the system has been breached and directs the user to an application to resolve the breach. Which of the following should the user do?

Options:

A.

Close the website and ignore the pop-up

B.

Replace the smartphone

C.

Download and install the application to resolve the issue

D.

Analyze the smartphone to find the source of the breach

Buy Now
Questions 153

A technician is setting up backup and recovery solutions that must restore quickly. Storage space is not a factor. Which of the following backup methods should the technician implement?

Options:

A.

Differential

B.

Synthetic

C.

Full

D.

Incremental

Buy Now
Questions 154

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

Options:

A.

Issuinga laptop to the user with increased font size to be used only for meetings

B.

Using display settings to adjust the text size during meetings

C.

Addinga local user account, which has a larger font size set, for the user to log In toduring meetings

D.

Addinga second monitor to the user's desktop and increase the font size for only that display

Buy Now
Questions 155

Which of the following environmental effects can be the result of using virtualization?

Options:

A.

Greater energy consumption

B.

Noise pollution

C.

Reduced space requirements

D.

Fewer maintenance needs

Buy Now
Questions 156

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Buy Now
Questions 157

A company downloads a large number of files over the internet daily. The company needs a way to ensure the files have not been modified or corrupted during the download process. Which of the following should the company do to verify the files?

Options:

A.

Clear browsing data

B.

Install SSL certificates

C.

Check the hash value

D.

Use trusted sources

Buy Now
Questions 158

A client recently upgraded their Windows 10 machine to Windows 11. The client reports the following message displays when turning the computer on: "Error loading operating system." Which of the following should a technician do first to troubleshoot this issue?

Options:

A.

Disable the Secure Boot feature.

B.

Use the automated startup recovery.

C.

Format the drive.

D.

Resize the boot partition.

Buy Now
Questions 159

A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?

Options:

A.

Configure the sleep settings.

B.

Disablehibernation.

C.

Edit thepower plan.

D.

Turn onfast startup.

Buy Now
Questions 160

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Options:

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Buy Now
Questions 161

A technician is configuring a workstation's security settings, and the following options are available:

    Account lockout policy

    Group policy

    Two-factor authentication

    Password complexity requirements

    Firewalls

    User accounts

    Access control lists

    Antivirus software

Which of the following settings should the technician configure to deploy strong password enforcement across the enterprise?

Options:

A.

Account lockout policy

B.

Group policy

C.

Two-factor authentication

D.

Access control lists

Buy Now
Questions 162

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 163

A user is unable to access the company’s internal network on a separate subnet. A help desk technician verifies the user's credentials, and the user has the appropriate permissions to access the network. The technician checks the network and finds the connection is stable. No other users are having this issue. Which of the following should the technician do next?

Options:

A.

Consult with the firewall team to see If the user's IP address Is blocked.

B.

Delete the user’s credentials and create new ones.

C.

Run a virus scan on the user's workstation.

D.

Update the network drivers on the user’s workstation.

Buy Now
Questions 164

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Buy Now
Questions 165

Which of the following Is used to identify potential issues with a proposed change poor lo implementation?

Options:

A.

Request form

B.

Rollback plan

C.

End-user acceptance

D.

Sandbox testing

Buy Now
Questions 166

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

Options:

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

Buy Now
Questions 167

A user takes a work-issued laptop home for the first time. When the user attempts to browse any website on the home internet, the user receives the following error:

"This site cannot be reached."

A technician from work confirms that the static IP that was set up on the machine was changed back to DHCP. Which of the following needs to be corrected?

Options:

A.

HTTPS

B.

VLAN

C.

DNS

D.

SMTP

Buy Now
Questions 168

A developer receives the following error while trying to install virtualization software on a workstation:

VTx not supported by system

Which of the following upgrades will MOST likely fix the issue?

Options:

A.

Processor

B.

Hard drive

C.

Memory

D.

Video card

Buy Now
Questions 169

Which of the following Is a package management utility for PCs that are running the Linux operating system?

Options:

A.

chmod

B.

yum

C.

man

D.

grep

Buy Now
Questions 170

A systems administrator notices that a server on the company network has extremely high CPU utilization. Upon further inspection, the administrator sees that the server Is consistently communicating with an IP address that is traced back to a company that awards digital currency for solving hash algorithms. Which of the following was MOST likely used to compromise the server?

Options:

A.

Keylogger

B.

Ransomware

C.

Boot sector virus

D.

Cryptomining malware

Buy Now
Questions 171

A technician downloaded a software program to a network share. When the technician attempts to copy the program to the Windows tablet for installation, the technician receives an error. Which of the following is the best procedure for the technician to use to complete the assignment?

    Copy the program file to a USB drive and install.

Options:

A.

Burn the program file to a CD and install.

B.

Format the HDD and then do the installation.

C.

Replace the HDD and then do the installation.

Buy Now
Questions 172

A company recently experienced a security incident in which a USB drive containing malicious software was able to covertly install malware on a workstation. Which of the following actions should be taken to prevent this incident from happening again? (Select two).

Options:

A.

Install a host-based IDS.

B.

Restrict log-in times.

C.

Enable a BIOS password.

D.

Update the password complexity.

E.

Disable AutoRun.

F.

Update the antivirus definitions.

G.

Restrict user permissions.

Buy Now
Questions 173

A company is experiencing a ODDS attack. Several internal workstations are the source of the traffic Which of the following types of infections are the workstations most likely experiencing? (Select two)

Options:

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomvvare

F.

Spyware

Buy Now
Questions 174

A remote user is experiencing issues connecting to a corporate email account on a laptop. The user clicks the internet connection icon and does not recognize the connected Wi-Fi. The help desk technician, who is troubleshooting the issue, assumes this is a rogue access point. Which of the following is the first action the technician should take?

Options:

A.

Restart the wireless adapter.

B.

Launch the browser to see if it redirects to an unknown site.

C.

Instruct the user to disconnect the Wi-Fi.

D.

Instruct the user to run the installed antivirus software.

Buy Now
Questions 175

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 176

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Options:

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Buy Now
Questions 177

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Buy Now
Questions 178

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

Options:

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Buy Now
Questions 179

A systems administrator is tasked with configuring desktop systems to use a new proxy server that the organization has added to provide content filtering. Which of the following Windows utilities is the best choice for accessing the necessary configuration to complete this goal?

Options:

A.

Security and Maintenance

B.

Network and Sharing Center

C.

Windows Defender Firewall

D.

Internet Options

Buy Now
Questions 180

Every time a user tries to open the organization's proprietary application on an Android tablet, the application immediately closes. Other applications are operating normally. Which of the following troubleshooting actions would MOST likely resolve the Issue? (Select TWO).

Options:

A.

Uninstalling the application

B.

Gaining root access to the tablet

C.

Resetting the web browser cache

D.

Deleting the application cache

E.

Clearing the application storage

F.

Disabling mobile device management

Buy Now
Questions 181

A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?

Options:

A.

DNS

B.

IPS

C.

VPN

D.

SSH

Buy Now
Questions 182

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Buy Now
Questions 183

A user's company phone was stolen. Which of the following should a technician do next?

Options:

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Buy Now
Questions 184

A user's corporate laptop with proprietary work Information was stolen from a coffee shop. The user togged in to the laptop with a simple password. and no other security mechanisms were in place. Which of the following would MOST likely prevent the stored data from being recovered?

Options:

A.

Biometrics

B.

Full disk encryption

C.

Enforced strong system password

D.

Two-factor authentication

Buy Now
Questions 185

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

Options:

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

Buy Now
Questions 186

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

Options:

A.

AAA

B.

SSH

C.

RDP

D.

VPN

Buy Now
Questions 187

A technician is installing RAM in a new workstation and needs to protect against electrostatic discharge. Which of the following will best resolve this concern?

Options:

A.

Battery backup

B.

Thermal paste

C.

ESD strap

D.

Consistent power

Buy Now
Questions 188

A remote user is having issues accessing an online share. Which of the following tools would MOST likely be used to troubleshoot the Issue?

Options:

A.

Screen-sharing software

B.

Secure shell

C.

Virtual private network

D.

File transfer software

Buy Now
Questions 189

A salesperson's computer is unable to print any orders on a local printer that is connected to the computer Which of the following tools should the salesperson use to restart the print spooler?

Options:

A.

Control Panel

B.

Processes

C.

Startup

D.

Services

Buy Now
Questions 190

A remote user is experiencing issues with Outlook settings and asks a technician to review the settings. Which of the following can the technician use to access the user's computer remotely?

Options:

A.

VPN

B.

RDP

C.

RMM

D.

SSH

Buy Now
Questions 191

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 192

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Buy Now
Questions 193

Which of the following common security vulnerabilities can be mitigated by using input validation?

Options:

A.

Brute-force attack

B.

Cross-site scripting

C.

SQL injection

D.

Cross-site request forgery

Buy Now
Questions 194

A technician is finalizing a new workstation for a user. The user's PC will be connected to the internet but will not require the same private address each time. Which of the following protocols will the technician MOST likely utilize?

Options:

A.

DHCP

B.

SMTP

C.

DNS

D.

RDP

Buy Now
Questions 195

A user needs assistance installing software on a Windows PC but will not be in the office. Which of the following solutions would a technician MOST likely use to assist the user without having to install additional software?

Options:

A.

VPN

B.

MSRA

C.

SSH

D.

RDP

Buy Now
Questions 196

A technician is troubleshooting an issue with a computer that contains sensitive information. The technician determines the computer needs to be taken off site for repair. Which of the following should the technician do NEXT?

Options:

A.

Remove the HDD and then send the computer for repair.

B.

Check corporate polices for guidance.

C.

Delete the sensitive information before the computer leaves the building.

D.

Get authorization from the manager.

Buy Now
Questions 197

A new employee was hired recently. Which of the following documents will the new employee need to sign before being granted login access to the network?

Options:

A.

MSDS

B.

EULA

C.

UAC

D.

AUP

Buy Now
Questions 198

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

Buy Now
Questions 199

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Buy Now
Questions 200

Which of the following only has a web browser interface?

Options:

A.

Linux

B.

Microsoft Windows

C.

iOS

D.

Chromium

Buy Now
Questions 201

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

Options:

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

Buy Now
Questions 202

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 203

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 204

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Buy Now
Questions 205

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Buy Now
Questions 206

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Buy Now
Questions 207

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 208

A user updates a mobile device's OS. A frequently used application becomes consistently unresponsive immediately after the device is launched. Which of the following troubleshooting steps should the user perform FIRST?

Options:

A.

Delete the application's cache.

B.

Check for application updates.

C.

Roll back the OS update.

D.

Uninstall and reinstall the application.

Buy Now
Questions 209

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Buy Now
Questions 210

Which of the following is used as a password manager in the macOS?

Options:

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Buy Now
Questions 211

A technician is working on a way to register all employee badges and associated computer IDs. Which of the following options should the technician use in order to achieve this objective?

Options:

A.

Database system

B.

Software management

C.

Active Directory description

D.

Infrastructure as a Service

Buy Now
Questions 212

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Buy Now
Questions 213

Which of the following is the proper way for a technician to dispose of used printer consumables?

Options:

A.

Proceed with the custom manufacturer's procedure.

B.

Proceed with the disposal of consumables in standard trash receptacles.

C.

Empty any residual ink or toner from consumables before disposing of them in a standard recycling bin.

D.

Proceed with the disposal of consumables in standard recycling bins.

Buy Now
Questions 214

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Buy Now
Questions 215

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

Options:

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

Buy Now
Questions 216

An employee calls the help desk regarding an issue with a laptop PC. After a Windows update, the user can no longer use certain locally attached devices, and a reboot has not fixed the issue. Which of the following should the

technician perform to fix the issue?

Options:

A.

Disable the Windows Update service.

B.

Check for updates.

C.

Restore hidden updates.

D.

Rollback updates.

Buy Now
Questions 217

A technician is preparing to remediate a Trojan virus that was found on a workstation. Which of the following steps should the technician complete BEFORE removing the virus?

Options:

A.

Disable System Restore.

B.

Schedule a malware scan.

C.

Educate the end user.

D.

Run Windows Update.

Buy Now
Questions 218

A user reports that the pages flash on the screen two or three times before finally staying open when attempting to access banking web pages. Which of the following troubleshooting steps should the technician perform NEXT to resolve the issue?

Options:

A.

Examine the antivirus logs.

B.

Verify the address bar URL.

C.

Test the internet connection speed.

D.

Check the web service status.

Buy Now
Questions 219

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Buy Now
Questions 220

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Buy Now
Questions 221

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Options:

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Buy Now
Questions 222

An organization implemented a method of wireless security that requires both a user and the user's computer to be in specific managed groups on the server in order to connect to Wi-Fi. Which of the following wireless security methods BEST describes what this organization implemented?

Options:

A.

TKIP

B.

RADIUS

C.

WPA2

D.

AES

Buy Now
Questions 223

A customer called the help desk to report that a machine that was recently updated is no longer working. The support technician checks the latest logs to see what updates were deployed, but nothing was

deployed in more than three weeks. Which of the following should the support technician do to BEST resolve the situation?

Options:

A.

Offer to wipe and reset the device for the customer.

B.

Advise that the help desk will investigate and follow up at a later date.

C.

Put the customer on hold and escalate the call to a manager.

D.

Use open-ended questions to further diagnose the issue.

Buy Now
Questions 224

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Buy Now
Questions 225

A company needs employees who work remotely to have secure access to the corporate intranet. Which of the following should the company implement?

Options:

A.

Password-protected Wi-Fi

B.

Port forwarding

C.

Virtual private network

D.

Perimeter network

Buy Now
Questions 226

A user calls the help desk to report that Windows installed updates on a laptop and rebooted overnight. When the laptop started up again, the touchpad was no longer working. The technician thinks the software that controls the touchpad might be the issue. Which of the following tools should the technician use to make adjustments?

Options:

A.

eventvwr.msc

B.

perfmon.msc

C.

gpedic.msc

D.

devmgmt.msc

Buy Now
Questions 227

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Buy Now
Questions 228

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 229

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

Options:

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Buy Now
Questions 230

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Buy Now
Questions 231

A user enabled a mobile device's screen lock function with pattern unlock. The user is concerned someone could access the mobile device by repeatedly attempting random patterns to unlock the device. Which of the following features BEST addresses the user's concern?

Options:

A.

Remote wipe

B.

Anti-maIware

C.

Device encryption

D.

Failed login restrictions

Buy Now
Questions 232

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

Options:

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Jun 28, 2025
Questions: 789

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now 220-1102 testing engine

PDF (Q&A)

$49.8  $124.49
buy now 220-1102 pdf