Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

Options:

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

Buy Now
Questions 5

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 6

A user is unable to access a website, which is widely used across the organization, and receives the following error message:

The security certificate presented by this website has expired or is not yet valid.

The technician confirms the website works when accessing it from another computer but not from the user's computer. Which of the following should the technician perform NEXT to troubleshoot the issue?

Options:

A.

Reboot the computer.

B.

Reinstall the OS.

C.

Configure a static 12

D.

Check the computer's date and time.

Buy Now
Questions 7

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Buy Now
Questions 8

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Buy Now
Questions 9

A Windows user recently replaced a computer The user can access the public internet on the computer; however, an internal site at https7/companyintranet.com:8888 is no longer loading. Which of the following should a technician adjust to resolve the issue?

Options:

A.

Default gateway settings

B.

DHCP settings

C.

IP address settings

D.

Firewall settings

E.

Antivirus settings

Buy Now
Questions 10

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

Options:

A.

Adjust the content filtering.

B.

Unmap port forwarding.

C.

Disable unused ports.

D.

Reduce the encryption strength

Buy Now
Questions 11

After a failed update, an application no longer launches and generates the following error message: Application needs to be repaired. Which of the following Windows 10 utilities should a technician use to address this concern?

Options:

A.

Device Manager

B.

Administrator Tools

C.

Programs and Features

D.

Recovery

Buy Now
Questions 12

Which of the following is the default GUI and file manager in macOS?

Options:

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Buy Now
Questions 13

A technician is installing a new business application on a user's desktop computer. The machine is running Windows 10 Enterprise 32-bit operating system. Which of the following files should the technician execute in order to complete the installation?

Options:

A.

Installer_x64.exe

B.

Installer_Files.zip

C.

Installer_32.msi

D.

Installer_x86.exe

E.

Installer_Win10Enterprise.dmg

Buy Now
Questions 14

Which of the following is an example of MFA?

Options:

A.

Fingerprint scan and retina scan

B.

Password and PIN

C.

Username and password

D.

Smart card and password

Buy Now
Questions 15

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

Options:

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

Buy Now
Questions 16

A company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

Options:

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

Buy Now
Questions 17

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 18

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

Options:

A.

Run an AV scan.

B.

Reinstall the operating system

C.

Install a software firewall.

D.

Perform a system restore.

E.

Comply with the on-screen instructions.

Buy Now
Questions 19

Which of the following items require special e-waste recycling? (Select two).

Options:

A.

Solid-state drive

B.

A/C adapter

C.

Surge protector

D.

Laptop battery

E.

CRT monitor

F.

Power supply

Buy Now
Questions 20

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Buy Now
Questions 21

A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?

Options:

A.

Cryptominers

B.

Rootkit

C.

Spear phishing

D.

Keylogger

Buy Now
Questions 22

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

Options:

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser

Buy Now
Questions 23

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

Options:

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Buy Now
Questions 24

A corporation purchased new computers for a school. The computers are the same make and model and need to have the standard image loaded. Which of the following orchestration tools should a desktop administrator use tor wide-scale deployment?

Options:

A.

USB drive

B.

DVD Installation media

C.

PXE boot

D.

Recovery partition

Buy Now
Questions 25

A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?

Options:

A.

Full

B.

Incremental

C.

Differential

D.

Synthetic

Buy Now
Questions 26

A technician downloads a validated security tool and notes the vendor hash of a58e87a2. When the download is complete, the technician again validates the hash, but the value returns as 2a876a7d3. Which of the following is the MOST likely cause of the issue?

Options:

A.

Private-browsing mode

B.

Invalid certificate

C.

Modified file

D.

Browser cache

Buy Now
Questions 27

Which of the following statements describes the purpose of scripting languages?

Options:

A.

To access the hardware of the computer it is running on

B.

To automate tasks and reduce the amount of manual labor

C.

To abstract the complexity of the computer system

D.

To compile the program into an executable file

Buy Now
Questions 28

A user's application is unresponsive. Which of the following Task Manager tabs will allow the user to address the situation?

Options:

A.

Startup

B.

Performance

C.

Application history

D.

Processes

Buy Now
Questions 29

An office is experiencing constant connection attempts to the corporate Wi-Fi. Which of the following should be disabled to mitigate connection attempts?

Options:

A.

SSID

B.

DHCP

C.

Firewall

D.

SSD

Buy Now
Questions 30

A user's permissions are limited to read on a shared network folder using NTFS security settings. Which of the following describes this type of security control?

Options:

A.

SMS

B.

MFA

C.

ACL

D.

MDM

Buy Now
Questions 31

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Buy Now
Questions 32

When visiting a particular website, a user receives a message stating, "Your connection is not private." Which of the following describes this issue?

Options:

A.

Certificate warning

B.

Malware

C.

JavaScript error

D.

Missing OS update

Buy Now
Questions 33

A technician needs to replace a PC's motherboard. The technician shuts down the PC. Which of the following steps should the technician take next?

Options:

A.

Turn off the monitor.

B.

Remove the power cord.

C.

Remove the PSU.

D.

Remove the RAM modules.

Buy Now
Questions 34

An organization is updating the monitors on kiosk machines. While performing the upgrade, the organization would like to remove physical input devices. Which of the following utilities in the Control Panel can be used to turn on the on-screen keyboard to replace the physical input devices?

Options:

A.

Devices and Printers

B.

Ease of Access

C.

Programs and Features

D.

Device Manager

Buy Now
Questions 35

A user reports seeing random, seemingly non-malicious advertisement notifications in the Windows 10 Action Center. The notifications indicate the advertisements are coming from a web browser. Which of the following is the best solution for a technician to implement?

Options:

A.

Disable the browser from sending notifications to the Action Center.

B.

Run a full antivirus scan on the computer.

C.

Disable all Action Center notifications.

D.

Move specific site notifications from Allowed to Block.

Buy Now
Questions 36

Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?

Options:

A.

gpedit.msc

B.

perfmon.msc

C.

devmgmt.msc

Buy Now
Questions 37

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Buy Now
Questions 38

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

220-1102 Question 38

220-1102 Question 38

220-1102 Question 38

220-1102 Question 38

220-1102 Question 38

220-1102 Question 38

Options:

Buy Now
Questions 39

A technician is investigating an employee's smartphone that has the following symptoms

• The device is hot even when it is not in use.

•Applications crash, especially when others are launched.

• Certain applications, such as GPS, are in portrait mode when they should be in landscape mode.

Which of the following can the technician do to MOST likely resolve these issues with minimal impact? (Select TWO).

Options:

A.

Turn on autorotation

B.

Activate airplane mode.

C.

Close unnecessary applications

D.

Perform a factory reset

E.

Update the device's operating system

F.

Reinstall the applications that have crashed.

Buy Now
Questions 40

A company is recycling old hard drives and wants to quickly reprovision the drives for reuse. Which of the following data destruction methods should the company use?

Options:

A.

Degaussing

B.

Standard formatting

C.

Low-level wiping

D.

Deleting

Buy Now
Questions 41

A Linux technician needs a filesystem type that meets the following requirements:

. All changes are tracked.

. The possibility of file corruption is reduced.

· Data recovery is easy.

Which of the following filesystem types best meets these requirements?

Options:

A.

ext3

B.

FAT32

C.

exFAT

D.

NTFS

Buy Now
Questions 42

A customer, whose smartphone's screen was recently repaired, reports that the device has no internet access through Wi-Fi. The device shows that it is connected to Wi-Fi, has an address of 192.168.1.42. and has no subnet mask. Which of the following should the technician check next?

Options:

A.

Internal antenna connections

B.

Static IP settings

C.

Airplane mode

D.

Digitizer calibration

Buy Now
Questions 43

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?

Options:

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Buy Now
Questions 44

A customer who uses a Linux OS called the help desk to request assistance in locating a missing file. The customer does not know the exact name of the file but can provide a partial file name. Which of the following tools should the technician use? (Select two).

Options:

A.

cat

B.

df

C.

grep

D.

ps

E.

dig

F.

find

G.

top

Buy Now
Questions 45

A user recently downloaded a free game application on an Android device. The device then began crashing frequently and quickly losing its battery charge. Which of the following should the technician recommend be done first to remediate these issues? (Select two).

Options:

A.

Uninstall the game application.

B.

Perform a factory reset of the device.

C.

Connect the device to an external charger.

D.

Install the latest security patches.

E.

Clear the application's cache.

F.

Enable the device's built-in anti-malware protection.

Buy Now
Questions 46

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Buy Now
Questions 47

A payroll workstation has data on it that needs to be readily available and can be recovered quickly if something is accidentally removed. Which of the following backup methods should be used to provide fast data recovery in this situation?

Options:

A.

Full

B.

Differential

C.

Synthetic

D.

Incremental

Buy Now
Questions 48

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Buy Now
Questions 49

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 50

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen Immediately before network use is authorized?

Options:

A.

Document the date and time of the change.

B.

Submit a change request form

C.

Determine the risk level of this change

D.

Request an unused IP address.

Buy Now
Questions 51

A user reported that a laptop's screen turns off very quickly after silting for a few moments and is also very dim when not plugged in to an outlet Everything else seems to be functioning normally. Which of the following Windows settings should be configured?

Options:

A.

Power Plans

B.

Hibernate

C.

Sleep/Suspend

D.

Screensaver

Buy Now
Questions 52

During an enterprise rollout of a new application, a technician needs to validate compliance with an application's EULA while also reducing the number of licenses to manage. Which of the following licenses would best accomplish this goal?

Options:

A.

Personal use license

B.

Corporate use license

C.

Open-source license

D.

Non-expiring license

Buy Now
Questions 53

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Buy Now
Questions 54

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

Options:

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

Buy Now
Questions 55

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Buy Now
Questions 56

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Buy Now
Questions 57

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

Options:

A.

Run an antivirus and enable encryption.

B.

Restore the defaults and reimage the corporate OS.

C.

Back up the files and do a system restore.

D.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 58

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Buy Now
Questions 59

A customer installed a new web browser from an unsolicited USB drive that the customer received in the mail. The browser is not working as expected, and internet searches are redirected to another site. Which of the following should the user do next after uninstalling the browser?

Options:

A.

Delete the browser cookies and history.

B.

Reset all browser settings.

C.

Change the browser default search engine.

D.

Install a trusted browser.

Buy Now
Questions 60

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

Options:

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

Buy Now
Questions 61

Which of the following is the best reason for sandbox testing in change management?

Options:

A.

To evaluate the change before deployment

B.

To obtain end-user acceptance

C.

To determine the affected systems

D.

To select a change owner

Buy Now
Questions 62

A technician is unable to access the internet or named network resources. The technician receives a valid IP address from the DHCP server and can ping the default gateway. Which of the following should the technician check next to resolve the issue?

Options:

A.

Verify the DNS server settings.

B.

Turn off the Windows firewall.

C.

Confirm the subnet mask is correct.

D.

Configure a static IP address.

Buy Now
Questions 63

A user contacts the help desk to request assistance with a program feature. The user is in a different building but on the same network as the help desk technician. Which of the following should the technician use to assist the user?

Options:

A.

AAA

B.

SSH

C.

RDP

D.

VPN

Buy Now
Questions 64

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 65

A PC is taking a long time to boot Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 66

A technician is upgrading the Microsoft Windows 10 OS. Which of the following are required for the technician to safely upgrade the OS? (Select two).

Options:

A.

Release notes

B.

Antivirus software

C.

Backup of critical data

D.

Device drivers

E.

Word processing software

F.

Safe boot mode

Buy Now
Questions 67

A user is unable to see transaction details on a website, and nothing happens when the user clicks the details button. Which of the following should the user do to fix this issue?

Options:

A.

Clear the browser cache.

B.

Disable the pop-up blocker.

C.

Configure private browsing.

D.

Verify valid certificates.

Buy Now
Questions 68

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Options:

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Buy Now
Questions 69

Which of the following Windows 10 editions is the most appropriate for a single user who wants to encrypt a hard drive with BitLocker?

Options:

A.

Professional

B.

Home

C.

Enterprise

D.

Embedded

Buy Now
Questions 70

Which of the following languages is used for scripting the creation of Active Directory accounts?

Options:

A.

Bash

B.

Structured Query Language

C.

Hypertext Preprocessor

D.

PowerShell

Buy Now
Questions 71

Which of the following language types enables the automation of tasks?

Options:

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Buy Now
Questions 72

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.

Move the application to the desktop and press delete

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Buy Now
Questions 73

A user clicked a link in an email, and now the cursor is moving around on its own. A technician notices that File Explorer is open and data is being copied from the local drive to an unknown cloud storage location. Which of the following should the technician do first?

Options:

A.

Investigate the reported symptoms.

B.

Run anti-malware software.

C.

Educate the user about dangerous links.

D.

Quarantine the workstation.

Buy Now
Questions 74

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

Options:

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Buy Now
Questions 75

A technician needs to strengthen security controls against brute-force attacks. Which of the following options best meets this requirement?

Options:

A.

Multifactor authentication

B.

Encryption

C.

Increased password complexity

D.

Secure password vault

Buy Now
Questions 76

Which of the following involves sending arbitrary characters in a web page request?

Options:

A.

SMS

B.

SSL

C.

XSS

D.

VPN

Buy Now
Questions 77

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

Options:

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

Buy Now
Questions 78

A user wants to back up a Windows 10 device. Which of the following should the user select?

Options:

A.

Devices and Printers

B.

Email and Accounts

C.

Update and Security

D.

Apps and Features

Buy Now
Questions 79

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

Options:

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Buy Now
Questions 80

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 81

The courts determined that a cybercrimes case could no longer be prosecuted due to the agency's handling of evidence. Which of the following was MOST likely violated during the investigation?

Options:

A.

Open-source software

B.

EULA

C.

Chain of custody

D.

AUP

Buy Now
Questions 82

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

Options:

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Buy Now
Questions 83

A customer recently experienced a power outage at a SOHO. The customer does not think the components are connected properly. A print job continued running for several minutes after the power failed, but the customer was not able to interact with the computer. Once the UPS stopped beeping, all functioning devices also turned off. In case of a future power failure, the customer wants to have the most time available to save cloud documents and shut down the computer without losing any data.

220-1102 Question 83

Options:

Buy Now
Questions 84

A small business owner wants to install newly purchased software on all networked PCs. The network is not configured as a domain, and the owner wants to use the easiest method possible. Which of the following is the MOST deficient way lor the owner to install the application?

Options:

A.

Use a network share to share the installation files.

B.

Save software to an external hard drive to install.

C.

Create an imaging USB for each PC.

D.

Install the software from the vendor's website

Buy Now
Questions 85

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 86

A company has just refreshed several desktop PCs. The hard drives contain PII. Which of the following is the BEST method to dispose of the drives?

Options:

A.

Drilling

B.

Degaussing

C.

Low-level formatting

D.

Erasing/wiping

Buy Now
Questions 87

A macOS user needs to create another virtual desktop space. Which of the following applications will allow the user to accomplish this task?

Options:

A.

Dock

B.

Spotlight

C.

Mission Control

D.

Launchpad

Buy Now
Questions 88

A junior administrator is responsible for deploying software to a large group of computers in an organization. The administrator finds a script on a popular coding website to automate this distribution but does not understand the scripting language. Which of the following BEST describes the risks in running this script?

Options:

A.

The instructions from the software company are not being followed.

B.

Security controls will treat automated deployments as malware.

C.

The deployment script is performing unknown actions.

D.

Copying scripts off the internet is considered plagiarism.

Buy Now
Questions 89

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Buy Now
Questions 90

A technician is partitioning a hard disk. The five primary partitions should contain 4TB of free space. Which of the following partition styles should the technician use to partition the device?

Options:

A.

EFS

B.

GPT

C.

MBR

D.

FAT32

Buy Now
Questions 91

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Buy Now
Questions 92

A technician is hardening a company file server and needs to prevent unauthorized LAN devices from accessing stored files. Which of the following should the technician use?

Options:

A.

Software firewall

B.

Password complexity

C.

Antivirus application

D.

Anti-malware scans

Buy Now
Questions 93

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

Options:

A.

Do not notify the customer if arriving before the customer.

B.

Dismiss the customer and proceed with the after-hours work.

C.

Contact the customer if the technician is arriving late.

D.

Disclose the experience via social media.

Buy Now
Questions 94

A management team at a small office wants to block access to inappropriate websites and create a log of these access attempts. Which of the following is a way to meet these requirements?

Options:

A.

Content filter

B.

Screened subnet

C.

Port forwarding

D.

Access control list

Buy Now
Questions 95

An IT technician is attempting to access a user's workstation on the corporate network but needs more information from the user before an invitation can be sent. Which of the following command-line tools should the technician instruct the user to run?

Options:

A.

nslookup

B.

tracert

C.

hostname

D.

gpresult

Buy Now
Questions 96

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Buy Now
Questions 97

A user is unable to access a remote server from a corporate desktop computer using the appropriate terminal emulation program. The user contacts the help desk to report the issue. Which of the following clarifying questions would be most effective for the help desk technician to ask the user in order to understand the issue?

Options:

A.

What is the error message?

B.

Does the program work on another computer?

C.

Did the program ever work?

D.

Is anyone else having this issue?

Buy Now
Questions 98

A change advisory board authorized a setting change so a technician is permitted to Implement the change. The technician successfully implemented the change. Which of the following should be done next?

Options:

A.

Document the date and time of change

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document the findings of the sandbox test,

Buy Now
Questions 99

A technician removed a virus from a user's device. The user returned the device a week later with the same virus on it. Which of the following should the technician do to prevent future infections?

Options:

A.

Disable System Restore.

B.

Educate the end user.

C.

Install the latest OS patches.

D.

Clean the environment reinstallation.

Buy Now
Questions 100

A technician is setting up a newly built computer. Which of the following is the fastest way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 101

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Buy Now
Questions 102

A user installed a new computer game. Upon starting the game, the user notices the frame rates are low. Which of the following should the user upgrade to resolve the issue?

Options:

A.

Hard drive

B.

Graphics card

C.

Random-access memory

D.

Monitor

Buy Now
Questions 103

Which of The following refers to the steps to be taken if an Issue occurs during a change Implementation?

Options:

A.

Testing

B.

Rollback

C.

Risk

D.

Acceptance

Buy Now
Questions 104

A company discovered that numerous computers from multiple geographic locations are sending a very high number of connection requests which is causing the company’s web server to become unavailable to the general public. Which of the following attacks is occurring?

Options:

A.

Zero day

B.

SOL injection

C.

Cross-site scripting

D.

Distributed denial of service

Buy Now
Questions 105

A user installed a new application that automatically starts each time the user logs in to a Windows 10 system. The user does not want this to happen and has asked for this setting to be changed. Which of the following tools would the technician MOST likely use to safely make this change?

Options:

A.

Registry Editor

B.

Task Manager

C.

Event Viewer

D.

Local Users and Groups

Buy Now
Questions 106

Which of the following should be used to control security settings on an Android phone in a domain environment?

Options:

A.

MDM

B.

MFA

C.

ACL

D.

SMS

Buy Now
Questions 107

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Buy Now
Questions 108

A Windows user reported that a pop-up indicated a security issue. During inspection, an antivirus system identified malware from a recent download, but it was unable to remove the malware. Which of the following actions would be BEST to remove the malware while also preserving the user's files?

Options:

A.

Run the virus scanner in an administrative mode.

B.

Reinstall the operating system.

C.

Reboot the system in safe mode and rescan.

D.

Manually delete the infected files.

Buy Now
Questions 109

Antivirus software indicates that a workstation is infected with ransomware that cannot be quarantined. Which of the following should be performed FIRST to prevent further damage to the host and other systems?

Options:

A.

Power off the machine.

B.

Run a full antivirus scan.

C.

Remove the LAN card.

D.

Install a different endpoint solution.

Buy Now
Questions 110

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

Options:

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

Buy Now
Questions 111

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material .

C.

Adhere to user privacy policy

D.

Set and meet timelines

Buy Now
Questions 112

Which of the following change management documents includes how to uninstall a patch?

Options:

A.

Purpose of change

B.

Rollback plan

C.

Scope of change

D.

Risk analysis

Buy Now
Questions 113

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

Options:

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Buy Now
Questions 114

A user's system is infected with malware. A technician updates the anti-malware software and runs a scan that removes the malware. After the user reboots the system, it once again becomes infected with malware. Which of the following will MOST likely help to permanently remove the malware?

Options:

A.

Enabling System Restore

B.

Educating the user

C.

Booting into safe mode

D.

Scheduling a scan

Buy Now
Questions 115

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Buy Now
Questions 116

A technician has been asked to set up a new wireless router with the best possible security. Which of the following should the technician implement?

Options:

A.

WPS

B.

TKIP

C.

WPA3

D.

WEP

Buy Now
Questions 117

A user turns on a new laptop and attempts to log in to specialized software, but receives a message stating that the address is already in use. The user logs on to the old desktop and receives the same message. A technician checks the account and sees a comment that the user requires a specifically allocated address before connecting to the software. Which of the following should the technician do to MOST likely resolve the issue?

Options:

A.

Bridge the LAN connection between the laptop and the desktop.

B.

Set the laptop configuration to DHCP to prevent conflicts.

C.

Remove the static IP configuration from the desktop.

D.

Replace the network card in the laptop, as it may be defective.

Buy Now
Questions 118

An organization's Chief Financial Officer (CFO) is concerned about losing access to very sensitive, legacy unmaintained PII on a workstation if a

ransomware outbreak occurs. The CFO has a regulatory requirement to retain this data for many years. Which of the following backup methods

would BEST meet the requirements?

Options:

A.

A daily, incremental backup that is saved to the corporate file server

B.

An additional, secondary hard drive in a mirrored RAID configuration

C.

A full backup of the data that is stored of site in cold storage

D.

Weekly, differential backups that are stored in a cloud-hosting provider

Buy Now
Questions 119

A user received the following error upon visiting a banking website:

The security presented by website was issued a different website' s address .

A technician should instruct the user to:

Options:

A.

clear the browser cache and contact the bank.

B.

close out of the site and contact the bank.

C.

continue to the site and contact the bank.

D.

update the browser and contact the bank.

Buy Now
Questions 120

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Options:

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Buy Now
Questions 121

A technician is attempting to mitigate micro power outages, which occur frequently within the area of operation. The outages are usually short, with the longest occurrence lasting five minutes. Which of the following should the technician use to mitigate this issue?

Options:

A.

Surge suppressor

B.

Battery backup

C.

CMOS battery

D.

Generator backup

Buy Now
Questions 122

A technician downloaded an OS installation file but is unable to run it. When the technician tries to open the file, a message indicates no software is installed to run this file. Which of the following should the technician do next to attempt to access the OS file?

Options:

A.

Request physical media

B.

Mount the ISO file.

C.

Install a third-party software.

D.

Download an appropriate 32-bit/64-bit OS file.

Buy Now
Questions 123

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Buy Now
Questions 124

A user wants to back up a device's OS and data. Which of the following is the best way to accomplish this task?

Options:

A.

Incremental backup

B.

System image

C.

System restore point

D.

Differential backup

Buy Now
Questions 125

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Buy Now
Questions 126

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Buy Now
Questions 127

A user's company phone has several pending software updates. A technician completes the following steps:

•Rebooted the phone

•Connected to Wi-Fi

•Disabled metered data

Which of the following should the technician do next?

Options:

A.

Restore the factory settings.

B.

Clean the browser history.

C.

Uninstall and reinstall the applications.

D.

Clear the cache.

Buy Now
Questions 128

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 129

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

Options:

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Buy Now
Questions 130

A user's work PC has been the target of multiple phishing attacks. Which of the following is a way for the user to prevent further attacks?

Options:

A.

Enabling Windows Firewall

B.

Activating the email spam filter

C.

Using a secure VPN connection

D.

Running vulnerability scans on a schedule

Buy Now
Questions 131

A user is experiencing the following issues with Bluetooth on a smartphone:

•The user cannot hear any sound from a speaker paired with the smartphone.

•The user is having issues synchronizing data from their smart watch, which is also connected via Bluetooth.

A technician checked the Bluetooth settings, confirmed it is successfully paired with a speaker, and adjusted the volume levels, but still could not hear anything. Which of the following steps should the technician take next to troubleshoot the Bluetooth issues?

Options:

A.

Restart the smartphone.

B.

Reset the network settings.

C.

Unpair the Bluetooth speaker.

D.

Check for system updates.

Buy Now
Questions 132

A technician is troubleshooting a Windows 10 PC that has experienced a BSOD. The user recently installed optional Windows updates. Which of the following is best way to resolve the issue?

Options:

A.

Enable System Restore.

B.

Roll back the device drivers.

C.

Reinstall the OS.

D.

Update the BIOS.

Buy Now
Questions 133

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 134

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Buy Now
Questions 135

Which of the following operating systems was the app file type designed to run under as an application file bundle?

Options:

A.

macOS

B.

Chrome

C.

Windows

D.

Linux

Buy Now
Questions 136

A user's computer is running slower than usual and takes a long time to start up. Which of the following tools should the technician use first to investigate the issue?

Options:

A.

Action Center

B.

Task Manager

C.

Resource Monitor

D.

Security Configuration Wizard

E.

Event Viewer

Buy Now
Questions 137

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Buy Now
Questions 138

Which of the following is a proprietary Cisco AAA protocol?

Options:

A.

TKIP

B.

AES

C.

RADIUS

D.

TACACS+

Buy Now
Questions 139

Following the latest Windows update PDF files are opening in Microsoft Edge instead of Adobe Reader. Which of the following utilities should be used to ensure all PDF files open in Adobe Reader?

Options:

A.

Network and Sharing Center

B.

Programs and Features

C.

Default Apps

D.

Add or Remove Programs

Buy Now
Questions 140

Welcome to your first day as a Fictional Company. LLC helpdesk employee. Please work the tickets in your helpdesk ticket queue.

Click on individual tickers to see the ticket details. View attachments to determine the problem.

Select the appropriate issue from the 'issue' drop-down menu. Then, select the MOST efficient resolution from the 'Resolution' drop-down menu. Finally, select the proper command or verification to remediate or confirm your fix of the issue from the Verify Resolve drop-down menu.

220-1102 Question 140

220-1102 Question 140

220-1102 Question 140

Options:

Buy Now
Questions 141

A user attempts to open some files, but a message appears stating that the files are encrypted. The user was able to access these files before without receiving this message and no changes have been made within the company. Which of the following has infected the computer?

Options:

A.

Cryptominer

B.

Phishing

C.

Ransomware

D.

Keylogger

Buy Now
Questions 142

A technician needs to formal a USB drive to transfer 20GB of data from a Linux computer to a Windows computer. Which of the following filesystems will the technician MOST likely use?

Options:

A.

FAT32

B.

ext4

C.

NTFS

D.

exFAT

Buy Now
Questions 143

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

Options:

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

Buy Now
Questions 144

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

Options:

A.

WPA2 with TKIP

B.

WPA2 with AES

C.

WPA3withAES-256

D.

WPA3 with AES-128

Buy Now
Questions 145

A technician is working with a company to determine the best way to transfer sensitive personal information between offices when conducting business. The company currently uses USB drives and is resistant to change. The company's compliance officer states that all media at rest must be encrypted. Which of the following would be the BEST way to secure the current workflow?

Options:

A.

Deploy a secondary hard drive with encryption on the appropriate workstation

B.

Configure a hardened SFTP portal for file transfers between file servers

C.

Require files to be individually password protected with unique passwords

D.

Enable BitLocker To Go with a password that meets corporate requirements

Buy Now
Questions 146

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

Options:

A.

.deb

B.

.vbs

C.

.exe

D.

.app

Buy Now
Questions 147

A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following should the technician MOST likely have done to prevent damage?

Options:

A.

Removed all jewelry

B.

Completed an inventory of tools before use

C.

Practiced electrical fire safety

D.

Connected a proper ESD strap

Buy Now
Questions 148

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

Options:

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

Buy Now
Questions 149

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Buy Now
Questions 150

A user is configuring a new SOHO Wi-Fi router for the first time. Which of the following settings should the user change FIRST?

Options:

A.

Encryption

B.

Wi-Fi channel

C.

Default passwords

D.

Service set identifier

Buy Now
Questions 151

A technician needs to recommend the best backup method that will mitigate ransomware attacks. Only a few files are regularly modified, however, storage space is a concern. Which of the following backup methods would BEST address these concerns?

Options:

A.

Full

B.

Differential

C.

Off-site

D.

Grandfather-father-son

Buy Now
Questions 152

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.

Open Settings, select Accounts, select, Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Buy Now
Questions 153

A user reports a computer is running slow. Which of the following tools will help a technician identity the issued

Options:

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

Buy Now
Questions 154

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?

Options:

A.

End user acceptance

B.

Perform risk analysis

C.

Communicate to stakeholders

D.

Sandbox testing

Buy Now
Questions 155

Which of the following could be used to implement secure physical access to a data center?

Options:

A.

Geofence

B.

Alarm system

C.

Badge reader

D.

Motion sensor

Buy Now
Questions 156

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Buy Now
Questions 157

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

220-1102 Question 157

220-1102 Question 157

Which of the following should be done NEXT?

Options:

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Buy Now
Questions 158

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

Options:

A.

afc

B.

ehkdsk

C.

git clone

D.

zobocopy

Buy Now
Questions 159

A user corrects a laptop that is running Windows 10 to a docking station with external monitors when working at a desk. The user would like to close the laptop when it is docked, but the user reports it goes to sleep when it is closed. Which of the following is the BEST solution to prevent the laptop from going to sleep when it is closed and on the docking station?

Options:

A.

Within the Power Options of the Control Panel utility click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the Plugged In category to Never

B.

Within the Power Options of the Control Panel utility, click the Change Plan Settings button for the enabled power plan and select Put the Computer to Sleep under the On Battery category to Never

C.

Within the Power Options of the Control Panel utility select the option Choose When to Turn Off the Display and select Turn Off the Display under the Plugged In category to Never

D.

Within the Power Options of the Control Panel utility, select the option Choose What Closing the Lid Does and select When I Close the Lid under the Plugged in category to Do Nothing

Buy Now
Questions 160

A user's mobile phone has become sluggish A systems administrator discovered several malicious applications on the device and reset the phone. The administrator installed MDM software. Which of the following should the administrator do to help secure the device against this threat in the future? (Select TWO).

Options:

A.

Prevent a device root

B.

Disable biometric authentication

C.

Require a PIN on the unlock screen

D.

Enable developer mode

E.

Block a third-party application installation

F.

Prevent GPS spoofing

Buy Now
Questions 161

A user's smartphone data usage is well above average. The user suspects an installed application is transmitting data in the background. The user would like to be alerted when an application attempts to communicate with the internet. Which of the following BEST addresses the user's concern?

Options:

A.

Operating system updates

B.

Remote wipe

C.

Antivirus

D.

Firewall

Buy Now
Questions 162

A technician suspects a rootkit has been installed and needs to be removed. Which of the following would BEST resolve the issue?

Options:

A.

Application updates

B.

Anti-malware software

C.

OS reinstallation

D.

File restore

Buy Now
Questions 163

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

220-1102 Question 163

Options:

Buy Now
Questions 164

A technician found that an employee is mining cryptocurrency on a work desktop. The company has decided that this action violates its guidelines. Which of the following should be updated to reflect this new requirement?

Options:

A.

MDM

B.

EULA

C.

IRP

D.

AUP

Buy Now
Questions 165

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Buy Now
Questions 166

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Buy Now
Questions 167

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?

Options:

A.

Pretexting

B.

Spoofing

C.

Vishing

D.

Scareware

Buy Now
Questions 168

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Buy Now
Questions 169

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

Options:

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

Buy Now
Questions 170

A user needs assistance changing the desktop wallpaper on a Windows 10 computer. Which of the following methods will enable the user to change the wallpaper using a Windows 10 Settings tool?

Options:

A.

Open Settings, select Accounts, select Your info, click Browse, and then locate and open the image the user wants to use as the wallpaper.

B.

Open Settings, select Personalization, click Browse, and then locate and open the image the user wants to use as the wallpaper.

C.

Open Settings, select System, select Display, click Browse, and then locate and open the image the user wants to use as the wallpaper.

D.

Open Settings, select Apps, select Apps & features, click Browse, and then locate and open the image the user wants to use as the wallpaper.

Buy Now
Questions 171

A user tries to access commonly used web pages but is redirected to unexpected websites. Clearing the web browser cache does not resolve the issue. Which of the following should a technician investigate NEXT to resolve the issue?

Options:

A.

Enable firewall ACLs.

B.

Examine the localhost file entries.

C.

Verify the routing tables.

D.

Update the antivirus definitions.

Buy Now
Questions 172

A user contacts a technician about an issue with a laptop. The user states applications open without being launched and the browser redirects when trying to go to certain websites. Which of the following is MOST likely the cause of the user's issue?

Options:

A.

Keylogger

B.

Cryptominers

C.

Virus

D.

Malware

Buy Now
Questions 173

A company implemented a BYOD policy and would like to reduce data disclosure caused by malware that may infect these devices. Which of the following should the company deploy to address these concerns?

Options:

A.

UAC

B.

MDM

C.

LDAP

D.

SSO

Buy Now
Questions 174

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Buy Now
Questions 175

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

Options:

A.

Rolling back video card drivers

B.

Restoring the PC to factory settings

C.

Repairing the Windows profile

D.

Reinstalling the Windows OS

Buy Now
Questions 176

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Buy Now
Questions 177

A technician is in the process of installing a new hard drive on a server but is called away to another task. The drive has been unpackaged and left on a desk. Which of the following should the technician perform before leaving?

Options:

A.

Ask coworkers to make sure no one touches the hard drive.

B.

Leave the hard drive on the table; it will be okay while the other task is completed.

C.

Place the hard drive in an antistatic bag and secure the area containing the hard drive.

D.

Connect an electrostatic discharge strap to the drive.

Buy Now
Questions 178

A user is trying to use a third-party USB adapter but is experiencing connection issues. Which of the following tools should the technician use to resolve this issue?

Options:

A.

taskschd.msc

B.

eventvwr.msc

C.

de vmgmt. msc

D.

diskmgmt.msc

Buy Now
Questions 179

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

Options:

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Buy Now
Questions 180

A user lost a company tablet that was used for customer intake at a doctor's office. Which of the following actions would BEST protect against unauthorized access of the data?

Options:

A.

Changing the office's Wi-Fi SSID and password

B.

Performing a remote wipe on the device

C.

Changing the user's password

D.

Enabling remote drive encryption

Buy Now
Questions 181

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Buy Now
Questions 182

A change advisory board authorized a setting change so a technician is permitted to implement the change. The technician successfully implemented the change. Which of the following should be done NEXT?

Options:

A.

Document the date and time of change.

B.

Document the purpose of the change.

C.

Document the risk level.

D.

Document findings of the sandbox test.

Buy Now
Questions 183

A technician is troubleshooting application crashes on a Windows workstation. Each time the workstation user tries to open a website in a browser, the following message is displayed:

crypt32.d11 is missing not found

Which of the following should the technician attempt FIRST?

Options:

A.

Rebuild Windows profiles.

B.

Reimage the workstation

C.

Roll back updates

D.

Perform a system file check

Buy Now
Questions 184

A user's corporate phone was stolen, and the device contains company trade secrets. Which of the following technologies should be implemented to mitigate this risk? (Select TWO).

Options:

A.

Remote wipe

B.

Firewall

C.

Device encryption

D.

Remote backup

E.

Antivirus

F.

Global Positioning System

Buy Now
Questions 185

A manager called the help desk to ask for assistance with creating a more secure environment for the finance department- which resides in a non-domain environment. Which of the following would be the BEST method to protect against unauthorized use?

Options:

A.

Implementing password expiration

B.

Restricting user permissions

C.

Using screen locks

D.

Disabling unnecessary services

Buy Now
Questions 186

A technician needs to provide recommendations about how to upgrade backup solutions for a site in an area that has frequent hurricanes and an unstable power grid. Which of the following should the technician recommend implementing?

Options:

A.

High availability

B.

Regionally diverse backups

C.

On-site backups

D.

Incremental backups

Buy Now
Questions 187

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Buy Now
Questions 188

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?

Options:

A.

Phishing

B.

Smishing

C.

Whaling

D.

Vishing

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Apr 23, 2024
Questions: 629

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now 220-1102 testing engine

PDF (Q&A)

$42  $104.99
buy now 220-1102 pdf