Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

220-1102 CompTIA A+ Certification Core 2 Exam Questions and Answers

Questions 4

A macOS user reports seeing a spinning round cursor on a program that appears to be frozen. Which of the following methods does the technician use to force the program to close in macOS?

Options:

A.

The technician presses the Ctrl+Alt+Del keys to open the Force Quit menu, selects the frozenapplication in the list, and clicks Force Quit.

B.

The technician clicks on the frozen application and presses and holds the Esc key on the keyboard for 10 seconds Which causes the application to force quit.

C.

The technician opens Finder, navigates to the Applications folder, locates the application that is frozen in the list, right-clicks on the application, and selects the Force Quit option.

D.

The technician opens the Apple icon menu, selects Force Quit, selects the frozen application in thelist, and clicks Force Quit.

Buy Now
Questions 5

A mobile phone user has downloaded a new payment application that allows payments to be made with a mobile device. The user attempts to use the device at a payment terminal but is unable to do so successfully. The user contacts a help desk technician to report the issue. Which of the following should the technician confirm NEXT as part of the troubleshooting process?

Options:

A.

If airplane mode is enabled

B.

If Bluetooth is disabled

C.

If NFC is enabled

D.

If WiFi is enabled

E.

If location services are disabled

Buy Now
Questions 6

A user created a file on a shared drive and wants to prevent its data from being accidentally deleted by others. Which of the following applications should the technician use to assist the user with hiding the file?

Options:

A.

Device Manager

B.

Indexing Options

C.

File Explorer

D.

Administrative Tools

Buy Now
Questions 7

A help desk team lead contacts a systems administrator because the technicians are unable to log in to a Linux server that is used to access tools. When the administrator tries to use remote desktop to log in to the server, the administrator sees the GUI is crashing. Which of the following methods can the administrator use to troubleshoot the server effectively?

Options:

A.

SFTP

B.

SSH

C.

VNC

D.

MSRA

Buy Now
Questions 8

A user is setting up a computer for the first time and would like to create a secondary login with permissions that are different than the primary login. The secondary login will need to be protected from certain content such as games and websites. Which of the following Windows settings should the user utilize to create the secondary login?

Options:

A.

Privacy

B.

Accounts

C.

Personalization

D.

Shared resources

Buy Now
Questions 9

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

Options:

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

Buy Now
Questions 10

A network administrator is deploying a client certificate to be used for Wi-Fi access for all devices in an organization. The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi.

B.

All Wi-Fi traffic will be encrypted in transit.

C.

Eavesdropping attempts will be prevented.

D.

Rogue access points will not connect.

Buy Now
Questions 11

A technician is setting up a new laptop for an employee who travels. Which of the following is the BEST security practice for this scenario?

Options:

A.

PIN-based login

B.

Quarterly password changes

C.

Hard drive encryption

D.

A physical laptop lock

Buy Now
Questions 12

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

Options:

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

Buy Now
Questions 13

Which of the following is a consequence of end-of-lite operating systems?

Options:

A.

Operating systems void the hardware warranty.

B.

Operating systems cease to function.

C.

Operating systems no longer receive updates.

D.

Operating systems are unable to migrate data to the new operating system.

Buy Now
Questions 14

A user submits a request to have a graphics application installed on a desktop When the technician attempts to install the application, the installation fails and the error message "Not compatible with OS' is displayed. Which of the following is the most likely reason for this error message?

Options:

A.

Thegraphics card driver needs to beupdated

B.

Theapplication installer is 64-bit.

C.

Theinstallation requires administrative rights.

D.

Thedisk space is inadequate.

Buy Now
Questions 15

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

Options:

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

Buy Now
Questions 16

An administrator has submitted a change request for an upcoming server deployment. Which of the following must be completed before the change can be approved?

Options:

A.

Risk analysis

B.

Sandbox testing

C.

End user acceptance

D.

Lessons learned

Buy Now
Questions 17

A user reports a PC is running slowly. The technician suspects high disk I/O. Which of the following should the technician perform NEXT?

Options:

A.

resmon_exe

B.

dfrgui_exe

C.

msinf032exe

D.

msconfig_exe

Buy Now
Questions 18

A developer is creating a shell script to automate basic tasks in Linux. Which of the following file types are supported by default?

Options:

A.

.py

B.

.js

C.

.vbs

D.

.sh

Buy Now
Questions 19

While assisting a customer with an issue, a support representative realizes the appointment is taking longer than expected and will cause the next customer meeting to be delayed by five minutes. Which of the following should the support representative do NEXT?

Options:

A.

Send a quick message regarding the delay to the next customer.

B.

Cut the current customer's lime short and rush to the next customer.

C.

Apologize to the next customer when arriving late.

D.

Arrive late to the next meeting without acknowledging the lime.

Buy Now
Questions 20

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?

Options:

A.

Escalate the ticket to Tier 2.

B.

Run a virus scan.

C.

Utilize a Windows restore point.

D.

Reimage the computer.

Buy Now
Questions 21

A call center handles inquiries into billing issues for multiple medical facilities. A security analyst notices that call center agents often walk away from their workstations, leaving patient data visible for anyone to see. Which of the following should a network administrator do to BEST prevent data theft within the call center?

Options:

A.

Encrypt the workstation hard drives.

B.

Lock the workstations after five minutes of inactivity.

C.

Install privacy screens.

D.

Log off the users when their workstations are not in use.

Buy Now
Questions 22

After a company installed a new SOHO router customers were unable to access the company-hosted public website. Which of the following will MOST likely allow customers to access the website?

Options:

A.

Port forwarding

B.

Firmware updates

C.

IP filtering

D.

Content filtering

Buy Now
Questions 23

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need?

Options:

A.

Guards

B.

Bollards

C.

Motion sensors

D.

Access control vestibule

Buy Now
Questions 24

A user is being directed by the help desk to look up a Windows PC's network name so the help desk can use a remote administration tool to assist the user. Which of the following commands would allow the user to give the technician the correct information? (Select TWO).

Options:

A.

ipconfig /all

B.

hostname

C.

netstat /?

D.

nslookup localhost

E.

arp —a

F.

ping:: 1

Buy Now
Questions 25

A technician needs to configure a computer for a user to work from home so the user can still securely access the user's shared files and corporate email. Which of the following tools would best accomplish this task?

Options:

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Buy Now
Questions 26

A workstation does not recognize a printer. However, the previous day. the printer successfully received a job from the workstation. Which of the following tools should a technician use to see what happened before the failure?

Options:

A.

Performance Monitor

B.

Devices and Printers

C.

Task Scheduler

D.

Event Viewer

Buy Now
Questions 27

A company wants to reduce the negative ecological impacts of its business and has decided to hire an e-waste company to dispose of equipment. Which of the following should the e-waste company provide the business7

Options:

A.

Non-disclosure agreement

B.

Certification of destruction

C.

Low-level formatting

D.

Shredding/drilling

Buy Now
Questions 28

A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?

Options:

A.

AES

B.

RADIUS

C.

TKIP

D.

WPA3

Buy Now
Questions 29

A user reports some single sign-on errors to a help desk technician. Currently, the user is able to sign in to the company's application portal but cannot access a specific SaaS-based tool. Which of the following would the technician most likely suggest as a next step?

Options:

A.

Reenroll the user's mobile device to be used as an MFA token.

B.

Use a private browsing window to avoid local session conflicts.

C.

Bypass single sign-on by directly authenticating to the application.

D.

Reset the device being used to factory defaults.

Buy Now
Questions 30

A security administrator teaches all of an organization's staff members to use BitLocker To Go. Which of the following best describes the reason for this training?

Options:

A.

To ensure that all removable media is password protected in case of loss or theft

B.

To enable Secure Boot and a BIOS-level password to prevent configuration changes

C.

To enforce VPN connectivity to be encrypted by hardware modules

D.

To configure all laptops to use the TPM as an encryption factor for hard drives

Buy Now
Questions 31

A desktop engineer is deploying a master image. Which of the following should the desktop engineer consider when building the master image? (Select TWO).

Options:

A.

Device drivers

B.

Keyboard backlight settings

C.

Installed application license keys

D.

Display orientation

E.

Target device power supply

F.

Disabling express charging

Buy Now
Questions 32

Which of the following often uses an SMS or third-party application as a secondary method to access a system?

Options:

A.

MFA

B.

WPA2

C.

AES

D.

RADIUS

Buy Now
Questions 33

A user’s Windows 10 workstation with an HDD is running really slowly. The user has opened, closed, and saved many large files over the past week. Which of the following tools should a technician use to remediate the issue?

Options:

A.

Disk Defragment

B.

Registry Editor

C.

System Information

D.

Disk Cleanup

Buy Now
Questions 34

A small-office customer needs three PCs to be configured in a network with no server. Which of the following network types is the customer's BEST choice for this environment?

Options:

A.

Workgroup network

B.

Public network

C.

Wide area network

D.

Domain network

Buy Now
Questions 35

A technician is trying to encrypt a single folder on a PC. Which of the following should the technician use to accomplish this task?

Options:

A.

FAT32

B.

exFAT

C.

BitLocker

D.

EFS

Buy Now
Questions 36

A user opened an infected email. A security administrator responded to the malicious event, successfully mitigated the situation, and returned the machine to service Which of the following needs to be completed before this event is considered closed?

Options:

A.

Acceptable use policy

B.

Incident report

C.

End user license agreement

D.

Standard operating procedures

Buy Now
Questions 37

A technician is troubleshooting a smartphone that is unable to download and install the latest OS update. The technician notices the device operates more slowly than expected, even after rebooting and closing all applications. Which of the following should the technician check next?

Options:

A.

Application permissions

B.

Available storage space

C.

Battery charge level

D.

Wi-Fi connection speed

Buy Now
Questions 38

A department manager submits a help desk ticket to request the migration of a printer's port utilization from USB to Ethernet so multiple users can access the printer. This will be a new network printer, thus a new IP address allocation is required. Which of the following should happen immediately before network use is authorized?

    Document the date and time of the change.

Options:

A.

Submit a change request form.

B.

Determine the risk level of this change.

C.

Request an unused IP address.

Buy Now
Questions 39

A technician just completed a Windows 10 installation on a PC that has a total of 16GB of RAM. The technician notices the Windows OS has only 4GB of RAM available for use. Which of the following explains why the OS can only access 46B of RAM?

Options:

A.

The UEFI settings need to be changed.

B.

The RAM has compatibility issues with Windows 10.

C.

Some of the RAM is defective.

D.

The newly installed OS is x86.

Buy Now
Questions 40

Which of the following command-line tools will delete a directory?

Options:

A.

md

B.

del

C.

dir

D.

rd

E.

cd

Buy Now
Questions 41

Which of the following is a data security standard for protecting credit cards?

Options:

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Buy Now
Questions 42

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

Options:

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

Buy Now
Questions 43

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?

Options:

A.

Security groups

B.

Access control list

C.

Group Policy

D.

Login script

Buy Now
Questions 44

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

Options:

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

Buy Now
Questions 45

Which of the following is an advantage of using WPA2 instead of WPA3?

Options:

A.

Connection security

B.

Encryption key length

C.

Device compatibility

D.

Offline decryption resistance

Buy Now
Questions 46

A user is unable to access files on a work PC after opening a text document. The text document was labeled "URGENT PLEASE READ.txt - In active folder, .txt file titled urgent please read". Which of the following should a support technician do FIRST?

Options:

A.

Quarantine the host in the antivirus system.

B.

Run antivirus scan tor malicious software.

C.

Investigate how malicious software was Installed.

D.

Reimage the computer.

Buy Now
Questions 47

A technician needs to add an individual as a local administrator on a Windows home PC. Which of the following utilities would the technician MOST likely use?

Options:

A.

Settings > Personalization

B.

Control Panel > Credential Manager

C.

Settings > Accounts > Family and Other Users

D.

Control Panel > Network and Sharing Center

Buy Now
Questions 48

The findings from a security audit indicate the risk of data loss from lost or stolen laptops is high. The company wants to reduce this risk with minimal impact to users who want to use their laptops when not on the network. Which of the following would BEST reduce this risk for Windows laptop users?

Options:

A.

Requiring strong passwords

B.

Disabling cached credentials

C.

Requiring MFA to sign on

D.

Enabling BitLocker on all hard drives

Buy Now
Questions 49

A technician has an external SSD. The technician needs to read and write to an external SSD on both Macs and Windows PCs. Which of the following filesystems is supported by both OS types?

Options:

A.

NTFS

B.

APFS

C.

ext4

D.

exFAT

Buy Now
Questions 50

A technician is troubleshooting an issue that requires a user profile to be rebuilt. The technician is unable to locate Local Users and Groups in the Mtv1C console. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.

Run the antivirus scan.

B.

Add the required snap-in.

C.

Restore the system backup

D.

use the administrator console.

Buy Now
Questions 51

A company is retiring old workstations and needs a certificate of destruction for all hard drives. Which of the following would be BEST to perform on the hard drives to ensure the data is unrecoverable? (Select TWO).

Options:

A.

Standard formatting

B.

Drilling

C.

Erasing

D.

Recycling

E.

Incinerating

F.

Low-level formatting

Buy Now
Questions 52

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the

available RAM?

Options:

A.

The system is missing updates.

B.

The systems utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates.

Buy Now
Questions 53

A technician is upgrading the backup system for documents at a high-volume law firm. The current backup system can retain no more than three versions of full backups before failing. The law firm is not concerned about restore times but asks the technician to retain more versions when possible. Which of the following backup methods should the technician MOST likely implement?

Options:

A.

Full

B.

Mirror

C.

Incremental

D.

Differential

Buy Now
Questions 54

Which of the following default system tools can be used in macOS to allow the technician to view the screen simultaneously with the user?

Options:

A.

Remote Assistance

B.

Remote Desktop Protocol

C.

Screen Sharing

D.

Virtual Network Computing

Buy Now
Questions 55

Which of the following options should MOST likely be considered when preserving data from a hard drive for forensic analysis? (Select TWO).

Options:

A.

Licensing agreements

B.

Chain of custody

C.

Incident management documentation

D.

Data integrity

E.

Material safety data sheet

F.

Retention requirements

Buy Now
Questions 56

A technician suspects the boot disk of a user's computer contains bad sectors. Which of the following should the technician verify in the command prompt to address the issue without making any changes?

Options:

A.

Run sfc / scannow on the drive as the administrator.

B.

Run clearnmgr on the drive as the administrator

C.

Run chkdsk on the drive as the administrator.

D.

Run dfrgui on the drive as the administrator.

Buy Now
Questions 57

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

Options:

A.

afc

B.

ehkdsk

C.

git clone

D.

zobocopy

Buy Now
Questions 58

A user is unable to log in to the domain with a desktop PC, but a laptop PC is working properly on the same network. A technician logs in lo the desktop PC with a local account but is unable to browse to the secure intranet site to get troubleshooting tools. Which of the following is the MOST likely cause of the issue?

Options:

A.

Time drift

B.

Dual in-line memory module failure

C.

Application crash

D.

Filesystem errors

Buy Now
Questions 59

A technician is configuring a new Windows laptop Corporate policy requires that mobile devices make use of full disk encryption at all limes Which of the following encryption solutions should the technician choose?

Options:

A.

Encrypting File System

B.

FileVault

C.

BitLocker

D.

Encrypted LVM

Buy Now
Questions 60

Which of the following must be maintained throughout the forensic evidence life cycle when dealing with a piece of evidence?

Options:

A.

Acceptable use

B.

Chain of custody

C.

Security policy

D.

Information management

Buy Now
Questions 61

A company is Issuing smartphones to employees and needs to ensure data is secure if the devices are lost or stolen. Which of the following provides the BEST solution?

Options:

A.

Anti-malware

B.

Remote wipe

C.

Locator applications

D.

Screen lock

Buy Now
Questions 62

Ann, a CEO, has purchased a new consumer-class tablet for personal use, but she is unable to connect it to the company’s wireless network. All the corporate laptops are connecting without issue. She has asked you to assist with getting the device online.

INSTRUCTIONS

Review the network diagrams and device configurations to determine the cause of the problem and resolve any discovered issues.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

220-1102 Question 62

Options:

Buy Now
Questions 63

All the desktop icons on a user's newly issued PC are very large. The user reports that the PC was working fine until a recent software patch was deployed. Which of the following would BEST resolve the issue?

Options:

A.

Rolling back video card drivers

B.

Restoring the PC to factory settings

C.

Repairing the Windows profile

D.

Reinstalling the Windows OS

Buy Now
Questions 64

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

Options:

A.

Manually configure an IP address, a subnet mask, and a default gateway.

B.

Connect to the vendor's network using a VPN.

C.

Change the network location to private.

D.

Configure MFA on the network.

Buy Now
Questions 65

An administrator needs to select a method to dispose of SSDs containing sensitive data. Which of the following are the most appropriate methods? (Select two).

Options:

A.

Degauss

B.

Delete

C.

Incinerate

D.

Recycle

E.

Format

F.

Shred

Buy Now
Questions 66

A network administrator wants to enforce a company's security policy that prohibits USB drives on user workstations. Which of the following commands should the administrator run on the users' workstations?

Options:

A.

diskpart

B.

chown

C.

gpupdate

D.

netstat

Buy Now
Questions 67

A user has been unable to receive emails or browse the internet from a smartphone while traveling. However, text messages and phone calls are working without issue. Which of the following should a support technician check FIRST?

Options:

A.

User account status

B.

Mobile OS version

C.

Data plan coverage

D.

Network traffic outages

Buy Now
Questions 68

An IT security team is implementing a new Group Policy that will return a computer to the login after three minutes. Which of the following BEST describes the change in policy?

Options:

A.

Login times

B.

Screen lock

C.

User permission

D.

Login lockout attempts

Buy Now
Questions 69

A user notices a small USB drive is attached to the user's computer after a new vendor visited the office. The technician notices two files named grabber.exe and output.txt. Which of the following attacks is MOST likely occurring?

Options:

A.

Trojan

B.

Rootkit

C.

Cryptominer

D.

Keylogger

Buy Now
Questions 70

An executive has contacted you through the help-desk chat support about an issue with a mobile device.

Assist the executive to help resolve the issue.

220-1102 Question 70

220-1102 Question 70

Which of the following should be done NEXT?

Options:

A.

Educate the user on the solution that was performed.

B.

Tell the user to take time to fix it themselves next time.

C.

Close the ticket out.

D.

Send an email to Telecom to inform them of the Issue and prevent reoccurrence.

Buy Now
Questions 71

A technician receives a ticket indicating the user cannot resolve external web pages However, specific IP addresses are working. Which of the following does the technician MOST likely need to change on the workstation to resolve the issue?

Options:

A.

Default gateway

B.

Host address

C.

Name server

D.

Subnet mask

Buy Now
Questions 72

A large company is selecting a new Windows operating system and needs to ensure it has built-in encryption and endpoint protection. Which of the following Windows versions will MOST likely be selected?

Options:

A.

Home

B.

Pro

C.

Pro for Workstations

D.

Enterprise

Buy Now
Questions 73

A technician is setting up a conference room computer with a script that boots the application on login. Which of the following would the technician use to accomplish this task? (Select TWO).

Options:

A.

File Explorer

B.

Startup Folder

C.

System Information

D.

Programs and Features

E.

Task Scheduler

F.

Device Manager

Buy Now
Questions 74

A technician is troubleshooting boot times for a user. The technician attempts to use MSConfig to see which programs are starting with the OS but receives a message that it can no longer be used to view startup items. Which of the following programs can the technician use to view startup items?

Options:

A.

msinfo32

B.

perfmon

C.

regedit

D.

taskmgr

Buy Now
Questions 75

A computer on a corporate network has a malware infection. Which of the following would be the BEST method for returning the computer to service?

Options:

A.

Scanning the system with a Linux live disc, flashing the BIOS, and then returning the computer to service

B.

Flashing the BIOS, reformatting the drive, and then reinstalling the OS

C.

Degaussing the hard drive, flashing the BIOS, and then reinstalling the OS

D.

Reinstalling the OS. flashing the BIOS, and then scanning with on-premises antivirus

Buy Now
Questions 76

A homeowner recently moved and requires a new router for the new ISP to function correctly. The internet service has been installed and has been confirmed as functional. Which of the following is the FIRST step the homeowner should take after installation of all relevant cabling and hardware?

Options:

A.

Convert the PC from a DHCP assignment to a static IP address.

B.

Run a speed test to ensure the advertised speeds are met.

C.

Test all network sharing and printing functionality the customer uses.

D.

Change the default passwords on new network devices.

Buy Now
Questions 77

A user added a second monitor and wants to extend the display to it. In which of the following Windows settings will the user MOST likely be able to make this change?

Options:

A.

System

B.

Devices

C.

Personalization

D.

Accessibility

Buy Now
Questions 78

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

Options:

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

Buy Now
Questions 79

Which of the following is MOST likely used to run .vbs files on Windows devices?

Options:

A.

winmgmt.exe

B.

powershell.exe

C.

cscript.exe

D.

explorer.exe

Buy Now
Questions 80

Which of the following is the default GUI and file manager in macOS?

Options:

A.

Disk Utility

B.

Finder

C.

Dock

D.

FileVault

Buy Now
Questions 81

Upon downloading a new ISO, an administrator is presented with the following string:

59d15a16ce90cBcc97fa7c211b767aB

Which of the following BEST describes the purpose of this string?

Options:

A.

XSS verification

B.

AES-256 verification

C.

Hash verification

D.

Digital signature verification

Buy Now
Questions 82

A systems administrator is setting up a Windows computer for a new user Corporate policy requires a least privilege environment. The user will need to access advanced features and configuration settings for several applications. Which of the following BEST describes the account access level the user will need?

Options:

A.

Power user account

B.

Standard account

C.

Guest account

D.

Administrator account

Buy Now
Questions 83

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password Which of the following BEST describes the security benefits realized after this deployment?

Options:

A.

Multifactor authentication will be forced for Wi-Fi

B.

All Wi-Fi traffic will be encrypted in transit

C.

Eavesdropping attempts will be prevented

D.

Rogue access points will not connect

Buy Now
Questions 84

A technician is troubleshooting a mobile device that was dropped. The technician finds that the screen (ails to rotate, even though the settings are correctly applied. Which of the following pieces of hardware should the technician replace to resolve the issue?

Options:

A.

LCD

B.

Battery

C.

Accelerometer

D.

Digitizer

Buy Now
Questions 85

A user is having phone issues after installing a new application that claims to optimize performance. The user downloaded the application directly from the vendor's website and is now experiencing high network utilization and is receiving repeated security warnings. Which of the following should the technician perform FIRST to mitigate the issue?

Options:

A.

Reset the phone to factory settings

B.

Uninstall the fraudulent application

C.

Increase the data plan limits

D.

Disable the mobile hotspot.

Buy Now
Questions 86

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

Options:

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

Buy Now
Questions 87

A technician wants to harden Windows workstations after a recent security audit indicated the company is vulnerable to brute-force attacks. Which of the following features should the technician implement to mitigate such attacks?

Options:

A.

System screen lock

B.

Failed log-in lockout

C.

Restricted user permissions

D.

Data-at-rest encryption

Buy Now
Questions 88

A help desk technician is troubleshooting a workstation in a SOHO environment that is running above normal system baselines. The technician discovers an unknown executable with a random string name running on the system. The technician terminates the process, and the system returns to normal operation. The technician thinks the issue was an infected file, but the antivirus is not detecting a threat. The technician is concerned other machines may be infected with this unknown virus. Which of the following is the MOST effective way to check other machines on the network for this unknown threat?

Options:

A.

Run a startup script that removes files by name.

B.

Provide a sample to the antivirus vendor.

C.

Manually check each machine.

D.

Monitor outbound network traffic.

Buy Now
Questions 89

A user reports that a workstation is operating sluggishly Several other users operate on the same workstation and have reported that the workstation is operating normally. The systems administrator has validated that the workstation functions normally. Which of the following steps should the systems administrator most likely attempt NEXT?

Options:

A.

Increase the paging file size

B.

Run the chkdsk command

C.

Rebuild the user's profile

D.

Add more system memory.

E.

Defragment the hard drive.

Buy Now
Questions 90

A user receives a notification indicating the antivirus protection on a company laptop is out of date. A technician is able to ping the user's laptop. The technician checks the antivirus parent servers and sees the latest signatures have been installed. The technician then checks the user's laptop and finds the antivirus engine and definitions are current. Which of the following has MOST likely occurred?

Options:

A.

Ransomware

B.

Failed OS updates

C.

Adware

D.

Missing system files

Buy Now
Questions 91

A user calls the help desk to report potential malware on a computer. The anomalous activity began after the user clicked a link to a free gift card in a recent email The technician asks the user to describe any unusual activity, such as slow performance, excessive pop-ups, and browser redirections. Which of the following should the technician do NEXT?

Options:

A.

Advise the user to run a complete system scan using the OS anti-malware application

B.

Guide the user to reboot the machine into safe mode and verify whether the anomalous activities are still present

C.

Have the user check for recently installed applications and outline those installed since the link in the email was clicked

D.

Instruct the user to disconnect the Ethernet connection to the corporate network.

Buy Now
Questions 92

A company needs to securely dispose of data stored on optical discs. Which of the following is the MOST effective method to accomplish this task?

Options:

A.

Degaussing

B.

Low-level formatting

C.

Recycling

D.

Shredding

Buy Now
Questions 93

A technician is troubleshooting a Windows system that is having issues with the OS loading at startup. Which of the following should the technician do to diagnose the issue?

Options:

A.

Enable boot logging on the system.

B.

Launch the last known-good configuration.

C.

Check the system resource usage in Task Manager.

D.

Run the sfc /scannow command.

E.

Use the Event Viewer to open the application log

Buy Now
Questions 94

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

Options:

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Buy Now
Questions 95

A technician is installing software on a user's workstation. The installation fails due to incompliance with the HCL. Which of the following components is most likely causing the installation to fail? (Select two).

Options:

A.

NIC

B.

CPU

C.

PSU

D.

KVM

E.

RAM

F.

DVI

Buy Now
Questions 96

A customer service representative is unable to send jobs to a printer at a remote branch office. However, the representative can print successfully to a local network printer. Which of the following commands should a technician use to view the path of the network traffic from the PC?

Options:

A.

netstat

B.

ping

C.

format

D.

tracert

Buy Now
Questions 97

Which of the following is the MOST cost-effective version of Windows 10 that allows remote access through Remote Desktop?

Options:

A.

Home

B.

Pro for Workstations

C.

Enterprise

D.

Pro

Buy Now
Questions 98

A technician needs to interconnect two offices to the main branch while complying with good practices and security standards. Which of the following should the technician implement?

Options:

A.

MSRA

B.

VNC

C.

VPN

D.

SSH

Buy Now
Questions 99

A technician is installing a new copy of Windows on all computers in the enterprise Given the following requirements:

• The install phase must be scripted to run over the network • Each computer requires a new SSD as the system drive, • The existing HDD should remain as a backup drive.

Which of the following command-line tools should the technician use to install the drive and transfer the installation files from the network share? (Select three).

Options:

A.

net use

B.

robocopy

C.

winver

D.

diskpart

E.

sfc

F.

r.etstat

G.

ping

Buy Now
Questions 100

Which of the following Wi-Fi protocols is the MOST secure?

Options:

A.

WPA3

B.

WPA-AES

C.

WEP

D.

WPA-TKIP

Buy Now
Questions 101

The command cac cor.ptia. txt was issued on a Linux terminal. Which of the following results should be expected?

Options:

A.

The contents of the text comptia.txt will be replaced with a new blank document

B.

The contents of the text comptia. txt would be displayed.

C.

The contents of the text comptia.txt would be categorized in alphabetical order.

D.

The contents of the text comptia. txt would be copied to another comptia. txt file

Buy Now
Questions 102

An organization wants to deploy a customizable operating system. Which of the following should the organization choose?

Options:

A.

Windows 10

B.

macOS

C.

Linux

D.

Chrome OS

E.

iOS

Buy Now
Questions 103

A technician needs to troubleshoot a user's computer while the user is connected to the system. The technician must also connect to the user's system using remote access tools built in to Windows Which of the following is the best option to troubleshoot the user's computer?

Options:

A.

Screen share

B.

MSRA

C.

Virtual network computer

D.

RDP

Buy Now
Questions 104

A technician has been unable to remediate a persistent malware infection on a user's workstation. After the technician reinstalled the OS. the malware infection returned later that day. Which of the following is the most likely source?

Options:

A.

Trojan

B.

Boot sector virus

C.

Spyware

D.

Rootkit

Buy Now
Questions 105

Which of the following best describes a rollback plan?

Options:

A.

A developer configures a process to return to the starting state upon completion.

B.

A user asks to remove an unneeded fileshare.

C.

An administrator applies new settings to a computer after the previous settings failed.

D.

A technician reverts the system to a previous state following a failed upgrade.

Buy Now
Questions 106

A technician is following the ticketing system’s best practices when handling user support requests. Which of the following should the technician do first when responding to a user support request that contains insufficient information?

Options:

A.

Ask the user for clarification.

B.

Keep the user updated on the progress.

C.

Document the root cause.

D.

Follow the system’s escalation process.

Buy Now
Questions 107

A technician is troubleshooting a user’s PC that is displaying pop-up windows, which are advertising free software downloads. When the technician tries to open a document, the system displays an error message that reads: Not enough memory to perform this operation. Which of the following should be the technician's next step to resolve this issue?

Options:

A.

Install antispyware

B.

Reimage the system

C.

Disable the pop-up blocker

D.

Upgrade the browser

E.

Install antivirus software

Buy Now
Questions 108

Which of the following language types enables the automation of tasks?

Options:

A.

Compiled

B.

Scripting

C.

Web

D.

Database

Buy Now
Questions 109

A technician is setting up a network printer for a customer who has a SOHO router. The technician wants to make sure the printer stays connected in the future and is available on all the computers in the house. Which of the following should the technician configure on the printer?

Options:

A.

DNS settings

B.

Static IP

C.

WWAN

D.

Meteredconnection

Buy Now
Questions 110

A technician is configuring a SOHO router and wants to only allow specific computers on the network. Which of the following should the technician do?

Options:

A.

Configure MAC filtering.

B.

Disable DHCP.

C.

Configure port forwarding.

D.

Disable guest access.

Buy Now
Questions 111

A technician is setting up a printer on a Linux workstation. Which of the following commands should the technician use to set the default printer?

Options:

A.

ipr

B.

Ispool

C.

Ipstat

D.

Ipoptions

Buy Now
Questions 112

Which of the following combinations meets the requirements for mobile device multifactor authentication?

Options:

A.

Password and PIN

B.

Password and swipe

C.

Fingerprint and password

D.

Swipe and PIN

Buy Now
Questions 113

A user reports being unable to access a sports team's website on an office computer. The administrator tells the user this blocked access is intentional and based on company guidelines. Which of the following is the administrator referring to?

Options:

A.

NDA

B.

AUP

C.

VPN

D.

SOP

Buy Now
Questions 114

A technician is doing a bare-metal installation of the Windows 10 operating system. Which of the following prerequisites must be in place before the technician can start the installation process?

Options:

A.

Internet connection

B.

Product key

C.

Sufficient storage space

D.

UEFI firmware

E.

Legacy BIOS

Buy Now
Questions 115

A technician is troubleshooting a user’s PC that is running slowly and displaying frequent pop-ups. The technician thinks malware may be causing the issues, but before the issues began the user installed anti-malware software in response to a pop-up window Which of the following is the most likely cause of these issues'?

Options:

A.

Expired certificate

B.

False alert

C.

Missing system files

D.

OS update failure

Buy Now
Questions 116

A user receives an error message on a Windows 10 device when trying to access a mapped drive from a Windows XP machine in the office. Other Windows XP devices in the office can access the drive. Which of the following Control Panel utilities should the user select to enable connectivity to the device?

Options:

A.

Devices and Printers

B.

Administrative Tools

C.

Network and Sharing Center

D.

Programs and Features

Buy Now
Questions 117

A company installed WAPs and deployed new laptops and docking stations to all employees. The docking stations are connected via LAN cables. Users are now reporting degraded network service. The IT department has determined that the WAP mesh network is experiencing a higher than anticipated amount of traffic. Which of the following would be the most efficient way to ensure the wireless network can support the expected number of wireless users?

Options:

A.

Replacing non-mobile users' laptops with wired desktop systems

B.

Increasing the wireless network adapter metric

C.

Adding wireless repeaters throughout the building

D.

Upgrading the current mesh network to support the 802.11 n specification

Buy Now
Questions 118

A technician needs to configure a computer for a user to work from home so the user can still securely access the user’s shared files and corporate email. Which of the following tools would best accomplish this task*?

Options:

A.

MSRA

B.

FTP

C.

RMM

D.

VPN

Buy Now
Questions 119

Multiple users are reporting audio issues as well as performance issues after downloading unauthorized software. You have been dispatched to identify and resolve any issues on the network using best practice procedures.

INSTRUCTIONS

Quarantine and configure the appropriate device(s) so that the users' audio issues are

resolved using best practice procedures.

Multiple devices may be selected for quarantine.

Click on a host or server to configure services.

220-1102 Question 119

220-1102 Question 119

220-1102 Question 119

220-1102 Question 119

220-1102 Question 119

220-1102 Question 119

Options:

Buy Now
Questions 120

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 121

A technician at a customer site is troubleshooting a laptop A software update needs to be downloaded but the company's proxy is blocking traffic to the update site. Which of the following should the technician perform?

Options:

A.

Change the DNS address to 1.1.1.1

B.

Update Group Policy

C.

Add the site to the client's exceptions list

D.

Verity the software license is current.

Buy Now
Questions 122

Users report having difficulty using the Windows Hello facial recognition feature. Which of the following is a secondary feature of Windows Hello that can be used to log in?

Options:

A.

Personal identification number

B.

Username/password

C.

One-time-use token

D.

Cryptographic device

Buy Now
Questions 123

A technician needs to recommend a way to keep company devices for field and home-based staff up to date. The users live in various places across the country and the company has several national offices that staff can go to for technical support Which of the following methods is most appropriate for the users?

Options:

A.

Make office attendance mandatory for one day per week so that updates can be installed.

B.

Ask users to ensure that they run updates on devices and reboot computers on a regular basis.

C.

Push updates out via VPN on a weekly basis in a staggered manner so that the network is not affected.

D.

Configure cloud-based endpoint management software to automatically manage computer updates.

Buy Now
Questions 124

A user is unable to start a computer following a failed Windows 10 update. When trying to start the computer, the user sees a blue screen of death. Which of the following steps should a technician take to diagnose the issue?

Options:

A.

Perform a safe mode boot.

B.

Run the System Restore wizard.

C.

Start the computer in the last known-good configuration.

D.

Reset the BIOS settinqs.

Buy Now
Questions 125

A company-owned mobile device is displaying a high number of ads, receiving data-usage limit notifications, and experiencing slow response. After checking the device, a technician notices the device has been jailbroken. Which of the following should the technician do next?

    Run an antivirus and enable encryption.

Options:

A.

Restore the defaults and reimage the corporate OS.

B.

Back up the files and do a system restore.

C.

Undo the jailbreak and enable an antivirus.

Buy Now
Questions 126

Which of the following statements describes the purpose of scripting languages?

    To access the hardware of the computer it is running on

Options:

A.

To automate tasks and reduce the amount of manual labor

B.

To abstract the complexity of the computer system

C.

To compile the program into an executable file

Buy Now
Questions 127

A systems administrator received a request to limit the amount of cellular data a user's Windows 10 tablet can utilize when traveling. Which of the following can the administrator do to best solve the user's issue?

Options:

A.

Turn on airplane mode.

B.

Set the connection to be metered.

C.

Configure the device to use a static IP address.

D.

Enable the Windows Defender Firewall.

Buy Now
Questions 128

A technician has verified that a user's computer has a virus and the antivirus software is out of date. Which of the following steps should the technician take next?

Options:

A.

Quarantine the computer.

B.

Use a previous restore point.

C.

Educate the end user about viruses.

D.

Download the latest virus definitions.

Buy Now
Questions 129

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

Options:

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Buy Now
Questions 130

An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published?

    Standard operating procedure

Options:

A.

Acceptable use policy

B.

Security protocols

C.

Data flow diagram

Buy Now
Questions 131

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

Options:

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Buy Now
Questions 132

A user's laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?

Options:

A.

Scan for malware and ransomware.

B.

Perform a system restore.

C.

Check the network utilization.

D.

Update the antivirus software.

Buy Now
Questions 133

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

Options:

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

Buy Now
Questions 134

A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer.

Which of the following security measures should the user take to ensure security and privacy?

Options:

A.

Only accept calls from known people.

B.

Disregard any suspicious emails.

C.

Update the antivirus software.

D.

Enable two-factor authentication.

E.

Install a malware scanner.

Buy Now
Questions 135

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

Options:

A.

.dmg

B.

. app

C.

. rpm

D.

.pkg

Buy Now
Questions 136

A user is trying to use proprietary software, but it crashes intermittently. The user notices that the desktop is displaying a "low memory" warning message. Upon restarting the desktop, the issue persists. Which of the following should a technician do next to troubleshoot the issue?

Options:

A.

Reimage the computer.

B.

Replace the system RAM.

C.

Reinstall and update the failing software.

D.

Decrease the page file size.

Buy Now
Questions 137

A user's iPhone was permanently locked after several failed log-in attempts. Which of the following authentication methods are needed to restore access, applications, and data to the device?

Options:

A.

Fingerprint and pattern

B.

Facial recognition and PIN code

C.

Primary account and password

D.

Recovery contact and recovery key

Buy Now
Questions 138

A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?

Options:

A.

VNC

B.

SSH

C.

VPN

D.

RMM

Buy Now
Questions 139

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

    Connect to the company's Wi-Fi network.

Options:

A.

Change the settings on the phone to connect to a different cellular tower.

B.

Install a cellular repeater at the office for this user.

C.

Update all applications on the phone.

Buy Now
Questions 140

A technician wants to mitigate unauthorized data access if a computer is lost or stolen. Which of the following features should the technician enable?

Options:

A.

Network share

B.

Group Policy

C.

BitLocker

D.

Static IP

Buy Now
Questions 141

A technician needs to reimage a desktop in an area without network access. Which of the following should the technician use? (Select two).

Options:

A.

USB

B.

PXE

C.

Optical media

D.

Partition

E.

Boot record

F.

SMB

Buy Now
Questions 142

Which of the following should be documented to ensure that the change management plan is followed?

Options:

A.

Scope of the change

B.

Purpose of the change

C.

Change rollback plan

D.

Change risk analysis

Buy Now
Questions 143

The calendar application on an employee's smartphone is experiencing frequent crashes, and the smartphone has become unresponsive. Which of the following should a technician do first to resolve the issue?

Options:

A.

Reinstall the application on the smartphone.

B.

Update the smartphone's OS.

C.

Reset the smartphone to factory settings.

D.

Reboot the smartphone.

Buy Now
Questions 144

Which of the following file extensions should a technician use for a PowerShell script?

Options:

A.

.ps1

B.

.py

C.

.sh

D.

.bat

E.

.cmd

Buy Now
Questions 145

A user recently purchased a second monitor and wants to extend the Windows desktop to the new screen. Which of the following Control Panel options should a technician adjust to help the user?

    Color Management

Options:

A.

System

B.

Troubleshooting

C.

Device Manager

D.

Administrative Tools

Buy Now
Questions 146

A technician is troubleshooting a customer's PC and receives a phone call. The technician does not take the call and sets the phone to silent. Which of the following BEST describes the technician's actions?

Options:

A.

Avoid distractions

B.

Deal appropriately with customer's confidential material

C.

Adhere to user privacy policy

D.

Set and meet timelines

Buy Now
Questions 147

When a user calls in to report an issue, a technician submits a ticket on the user's behalf. Which of the following practices should the technician use to make sure the ticket is associated with the correct user?

Options:

A.

Have the user provide a callback phone number to be added to the ticket

B.

Assign the ticket to the department's power user

C.

Register the ticket with a unique user identifier

D.

Provide the user with a unique ticket number that can be referenced on subsequent calls.

Buy Now
Questions 148

After clicking on a link in an email a Chief Financial Officer (CFO) received the following error:

220-1102 Question 148

The CFO then reported the incident to a technician. The link is purportedly to the organization's bank. Which of the following should the technician perform FIRST?

Options:

A.

Update the browser's CRLs

B.

File a trouble ticket with the bank.

C.

Contact the ISP to report the CFCs concern

D.

Instruct the CFO to exit the browser

Buy Now
Questions 149

An incident handler needs to preserve evidence for possible litigation. Which of the following will the incident handler MOST likely do to preserve the evidence?

Options:

A.

Encrypt the files

B.

Clone any impacted hard drives

C.

Contact the cyber insurance company

D.

Inform law enforcement

Buy Now
Questions 150

A computer technician is investigating a computer that is not booting. The user reports that the computer was working prior to shutting it down last night. The technician notices a removable USB device is inserted, and the user explains the device is a prize the user received in the mail yesterday. Which of the following types of attacks does this describe?

Options:

A.

Phishing

B.

Dumpster diving

C.

Tailgating

D.

Evil twin

Buy Now
Questions 151

A user has requested help setting up the fingerprint reader on a Windows 10 laptop. The laptop is equipped with a fingerprint reader and is joined to a domain Group Policy enables Windows Hello on all computers in the environment. Which of the following options describes how to set up Windows Hello Fingerprint for the user?

Options:

A.

Navigate to the Control Panel utility, select the Security and Maintenance submenu, select Change Security and Maintenance settings, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

B.

Navigate to the Windows 10 Settings menu, select the Accounts submenu, select Sign in options, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

C.

Navigate to the Windows 10 Settings menu, select the Update & Security submenu select Windows Security, select Windows Hello Fingerprint and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete

D.

Navigate to the Control Panel utility, select the Administrative Tools submenu, select the user account in the list, select Windows Hello Fingerprint, and have the user place a fingerprint on the fingerprint reader repeatedly until Windows indicates setup is complete.

Buy Now
Questions 152

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two).

    Install the latest GPU drivers.

Options:

A.

Reinstall the OS.

B.

Increase the RAM.

C.

Increase the hard drive space.

D.

Uninstall unnecessary software.

E.

Disable scheduled tasks.

Buy Now
Questions 153

An employee has repeatedly contacted a technician about malware infecting a work computer. The technician has removed the malware several times, but the user's PC keeps getting infected. Which of the following should the technician do to reduce the risk of future infections?

Options:

A.

Configure the firewall.

B.

Restore the system from backups.

C.

Educate the end user

D.

Update the antivirus program.

Buy Now
Questions 154

Which of the following are mobile operating systems used on smartphones? (Select two).

Options:

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

Buy Now
Questions 155

A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?

Options:

A.

ipconfig

B.

arp

C.

nslookup

D.

pathping

Buy Now
Questions 156

Which of the following is the best way to limit the loss of confidential data if an employee's company smartphone is lost or stolen?

Options:

A.

Installing a VPN

B.

Implementing location tracking

C.

Configuring remote wipe

D.

Enabling backups

Buy Now
Questions 157

A user requested that the file permissions on a Linux device be changed to only allow access to a certain group of users. Which of the following commands should be used to complete the user's request?

Options:

A.

cat

B.

chmod

C.

pwd

D.

cacls

Buy Now
Questions 158

A technician successfully removed malicious software from an infected computer after running updates and scheduled scans to mitigate future risks. Which of the following should the technician do next?

Options:

A.

Educate the end user on best practices for security.

B.

Quarantine the host in the antivirus system.

C.

Investigate how the system was infected with malware.

D.

Create a system restore point.

Buy Now
Questions 159

A technician is setting up a SOHO wireless router. The router is about ten years old. The customer would like the most secure wireless network possible. Which of the following should the technician configure?

Options:

A.

WPA2 with TKIP

B.

WPA2 with AES

C.

WPA3withAES-256

D.

WPA3 with AES-128

Buy Now
Questions 160

A technician is replacing the processor in a desktop computer prior to opening the computer, the technician wants to ensure the internal components are protected. Which of the following safety procedures would BEST protect the components in the PC? (Select TWO).

Options:

A.

Utilizing an ESD strap

B.

Disconnecting the computer from the power source

C.

Placing the PSU in an antistatic bag

D.

Ensuring proper ventilation

E.

Removing dust from the ventilation fans

F.

Ensuring equipment is grounded

Buy Now
Questions 161

A user's company phone was stolen. Which of the following should a technician do next?

Options:

A.

Perform a low-level format.

B.

Remotely wipe the device.

C.

Degauss the device.

D.

Provide the GPS location of the device.

Buy Now
Questions 162

A technician needs to remotely connect to a Linux desktop to assist a user with troubleshooting. The technician needs to make use of a tool natively designed for Linux. Which of the following tools will the technician MOST likely use?

Options:

A.

VNC

B.

MFA

C.

MSRA

D.

RDP

Buy Now
Questions 163

An engineer is configuring a new server that requires a bare-metal installation. Which of the following installation methods should the engineer use if installation media is not available on site?

Options:

A.

Image deployment

B.

Recovery partition installation

C.

Remote network installation

D.

Repair installation

Buy Now
Questions 164

As a corporate technician, you are asked to evaluate several suspect email messages on

a client's computer. Corporate policy requires he following:

. All phishing attempts must be reported.

. Future spam emails to users must be prevented.

INSTRUCTIONS

Review each email and perform the

following within the email:

. Classify the emails

. Identify suspicious items, if applicable, in each email

. Select the appropriate resolution

220-1102 Question 164

Options:

Buy Now
Questions 165

A technician is working on a Windows 10 PC that has unwanted applications starting on boot. Which of the following tools should the technician use to disable applications on startup?

Options:

A.

System Configuration

B.

Task Manager

C.

Performance Monitor

D.

Group Policy Editor

Buy Now
Questions 166

A technician sees a file that is requesting payment to a cryptocurrency address. Which of the following should the technician do first?

Options:

A.

Quarantine the computer.

B.

Disable System Restore.

C.

Update the antivirus software definitions.

D.

Boot to safe mode.

Buy Now
Questions 167

Which of the following would most likely be used to extend the life of a device?

Options:

A.

Battery backup

B.

Electrostatic discharge mat

C.

Proper ventilation

D.

Green disposal

Buy Now
Questions 168

Which of the following best describes when to use the YUM command in Linux?

Options:

A.

To add functionality

B.

To change folder permissions

C.

To show documentation

D.

To list file contents

Buy Now
Questions 169

Which of the following allows access to the command line in macOS?

Options:

A.

PsExec

B.

command.com

C.

Terminal

D.

CMD

Buy Now
Questions 170

A hard drive that previously contained PI I needs to be repurposed for a public access workstation. Which of the following data destruction methods should a technician use to ensure data is completely removed from the hard drive?

Options:

A.

Shredding

B.

Degaussing

C.

Low-level formatting

D.

Recycling

Buy Now
Questions 171

Which of the following would cause a corporate-owned iOS device to have an Activation Lock issue?

Options:

A.

A forgotten keychain password

B.

An employee's Apple ID used on the device

C.

An operating system that has been jailbroken

D.

An expired screen unlock code

Buy Now
Questions 172

A customer calls the help desk asking for instructions on how to modify desktop wallpaper. Which of the following Windows 10 settings should the technician recommend?

Options:

A.

Personalization

B.

Apps

C.

Updates

D.

Display

Buy Now
Questions 173

An Internet cafe has several computers available for public use. Recently, users have reported the computers are much slower than they were the previous week. A technician finds the CPU is at 100% utilization, and antivirus scans report no current infection. Which of the following is MOST likely causing the issue?

Options:

A.

Spyware is redirecting browser searches.

B.

A cryptominer is verifying transactions.

C.

Files were damaged from a cleaned virus infection.

D.

A keylogger is capturing user passwords.

Buy Now
Questions 174

A PC is taking a long time to boot. Which of the following operations would be best to do to resolve the issue at a minimal expense? (Select two).

Options:

A.

Installing additional RAM

B.

Removing the applications from startup

C.

Installing a faster SSD

D.

Running the Disk Cleanup utility

E.

Defragmenting the hard drive

F.

Ending the processes in the Task Manager

Buy Now
Questions 175

Which of the following filesystems supports journaling?

Options:

A.

NTFS

B.

exFAT

C.

HFS

D.

ext2

Buy Now
Questions 176

A web developer installs and launches a new external web server. Immediately following the launch, the performance of all traffic traversing the firewall degrades substantially. Which of the following considerations was overlooked?

Options:

A.

OS compatibility

B.

Quality of service

C.

32- vs. 64-bit architecture

D.

Storage requirements

Buy Now
Questions 177

A user's mobile phone battery does not last long and navigation is very slow. Which of the following should the technician do first to resolve the issue?

Options:

A.

Uninstall unused programs

B.

Check running applications

C.

Update the mobile OS

D.

Disable network services

Buy Now
Questions 178

Which of the following is used to detect and record access to restricted areas?

Options:

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

Buy Now
Questions 179

A technician needs to disable guest log-ins on domain-joined desktop machines. Which of the following should the technician use?

Options:

A.

Group Policy

B.

Firewall

C.

Microsoft Management Control

D.

MSConfig

Buy Now
Questions 180

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

Options:

A.

Using an agent-based cloud backup solution

B.

Implementing a grandfather-father-son backup rotation

C.

Automating backups to a local network share

D.

Saving files manually to an external drive

Buy Now
Questions 181

A user accidentally installed the incorrect word processing application on an iMac. Which of the following would allow the user to uninstall the incorrect application?

Options:

A.

Move the application to the desktop and press delete.

B.

Identify the application in Finder and drag it to the trash can.

C.

Use Spotlight to search for the application, and then run the application.

D.

Use Time Machine to go back to the date before the installation.

Buy Now
Questions 182

A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing. Which of the following remote access technologies should the administrator use?

Options:

A.

RDP

B.

MSRA

C.

SSH

D.

VNC

Buy Now
Questions 183

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

Options:

A.

APK Source

B.

Connectivity issues

C.

Developer Mode

D.

Jailbreak

Buy Now
Questions 184

A technician is updating the OS on a number of Windows workstations. After successfully updating several workstations, the technician receives an error indicating that the upgrade takes more space than is available on one of the PCs. Which of the following should the technician do to proceed with the upgrade? (Select two).

Options:

A.

Unplug the extra hardware.

B.

Delete unnecessary files.

C.

Update the driver software.

D.

Restore the system files.

E.

Uninstall unused desktop applications.

F.

Add additional memory.

Buy Now
Questions 185

A technician received a notification about encrypted production data files and thinks active ransomware is on the network. The technician isolated and removed the suspicious system from the network. Which of the following steps should the technician take next?

Options:

A.

Schedule and perform an antivirus scan and system update

B.

Educate the end user on internet usage

C.

Perform a system scan to remove the malware

D.

Create a system restore point

Buy Now
Questions 186

A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?

Options:

A.

Valid license

B.

Data retention requirements

C.

Material safety data sheet

D.

Chain of custody

Buy Now
Questions 187

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

Options:

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

Buy Now
Questions 188

A technician wants to update the local security policies on a Windows machine but is unable to launch the expected snap-in. Which of the following is the most likely reason?

Options:

A.

The computer is running Windows Home.

B.

The user did not sign the end user license agreement.

C.

The user disabled the User Account Control.

D.

An antivirus application is blocking access.

Buy Now
Questions 189

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

Options:

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

Buy Now
Questions 190

A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?

Options:

A.

Configure the sleep settings.

B.

Disablehibernation.

C.

Edit thepower plan.

D.

Turn onfast startup.

Buy Now
Questions 191

The user often hosts meetings from a Windows desktop, and meeting participants ask the user to make the text larger when the user shares the computer screen. When not in meetings, the user wants the text be smaller for work tasks. Which of the following is the most efficient way to change text font size?

Options:

A.

Issuinga laptop to the user with increased font size to be used only for meetings

B.

Using display settings to adjust the text size during meetings

C.

Addinga local user account, which has a larger font size set, for the user to log In toduring meetings

D.

Addinga second monitor to the user's desktop and increase the font size for only that display

Buy Now
Questions 192

Which of the following change management practices lists all the changes that are taking place for a project to ensure that no unexpected changes happen?

Options:

A.

Risk analysis

B.

Scope

C.

Rollbackplan

D.

Review

Buy Now
Questions 193

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

Options:

A.

File Explorer Options

B.

Ease of Access

C.

Indexing Options

D.

Administrative Tools

Buy Now
Questions 194

A technician is helping a customer connect to a shared drive. The technician notices some unused drives that have already been mapped and wants to disconnect those drives first. Which of the following commands should the technician use?

Options:

A.

format

B.

netstat

C.

diskpart

D.

net use

E.

rmdir

Buy Now
Questions 195

A user's workstation was infected with a newly discovered virus that the AV system detected. After a full virus scan and a workstation reboot, the virus is still present in the OS. Which of the following actions should the user take to remove the virus?

Options:

A.

Enable the system firewall.

B.

Use bootable antivirus media to scan the system.

C.

Download software designed to specifically target the virus.

D.

Run the operating system update process.

Buy Now
Questions 196

An employee lost a smartphone and reported the loss to the help desk. The employee is concerned about the possibility of a breach of private data. Which of the following is the best way for a technician to protect the data on the phone?

Options:

A.

Remote lockBRemote wipe

B.

Remote access

C.

Remote encrypt

Buy Now
Questions 197

A technician is trying to perform an in-place upgrade of a Windows OS from a file. When the technician double-clicks the file, the technician receives a prompt to mount a drive. Which of the following file types did the technician download?

Options:

A.

msi

B.

iso

C.

zip

D.

exe

Buy Now
Questions 198

You have been contacted through the help desk chat application. A user is setting up a replacement SOHO router. Assist the user with setting up the router.

INSTRUCTIONS

Select the most appropriate statement for each response. Click the send button after

each response to continue the chat. If at any time you would like to bring back

the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 199

A user asks a technician for recommendations to back up desktop data from a Windows OS. The technician recommends implementing daily full backups, but the user is concerned about having enough space. Which of the following additional backup methods should the technician recommend?

Options:

A.

Transaction log

B.

Incremental

C.

Synthetic

D.

Differential

Buy Now
Questions 200

A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?

Options:

A.

Disconnect the computer from the network

B.

Run an antivirus scan

C.

Reboot the computer

D.

Educate the user about cybersecurity best practices

Buy Now
Questions 201

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

Options:

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Buy Now
Questions 202

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

Options:

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

Buy Now
Questions 203

Which of the following is used as a password manager in the macOS?

Options:

A.

Terminal

B.

FileVault

C.

Privacy

D.

Keychain

Buy Now
Questions 204

Which of the following would MOST likely be deployed to enhance physical security for a building? (Select TWO).

Options:

A.

Multifactor authentication

B.

Badge reader

C.

Personal identification number

D.

Firewall

E.

Motion sensor

F.

Soft token

Buy Now
Questions 205

A user receives an error message from an online banking site that states the following:

Your connection is not private. Authority invalid.

Which of the following actions should the user take NEXT?

Options:

A.

Proceed to the site.

B.

Use a different browser.

C.

Report the error to the bank.

D.

Reinstall the browser.

Buy Now
Questions 206

A user rotates a cell phone horizontally to read emails, but the display remains vertical, even though the settings indicate autorotate is on. VT1ich of the following will MOST likely resolve the issue?

Options:

A.

Recalibrating the magnetometer

B.

Recalibrating the compass

C.

Recalibrating the digitizer

D.

Recalibrating the accelerometer

Buy Now
Questions 207

Which of the following editions of Windows 10 requires reactivation every 180 days?

Options:

A.

Enterprise

B.

Pro for Workstation

C.

Home

D.

Pro

Buy Now
Questions 208

A technician installed Windows 10 on a workstation. The workstation only has 3.5GB of usable RAM, even though the technician installed 8GB. Which of the following is the MOST likely reason this system is not utilizing all the available RAM?

Options:

A.

The system is missing updates.

B.

The system is utilizing a 32-bit OS.

C.

The system's memory is failing.

D.

The system requires BIOS updates

Buy Now
Questions 209

A user has a computer with Windows 10 Home installed and purchased a Windows 10 Pro license. The user is not sure how to upgrade the OS. Which of the following should the technician do to apply this license?

Options:

A.

Copy the c:\Wlndows\wlndows.lie file over to the machine and restart.

B.

Redeem the included activation key card for a product key.

C.

Insert a Windows USB hardware dongle and initiate activation.

D.

Activate with the digital license included with the device hardware.

Buy Now
Questions 210

A desktop technician has received reports that a user's PC is slow to load programs and saved files. The technician investigates and discovers an older HDD with adequate free space. Which of the following should the technician use to alleviate the issue first?

Options:

A.

Disk Management

B.

Disk Defragment

C.

Disk Cleanup

D.

Device Manager

Buy Now
Questions 211

A user visits a game vendor's website to view the latest patch notes, but this information is not available on the page. Which of the following should the user perform before reloading the page?

Options:

A.

Synchronize the browser data.

B.

Enable private browsing mode.

C.

Mark the site as trusted.

D.

Clear the cached file.

Buy Now
Questions 212

A user called the help desk lo report an Issue with the internet connection speed on a laptop. The technician thinks that background services may be using extra bandwidth. Which of the following tools should the technician use to investigate connections on the laptop?

Options:

A.

nslookup

B.

net use

C.

netstat

D.

net user

Buy Now
Questions 213

A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to Investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?

Options:

A.

Resource Monitor

B.

Performance Monitor

C.

Command Prompt

D.

System Information

Buy Now
Questions 214

A technician receives a help desk ticket from a user who is unable to update a phone. The technician investigates the issue and notices the following error message: Insufficient storage space

While analyzing the phone, the technician does not discover any third-party' applications or photos. Which of the following is the best way to resolve the issue?

Options:

A.

Exchange the device for a newer one.

B.

Upgrade the onboard storage

C.

Allocate more space by removing factory applications

D.

Move factory applications to external memory.

Buy Now
Questions 215

The screen on a user's mobile device is not autorotating even after the feature has been enabled and the device has been restarted. Which of the following should the technician do next to troubleshoot the issue?

Options:

A.

Calibrate the phone sensors.

B.

Enable the touch screen.

C.

Reinstall the operating system.

D.

Replace the screen.

Buy Now
Questions 216

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

Options:

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

Buy Now
Questions 217

A system drive is nearly full, and a technician needs lo tree up some space. Which of the following tools should the technician use?

Options:

A.

Disk Cleanup

B.

Resource Monitor

C.

Disk Defragment

D.

Disk Management

Buy Now
Questions 218

A technician installs specialized software on a workstation. The technician then attempts to run the software. The workstation displays a message indicating the software is not authorized to run. Which of the following should the technician do to most likely resolve the issue?

Options:

A.

Install the software in safe mode.

B.

Attach the external hardware token.

C.

Install OS updates.

D.

Restart the workstation after installation.

Buy Now
Questions 219

An administrator responded to an incident where an employee copied financial data to a portable hard drive and then left the company with the data. The administrator documented the movement of the evidence. Which of the following concepts did the administrator demonstrate?

Options:

A.

Preserving chain of custody

B.

Implementing data protection policies

C.

Informing law enforcement

D.

Creating a summary of the incident

Buy Now
Questions 220

A developer's Type 2 hypervisor is performing inadequately when compiling new source code. Which of the following components should the developer upgrade to improve the hypervisor’s performance?

Options:

A.

Amount of system RAM

B.

NIC performance

C.

Storage IOPS

D.

Dedicated GPU

Buy Now
Questions 221

Which of the following physical security controls can prevent laptops from being stolen?

Options:

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

Buy Now
Questions 222

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?

Options:

A.

System

B.

Power Options

C.

Devices and Printers

D.

Ease of Access

Buy Now
Questions 223

A technician is selling up a newly built computer. Which of the following is the FASTEST way for the technician to install Windows 10?

Options:

A.

Factory reset

B.

System Restore

C.

In-place upgrade

D.

Unattended installation

Buy Now
Questions 224

A company's assets are scanned annually. Which of the following will most likely help the company gain a holistic view of asset cost?

Options:

A.

Creating a database

B.

Assigning users to assets

C.

Inventorying asset tags

D.

Updating the procurement account owners

Buy Now
Questions 225

A user opened a ticket regarding a corporate-managed mobile device. The assigned technician notices the OS Is several versions out of date. The user Is unaware the OS version is not current because auto-update is turned on. Which of the following is MOST likely the cause of the Issue?

Options:

A.

The device does not have enough free space lo download the OS updates.

B.

The device needs domain administrator confirmation to update to a major release.

C.

The device is not compatible with the newest version of the OS.

D.

The device is restricted from updating due to a corporate security policy.

Buy Now
Questions 226

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

    Disable Wi-Fi autoconnect.

Options:

A.

Stay offline when in public places.

B.

Uninstall all recently installed applications.

C.

Schedule an antivirus scan.

D.

Reboot the device

E.

Update the OS

Buy Now
Exam Code: 220-1102
Exam Name: CompTIA A+ Certification Core 2 Exam
Last Update: Nov 14, 2024
Questions: 756

PDF + Testing Engine

$64  $159.99

Testing Engine

$48  $119.99
buy now 220-1102 testing engine

PDF (Q&A)

$40  $99.99
buy now 220-1102 pdf