CompTIA A+ Certification Exam 220-1002 Updated Dumps V14.02

Now you can pass your CompTIA A+ Core 2 220-1002 exam with updated dumps. We have updated 220-1002 exam dumps with 476 practice exam questions and answers, which are real and accurate for passing CompTIA A+ certification.We proved that the updated CompTIA A+ 220-1002 dumps are great and valid for passing CompTIA A+ Certification Exam: Core 2.

Read 220-1002 free dumps before getting 220-1002 updated dumps

1. A user's computer was infected with malware, and a technician successfully removed the infection However, the user reports certain web-based services are still inaccessible.

Which of the following should the technician perform FIRST to resolve the issue?

2. A technician is disposing of computer hardware that contains PHI. The drive must be reusable.

Which of the following methods should be used?

3. A technician receives a phone call regarding ransomware that has been detected on a PC in a remote office.

Which of the following steps should the technician take FIRST?

4. A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour.

Which of the following steps should be performed prior to traveling to prevent further infection? (Select TWO)

5. Which of the following would BEST support an 8TB hard drive with one partition?

6. A technician needs to ensure users are prompted or warned when an installation takes place on a Windows system.

Which of the following would meet this requirement?

7. A technician was contacted regarding an issue affecting hundreds of users on a domain network.

Which of the following would be MOST effective al remediating future issues through documentation?

8. A remotely managed self-checkout machine in a retail store runs Windows 10. The image contains drivers for locally attached third-party hardware (i.e., receipt printers), third-party applications, and proprietary applications made by the company's IT department. The self-checkout machine is experiencing errors, and the store employees are instructed to reload the OS.

Which of the following would be the BEST option to restore full functionality to this machine with the least administrative effort?

9. Which of the following BEST describes the Guest account on a Windows system?

10. Users notify the help desk of an email that was just received. The email came from the help desk’s email address and asked the users to click on an embedded link.

This email is BEST described as:

11. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.

Which of the following should the technician do NEXT?

12. CORRECT TEXT

To connect to a secure wireless network, a guest user logs in and is prompted to enter a code that is sent as a text message to the user.

Which of the following types of authentication is this an example?

13. An employee is unable to view in-office network folders while working at home.

Which of the following is the MOST likely cause of the problem?

14. A technician is alerted to a virus on a PC. The technician isolates the PC from the network.

After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

15. Which of the following employs content filtering to prevent data leaks within an organization?

16. A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

17. An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster.

In addition to the generators and UPS systems, which of the following should the technician recommend testing?

18. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

19. Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

20. An administrator wants to search a file on a Linux server for the plus symbol (+).

Which of the following will the administrator MOST likely use?

21. A company recently upgraded its computers from Windows XP SP3 lo Windows 7. Due to budget constraints, the company was not able to purchase newer machines. The computers do not have TPM chips. Out the company would like to secure the information on the local hard disk in case the hard drive is stolen, while being able to access all of its information even if users leave.

Which of the following would allow the company to accomplish this task?

22. A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection.

Which of the following terminal commands should the technician use?

23. A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall.

To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

24. After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly.

Which of the following should the technician do NEXT?

25. A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a 1TB SSD. and a high-end GPU. The technician installed the OS and a new game but noticed the frame-rate performance was much lower than expected.

Which of the following should the technician do NEXT to address the performance issues?

26. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists.

Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

27. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

28. An office location regularly experiences brownouts.

Which of the following would be the MOST appropriate solution to protect the office computers?

29. A systems administrator is configuring a new workstation.

Which of the following will MOST likely be the administrator's FIRST step?

30. A technician is performing service on a computer and notices it is responding very slowly. The computer has 4GB of RAM. a four-core 3GHz processor, and a SATA I 54O0rpm 300GB HOD.

The technician logs the following process information:

Based on this data, which of the following is the MOST likely cause of the performance issues?

31. A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.

Which of the following is the most likely NEXT step?

32. An end user reports a Windows computer is infected with a virus.

Which of the following should be the technician’s FIRST troubleshooting step?

33. A technician is cleaning malware on a Windows workstation.

Which of the following would MOST likely prevent a recurrence of the same malware?

34. A technician is recycling PCs to be reused by a middle school.

Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

35. Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

Which of the following should the technician check NEXT?

36. A network administrator needs to be able to securely connect to a local router from within the office.

Which of the following protocols should the administrator ensure is enabled on the router?

37. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

38. Which of the following provide the BEST security for a server room? (Select two.)

39. A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors.

Which of the following Is MOST likely the Issue?

40. A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP.

Which of the following would be the NEXT appropriate act?

41. A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

42. Which of the following Windows versions introduced using applications in the Metro interface?

43. A technician is cleaning up a warehouse and several old CRT monitors and UPS units. The technician removes the batteries from the UPSs and wants to comply with proper disposal techniques.

Which of the following should the technician do NEXT to proceed with disposal of the batteries?

44. A user wants a phone with an operating system that is highly customizable.

Which of the following operating systems will a technician MOST likely recommend?

45. Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send.

Which of the following would be the BEST way to resolve this issue?

46. Which of the following NTFS security settings overrides all other settings?

47. A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made.

Which of the following solutions would the technician MOST likely recommend? (Select TWO)

48. A user reports malware activity on an isolated workstation used for testing It is running an end-of-life OS. and a USB drive is the only method used to transfer files After removing the malware and replacing the USB drive with a brand new one. the technician gives the approval to use the equipment. The next day the user reports the same malware activity is present after powering on the system.

Which of the following did the technician forget to do to prevent reinfection?

49. A technician Is completing the documentation for a major OS upgrade of a Linux distribution that will impact a company's web services. The technician finishes the risk assessment and documents the change process.

Which of the following should the technician complete NEXT?

50. A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.

Which of the following methods would the technician MOST likely perform on the computer?

51. A customer recently upgraded from Windows 7 to Windows 10. The customer lost access to certain network shares, and the system keeps preventing the user's access.

Which of the following is the MOST likely cause of the issue?

52. Which of the following types of social engineering attacks can be prevented by the destruction of documents with personal or sensitive information?

53. A user’s mobile device is losing its battery change very quickly. The user report charge at 9:00 a.m. but has 22% battery by 1:00 p.m. The user has installed several applications, and the phone is relatively new, high-end phon. The user claims most of the usage involves checking emails for a few minutes three or four times per hours.

Windows of the following should a technician perform FIRST to diagnose the issue properly?

54. A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page. The technician tries with a third-party browser and connects without error. The technician needs to make sure the old certificate is no longer used in Internet Explorer.

Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

55. Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

56. Which of the following is a community supported, open source OS used for both services and workstations?

57. To which of the following should a technician ground an ESD strap when adding memory to a workstation?

58. A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

59. A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

60. A contract technician is working on a network printer when a print job starts and completes.

The technician notices it is a spreadsheet that appears to be an annual salary report.

Which of the following actions should the technician take?

61. Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together.

Which of the following should the technician perform FIRST?

62. Which of the following devices provides protection against brownouts?

63. What a user is allowed to do on a computer network would be addressed in:

64. Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

65. Which of the following is an authentication protocol that can be used for users in the field?

66. A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

67. A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory,.

Which of the following should the technician use to accomplish this?

68. Users have reported their files have disappeared, and they are unable to access local data. The security administrator quarantined all affected systems and removed any remote connectivity; however, users are still unable to access local data PC performance has not been affected, but the applications keep failing.

Which of the following has MOST likely occurred?

69. Joe, a user. is unable to log into a laptop using his proper network credentials because of an incorrect username or password However. Joe is able to log in without issue to a coworker's PC using his credentials.

Which of the following is the MOST likely cause of the issue?

70. CORRECT TEXT

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D

Please repair this failure without overwriting the customers’ local user profiles.

INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

71. A technician notices a Windows computer is running slowly. The computer boots up slowly and has long delays when executing large files. The technician runs Disk Cleanup, but the problem persists.

Which of the following will MOST likely help speed up the computer?

72. Which of the following types of scripts would be seen on the user end of a web page?

73. A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs.

Which of the following should the technician implement to ensure maximum uptime of the client VM?

74. A technician has set up a new computer for a customer and needs to add a login with administrative privileges.

Which of the following tools should the technician use?

75. Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

76. Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

77. A user has changed the MAC address of a laptop to gain access to a network.

This is an instance of:

78. The Chief Executive Offer (CEO) of a company receives an email from a local bank. It states the company’s account has several suspicious transactions and instructs the CEO to log in immediately to validate the transactions; otherwise, the account will be frozen.

Which of the following BEST describes this email?

79. Which of the following key and mouse combinations can be used to run an application as a different user?

80. A user is unable to get to any internal websites but can access some external websites.

Which of the following will MOST likely resolve this issue?

81. A technician is using a CLI to perform tasks on a Windows OS. The technician needs to determine which ports are being utilized for TCP listening.

Which of the following commands should the technician use?

82. Company policy states that users must secure their laptops before leaving the office for the evening.

Which of the following physical security measures should be used?

83. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

84. Ann, an end user, is working with highly regulated data and often notices the high volume of traffic in her work area. Ann requests help with limiting the exposure of data as people walk by.

Which of the following security measures should be used?

85. A wireless access point is going to be configured in a small office located in a crowded building.

Which of the following should the installation technician perform to increase the security of the wireless network? (Select two.)

86. A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.

Which of the following actions should the user take FIRST?

87. A technician is working on an infected computer that is currently turned off. The technician is concerned the boot sector is affected.

Which of the following is the BEST method for the technician to use to scan the boot sector?

88. A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

89. A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.

Which of the following should the technician do to remove the threat from the system?

90. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

91. A technician is in the process of removing a recently discovered Trojan horse application from a users laptop.

Which of the following should the technician complete to prevent reinfection of the same machine?

92. An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work.

Which of the following is the BEST solution for the technician to recommend?

93. Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?

94. A company is upgrading the desktops of all its employees. Users in the multimedia department would like to keep the RAM from their current desktops to upgrade their new devices.

Following change management best practices, which of the following actions should a technician perform NEXT?

95. A technician is troubleshooting a computer that may have some corrupt operating system files.

Which of the following command line tools should the technician use to check these files?

96. A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information.

Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

97. A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks.

Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).

98. A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately.

Which of the following should the technician perform FIRST?

99. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office.

Which of the following would MOST likely reduce this symptom? (Select TWO).

100. A user reports that when opening a web browser the initial page loads to a search engine the user does not recognize When the user performs searches on the site, the results are often irrelevant, and there are many pop-ups.

Which of the following should a technician do to resolve these issues? (Select TWO)


 

The Most Updated CompTIA A+ 220-1001 Practice Dumps V17.02
Updated CompTIA CASP CAS-003 Dumps Questions V16.02

Add a Comment

Your email address will not be published. Required fields are marked *