CompTIA A+ Certification Exam: Core 2 220-1002 Updated Dumps V15.02

Several days ago, we share the news of updated 220-1001 dumps V18.02 with real Q&As. Most customers also want to get the updated 220-1002 dumps questions. Good news, CompTIA A+ Certification Exam: Core 2 220-1002 Updated Dumps V15.02 are available. We have collected 487 practice questions and answers for all candidates. We ensure that you can pass 220-1001 and 220-1002 exams and complete CompTIA A+ certification.

Check CompTIA A+ 220-1002 Free Dumps Online

1. Joe, an end user, has been prompted to provide his username and password to access the payroll system.

Which of the following authentication methods is being requested?

2. A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

3. Which of the following employs content filtering to prevent data leaks within an organization?

4. A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet.

Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

5. A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

6. A technician is recycling PCs to be reused by a middle school.

Which of the following methods is MOST appropriate for ensuring data has been removed from the PCs?

7. A security learn recommends a disaster recovery plan with the following requirements:

* Recent backups should be readily available.

* Only long-term backups should be stored off premises

* There should be minimum expenditure on hardware.

Which of the following satisfies all of these requirements?

8. An office building lost power, and the generator started up. Users on several floors have reported their machines will not start, even though the generator is running. A technician works to divert power from other floors until all users are able to work.

Which of the following is the BEST solution for the technician to recommend?

9. A desktop technician needs to replace a laptop’s SSD.

Which of the following must the technician use to prevent damage to the SSD during the replacement?

10. Which of the following is considered government-regulated data?

11. A user lives in a location that experiences frequent lightning storms.

Which of the following would be the LEAST expensive solution to protect the user's computer hardware?

12. Company policy states that users must secure their laptops before leaving the office for the evening.

Which of the following physical security measures should be used?

13. A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected.

II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

14. A manager requests remote access to a server after hours and on weekends to check data. The manager insists on using the server. Before granting the access, which of the following is the MOST important step a technician can take to protect against possible infection?

15. Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage.

Which of the following change management practices would MOST likely have prevented this outage?

16. Which of the following built-in accounts was removed in Windows 10?

17. After receiving a replacement smartphone. a corporate user is able to open some emails but is unable to open encrypted emails.

Which of the following troubleshooting steps should a technician take NEXT?

18. A technician is cleaning malware on a Windows workstation.

Which of the following would MOST likely prevent a recurrence of the same malware?

19. In which of the following operating systems has the publisher removed the ability to turn off automatic updates

with the Control Panel applet?

20. A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made.

Which of the following tools would the technician MOST likely use?

21. CORRECT TEXT

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive

F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS :

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

22. A user’s computer is displaying a black screen. The technician restarts the computer, but

the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

23. Which of the following Windows technologies can tender a file unreadable by anyone other the fole's creator?

24. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

25. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.

Which of the following should the technician do NEXT?

26. While troubleshooting a software error on a user’s computer, a technician finds inappropriate content.

Which of the following should the technician perform FIRST?

27. An administrator is creating a new user account and wants to grant access to only the resources required to perform the user's assigned job duties.

Which of the following will the administrator MOST likely use?

28. A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting.

Which of the following steps should the technician take NEXT?

29. Which of the following has the ability to allow or deny POP3 traffic on the firewall?

30. Which of the following OS installation methods provides previously unavailable features and functionality white maintaining user settings?

31. A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall.

To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

32. A customer's smartphone has been overheating frequently and becoming unresponsive since installing an OS update A technician has already performed a soft reboot of the device.

Which of the following should the technician perform NEXT? (Select TWO)

33. A technician was contacted regarding an issue affecting hundreds of users on a domain network.

Which of the following would be MOST effective al remediating future issues through documentation?

34. Which of the following standards controls the processing of credit cards?

35. A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue.

According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?

36. Six months after a new version of an OS was released to the market, end users began to lose access to application updates.

Which of the following was MOST likely the reason for this issue?

37. A technician is implementing a change to a piece of production environment. The change is causing other several other problem to occur.

Which of the following should the technician do NEXT?

38. A technician is troubleshooting vendor-specific software.

Which of the following is where the technician should go to find problem-specific fixes on the vendor's website?

39. A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot.

Which of the following should the technician complete to resolve the issue?

40. A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.

Which of the following troubleshooting steps should the technician take NEXT?

41. A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective.

A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

42. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists.

Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

43. A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access.

Which of the following policies is needed?

44. A technician is working on an infected computer After running a scan and removing the malicious software, only one issue remains. When opening up the browser, it is redirected to an unwanted site. The technician checks the home page settings, and they are correct. The technician types the home page address in the browser, and it is still redirected.

Which of the following does the technician need to edit to resolve this issue?

45. A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications.

Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?

46. A healthcare institute has asked the IT department to help protect medical and financial data.

Which of the following regulations is the healthcare provider MOST concerned about' (Select TWO).

47. A technician responds to a call from a user who claims to have a virus on a workstation.

The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware.

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

48. A customer has a Linux desktop and is installing a 3TB HDD. The customer wants to use only half of its capacity right now, but would like to be able to increase the size of the partition at a later date.

Which of the following filesystem types would the customer’s drive require?

49. Which of the following variable types should be used to store the data “Chicago” within a script or code?

50. A user brings in a home desktop computer for cleaning. Upon opening the computer, a technician finds large amounts of dust and dirt inside.

Which of the following should the technician use to remove the excess dust and dirt?

51. A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft?.

Which of the following should the user try FIRST

52. A technician is installing a new SOHO wireless router and wants to ensure it is using the latest feature set and is secure.

Which of the following should the technician perform FIRST?

53. A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer.

Which of the following connection protocols should the technician use?

54. A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Choose two.)

55. Joe, a user, reports that several of his colleagues have received a suspicious email from his account that he did not send. A technician asks one of the colleagues to forward the email for inspection. After ruling out spoofing, the technician verifies the email originated from the corporate email server.

Which of the following is the FIRST step the technician should take to correct this issue?

56. Joe, a user, notices someone use his computer while he was on break, Joe’s browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else’s PII.

Which of the following steps should Joe take to prevent unauthorized access of his account.

57. Which of the following extensions identify files that are typically implemented as scripts? (Select TWO).

58. A customer is having issues with an Android-based smartphone after a recent application update. The application becomes unresponsive immediately after attempting to open it. Auto-sync is not enabled, and no recent backups exist for the smartphone.

Without losing any critical information, which of the following should be performed NEXT to further troubleshoot the issue? (Choose two.)

59. After a security audit, a technician is tasked with implementing new measures to help secure company workstations. The new policy states that all workstations must be signed off at night, a password is necessary to boot the computer, and encryption must be enabled.

Which of the following features should the technician implement to BEST meet these requirements? (Choose three.)

60. A technician is remediating a virus on an infected workstation. All user files are set to system and hidden.

Which of the following shouW a technician perform NEXT to remediate the system?

61. A technician was alerted by IT security of a potentially infected desktop, which is at a remote location. The technician will arrive on site after one hour.

Which of the following steps should be performed prior to traveling to prevent further infection'' (Select TWO)?

62. A company brings in contractors several times a year to perform inventory, and the contractors use company supplied laptops. The company’s security policy states that once the inventory is completed, the contractors should not be able to log in to the laptops until the next inventory.

Which of the following BEST enforces this policy?

63. A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.

Which of the following security concepts has the company just enabled?

64. When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

65. A user reports that a cell phone application is loading slowly and not functioning properly.

Which of the following should a technician do FIRST to remedy this issue?

66. Joe. a technician, imaged a laptop using third-party software, but the drive is now showing a smaller partition size than the installed disk space.

Which of the following utilities will allow Joe to resize the partition using a graphical interface?

67. Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

68. A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares.

Which of the following are the MOST likely reasons for these issues? (Select two.)

69. Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

70. A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

71. An end user's laptop Is not as fast as when it was first purchased. The user wants it to revert to that point without losing any data. A technician examines the laptop and notices it has a magnetic hard drive.

Which of the following can the technician do to make the laptop faster?

72. A user's desktop icons appear much larger than before, and the display colors look unusual A technician runs hardware diagnostics but finds no issues. The system logs show the update service ran last night; however, no new applications were installed.

Which of the following is me BEST solution?

73. A user calls a technician regarding an iOS mobile device that is having problems with standby time after a new update was applied. The technician verifies no new applications were installed since the update, but the device still has poor standby time even after the update is removed.

Which of the following is the MOST likely cause of the issue?

74. A technician is developing a backup and disaster recovery plan for a customer. The customer requires quick file recovery when necessary, but wants to ensure recovery is possible in case of a complete disaster, with data loss of no more than three days.

Which of the following backup procedures should the technician suggest to BEST meet the customer's needs?

75. A technician performs a virus cleaning on a computer that has been redirecting all browsers to a phishing website. System Restore was turned off before the cleaning. The technician runs the machine through several scanners, and then tests for redirection. A smaller number of sites are still redirecting to the phishing website. The antivirus software correctly blocks the website.

Which of the following should the technician do NEXT?

76. A technician is trying to repair a computer that was infected with an encrypting virus. After disconnecting the system from the network, the technician images the computer. Upon startup, the system consistently presents a blue screen at the Windows logo.

Which of the following should the technician perform NEXT to resolve the issue?

77. A SOHO technician needs to upgrade two computers quickly and is not concerned about retaining user settings. The users currently have Windows 8 and want to upgrade to Windows 10.

Which of the following installation methods would the technician MOST likely use to accomplish this quickly?

78. Many of the files in a user's network folder have a new file extension and are inaccessible. After some

troubleshooting, a technician discovers a text document that states the files were intentionally encrypted, and a large sum of money is required to decrypt them.

Which of the following should the technician do to recover the files?

79. A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible.

Which of the following technologies should the technician use to manage this system?

80. The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable.

Which of the following methods should the technician use to meet the requirement?


 

Updated N10-007 Exam Questions V21.02 For CompTIA Network+ Certification
CompTIA Security+ Certification Exam SY0-601 Dumps V11.02 Is Online

Add a Comment

Your email address will not be published. Required fields are marked *