CompTIA A+ Certification Exam: Core 2 220-1002 Updated Dumps V16.02

Customers who have chosen or will choose  DumpsBase 220-1002 dumps need to know that the current version of CompTIA A+ 220-1002 dumps is V16.02. Prepare for your CompTIA A+ Certification Exam: Core 2 with the updated CompTIA 220-1002 dumps V16.02 now. We have collected 581 practice exam questions and answers to ensure that your success.

Check CompTIA A+ 220-1002 Free Dumps V16.02 Online

1. A Linux user wants to use the grep command to identify every file name in the current directory that contains the word "mandatory.

Which of the following commands would BEST accomplish this?

2. Joe, an end user, has been prompted to provide his username and password to access the payroll system.

Which of the following authentication methods is being requested?

3. A workstation needs to be hardened against brute force attacks. It also needs to be protected if a user walks away and leaves the computer unlocked.

Which of the following would harden the workstation as required? (Select TWO).

4. A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

5. A technician is able to connect to a website: however, the technician receives the following error, when alternating to access a different website: Page cannot be displayed.

Which of the following command line tools would be BEST to identify the root cause of the connection problem?

6. A user is receiving a large number of suspicious emails, many of which are automated emails that state the recipient cannot be found.

Which of the following is the MOST likely cause of the issue?

7. Which of the following installation types would require the use of an answer file to install the OS?

8. Which of the following OS types provides a lightweight option for workstations that need an easy-to-use browser-based interface?

9. A technician needs to install Windows 10 on a 4TB hard drive,.

Which of the following ‘should the technician perform to accomplish this task?

10. A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor.

Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

11. A technician recently installed a new secondary hard drive in a Windows 10 desktop. After the installation, the computer displayed the following error message: No Operating System Found. However, after unplugging the new hard drive, the error message no longer appeared. The technician then reconnected the new drive to continue troubleshooting.

Which of the following steps should the technician take NEXT?

12. A customer recently lost data because it was accidentally deleted. The customer calls a technician and asks to have a Windows backup solution installed. The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made.

Which of the following solutions would the technician MOST likely recommend? (Select TWO)

13. Accompany is concerned about the amount of time employees spend browsing the Internet for personal purposes.

Which of the following should be put in place to address the company’s concerns?

14. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

15. A user who is running Windows 10 logs Into a machine and notices that shared drives are missing, the "My Documents* folder is empty, and personal settings are reset.

Which of the following would be required to resolve the issue?

16. A folder on an NTFS volume has the following permissions enabled for the administrators group: full control, modify, and write. A technician adds a permissions entry to the folder's security settings denying the administrators group write and modify access.

Which of the following permissions will the administrators group effectively have? (Select TWO)

17. Following a recent password change, a user can log on successfully to an Apple computer but cannot access a web-based service. An error message displays each time the user attempts lo authenticate to the service. Prior to changing the password, the computer had no communication issues.

Which of the following should a technician use to continue troubleshooting the issue?

18. Which of the following authentication methods was designed to be used primarily for administration purposes, such as giving users access to manage switches and routers?

19. CORRECT TEXT

A technician has been asked to review the configuration of an executive's SOHO network following a recent news report regarding home Internet routers that are being added to botnets for malicious purposes.

Which of the following would be BEST to prevent the router from being added to a botnet? (Select TWO).

20. A technician is creating a network topology diagram.

Which of the following would be the MOST appropriate to include? (Select TWO)

21. Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues.

Which of the following is MOST likely the cause of the issue?

22. Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

23. A recent ransomware attack caused several datasets to be inaccessible. Security technicians were able to mitigate any additional attacks and remove any unauthorized software.

Which of the following should the technicians do NEXT?

24. Which of the following security concepts can be overcome through social engineering? (Select TWO)

25. A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.

Which of the following should the technician do NEXT? (Choose two.)

26. Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet.

Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

27. Company policy states that users must secure their laptops before leaving the office for the evening.

Which of the following physical security measures should be used?

28. Which of the following Is the MOST cost-effective option to protect computers and peripherals from damage caused by power fluctuations?

29. A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away.

The device is relatively new, so the user is concerned it is defective.

A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

30. A technician is cleaning malware on a Windows workstation.

Which of the following would MOST likely prevent a recurrence of the same malware?

31. Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

32. A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

33. Joe, a customer, calls a technician to report a remote computer is demonstrating erratic behavior while he is working on it. The technician verifies the files and directories. Joe is working on locally cannot be opened in any application, and the computer is running extremely slow.

Which of the following is the MOST likely cause of this issue?

34. A user's mobile device appears to lose connectivity only in certain areas. The device works normally when II is not in those areas, and the user has determined that a cellular signal is available In the areas where the connectivity is lost.

Which of the following should be considered?

35. Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation.

Which of the following should the technician perform FIRST?

36. A technician is installing new software on an older laptop that has a current OS. The software contains a database back end that also requires installation.

Which of the following should the technician review to ensure the software will run before installing it? (Select TWO).

37. Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Select TWO.)

38. A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails.

Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

39. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message.

Which of the following should the technician do FIRST?

40. A technician must manually modify the HOSTS system file in order to resolve a website address to a specified local destination.

Which of the following utilities should the technician use to BEST accomplish the task?

41. A user contacts a technician to troubleshoot server errors. The user explains that some files will not open on the server, the data backups are operational, and the weather has been bad. The technician notices missing time slots in the event log.

Which of the following should the technician replace to prevent these issues in the future?

42. A user lives in a location that experiences frequent lightning storms.

Which of the following would be the LEAST expensive solution to protect the user's computer hardware?

43. A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the right corner of the screen without the browser open.

Which of the following should the technician do to remove the pop-ups?

44. A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet.

Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

45. Several mobile users are reporting issues connecting to the WLAN within a warehouse. A technician tests wireless connectivity in the lobby and is able to connect successfully. Mobile users can connect to the Internet using cellular service, but they cannot access any internal resources on the WLAN. The technician received alerts of devices failing throughout the network due to a power outage.

Which of the following is MOST likely causing the wireless issues?

46. A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.

Which of the following troubleshooting steps should the technician take NEXT?

47. Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online.

Which of the following is the MOST likely cause of Joe’s slow data speeds?

48. A technician is encrypting the company's laptops using BitLocker, but some of the laptops do not have a built-in TPM.

Which of the following would enable the technician to use BitLocker on these machines?

49. A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver malicious payloads across the network.

Which of the following security measures would have been BEST to prevent the attack from being executed in the first place? (Select TWO)?

50. The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable.

Which of the following methods should the technician use to meet the requirement?

51. Which of the following best practices should a technician observe to reduce the risk of electrical shock?

52. A technician configures a switch for an enterprise to use 802.1X.

Which of the following logical security concepts uses 802.1X?

53. A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

54. Which of the following wireless security protocols supports the use of a 40-bit encryption key?

55. A technician has enabled port security on a switchport.

Which of the following BEST describes the effect this will have?

56. Which of the following wireless encryption standards uses 802.1X In its process to secure a wireless network?

57. A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses.

Which of the following is MOST likely the problem?

58. Which of the following is protected data that can be found in a medical record?

59. A technician discovers a user's home computer has Windows Update disabled and suspects malware has replaced several Windows OS files.

After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

60. A technology team is creating limits and guidelines for the use of company-provided software, equipment, and Internet access.

Which of the following policies is needed?

61. An administrator needs to uninstall an update on a Windows 7 computer.

Which of the following Control Panel utilities would make this possible?

62. An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.

Which of the following actions should the user take?

63. technician performed an in-place upgrade to 10 on a customer laptop. following the upgrade, a proprietary software application no longer works. The technician realizes the software is not compatible with Windows 10.

Which of the following is the BEST option to make the software functional again?

64. Which of the following devices provides protection against brownouts?

65. After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system.

Which of the following OS retaliation methods will the technician MOST likely use?

66. A user is attempting to install an application and receives an error stating there is not enough space to install the application.

Which of the following did the user overlook?

67. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

68. A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources.

Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

69. An organization is developing testing schedules to ensure its disaster recovery plans will be effective in case of a disaster.

In addition to the generators and UPS systems, which of the following should the technician recommend testing?

70. A technician deployed a new file server on the network. The technician wants to map the file server as a network drive on all users' computers when they log onto the network by creating a logon script.

Which of the following should the technician use?

71. A folder has the share permissions of everyone - change, while the folder's NTFS permissions are Set to everyone - read.

Which of the following would be the MOST effective permissions for someone who is accessing the folder via the share?

72. The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen.

Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?

73. When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

74. A business unit wants to upgrade the current version of its loan processing software. A manager is putting together a change management request and gathering information on the software.

Which of the following would be MOST important during this phase of the request process?

75. A technician just replaced a network copier's toner cartridges and wants to dispose of the used ones.

Which of the following represents the BEST way to handle the waste?

76. Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

77. Which of the following encryption methods is used by WPA2 to improve data security as compared to previous wireless encryption protocols?

78. A technician is investigating connectivity issues over the corporate network. The technician attempts to Telnet into an access point in the break room, which is labeled AP-1. but is unable to proceed any further or authenticate.

Which of the following commands will be MOST beneficial in determining the connectivity issues?

79. Given the following batch file:

Which of the following describes the purpose of the line beginning with rem?

80. A computer running Windows 7 has an icon that has the appearance of an unlocked padlock with a yellow warning graphic. This icon advises the user that:

81. Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer.

Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

82. Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

83. A contract technician is working on a network printer when a print job starts and completes.

The technician notices it is a spreadsheet that appears to be an annual salary report.

Which of the following actions should the technician take?

84. Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users.

Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

85. A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

86. Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

87. Ann, an employee, has been trying to use a company-issued mobile device to access an internal fileshare while traveling abroad. She restarted the device due to a mobile OS update, but she is now unable to access company information Ann calls the help desk for assistance, and a technician verifies she can make calls and access websites.

Which of the following should the technician suggest NEXT to try to fix the issue?

88. A technician is attempting to repair a Windows computer that is infected with malware. The machine is quarantined but still cannot boot into a standard desktop.

Which of the following is the most likely NEXT step?

89. A company would like to increase its security measures because a workstation was recently hacked.

Which of the following would offer the BEST protection from unauthorized access of workstations?

90. Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights?

91. A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen,

The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using the side buttons designed for volume and power.

Which of the following describes the root cause of the issue?

92. Which of the following may include the use of a password and a rotating PIN lo access a wireless network?

93. A Windows user reports that clicking on links when browsing the Internet results in unexpected destination pages with advertisements or virus infection warnings. The user reboots the computer, but the issue persists.

Which of the following should a technician perform to identify and resolve the issue? (Choose two.)

94. A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance.

Which of the following should the help desk team recommend the user do in this situation?

95. A technician is setting up a SOHO wireless router and needs to adhere to the following requirements:

The router should not assign network addresses to any device.

All devices in the office must be able to access network resources and the Internet.

Which of the following should the technician perform to meet these requirements?

96. An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

97. A user is trying to access a popular email website but Is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.

Which of the following should the technician do to remove the threat from the system?

98. Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

99. A special type of ESD-sale vacuum cleaner may be necessary to safely clean large spills of:

100. An administrator is loading a new Linux server.

Which of the following filesystems will the administrator MOST likely select for the primary partition?


 

CompTIA PenTest+ Certification Exam PT0-001 Updated Questions V11.02 Online Released
What is the difference, CompTIA Server+ SK0-004 VS SK0-005?

Add a Comment

Your email address will not be published. Required fields are marked *