CompTIA A+ Core Exam 220-1002 Dumps Questions Online

In my last post, I have introduced 220-1001 exam to you, and today we will continue to introduce you antoher CompTIA A+ Core exam 220-1002. We can know that CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization and cloud computing and network troubleshooting. And CompTIA A+ 220-1002 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures. 220-1002 dumps questions online will bring you real and valid exam questions and answers, which will ensure you pass 220-1002 exam.

Free Dumps Questions of CompTIA A+ Core Exam 220-1002 Dumps

1. SIMULATION

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

2. A technician arrives on site to find that two users who have the same model on Android smartphone are having the same issue with a specific application.

Whenever they attempt to launch the application, it fails and gives an error message.

Which of the following should the technician do FIRST?

 
 
 
 

3. A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

 
 
 
 
 
 

4. An administrator is setting up a Windows terminal server.

Which of the following settings should the administrator modify to increase server security? (Select two.)

 
 
 
 
 
 

5. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

 
 
 
 

6. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

 
 
 
 
 
 

7. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

 
 
 
 

8. Which of the following provide the BEST security for a server room? (Select two.)

 
 
 
 
 
 

9. Which of the following threats uses personalized information in an attempt at obtaining information?

 
 
 
 

10. A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.

Which of the following needs to be adjusted on the workstation to fix the issue?

 
 
 
 

11. A department in an organization set up a proxy server to manage its Internet stage. A technician is configuring the Windows workstations to use the new proxy server.

Which of the following Control Panel utilities should the technician use to configure the setting?

 
 
 
 
 

12. Which of the following is the amount of memory a user is limited to with a 32-bit version of Windows?

 
 
 
 

13. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in.

Which of the following is the

BEST choice for the technician to make?

 
 
 
 
 

14. A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.

Which of the following is the BEST method of securing the phone?

 
 
 
 

15. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

 
 
 
 
 
 

16. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

 
 
 
 

17. A technician is installing a private PC in a public workspace.

Which of the following password practices should the technician implement on the PC to secure network access?

 
 
 
 

18. Joe, an employee, took a company-issues Windows laptop home, but is having trouble connecting to any of the shares hosted on his home media server.

Joe has verified he is connected to the Internet.

Which of the following would explain why Joe cannot access his personal shares?

 
 
 
 

19. A user believes there is a virus on a laptop. The user installs additional real-time protection antivirus software but is now experiencing extremely slow performance on the laptop.

Which of the following should a technician do to resolve the issue and avoid recurrence?

 
 
 
 
 

20. A user who is running Windows XP calls a technician to upgrade the computer to a newer Windows OS. The user states the computer has only 1GB of RAM and 16GB of hard drive space with a 1,7GHz processor.

Which of the following OSs should the technician recommended to ensure the BEST performance on this computer?

 
 
 
 

21. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

 
 
 
 

22. Which of the following security methods BEST describes when a user enters a username and password once for multiple applications?

 
 
 
 

CompTIA CASP+ CAS-003 Exam Questions
CompTIA A+ Core Exam 220-1001 study guide pdf