Genuine 220-1002 Dumps Updated (V19.02) With Correct 220-1002 Dumps Questions and Answers

Upgrade news for all 220-1002 exam candidates, DumpsBase has updated genuine 220-1002 dumps V19.02 with correct 220-1002 dumps questions and answers for good learning. The updated CompTIA 220-1002 dumps of DumpsBase are prepared by industry experts and based on the newest CompTIA 220-1002 exam description and objectives. With the genuine 220-1002 dumps V19.02, you will be guaranteed to pass the CompTIA A+ Certification Exam: Core 2 exam successfully.

Check Free Dumps OF 220-1002 Dumps Updated V19.02

1. Which of the following is a reason to use WEP over WPA?

2. Which of the following types of scripts would be seen on the user end of a web page?

3. A user’s computer is displaying a black screen. The technician restarts the computer, but the OS still does not load. The technician discovers the OS was patched the previous evening.

Which of the following should the technician attempt NEXT?

4. A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately.

With which of the following types of infections are the PCs MOST likely infected? (Select two.)

5. A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error.

Which of the following should the technician do NEXT? (Choose two.)

6. A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives the following error: No OS found. The technician confirms the boot.ini file is correct.

Which of the following is MOST likely causing this error?

7. A technician is called to troubleshoot a user's Windows workstation that fails to boot. The user reports that, after updating the workstation's graphics driver to a beta version, the machine gives a "Stop" error on every boot.

Which of the following should the technician complete to resolve the issue?

8. A technician is repairing a computer.

Which of the following should the technician do to protect the computer from accidental voltage spikes?

9. A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory,.

Which of the following should the technician use to accomplish this?

10. Which of the following devices provides protection against brownouts?

11. Which of the following is a community supported, open source OS used for both services and workstations?

12. An administrator created a connection to a private network using TLS 1.2. The Linux servers on the network do not support secure protocols.

Which of the following will the administrator MOST likely use to log in to these servers?

13. A technician has been asked to recommend antivirus software for a home PC, but the user does not want to pay for a license.

Which of the following license type should the technician recommend?

14. A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

15. Which of the following BEST describes the purpose of an ESD mat?

16. In which of the following file extension types would a user expect to see the command. “net use T: serverfiles’?

17. A junior Linux system administrator needs to update system software.

Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

18. Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware.

Which of the following should the technician check NEXT?

19. A technician is working on a Windows 10 PC that is running slowly.

Which of the following commands should the technician use to correct this issue? (Select two.)

20. A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures.

Which of the following steps should be taken FIRST to determine the cause of the issue?

21. A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources.

Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

22. Ann, a user, calls a technician and reports that her PC will not boot. The technician confirms the memory, power supply, and monitor are all working. The technician runs internal diagnostics on the PC, but the hard drive is nor recognized.

Which of the following messages will be displayed?

23. A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

24. A technician needs to edit a protected .dll file but cannot find the file in the System32 directory.

Which of the following Control Panel utilities should the technician use?

25. A user’s mobile device appears to be losing battery life rapidly and often feels warm to the touch, even when it is put away. The device is relatively new, so the user is concerned it is defective.

A technician inspects the device and see the following:

Which of the following should be changed to resolve this issue?

26. Which of the following provide the MOST security for PCs and mobile devices? (Choose two.)

27. A user’s phone contains customer’s PII. The user cannot have the phone automatically wiped because the data is very valuable.

Which of the following is the BEST method of securing the phone?

28. A technician logs on to a Linux computer and runs the following command:

ps -aux | grep vi

Which of the following MOST accurately describes the effect of the command?

29. Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed.

Which of the following would be the appropriate action for Joe?

30. Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up. counting down the time until the computer is no longer usable.

Which of the following should the technician do NEXT?

31. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem.

Which of the following should the technician do NEXT?

32. An employee reported that a suspicious individual was looking through the recycle bin.

Which of the following types of social engineering threats is this?

33. Which of the following is considered government-regulated data?

34. A user’s corporate email is missing the shared inbox folders that were present before the user went on vacation. The technician verifies the user is connected to the domain and can still send and receive email.

Which of the following is MOST likely causing the missing folders issue?

35. Which of the following is the MOST secure wireless security protocol?

36. Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

37. Joe, a customer, has informed a Tier 2 help desk technician that a computer will not boot up. After about ten minutes of troubleshooting, Joe is increasingly concerned and claims that the technician is wasting his time because he has already tried everything that has been suggested.

Which of the following should the technician do?

38. A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low.

Which of the following tasks should be done FIRST?

39. Which of the following threats uses personalized information in an attempt at obtaining information?

40. A manager with a restricted user account receives the following error message:

Windows Update cannot currently check for updates because the service is not running.

The manager contacts the help desk to report the error. A technician remotely connects to the user’s computer and identifies the problem.

Which of the following should the technician do NEXT?

41. A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LAN do not exhibit this symptom.

Which of the following needs to be adjusted on the workstation to fix the issue?

42. A user is attempting to open Outlook, Outlook seems to have cached some invalid user login information, causing it to fail when trying to connect to Office 365 applications.

Which of the following Control Panel applets should a technician use to clear the cached invalid user login information?

43. A small business has an open wireless network so vendors can connect to the network without logging in. The business owners are concerned that a nearby company is connecting and using the wireless connection without permission.

If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?

44. A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car.

Which of the following troubleshooting steps should the technician take NEXT?

45. A technician has set up a new computer for a customer and needs to add a login with administrative privileges.

Which of the following tools should the technician use?

46. A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard.

Which of the following would be BEST suited for this task?

47. A small office’s wireless network was compromised recently by an attacker who brute forced a PIN to gain access. The attacker then modified the DNS settings on the router and spread malware to the entire network.

Which of the following configurations MOST likely allowed the attack to take place? (Select two.)

48. A technician received 300 old desktops following a recent computer upgrade. After taking inventory of the old machines, the technician must destroy the data on the HDDs.

Which of the following would be the MOST effective method to accomplish this task?

49. A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network.

Which of the following boot methods initiates such an upgrade?

50. An end user’s PC is taking a long time to boot.

Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

51. A user's computer reports it has many virus infections and directs the user to call a phone number for assistance. A technician removes the hard drive and virus scans the drive with another computer. The scan does not identify any viruses.

Which of the following is MOST likely the problem?

52. A systems administrator has discovered a folder on the server with numerous inappropriate pictures and videos, which is in violation of the company’s AUP.

Which of the following would be the NEXT appropriate act?

53. During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade.

Which of the following plans must be implemented to revert back to the most recent version of the firmware?

54. A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon.

Which of the following actions should the user take FIRST?

55. A technician is setting up a SOHO wireless network for a healthcare office that does not have a server. The user requires the highest level of wireless security and various levels of desktop authentication to access cloud resources.

Which of the following protocols and authentication methods should the technician implement? (Select two.)

56. A network administrator has given a technician documentation detailing the switchports the technician will need to patch in for a network upgrade.

Which of the following documents did the network administrator MOST likely give to the technician?

57. Joe, a systems administrator, is setting up a risk management plan for the IT department. Part of the plan is to take daily backups of all servers. The server backups will be saved locally to NAS.

Which of the following can Joe do to ensure the backups will work if needed?

58. A technician is disposing of computer hardware that contains PHI. The drive must be reusable.

Which of the following methods should be used?

59. A network administrator has noticed unusual activity with a user’s login credentials on the network. The user is attempting multiple simultaneous login across the network, some of which are attempting to access workstations and servers to which the user does not have access.

Which of the following should the network administrator do NEXT?

60. A Linux user report that an application will not open and gives the error only one instance of the application may run at one time. A root administrator logs on ot the device and opens terminal.

Which of the following pairs of tools will be needed to ensure no other instance of the software are correctly running?

61. A technician has identified malware on a user’s system.

Which of the following should the technician do NEXT according to malware removal best practices?

62. Which of the following provide the BEST security for a server room? (Select two.)

63. A sales representative regularly modifies confidential files on a laptop and needs them to be available all the time. The sales representative will be on a six-month business trip in two weeks. A technician has been asked to assist the sales representative with saving files.

Which of the following is the BEST method to implement to prevent any data loss for the sales representative?

64. Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

65. A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

66. A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

67. With which of the following types is a man-in-the-middle attack associated?

68. An end user is browsing the Internet when multiple browser pages open by themselves. The user notices the PC is running slowly, even while not browsing the internet.

Which of the following actions should the user take?

69. Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

70. A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.

Which of the following actions should the IT department perform NEXT?

71. A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

72. Which of the following built-in accounts was removed in Windows 10?

73. Which of the following installation methods will allow a technician to resolve issues that may arise while the installation is being performed?

74. Which of the following is the memory limitation of a 32-bit OS?

75. A company’s security policy does not allow USB drives to be available in workstations. However, an exception needs to be made for a user. The network administrator changes the policy for the user.

Which of the following commands should the administrator run on the user’s workstation?

76. A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely.

Which of the following steps should a technician perform?

77. A SOHO customer has recently experienced a major hurricane. The customer has no backups and has lost all data and hardware associated with the company. The customer calls a contractor to assist in the rebuilding process and needs suggestions on the best way to prevent this from happening again.

Which of the following recommendations should the contractor give to the customer? (Select two.)

78. Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

79. Which of the following NTFS security settings overrides all other settings?

80. A user calls a technician to report loud beeps that are coming from the server room following a recent rainstorm and power outage. The technician verifies all the servers are online and working properly, and the backup power unit is functioning properly and without errors.

Which of the following Is MOST likely the Issue?

81. A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.

Which of the following security concepts has the company just enabled?

82. A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.

Which of the following methods would the technician MOST likely perform on the computer?

83. A new business will be using credit cards in a physical location as well as its web presence.

Which of the following does the business need?

84. A technician is installing a private PC in a public workspace.

Which of the following password practices should the technician implement on the PC to secure network access?

85. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

86. A technician responds to a call from a user who claims to have a virus on a workstation.

The technician observes the following notification from the system tray:

There are 1033 infected files on this computer. Click here to disinfect.

The link is blocked by the corporate content filter and displays a message stating the site contains known malware.

Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?

87. A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.

Which of the following is causing the error?

88. Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow.

Which of the following is the MOST likely cause of this issue?

89. A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.

The remote connection drops periodically.

Which of the following steps should the technician take NEXT to resolve the problem?

90. A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.

Which of the following account types would the technician MOST likely set up on this kiosk machine?

91. A MAC user’s operating system became corrupted, and files were deleted after malware was downloaded. The user needs to access the data that was previously stored on the MAC.

Which of the following built-in utilities should be used?

92. Joe. an end user, just changed his network password A pop-up box appears a few minutes later, prompting him to enter his password. Joe enters his new network password and is able to continue working. A few minutes later, the same pop-up box appears again, asking him to enter his network password.

Which of the following Control Panel utilities can Joe use to help with this situation?

93. Which of the following technologies can be utilized in a wireless network environment to provide secure SSO access for WiFi and network resources?

94. A small business has an open WiFi network for employees but does not want customers to connect to the access point. A technician has been dispatched to address the business’s concerns.

Which of the following configuration settings should the technician change to satisfy the requirements of the business? (Select two.)

95. A user calls a technician to report issues when logging in to a vendor’s website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user’s office. The user also informs the technician of strange pop-up notifications.

Which of the following are the MOST likely causes of these issues? (Choose two.)

96. A user is trying to access a popular email website but is being redirected to a different website that asks for login credentials. The user calls a technician, who promptly notices a security issue.

Which of the following should the technician do to remove the threat from the system?

97. A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use.

Which of the following naming convention formats should the technician follow?

98. Which of the following technologies is used by malicious employees to obtain user passwords?

99. A technician needs to remove malware from a Windows system. The technician has already performed research on the malware and determined it is a memory virus.

Which of the following steps should the technician take NEXT?

100. Which of the following is the maximum RAM limit of a Windows 32-bit version?


 

Updated CompTIA Network+ Certification N10-008 Dumps (V11.02) - Good Online Resource To Pass CompTIA Network+ Exam
New CompTIA A+ Core 2 (220-1102) Test - Valid 220-1102 Dumps With Actual Questions and Answers

Add a Comment

Your email address will not be published. Required fields are marked *