Updated CompTIA A+ Certification 220-1002 Exam Dumps Online

As one of the two CompTIA A+ exams, 220-1002 CompTIA A+ Certification Exam: Core 2 tests your skills in installing and configuring operating systems, expanded security, software troubleshooting and operational procedures. The updated 220-1002 exam dumps online at DumpsBase cover the new content of CompTIA A+ 220-1002 exam topics. With the latest and the most updated 220-1002 exam dumps online, you can pass 220-1002 CompTIA A+ Certification Exam: Core 2 exam successfully.

Before getting the updated version, you are recommended to read 220-1002 free dumps below:

1. A technician is deploying a PXE installation of a new OS onto a small group of company workstations .

Which of the following should the technician monitor during the installation?

2. Which of the following security tools can leverage the onboard TPM to protect data at rest?

3. Which of the following would MOST likely be used by an attacker to identify the hash value of a strong password quickly?

4. A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help.

To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

5. Which of the following is the maximum amount of RAM a computer can access if it is using a 32-bit version of the Windows OS?

6. A technician replaced the hard drive for the organization's Chief Financial Officer (CFO). The technician wants to reuse the old drive in another system.

Which of the following actions would be MOST appropriate?

7. A user suspects a computer Is infected with malware. A technician identifies the symptoms as being related to a recent spread of malware .

Which of the following steps should the technician take NEXT to address the infection?

8. A user opens a phishing email and types logon credentials into a fake banking website. The computer’s antivirus software then reports it has quarantined several temporary Internet files. A technician disconnects the computer from the network .

Which of the following should the technician perform NEXT?

9. Ann, an end user, is utilizing a styles on her table. The recognition point is off when she uses the stylus, but it registers In the correct spool when she her finger .

Which of the following would be the BEST resolution to issue?

10. A special type of ESD-safe vacuum cleaner may be necessary to safely clean large spills of:

11. A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs .

Which of the following should the technician implement to ensure maximum uptime of the client VM?

12. Given the following batch file:

Which of the following describes the purpose of the line beginning with rem?

13. Which of the following devices are MOST likely to have a grounding wire attached to them based on the manufacturer’s design? (Select two.)

14. After installing an application on a smartphone, a user starts receiving pop-up ads for recently visited physical stores. The user also receives prompts to install other applications .

Which of the following permissions should be revoked to disable the unwanted notifications?

15. Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting email issues .

Which of the following is MOST likely the cause of the issue?

16. A company is creating a disaster recovery plan .

Which of the following should be implemented to BEST ensure the company’s data can be successfully restored in the event of a disaster?

17. After receiving a replacement smartphone. a corporate user is able to open some emails but is unable to open encrypted emails .

Which of the following troubleshooting steps should a technician take NEXT?

18. A user’s mobile device has slow data speeds. The user first noticed the slow speeds after downloading a large application to the device. The application download MOST likely caused:

19. A user calls the help desk to report issues with multiple pop-ups and degraded PC performance. The user is out of the area, and assistance can only be provided remotely .

Which of the following steps should a technician perform?

20. An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for subscribing to an organization’s mailing list .

Which of the following should be performed to remove and prevent any further emails from this organization?

21. A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

22. A technician needs to configure network shares on users' computers when they log on. The technician wrote the script with the net use command .

Which of the following script file types is the technician writing?

23. A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share .

Which of the following commands should the technician use FIRST?

24. Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

25. A technician has been dispatched to resolve a malware problem on a user’s workstation. The antivirus program discovered several hundred potential malware items on the workstation and removed them successfully. The technician decides to schedule daily scans on the system, enables System Restore, and creates a restore point .

Which of the following should the technician do NEXT?

26. A technician responds to a report that a user’s desktop is operating much slower after upgrading the Windows OS to the latest version. The technician notices responsiveness is erratic, and the symptoms are similar to a failing hard drive. The technician runs a full hardware diagnostic, and all systems pass. The technician checks the properties for each device in Device Manager and the hard disk and the standard AHCI 1.0 serial ATA controller both indicate the following message: This device is working properly .

Which of the following should the technician attempt that will MOST likely resolve the performance issue?

27. Which of the following are best practices to avoid ESD-related damage when handling internal computer components? (Choose two.)

28. After a successful phishing attempt on a corporate workstation, the workstation is infected with malware that went undetected by the antivirus. When a technician arrives to investigate the issue, the workstation is no longer in a bootable state. Recovery is not possible, and the operating system has to be reinstalled completely .

Which of the following would MOST likely prevent a future infection?

29. A user has changed the MAC address of a laptop to gain access to a network.

This is an instance of:

30. Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

31. A. user ran updates on a Windows computer recently. Since then, the external CD drive no longer reads discs. The user has connected the external drive to another computer that has not been updated and then successfully ran the discs .

Which of the following should the user do to fix the issue?

B. Upgrade the drive.

C. Replace the discs.

D. Roll back the drivers.

D Reinstall the firmware.

32. A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails .

Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

33. A technician is reviewing system updates. Some of the updates address vulnerabilities found in mission-critical servers, and they need to be performed immediately .

Which of the following should the technician perform FIRST?

34. A technician is setting up a SOHO router for a customer. Per the customer’s requirements, data security is the highest priority .

Which of the following provides the MOST security for the network?

35. A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

36. A network administrator received a report that the disk storing the accounting department's files has less than 10% free space. An extra was installed in the file server and is unused .

Which of the following OS management features would allow for additional disk space for the department, avoiding downtime?

37. A smartphone user receives notice that a threshold for high-speed data usage, despite the user’s usage behaviors being unchanged from previous periods .

Which of the following troubleshooting steps should the user take FIRST?

38. A technician has completed troubleshooting and repairing a newly found bug on a user’s workstation. The technician wants to share the repair steps with the rest of the team .

Which of the following methods will the technician MOST likely use?

39. A customer built a computer with the following specifications:

Single hexa-core processor

8GB DDR4 memory

256GB SSD drive

Built-in graphics card

32-bit Windows OS

Audio editing software

The computer seems to be working, but the OS reports only 3.5GB of RAM is available .

Which of the following would correct the issue?

40. A technician is working at a help-desk form and receives a call from a user who has experienced repeated BSODs. The technician is scheduled to take a break just after the call comes in .

Which of the following is the BEST choice for the technician to make?

41. A user calls the help desk regarding a new Windows issues that started in the morning. The user can no longer use any locally attached devices, such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

42. Ann. an external user, has received several calls from a company asking why she has been sending the company communications with internal users' names in the "from" field. Ann calls a technician and explains she has not been sending any communications and would like this issue fixed. The technician investigates and determines the PC is not infected with any viruses or malware .

Which of the following should the technician check NEXT?

43. Following instructions from the help desk, a company employee turns off a workstation that has a suspected ransomware infection. A technician is dispatched later to investigate the workstation.

Which of the following should the technician perform FIRST?

44. A Microsoft application will not open when a user clicks on it. Instead, the following error message pops up: This application has crashed. Would you like to send an error report to Microsoft.

Which of the following should the user try FIRST?

45. A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

46. A technician is troubleshooting a network connectivity issue on a Linux workstation .

Which of the following commands would help the technician gain information about the network settings on the machine?

47. A technician receives a security alert stating a vendor has left a Keylogger on certain systems that shipped configured from the factory. The technician needs to research the system model numbers to determine if any production computers are affected.

II the technician finds vulnerable systems, which of the following is the BEST method to remove the Keylogger?

48. A Chief Information Officer (CIO) recently learned a critical update is required to secure several servers within the organization. The CIO asks a technician to:

✑ Deploy the patches to the environment following best practice protocols.

✑ Ensure the servers and applications are functioning properly after the deployment.

Which of the following steps will the technician most likely take NEXT?

49. A company has hired a new IT firm to manage its network switches and routers.

The firm is geographically separated from the company and will need to able to securely access the devices.

Which of the following will provide the ability to access these devices?

50. A technician is setting up a computer that needs to be configured so a few users can access it using Remote Desktop. For security reasons, the users should not be able to install software or change system settings.

Which of the following Control Panel utilities should the technician use to accomplish this task?

51. A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen, The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using the side buttons designed for volume and power .

Which of the following describes the root cause of the issue?

52. A technician is removing a virus from a user’s Windows workstation. The virus was installed by the user while downloading pirated software from the Internet .

Which of the following should the technician do to address this issue?

53. A technician is implementing multifactor authentication for logins to the network. The network already requires a username and password to authenticate users .

Which of the following should the technician add to meet the multifactor requirement?

54. Which of the following should a technician do to ensure static electricity does not damage the internal components of a PC while troubleshooting the motherboard?

55. A user recently browsed several online shopping sites on a computer. Since then, the user has been experiencing pop-ups that appear in the browser. The pop-ups also display in the right

corner of the screen without the browser open .

Which of the following should the technician do to remove the pop-ups?

56. A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom .

Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?

57. A security learn recommends a disaster recovery plan with the following requirements:

* Recent backups should be readily available.

* Only long-term backups should be stored off premises

* There should be minimum expenditure on hardware .

Which of the following satisfies all of these requirements?

58. A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information .

Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

59. A company is implementing multifactor authentication and requires a solution that utilizes TCP .

Which of the following will the company MOST likely select?

60. A user is working with the command line interface on a Linux computer To show the contents of the current directory, which of the following commands should be used'

61. An employee reported that a suspicious individual was looking through the recycle bin .

Which of the following types of social engineering threats is this?

62. A technician has installed a second monitor for a customer, but the desktop font sizes do not match .

Which of the following display settings should be technician adjust to correct this issue?

63. A user's laptop screen goes black after five minutes of not being used .

Which of the following Windows Control Panel utilities should be used to modify the user experience?

64. An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office .

Which of the following would MOST likely reduce this symptom? (Select TWO).

65. A technician is scheduled to upgrade a grocery store's network equipment at 11 00 p.m. There are only a few shoppers in the store, therefore, the store manager wants the technician to start the upgrade early.

Which of the following is the NEXT step the technician should perform?

66. A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely .

Which of the following solutions must the hardware be able to support? (Choose two.)

67. During the firmware upgrade of a web server, a power outage occurred. The outage caused a failure within the upgrade .

Which of the following plans must be implemented to revert back to the most recent version of the firmware?

68. While troubleshooting a software error on a user’s computer, a technician finds inappropriate content.

Which of the following should the technician perform FIRST?

69. A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources .

Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

70. Which of the following identifies changes in the environment, such as alternating current failure?

71. A technician is setting up a new laptop for a doctor to take to a conference. The laptop contains private health information, and the technician needs to ensure the laptop is protected from unauthorized access in case it us lost or stolen .

Which of the following the technician implement the BEST meet this requirement? (Select TWO.)

72. A customer Is having trouble opening several files on a computer. The customer renames one of the files, but then the correct program will no longer open it.

Which of the following settings is a solution to the issue?

73. When an employee logs in to a computer, access is automatically granted to all applications .

Which of the following must be enabled to facilitate this capability?

74. Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch .

Which of the following must Ann do to allow FTP communications?

75. Which of the following security settings can be changed on a folder to stop permission propagation and assign new rights?

76. A user reports that an application has been closing unexpectedly for the past two days when posting transactions. When an administrator attempts to access the application, it generates an error stating a data

library is missing.

Which of the following should a technician attempt FIRST?

77. A network technician is creating a set of scripts to help complete some common tasks. The technician wants to leave notes within the scripts to explain the purpose of each section and allow for changes later .

Which of the following should the technician use?

78. A technician is setting up a media server and wireless router that can stream video files to portable devices. The technician was asked to configure the system so the videos can be accessed by devices outside the LAN .

Which of the following does the technician MOST likely need to configure to allow access?

79. A network administrator wants to plan a major OS upgrade of the router, which acts as a default gateway in an organization. The administrator has documented the purpose of the change, scoped the change, and completed a comprehensive risk analysis .

Which of the following is an important part of the change request process for which the administrator still must plan?

80. A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem .

Which of the following should the technician do NEXT?

81. A technician needs to format a 64GB flash drive .

Which of the following formats will the technician MOST likely use?

82. Which of the following is the MOST common method of allowing outside access through a wireless SOHO router for specific program access?

83. A company requires multifactor authentication. When accessing one of the available RemoteApp programs that requires authentication, the user is not prompted to enter a pin.

Which of the following BEST describes this scenario?

84. An end user’s PC is taking a long time to boot .

Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

85. A user browses to a company's Intranet page and receives an invalid certificate message A technician discovers the certificate has expired A new certificate is put In place and Installed on the user's computer; however, the user still receives the same message when going to the Intranet page. The technician tries with a third-party browser and connects without error. The technician needs to make sure the old certificate is no longer used in Internet Explorer .

Which of the following Internet Options should the technician use to ensure the old certificate is removed'?

86. A Windows user is attempting to install a local printer and is unsuccessful on permissions.

Which of the following user types BEST describes this user?

87. Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

88. A recent outbreak of a virus has uncovered that a company must put a security template in place to mitigate future virus outbreaks .

Which of the following best practices would a technician MOST likely implement as pari of the security template? (Select TWO).

89. An end user who travels frequently receives a lot of spam and ransomware emails. The user has asked a technician to help ensure the data is secure and duplicated regularly without the need for equipment .

Which of the following would be the BEST method?

90. A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s laptop is currently using the corporate network for access to network resources as well as the cloud .

Which of the following should the help desk recommend performing prior to using the hotel network?

91. A technician must remove data from the human resources computers. The technician plans to reuse the drives in the computers.

Which of the following data destruction methods should the technician perform to ensure the data is removed completely?

92. A user moves a file from one NTFS disk to another NTFS disk.

Which of the following descnbes the changes to the file permissions?

93. A junior Linux system administrator needs to update system software .

Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

94. A technician discovers a user’s home computer has Windows Update disabled and suspects malware has replaced several Windows OS files.

After completing a malware scan, which of the following command line utilities would the technician MOST likely run before enabling Windows Update?

95. While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program .

Which of the following is the BEST option given the solution?

96. A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and Linux OSs.

Which of the following should the technician suggest the customer use?

97. An employee is unable to view in-office network folders while working at home .

Which of the following is the MOST likely cause of the problem?

98. A customer’s computer was turned off overnight, When the customer restarts the computer, an advanced startup menu is displayed.

The startup repair option is unsuccessful and causes the computer to reboot repeatly untill the advanced startup screen reappears .

Which of the following should a technician attempt FIRST?

99. A user calls the help desk regarding a new Windows issue that started in the morning. The user can no longer use any locally attached devices such as a mouse or a printer, and a reboot did not fix the problem.

Which of the following would MOST likely fix the issue?

100. The Chief Executive Officer (CEO) of an organization frequently travels with sensitive data on a laptop and is concerned the data could be compromised if the laptop is lost or stolen .

Which of the following should the technician recommend to BEST ensure the data is not compromised if the laptop is lost or stolen?


 

Get Updated CAS-003 Dumps To Pass CompTIA Advanced Security Practitioner (CASP+) Certification

Add a Comment

Your email address will not be published. Required fields are marked *