Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: takeit60

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102

220-1002 CompTIA A+ Certification Exam: Core 2 Questions and Answers

Questions 4

Joe, a user, notices someone use his computer while he was on break, Joe’s browser history reveals searches for websites he did not visit. The local print also has document in the output tray with someone else’s PII. Which of the following steps should Joe take to prevent unauthorized access of his account.

Options:

A.

Lock the desktop while he is away

B.

Change his password

C.

Implement login time restriction

D.

Change the default administrator password

Buy Now
Questions 5

A Windows user is trying to print a large number of documents to a network printer, but the printer is no longer printing. A technician investigates and notices all the jobs are stuck in the print queue. Which of the following should the technician perform to resolve the issue?

Options:

A.

Restart the WMI service

B.

Restart the Network Connection service.

C.

Restart the spooker service.

D.

Restart the Windows Update service

Buy Now
Questions 6

Which of the following security tools can leverage the onboard TPM to protect data at rest?

Options:

A.

Encrypted file system

B.

Access control list

C.

BitLocker

D.

Secure file transfer protocol

Buy Now
Questions 7

After purchasing an Ultrabook. Ann. a home user, has a technician come to her home and install an operating system. Which of the following OS retaliation methods will the technician MOST likely use?

Options:

A.

Flash drive

B.

PXE

C.

Optical disc

D.

Cloned drive

Buy Now
Questions 8

A technician is attempting to resolve an issue with a customer's smartphone. The customer can no longer unlock the smartphone due to an “incorrect pattern" message appearing onscreen,

The customer explains that the option to "make pattern visible” is unchecked in the security settings. The customer has also unsuccessfully tried to unlock the smartphone using a PIN. The

customer is certain the pattern and PIN being entered are both correct. The technician is unable to click the proper options onscreen to perform a reset, but can select it without issue using

the side buttons designed for volume and power. Which of the following describes the root cause of the issue?

Options:

A.

The smartphone's data cable is disconnected.

B.

The smartphone's side buttons are becoming sticky.

C.

The smartphone has very little free space available.

D.

The smartphone screen needs to be calibrated.

Buy Now
Questions 9

A user notices recent print jobs are not printing to the local printer despite printing fine yesterday. There are no errors indicated on the taskbar printer icon. Which of the following actions should the user take FIRST?

Options:

A.

Check to ensure the printer selected is the default printer

B.

Check the status of the print server queue

C.

Cancel all documents and print them again

D.

Check that the printer is not offline print mode

Buy Now
Questions 10

A desktop technician is attempting to upgrade several machines to Windows 10. After releasing there is only one disc for the installation, the technician decides to upgrade over the network. Which of the following boot methods initiates such an upgrade?

Options:

A.

SSD

B.

Optical drive

C.

Flash drive

D.

PXE

Buy Now
Questions 11

A user has installed two new drives in one of the computers in the computer lab and has been unable to format Disk1 from the command prompt.

The lab requires that Disk1 be a dynamic disk configured with two partitions. The first partition must be 256,000 MB in size and mapped to drive F. The second partition must be 512,000 MB in size and mapped to drive G.

The new partitions must be formatted to ensure that user’s files can be secured from other users and that the disk must be configured to account for future redundancy.

Make sure to maintain a consistent file system.

INSTRUCTIONS:

Conduct the necessary steps within the Disk Manager to accomplish these tasks.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 12

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Options:

A.

Remove any proxy servers configured on the user’s browsers.

B.

Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C.

Disable the SPI firewall on the office’s gateway and any other routers.

D.

Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E.

Create an outbound rule in Windows Firewall named after the user’s homepage.

F.

Run anti-malware scans and download the latest Windows updates.

Buy Now
Questions 13

Which of the following BEST describes the purpose of an ESD mat?

Options:

A.

Protects against accidental static discharge

B.

Protects against dust/dirt contamination

C.

Protects against accidental scratches

D.

Protects against accidental water damage

Buy Now
Questions 14

Which of the following features has undergone the most significant changes from Windows 7 to Windows 10 and greatly simplified the operating system installation process?

Options:

A.

Driver detection

B.

Metro interface

C.

Account control

D.

PXE installation

Buy Now
Questions 15

Joe, a user who is travelling for business, reports that his mobile phone was getting approximately 35 Mbps for the first few days of his trip, but now it is only getting around 500 Kbps. Joe uses the device as a GPS to visit customers and as a hot-spot to check work email and watch movies online. Which of the following is the MOST likely cause of Joe’s slow data speeds?

Options:

A.

Joe’s data transmission is over the limit

B.

The phone needs to be rebooted from overuse

C.

The use of GPS interferes with data speeds

D.

There is unintended Bluetooth pairing.

Buy Now
Questions 16

A junior Linux system administrator needs to update system software. Which of the following shell commands would allow the administrator to gain the necessary permissions to update the software?

Options:

A.

sudo

B.

chmod

C.

grep

D.

pwd

Buy Now
Questions 17

A technician is investigating the cause of a Windows 7 PC running very slow. While reviewing Task Manager, the technician finds one process is using more than 90% of the CPU. Outbound network traffic on port 25 Is very high, while Inbound network traffic Is low. Which of the following tasks should be done FIRST?

Options:

A.

Disconnect the network cable.

B.

Update the antivirus software.

C.

Run an antivirus scan.

D.

Shut down the PC

Buy Now
Questions 18

A technician logs on to a Linux computer and runs the following command:

ps -aux | grep vi

Which of the following MOST accurately describes the effect of the command?

Options:

A.

It kills any running programs starting with the letters vi.

B.

It opens a list of directories that start with the letters vi.

C.

It creates a new file named grep in the current working directory.

D.

If finds a list of processes running a text editor.

Buy Now
Questions 19

A technician is troubleshooting a print issue on a Windows computer and want to disable the printer to test a theory, Which of the following should the technician use to accomplish this?

Options:

A.

Devices and Printer

B.

Sync Center

C.

Device Manager

D.

Power Option

Buy Now
Questions 20

A client wants a technician to create a PC naming convention that will make the client’s PCs easier to track and identify while in use. Which of the following naming convention formats should the technician follow?

Options:

A.

Domain name, location, IP address

B.

Domain name, location, asset ID

C.

Asset ID, MAC address

D.

Location, RFID

Buy Now
Questions 21

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

Options:

A.

Installation method

B.

System requirements

C.

OS compatibility

D.

File permissions

Buy Now
Questions 22

A network administrator notifies a technician that the company is experiencing a DDoS attack. Several internal Windows PCs are the source of the traffic. The network administrator gives the technician the Windows computer names and states they be scanned and cleaned immediately. With which of the following types of infections are the PCs MOST likely infected? (Select two.)

Options:

A.

Spyware

B.

Zombies

C.

Virus

D.

Ransomware

E.

Worm

F.

Botnet

Buy Now
Questions 23

A company has just experienced a data breach that affected all mobile devices. Which of the following would BEST secure access to users' mobile devices? (Select TWO).

Options:

A.

Full device encryption

B.

Remote backup application

C.

SSO authentication

D.

Device profiles update

E.

OS security updates

F.

Biometric authentication

Buy Now
Questions 24

A technician is installing Windows 7 64-bit OS on a VM but keeps getting errors. The specifications for the malware are:

Two 1GHz CPUs

2GB of memory

15GB hard drive

800x600 screen resolution

Which of the following should the technician do to resolve the problem?

Options:

A.

Increase the number of CPUs

B.

Increase the amount of memory

C.

Increase the amount of hard drive space

D.

Increase the screen resolution

Buy Now
Questions 25

With which of the following types is a man-in-the-middle attack associated?

Options:

A.

Brute force

B.

Spoofing

C.

DDoS

D.

Zero-day

Buy Now
Questions 26

Every time a user manually runs an antivirus scan, the workstation becomes unresponsive, and the user has to reboot A technician is dispatched and sees an antivirus pop-up in the system tray, indicating the computer is severely damaged, and a "click here" button to resolve it. There is a timer in the pop-up. counting down the time until the computer is no longer usable. Which of the following should the technician do NEXT?

Options:

A.

Research the pop-up to see if it is a legitimate malware solution.

B.

Click on the pop-up window to resolve the issue before the time runs out.

C.

Send an email to all staff members warning them of malware on their system.

D.

Disconnect the Ethernet cable from the workstation and disable WiFi.

Buy Now
Questions 27

A technician is installing a private PC in a public workspace. Which of the following password practices should the technician implement on the PC to secure network access?

Options:

A.

Remove the guest account from the administrators group

B.

Disable single sign-on

C.

Issue a default strong password for all users

D.

Require authentication on wake-up

Buy Now
Questions 28

A user is working with the command line interface on a Linux computer To show the contents of the current directory, which of the following commands should be used'

Options:

A.

Is

B.

dir

C.

-get

D.

mv

Buy Now
Questions 29

A technician Is troubleshooting network connectivity and receives the following output:

Which of the following tools is the technician MOST likely using? (Select TWO)

Options:

A.

ping

B.

ipconfig

C.

netstat

D.

nslookup

E.

tracert

F.

nbstat

Buy Now
Questions 30

A user installed an application that now requires a license key to enable lull functionality. The user contacts support, and the technician decides to enter a license key in the software GUI on behalf of the user. Which of the following will support this task''

Options:

A.

SSH

B.

RDP

C.

FTP

D.

Telnet

Buy Now
Questions 31

Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting

email issues. Which of the following is MOST likely the cause of the issue?

Options:

A.

There is an OS update failure.

B.

Out-of-office is turned on.

C.

There is an Internet connectivity issue.

D.

SMTP services are not running.

Buy Now
Questions 32

Joe, a user, calls the help desk from a coffee shop while on a business trip to report the WiFi hot-spot on his phone is extremely slow. The technician runs a speed test from a laptop connected to the hot-spot and gets 200Kbps. Ann, Joe’s coworker with whom he is travelling, also has a hot-spot on her phone, and the speed test result on that hot-spot is 15Mbps. The technician checks the hot-spot settings on Joe’s phone and sees the following:

Which of the following is the MOST likely cause of the problem?

Options:

A.

Joe should be using WEP security on his hot-spot for faster throughput

B.

Someone else is using Joe’s hot-spot due to weak password

C.

Joe’s hot-spot gave him an invalid IP address

D.

Joe is likely in a poor signal area and should try another area

Buy Now
Questions 33

An end user set up a gaming server on an extra Windows PC. The user wants the PC to restart automatically during the night using the shutdown -r -£ command

Which of the following is the BEST tool to accomplish this?

A Computer Management

2B Task Scheduler b

C. Task Manager

D. Control Panel

Options:

Buy Now
Questions 34

A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization. Which of the following security concepts has the company just enabled?

Options:

A.

Certificates

B.

Least privilege

C.

Directory permissions

D.

Blacklists

Buy Now
Questions 35

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

Options:

A.

Universal serial bus locks

B.

Personal identity verification cards

C.

Privacy screen

D.

Entry control roster

E.

Door locks

F.

Privacy window

Buy Now
Questions 36

A team needs to deploy a temporary server room at a site to provide support during construction.

Which of the following should they use at this site while setting up the server room?

Options:

A.

Air filters

B.

Privacy screens

C.

Vacuums

D.

ESD mats

Buy Now
Questions 37

A technician needs to edit a protected .dll file but cannot find the file in the System32 directory. Which of the following Control Panel utilities should the technician use?

Options:

A.

System

B.

Display

C.

Folder Options

D.

Indexing Options

Buy Now
Questions 38

An employee contacts the help desk because the battery in a company-provided smartphone lasts only a short period of time when the worker is in the office. Which of the following would MOST likely reduce this symptom? (Select TWO).

Options:

A.

Close applications when tasks are completed.

B.

Increase the time to dim the screen automatically.

C.

Increase the frequency for syncing corporate email.

D.

Set the smartphone display to maximum brightness.

E.

Connect to the office WiFi network automatically.

F.

Disable 802.11ac and use mobile data exclusively.

Buy Now
Questions 39

A customer’s computer is having difficulty opening programs and regularly receives error messages regarding low system resources. Which of the following performance settings changes would BEST help customer temporarily until upgrade can be made?

Options:

A.

Data execution prevention

B.

Page-file size

C.

Visual effects

D.

Processor scheduling

Buy Now
Questions 40

Which of the following types of scripts would be seen on the user end of a web page?

Options:

A.

.bat

B.

.js

C.

.sh

D.

.vbs

Buy Now
Questions 41

Which of the following operating systems utilizes the web browser named Edge, replacing its older browser software?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 42

Which of the following are typically too dangerous to be disassembled by an in-house technician? (Choose two.)

Options:

A.

LCD monitor

B.

Power supply

C.

Laptop screen

D.

CRT monitor

E.

Motherboard

F.

Tablet

Buy Now
Questions 43

A technician is troubleshooting an issue affecting all company laptops. All the laptops have exactly the same hardware. The screens present glitches every time the users move their mouse pointers over the screen. The technician discovers there was a recent OS update deployed throughout the company, which includes new versions for video drivers. Restarting the laptop in safe mode will not present the issue. Which of the following should the technician do NEXT?

Options:

A.

Roll back the video card device drivers for all computers and escalate the issue to the video card vendor.

B.

Remove the current video drivers from all computers and advise users to work this way until the issue gets fixed.

C.

Advise all users to work in safe mode until the issue gets fixed and escalate the issue to the video card vendor.

D.

Reinstall the OS on all devices in the company to eliminate any traces of the current video drivers, then rerun the updates manually excluding the video drivers.

Buy Now
Questions 44

A technician is acquiring hardware devices and setting up a computer lab with virtual desktops. The lab computers must have the ability to connect automatically to the remote session upon boot and must be started remotely. Which of the following solutions must the hardware be able to support? (Choose two.)

Options:

A.

Image deployment

B.

Multiboot

C.

PXE

D.

Unattended installation

E.

USB

F.

Wake-on-LAN

Buy Now
Questions 45

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Buy Now
Questions 46

An IT professional recently assisted Ann, a customer, with updating her password and regaining access to a

hijacked email account. Shortly afterward, Ann notices dozens of unwanted emails, thanking her for

subscribing to an organization’s mailing list. Which of the following should be performed to remove and prevent

any further emails from this organization?

Options:

A.

Click the “Unsubscribe” button on each unwanted email

B.

Send the unwanted items to the spam or junk folder

C.

Deploy an email address whitelist

D.

Create domain-based filters

Buy Now
Questions 47

A user calls the corporate help desk to report a malware detection message that is displayed on the user's screen Which of the following should the technician instruct the user to do FIRST?

Options:

A.

Ignore the message as a false positive

B.

Shut down and restart the computer.

C.

Unplug the Ethernet cable.

D.

Follow the onscreen instructions to remove the malware

Buy Now
Questions 48

A user is unable to open a document on a shared drive from a Linux workstation. Which of the following commands would help the user gain access to the document?

Options:

A.

chmod

B.

lfconfig

C.

pwd

D.

grep

Buy Now
Questions 49

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

Options:

A.

After granting these permissions, disable the camera and GPS

B.

Install the application and change the permissions later

C.

Cancel installation of the application and report it to the application source

D.

Accept these permission requests and install the application

Buy Now
Questions 50

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

Options:

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Buy Now
Questions 51

A technician is working on a desktop computer that is not performing as expected. Program windows sometimes open and close without user intervention. Windows cannot check for OS updates, and some websites are not accessible. Which of the following tasks should the technician perform FIRST?

Options:

A.

Roll back recent driver updates.

B.

Replace the defective keyboard.

C.

Reset all the settings in the Internet Options.

D.

Unplug the Ethernet cable.

Buy Now
Questions 52

A user’s desktop will not run an accounting program. The program’s splash screen pops up, and then the software freezes. Which of the following actions should a technician take FIRST to help resolve the issue?

Options:

A.

Uninstall, reinstall, and restart the application.

B.

Reseat the memory.

C.

Ensure the PC meets the minimum requirements.

D.

Reset the PC display settings.

Buy Now
Questions 53

A user's PC has become infected with malware that has a known remediation, Which of the fallowing would MOST likely prevent this from happening again?

Options:

A.

Create a restore point.

B.

Utilize a preinstallation environment.

C.

Disable System Restore.

D.

Keep software up to date.

Buy Now
Questions 54

A technician submitted a change control request to upgrade the firmware on all company switches at the same time, during off hours, and through automation. Which of the following change management documents is MOST important to create to ensure the upgrade will not adversely affect the business?

Options:

A.

Plan for the change

B.

Scope of the change

C.

Risk analysis of the change

D.

Documentation of the change

Buy Now
Questions 55

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

Options:

A.

Incompatibility

B.

Impact to the network

C.

Impact to the user

D.

Impact to the device

Buy Now
Questions 56

A user has changed the MAC address of a laptop to gain access to a network. This is an instance of:

Options:

A.

spoofing

B.

brute force

C.

man-in-the-middle

D.

a botnet

Buy Now
Questions 57

A customer built a computer with the following specifications:

Single hexa-core processor

8GB DDR4 memory

256GB SSD drive

Built-in graphics card

32-bit Windows OS

Audio editing software

The computer seems to be working, but the OS reports only 3.5GB of RAM is available. Which of the following

would correct the issue?

Options:

A.

16GB DDR4 memory

B.

64-bit Windows OS

C.

Dual hexa-core processors

D.

512GB SSD drive

Buy Now
Questions 58

Ann, a customer, calls a technician and states that she is very concerned about the privacy of her home computer and the security of her home network while browsing the Internet. Which of the following would the technician MOST likely discuss with Ann to educate her on security concepts addressing her concerns? (Choose two.)

Options:

A.

Firewall

B.

Antivirus

C.

Email filtering

D.

ACLs

E.

VPN

Buy Now
Questions 59

Which of the following variable types should be used to store the data “Chicago” within a script or code?

Options:

A.

Integer

B.

String

C.

Boolean

D.

Float

Buy Now
Questions 60

A company needs to destroy several SSDs that contain sensitive information. Which of the following methods

is BEST suited for the total destruction of the SSDs?

Options:

A.

Overwriting

B.

Formatting

C.

Incinerating

D.

Degaussing

Buy Now
Questions 61

Which of the following Windows versions introduced using applications in the Metro interface?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 62

Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Options:

A.

Install the third-party driver from the manufacturer's website.

B.

Update the included Windows driver from Windows Update

C.

Flash the firmware on the BIOS to the latest version.

D.

Replace the video card with one that is supported by Windows natively.

Buy Now
Questions 63

Which of the following Microsoft operating systems comes with a PDF printer as part of the OS functionality?

Options:

A.

Windows 7

B.

Windows 8

C.

Windows 8.1

D.

Windows 10

Buy Now
Questions 64

After connecting to the corporate VPN, a user's workstation is no longer able to browse Internet websites A technician discovers launching a different web browser on the same computer reaches the websites correctly Which of the following should the technician do NEXT?

Options:

A.

Verify the browser's proxy configuration settings

B.

Instruct the user to use the alternate web browser instead.

C.

Disconnect and reconnect from the corporate VPN

D.

Flush the workstation's DNS cache

E.

Scan the user's workstation for malware

Buy Now
Questions 65

A technician is troubleshooting a network connectivity issue on a Linux workstation. Which of the following commands would help the technician gain information about the network settings on the machine?

Options:

A.

chmod

B.

grep

C.

ifconfig

D.

sudo

Buy Now
Questions 66

When a computer accesses an HTTPS website, which of the following describes how the browser determines the authenticity of the remote site?

Options:

A.

Certificates

B.

Software tokens

C.

Firewall

D.

Port security

Buy Now
Questions 67

Which of the following is protected data that can be found in a medical record?

Options:

A.

PII

B.

PHI

C.

PCI

D.

SPI

Buy Now
Questions 68

Joe, a technician, is installing a new internet connection at a customer’s site. While performing the installation, joe takes a cell from his manager and then responds to a social request. The customer become frustrated and asks and asks to speak with a supervisor. Which of the following should Joe do NEXT?

Options:

A.

Apologize for the delay, explain the situation, and promise the customer a refund.

B.

Give the supervisor’s phone number to the customer, leave the customer location, and document the incident.

C.

Assure the customer that the installation is almost complete and offer the supervisor’s phone number.

D.

Decline to provide the supervisor phone number to the customer and continue with the installation.

Buy Now
Questions 69

Ann. a network engineer is performing an after-hours upgrade on a network switch During the activity. Ann notices an unrelated setting she believes is misconfigured She decides to change the setting during the upgrade which causes an outage. Which of the following change management practices would MOST likely have prevented this outage?

Options:

A.

Risk analysis

B.

Change board approval

C.

Scoping the change

D.

End-user acceptance

Buy Now
Questions 70

A system administrator needs to submit a change request to the change control board for review and approved. The system administrator will be upgrading the production servers to the latest OS. Which of the following must the administrator include in the change request before the change control board will approve the request? (Select THREE.)

Options:

A.

A continuity of operations plan

B.

Change board approval

C.

A rack diagram

D.

An updated baseline

E.

A risk analysis

F.

A change plan

G.

A back-out plan

Buy Now
Questions 71

A remote user has reported a suspicious pop-up. and a technician is troubleshooting the user's laptop. The technician needs to connect securely to the computer to view the user's screen and investigate the issue Which of the following should the technician use?

Options:

A.

SSH

B.

MSTSC

C.

SFTP

D.

MSRA

Buy Now
Questions 72

Joe. a user, is receiving automated replies but does not remember sending any emails to those recipients He checks the sent items folder and sees email messages he did not send Which of the following would be the BEST way to resolve this issue?

Options:

A.

Reset Joe's email password

B.

Set up a rule to delete the automated replies

C.

Mark the automated replies as spam

D.

Rebuild Joe's profile

Buy Now
Questions 73

A customer reports that a phone’s battery does not last as long as expected. Which of the following would be the BEST way to resolve the short battery life issue and maintain phone functionally?

Options:

A.

Turn off mobile data.

B.

Email airplane mode.

C.

Disable software updates

D.

Uninstall games

E.

Stop all background applications.

Buy Now
Questions 74

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

Options:

A.

Contact his supervisor so the supervisor can make schedule changes.

B.

Move the appoints to the next business day.

C.

Reach out to a colleague to assist in completing the jobs.

D.

Continue to work on the current call, and get to the others as soon as possible.

Buy Now
Questions 75

A user’s smartphone is experiencing limited bandwidth when at home. The user reports to a technician that the device functions properly when at work or in the car. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Reset the device’s network settings

B.

Check the data usage statistics on the device

C.

Verify the SSID with which the device is associated

D.

Run any pending application or OS updates

Buy Now
Questions 76

A user calls a technician to report issues when logging in to a vendor's website. The technician is able to log in successfully before going to the office. However, the technician is unable to log in when in the user's office. The user also informs the technician of strange pop-up notifications. Which of the following are the MOST likely causes of these issues? (Select TWO).

Options:

A.

System files have been deleted

B.

Proxy settings are configured improperly

C.

The OS has been updated recently.

D.

There are disabled services on the vendor website.

E.

Program file permissions have changed recently.

F.

There is a rogue anti-malware program.

Buy Now
Questions 77

A technician is investigating connectivity issues over the corporate network. The technician attempts to Telnet into an access point in the break room, which is labeled AP-1. but is unable to proceed any further or authenticate Which of the following commands will be MOST beneficial in determining the connectivity issues?

Options:

A.

netstat

B.

tracert

C.

ipconfig

D.

nslookup

Buy Now
Questions 78

A technician is setting up a new corporate wireless network. One of the following requirements for the network is that connections must only be allowed for current account without giving a wireless key. Which of the following should the technician use?

Options:

A.

MAC filtering

B.

RADIUS

C.

MFA

D.

WPA2

Buy Now
Questions 79

A computer becomes infected with malware, which manages to steal all credentials stored on the PC. The malware then uses elevated credentials to infect all other PCs at the site. Management asks the IT staff to take action to prevent this from reoccurring. Which of the following would BEST accomplish this goal?

Options:

A.

Use an antivirus product capable of performing heuristic analysis

B.

Use a host-based intrusion detection system on each computer

C.

Disallow the password caching of accounts in the administrators group

D.

Install a UTM in between PC endpoints to monitor for suspicious traffic

E.

Log all failed login attempts to the PCs and report them to a central server

Buy Now
Questions 80

A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the

CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same user calls again with the same problem. Which of the following is a tool the technician can use to resolve the issue?

Options:

A.

Task Manager

B.

MSTSC

C.

MSConfig

D.

PerfMon

Buy Now
Questions 81

Which of the following would MOST likely be used in secure client-server communication?

Options:

A.

Redirection

B.

Certificates

C.

Port security

D.

Group Policy

Buy Now
Questions 82

A technician is updating a Linux server that had been in storage. After booting into single-user mode, a command is issued that displays the technician's current location in the filesystem. Which of the following commands was issued?

Options:

A.

pwd

B.

passwd

C.

apt-get

D.

grep

Buy Now
Questions 83

A network support technician takes a call from an office manager who wants to change the wireless security

key on the access point in that particular office. The office manager explains that a label on the access point

indicates it has an IP address of 10.0.100.2. Which of the following should the technician use to connect

securely to the access point to make the change?

Options:

A.

RDP to 10.0.100.2

B.

SSH to 10.0.100.2

C.

HTTP to 10.0.100.2

D.

Telnet to 10.0.100.2

Buy Now
Questions 84

Which of the following OS installation types would a technician use for multiple workstations at the same time?

Options:

A.

Image deployment

B.

Clean install

C.

Multiboot

D.

In-place upgrade

Buy Now
Questions 85

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

Options:

A.

WPA2-PSK

B.

AES

C.

TACACS

D.

TKIP

Buy Now
Questions 86

A user wants to use a computer to access files on a nearby laptop Both computers can ping each other, but the user is unable to access any remote files. Which of the following settings should the user change to resolve the issue?

Options:

A.

Proxy settings

B.

Default gateway

C.

Firewall exceptions

D.

DNS

E.

QoS

Buy Now
Questions 87

Joe, a technician, recently installed drivers for a webcam, but he is now experiencing issues when trying to operate it. Which of the following should Joe check NEXT to troubleshoot the issue?

Options:

A.

Services

B.

Device Manager

C.

Event Viewer

D.

Programs and Features

Buy Now
Questions 88

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

Options:

A.

Download antivirus updates

B.

Update the device drivers

C.

Quarantine the affected systems

D.

Perform hardware diagnostics

Buy Now
Questions 89

While installing a hard drive in a server, the administrator installs an extra physical hard disk Which of the following technologies will allow the administrator to extend an existing volume onto the extra disk?

Options:

A.

Dynamic partitioning

B.

Disk defragmenter

C.

RAID Level 5

D.

Swap partition

Buy Now
Questions 90

A user receives an email on a company smartphone. When trying to open the email, the user gets a message stating the email is encrypted, and the user cannot open it. The user forwards the email to a personal email account and receives the same message. The user calls the IT department to ask for help. To decrypt the message, the technician tells the user to contact the sender of the message to be able to exchange:

Options:

A.

keys

B.

passwords

C.

root CA

D.

tokens

Buy Now
Questions 91

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

Options:

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Buy Now
Questions 92

A technician is monitoring a network and notices an outage has occurred that could potentially cause a major disruption to the business workflow. Which of the following should the technician do NEXT? !•: A. Identify the issue and its impact to the business.

B. Report the incident to the proper teams or management for awareness.

C. Start a root cause analysts and create documentation

D. Create an action plan and implement the solution

Options:

Buy Now
Questions 93

A customer wants to format a 4TB external drive with a filesystem that is compatible with both Windows and

Linux OSs.

Which of the following should the technician suggest the customer use?

Options:

A.

Ext4

B.

exFAT

C.

NFS

D.

FAT32

E.

CDFS

Buy Now
Questions 94

After receiving a replacement smartphone. a corporate user is able to open some emails but is unable to open encrypted emails. Which of the following troubleshooting steps should a technician take NEXT?

Options:

A.

Place the previous certificate in escrow.

B.

Verity the installation of S/MIME on the phone

C.

Ensure the users public Key is in the global address list

D.

Instruct the user to wait for synchronization to complete.

Buy Now
Questions 95

A technician installed a new video card into a computer but did not connect the second monitor. When the technician boots the computer, it shows a blue screen during boot and automatically restarts.

The technician is able to boot into safe mode successfully. Which of the following would MOST. likely resolve the issue?

Options:

A.

Install the second monitor.

B.

Replace the video card

C.

Install updated video drivers.

D.

Disable the antivirus.

Buy Now
Questions 96

A user calls the help desk to report an issue accessing a new application on a Windows PC When the user tries to launch the application, an error message appears and then quietly disappears before the user can read it, Which of the following protocols would a technician MOST likely use to help diagnose this issue?

Options:

A.

FTP

B.

ROP

C.

SNWP

D.

SSH

Buy Now
Questions 97

A customer calls the help desk to report a computer that has become infected. While speaking with the technician, there is an audible siren coming from the computer. The browser window is flashing

red, stating the computer is infected, and then the computer becomes unresponsive. A technician is dispatched to determine a solution. After a reboot and a virus scan, the technician is unable to find

any issues, When the customer opens the browser, the homepage redirects to the same page, and the same issue occurs. Which of the following should be the NEXT step to resolve the issue?

Options:

A.

Reset the browser to defaults.

B.

Update the antivirus definitions.

C.

Reset Windows to a recent restore point.

D.

Install Windows Updates.

Buy Now
Questions 98

Which of the following application installation methods requires the use of a valid IP address?

Options:

A.

USB

B.

Network-based

C.

Script-based

D.

CD-ROM

Buy Now
Questions 99

A technician is setting up a media server and wireless router that can stream video files to portable devices. The technician was asked to configure the system so the videos can be accessed by devices outside the LAN. Which of the following does the technician MOST likely need to configure to allow access?

Options:

A.

Wireless encryption

B.

Port forwarding

C.

Content filtering

D.

Static IP addresses

Buy Now
Exam Code: 220-1002
Exam Name: CompTIA A+ Certification Exam: Core 2
Last Update: Apr 14, 2023
Questions: 665