New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 13 / 13
Total 845 questions

Which of the following should be considered when maintaining the environment of a server room?

A.

Circuit breaker capacity

B.

Power distribution unit placement

C.

RAID configurations

D.

Virtualization

A change management review board denied an administrator's request for change. The administrator had provided the purpose and scope of the change, the date and time, and impacted systems with the risk analysis. Which of the following should be included to approve this change?

A.

End-user acceptance

B.

Cost analysis

C.

Rollback plan

D.

Standard maintenance window

An employee utilizes a personal smartphone to work remotely. The employee is unable to reach the portal using the company-provided VPN service. Which of the following describes the cause of the issue?

A.

The application must be purchased by the company.

B.

The smartphone is not on the latest OS version.

C.

The smartphone is not enrolled in MDM service.

D.

The application fails to install and launch.

A technician is troubleshooting an issue on a PC that has low disk space. Which of the following Control Panel utilities should the technician most likely use to investigate and remediate the issue?

A.

Internet Options

B.

System

C.

Programs and Features

D.

Device Manager

A technician needs to configure a newly installed SSD. Which of the following tools should the technician use? (Select two).

A.

regedit.exe

B.

resmon.exe

C.

gpedit.msc

D.

diskmgmt.msc

E.

dfrgui.exe

F.

diskpart.msc

A user's PC is performing slowly after the user clicked on a suspicious email attachment. The technician notices that a single process is taking 100% of RAM, CPU, and network resources. Which of the following should the technician do first?

A.

Disconnect the computer from the network

B.

Run an antivirus scan

C.

Reboot the computer

D.

Educate the user about cybersecurity best practices

An MDM report shows that a user's company cell phone has unauthorized applications installed. The device has recently checked into the MDM server, and the company still has access to remotely wipe the device. Which of the following describes the action the user has performed?

A.

Obtained root access

B.

Upgraded the OS

C.

Installed a VPN

D.

Uninstalled the MDM software

A Windows 10 computer is not installing updates and continues to receive errors even during manual update installations. Which of the following should a technician do to fix the issues? (Select two).

A.

Ensure that the Windows Update Utility is the latest version.

B.

Refresh local WSUS settings on the computer.

C.

Delete the Windows Update cache.

D.

Run the System check to verify system files.

E.

Reimage the operating system while retaining user files.

F.

Reset WMI and re-register system .dlls.

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

Users report that a network printer intermittently goes offline during the day. Which of the following commands should the technician use to confirm whether the printer has connectivity issues?

A.

ping

B.

netstat

C.

net

D.

nslookup

After a user recently installs a new scanner and the associated software on a computer, they notice the computer is now starting up very slowly. Which of the following is the best tool to troubleshoot this issue?

A.

Resource Monitor

B.

Task Manager

C.

Device Manager

D.

Windows Update

E.

Event Viewer

Which of the following scripting languages is the most commonly used for system administration on Windows operating systems?

A.

PowerShell

B.

Python

C.

Bash

D.

JavaScript

A home office user wants to ensure a PC is backed up and protected against local natural disasters and hardware failures. Which of the following would meet the user's requirements?

A.

Using an agent-based cloud backup solution

B.

Implementing a grandfather-father-son backup rotation

C.

Automating backups to a local network share

D.

Saving files manually to an external drive