Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 15 / 16
Total 799 questions

A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing. Which of the following remote access technologies should the administrator use?

A.

RDP

B.

MSRA

C.

SSH

D.

VNC

A technician runs a command and gets the following output:

Ethernet adapter Ethernet 3:

Connection-specific DNS Suffix . :reddog.microsoft.com

Link-local IPv6 Address .......... :fe80::de3d:9283:4f00:856a%5

IPv4 Address.......................:10.203.10.16

Subnet Mask ...................... :255.255.255.0

Default Gateway .................. :10.203.10.1

Which of the following commands did the technician use?

A.

ipconfig

B.

tracert

C.

whoami

D.

net use

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

Which of the following Windows 10 editions is the most cost-effective and appropriate for a single user who needs to access their computer remotely?

A.

Education

B.

Pro

C.

Enterprise

D.

Home

A technician receives a help desk ticket regarding a software issue on a workstation. The workstation provides the only access to a corporate database, and the technician needs to recover the workstation quickly. Which of the following actions should the technician take?

A.

Restore the workstation from the last backup.

B.

Reinstall the operating system.

C.

Run the System File Checker.

D.

Run the Hardware Diagnostics tool.

A user recently accessed several websites that required log-in credentials. During subsequent visits, the user noticed that the log-in credential fields were already filled in. Which of the following is a way to prevent the browser from remembering the credentials for future visits?

A.

Disabling the password manager

B.

Removing the secure connections

C.

Clearing the browser cache

D.

Deleting the trusted sources

A technician finds that a new company security policy has broken an application in use at a branch office. Which of the following should the technician do to ensure that the application is fixed and prevent the issue from reoccurring?

A.

Request a policy exception be put in place while the application requirements are addressed

B.

Reinstall the affected software using local administrative rights for each computer

C.

Remove the new security settings and change the administrative accounts on the branch office computers to prevent the settings from being reapplied

D.

Research and procure a replacement application that is not adversely affected by the new policy

Which of the following filesystems is most likely to be used for the boot volume on a Linux desktop?

A.

ext4

B.

NTFS

C.

HFS

D.

APFS

A technician receives a migration audit stating that a desktop needs to be removed from the network and reimaged with a current OS. Which of the following is the most likely reason for the notification?

A.

MTBF exceeded

B.

Incompatible drivers

C.

End-of-life

D.

NTFS corruption

A user needs to test several software replacement possibilities. Part of the process involves installing the different software options on a corporate-imaged sandboxed PC. Which of the following is the best option to allow the user to install the required software?

A.

Make the user a member of Domain Admins.

B.

Add the user to the local Administrators group.

C.

Let the user use credentials from another user who has rights.

D.

Give the user the local, high-privileged account password.

An administrator received a new shipment of mobile devices. Per company policy, all enterprise-issued devices must have two authentication methods, and the organization has already enforced the use of PIN codes as one method. Which of the following device features should the administrator enable?

A.

Smart card

B.

Biometrics

C.

Hard token

D.

One-time password

A technician needs to import a new digital certificate and place it in the proper location. Which of the following Control Panel utilities should the technician use to import the certificate?

A.

Internet Options

B.

Network and Sharing Center

C.

Credential Manager

D.

Security and Maintenance

Which of the following is used to detect and record access to restricted areas?

A.

Bollards

B.

Video surveillance

C.

Badge readers

D.

Fence

A customer needs to purchase a desktop capable of rendering video. Which of the following should the customer prioritize?

A.

NIC

B.

USB

C.

GPU

D.

HDMI

Which of the following security threats requires a phone call to launch the attack?

A.

Vishing

B.

XSS

C.

Spoofing

D.

DDoS