Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 16 / 16
Total 799 questions

A technician is creating a Windows splash screen that details login expectations. Which of the following should the technician most likely use?

A.

End-user license agreement

B.

Non-disclosure agreement

C.

Regulatory compliance

D.

Acceptable use policy

Which of the following ensures proprietary information on a lost or stolen mobile device cannot be accessed while the device is offline?

A.

Remote wipe

B.

Mandatory screen locks

C.

Location applications

D.

Device data encryption

A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

A.

Record the details in the ticketing system.

B.

Take screenshots and attach them to the root cause analysis.

C.

Discuss the incident with the company’s legal team.

D.

List the details in the company’s knowledge base.

Which of the following file types should be used to install software on a macOS computer? (Select two).

A.

.yum

B.

.pkg

C.

.msi

D.

.ps1

E.

.exe

F.

.dmg

A technician is investigating a workstation that has not received the latest policy changes. Which of the following commands should the technician use to apply the latest domain policy changes?

A.

sfc /scannow

B.

gpupdare /force

C.

chkdsk /y

D.

xcopy Zp

Which of the following is the weakest wireless security protocol?

A.

WEP

B.

WPA2

C.

TKIP

D.

AES

h company uses shared drives as part of a workforce collaboration process. To ensure the correct access permissions, inheritance at the top-level folder is assigned to each department. A manager's team is working on confidential material and wants to ensure only the immediate team can view a specific folder and its subsequent files and subfolders. Which of the following actions should the technician most likely take?

A.

Turn off inheritance on the requested folder only and set the requested permissions to each file manually.

B.

Turn off inheritance at the top-level folder and remove all inherited permissions.

C.

Turn off Inheritance at the top-level folder and set permissions to each file and subfolder manually.

D.

Turn off inheritance on the requested folder only, set the requested permissions, and then turn on inheritance under the child folders.

A user reports that a system is performing unusually and is sending requests to an unfamiliar IP address every five minutes. Which of the following should the technician check first to troubleshoot the issue?

A.

Application logs

B.

Running processes

C.

Antivirus scans

D.

Recent system updates

After a failed attempt to open an email attachment for an unexpected overdue invoice, a smartphone user experiences abnormal performance when using their mobile browser and other applications. The user restarts the device, but the issue persists. Which of the following actions should the user take next?

A.

Shut down and cold start the smartphone

B.

Delete the email containing the attachment

C.

Wipe the device and reset it to factory defaults

D.

Uninstall and reinstall the mobile browser

A user's corporate iPhone had issues and was repaired while the user was on vacation. The mobile phone has compared to an identical phone. Which of the following best describes what is happening to the phone?

A.

APK Source

B.

Connectivity issues

C.

Developer Mode

D.

Jailbreak

A user's smartphone screen is not rotating. The technician confirms the rotation lock is deactivated. Which of the following steps should the technician perform next?

A.

Remove the screen protector.

B.

Update the smartphone’s software.

C.

Restart the smartphone.

D.

Replace the smartphone.

Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

A.

DoS

B.

Spoofing

C.

XSS

D.

SQL injection

A user is unable to log in to a workstation. The user reports an error message about the date being incorrect. A technician reviews the date and verifies it is correct, but the system clock is an hour behind. The technician also determines this workstation is the only one affected. Which of the following is the most likely issue?

A.

Time drift

B.

NTP failure

C.

Windows Update

D.

CMOS battery

An application's performance is degrading over time. The application is slowing but never gives an error and does not crash. Which of the following tools should a technician use to start troubleshooting?

A.

Reliability history

B.

Computer management

C.

Resource monitor

D.

Disk defragment