Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 3 / 17
Total 832 questions

A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file

extension Which pf the following actions is the FIRST step the technician should take?

A.

Runa live disk clone.

B.

Run a full antivirus scan.

C.

Use a batch file to rename the files-

D.

Disconnect the machine from the network

A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?

A.

Device Manager

B.

System

C.

Ease of Access Center

D.

Programs and Features

A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?

A.

Wi-Fi

B.

Nearby share

C.

NFC

D.

Bluetooth

Which of the following commands should a technician use to change user permissions?

A.

sudo

B.

chmod

C.

mv

D.

pwd

A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?

A.

Configure the sleep settings.

B.

Disablehibernation.

C.

Edit thepower plan.

D.

Turn onfast startup.

A technician reports that a SOHO wireless network was compromised by an attacker who brute forced a password to gain access. The attacker was able to modify the DNS settings on the router and spread malware to the entire network. Which of the following configurations would most likely have allowed the attack to take place? (Select two).

A.

Guest network

B.

TKIP

C.

WPS

D.

Default login

E.

WEP

F.

AES

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?

A.

DoS

B.

Spoofing

C.

XSS

D.

SQL injection

A help desk technician is preparing to upgrade the company's desktop OS from Windows 7 to Windows 10. The technician needs to ensure the upgrade will preserve the users’ applications and data but also minimize the time and effort required for the upgrade. Which of the following would the technician most likely do?

A.

Perform a clean install of the new OS.

B.

Utilize the Windows Update tool.

C.

Utilize the "Refresh this PC" option in the Settings menu.

D.

Use the Update Assistant tool.

A user reports the following issues:

•Their computer is constantly running slowly.

•The default home page of the web browser has changed to a suspicious search engine.

•They have been receiving pop-up ads on the screen.

Which of the following should a technician do first to address these issues?

A.

Update the antivirus program and run a full system scan.

B.

Uninstall the suspicious search engine and reset the home page.

C.

Install the latest updates for the operating system.

D.

Block the pop-up ads using the web browser settings.

Which of the following commands should be used to display current processor activity on a Linux workstation?

A.

top

B.

ls

C.

procmon

D.

taskmgr

A user connected a smartphone to a coffee shop’s public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity. A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do immediately to best address these security and privacy concerns? (Select two).

A.

Enable airplane mode.

B.

Stay offline when in public places.

C.

Uninstall recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device.

F.

Install all application updates.

A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?

A.

Storage cache

B.

Malicious applications

C.

Privacy settings

D.

Permissions

A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?

A.

netstat

B.

tracert

C.

net use

D.

net user

E.

nslookup

Which of the following filesystems is most likely to be used for the boot volume on a Linux desktop?

A.

ext4

B.

NTFS

C.

HFS

D.

APFS