Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 3 / 16
Total 799 questions

A user reports that an air-gapped computer may have been infected with a virus after the user transferred files from a USB drive. The technician runs a computer scan with Windows Defender but does not find an infection. Which of the following actions should the technician take next? (Select two).

A.

Examine the event logs.

B.

Connect to the network.

C.

Document the findings.

D.

Update the definitions.

E.

Reimage the computer.

F.

Enable the firewall.

Which of the following is the best reason for sandbox testing in change management?

    To evaluate the change before deployment

A.

To obtain end-user acceptance

B.

To determine the affected systems

C.

To select a change owner

Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin?

    .exe

A.

.dmg

B.

. app

C.

. rpm

D.

.pkg

A technician needs to perform after-hours service starting at 10:00 p.m. The technician is currently 20 minutes late. The customer will also be late. Which of the following should the technician do considering proper communication techniques and professionalism?

    Do not notify the customer if arriving before the customer.

A.

Dismiss the customer and proceed with the after-hours work.

B.

Contact the customer if the technician is arriving late.

C.

Disclose the experience via social media.

A remote user contacts the help desk about an email that appears to be distorted. The technician is unsure what the user means and needs to view the email to assist with troubleshooting. Which of the following should the technician use to assist the user?

A.

VNC

B.

SSH

C.

VPN

D.

RMM

In an organization with a standardized set of installed software, a developer submits a request to have new software installed. The company does not currently have a license for this software, but the developer already downloaded the installation file and is requesting that the technician install it. The developer states that the management team approved the business use of this software. Which of the following is the best action for the technician to take?

A.

Contact the software vendor to obtain the license for the user, and assist the user with installation once the license is purchased.

B.

Run a scan on the downloaded installation file to confirm that it is free of malicious software, install the software, and document the software installation process.

C.

Indicate to the developer that formal approval is needed; then, the IT team should investigate the software and the impact it will have on the organization before installing the software.

D.

Install the software and run a full system scan with antivirus software to confirm that the operating system is free of malicious software.

A technician is building a new desktop machine for a user who will be using the workstation to render 3-D promotional movies. Which of the following is the most important component?

A.

Dedicated GPU

B.

DDR5 SODIMM

C.

NVMe disk

D.

64-bit CPU

Which of the following is also known as something you know, something you have, and something you are?

    ACL

A.

MFA

B.

SMS

C.

NFC

Which of the following are mobile operating systems used on smartphones? (Select two).

A.

macOS

B.

Windows

C.

Chrome OS

D.

Linux

E.

iOS

F.

Android

A student is setting up a new Windows 10 laptop for the upcoming semester. The student is interested in customizing the wallpaper. Which of the following should the student use to change the wallpaper?

A.

Apps and Features

B.

Personalization

C.

File Explorer

D.

Task Manager

Which of the following environmental factors are most important to consider when planning the configuration of a data center? (Select two).

A.

Temperature levels

B.

Location of the servers

C.

Humidity levels

D.

Noise levels

E.

Lighting levels

F.

Cable management

A user wants to acquire antivirus software for a SOHO PC. A technician recommends a licensed software product, but the user does not want to pay for a license. Which of the following license types should the technician recommend?

A.

Corporate

B.

Open-source

C.

Personal

D.

Enterprise

Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?

A.

To maintain an information security policy

B.

To properly identify the issue

C.

To control evidence and maintain integrity

D.

To gather as much information as possible

A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?

A.

Investigate the firewall logs.

B.

Isolate the machine from the network.

C.

Inspect the Windows Event Viewer.

D.

Take a physical inventory of the device.

Which of the following is the most likely to use NTFS as the native filesystem?

A.

macOS

B.

Linux

C.

Windows

D.

Android