CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam
A technician received a call stating that all files in a user's documents folder appear to be Changed, and each of the files now has a look file
extension Which pf the following actions is the FIRST step the technician should take?
A technician is tasked with configuring a computer for a visually impaired user. Which of the following utilities should the technician use?
A customer reports that an Android phone will not allow the use of contactless electronic payment. Which of the following needs to be enabled to resolve the issue?
Which of the following commands should a technician use to change user permissions?
A user's laptop is shutting down every time the laptop lid is closed, which is leading to frequent work interruptions. Which of the following should a help desk specialist do to remediate the issue?
A technician reports that a SOHO wireless network was compromised by an attacker who brute forced a password to gain access. The attacker was able to modify the DNS settings on the router and spread malware to the entire network. Which of the following configurations would most likely have allowed the attack to take place? (Select two).
Which of the following is a data security standard for protecting credit cards?
Which of the following attacks can a hacker use to execute code on a user's computer when the user visits a specially prepared, malicious website?
A help desk technician is preparing to upgrade the company's desktop OS from Windows 7 to Windows 10. The technician needs to ensure the upgrade will preserve the users’ applications and data but also minimize the time and effort required for the upgrade. Which of the following would the technician most likely do?
A user reports the following issues:
•Their computer is constantly running slowly.
•The default home page of the web browser has changed to a suspicious search engine.
•They have been receiving pop-up ads on the screen.
Which of the following should a technician do first to address these issues?
Which of the following commands should be used to display current processor activity on a Linux workstation?
A user connected a smartphone to a coffee shop’s public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity. A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do immediately to best address these security and privacy concerns? (Select two).
A customer reports high data usage on a smartphone that reaches its monthly data limit within the first week of each billing cycle. The customer uses the phone primarily for calls and SMS messages with minimal content streaming. A technician troubleshoots the phone and notices that both developer mode and installs from unknown sources are enabled. Which of the following should the technician check next?
A technician thinks a customer's computer may have a malware infection and wants to determine whether the computer is in communication with any other machines. Which of the following commands should the technician use?
Which of the following filesystems is most likely to be used for the boot volume on a Linux desktop?