New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 3 / 13
Total 845 questions

A field technician applied a Group Policy setting to all the workstations in the network. This setting forced the workstations to use a specific SNTP server. Users are unable to log in now. Which of the following is the MOST likely cause of this issue?

A.

The SNTP server is offline.

B.

A user changed the time zone on a local machine.

C.

The Group Policy setting has disrupted domain authentication on the system,

D.

The workstations and the authentication server have a system clock difference.

A technician is setting up a backup method on a workstation that only requires two sets of tapes to restore. Which of the following would BEST accomplish this task?

A.

Differential backup

B.

Off-site backup

C.

Incremental backup

D.

Full backup

In which of the following scenarios would remote wipe capabilities MOST likely be used? (Select TWO).

A.

A new IT policy requires users to set up a lock screen PIN.

B.

A user is overseas and wants to use a compatible international SIM Card.

C.

A user left the phone at home and wants to prevent children from gaining access to the phone.

D.

A user traded in the company phone for a cell carrier upgrade by mistake.

E.

A user cannot locate the phone after attending a play at a theater.

F.

A user forgot the phone in a taxi, and the driver called the company to return the device.

A company is deploying mobile phones on a one-to-one basis, but the IT manager is concerned that users will root/jailbreak their phones. Which of the following technologies can be implemented to prevent this issue?

A.

Signed system images

B.

Antivirus

C.

SSO

D.

MDM

A technician is working to resolve a Wi-Fi network issue at a doctor's office that is located next to an apartment complex. The technician discovers that employees and patients are not the only people on the network. Which of the following should the technician do to BEST minimize this issue?

A.

Disable unused ports.

B.

Remove the guest network

C.

Add a password to the guest network

D.

Change the network channel.

A team of support agents will be using their workstations to store credit card data. Which of the following should the IT department enable on the workstations in order to remain compliant with common regulatory controls? (Select TWO).

A.

Encryption

B.

Antivirus

C.

AutoRun

D.

Guest accounts

E.

Default passwords

F.

Backups

A technician is troubleshooting a computer with a suspected short in the power supply. Which of the following is the FIRST step the technician should take?

A.

Put on an ESD strap

B.

Disconnect the power before servicing the PC.

C.

Place the PC on a grounded workbench.

D.

Place components on an ESD mat.

Which of the following is a data security standard for protecting credit cards?

A.

PHI

B.

NIST

C.

PCI

D.

GDPR

A technician is setting up a new laptop. The company's security policy states that users cannot install virtual machines. Which of the following should the technician implement to prevent users from enabling virtual technology on their laptops?

A.

UEFI password

B.

Secure boot

C.

Account lockout

D.

Restricted user permissions

A new service desk is having a difficult time managing the volume of requests. Which of the following is the BEST solution for the department?

A.

Implementing a support portal

B.

Creating a ticketing system

C.

Commissioning an automated callback system

D.

Submitting tickets through email

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.

Restore the device to factory settings.

B.

Uninstall the unapproved application.

C.

Disable the ability to install applications from unknown sources.

D.

Ensure the device is connected to the corporate WiFi network.

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A.

Use a key combination to lock the computer when leaving.

B.

Ensure no unauthorized personnel are in the area.

C.

Configure a screensaver to lock the computer automatically after approximately 30 minutes of inactivity.

D.

Turn off the monitor to prevent unauthorized visibility of information.

A company is looking lot a solution that provides a backup for all data on the system while providing the lowest impact to the network. Which of the following backup types will the company MOST likely select?

A.

Off-site

B.

Synthetic

C.

Full

D.

Differential

Which of the following physical security controls can prevent laptops from being stolen?

A.

Encryption

B.

LoJack

C.

Multifactor authentication

D.

Equipment lock

E.

Bollards

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Select two).

A.

Zombies

B.

Keylogger

C.

Adware

D.

Botnet

E.

Ransomware

F.

Spyware

A user connected a smartphone to a coffee shop's public Wi-Fi and noticed the smartphone started sending unusual SMS messages and registering strange network activity A technician thinks a virus or other malware has infected the device. Which of the following should the technician suggest the user do to best address these security and privacy concerns? (Select two).

A.

Disable Wi-Fi autoconnect.

B.

Stay offline when in public places.

C.

Uninstall all recently installed applications.

D.

Schedule an antivirus scan.

E.

Reboot the device

F.

Update the OS

A technician needs to establish a remote access session with a user who has a Windows workstation. The session must allow for simultaneous viewing of the workstation by both the user and technician. Which of the following remote access technologies should be used?

A.

RDP

B.

VPN

C.

SSH

D.

MSRA

A user reports a virus is on a PC. The user installs additional real-lime protection antivirus software, and the PC begins performing extremely slow. Which of the following steps should the technician take to resolve the issue?

A.

Uninstall one antivirus software program and install a different one.

B.

Launch Windows Update, and then download and install OS updates

C.

Activate real-time protection on both antivirus software programs

D.

Enable the quarantine feature on both antivirus software programs.

E.

Remove the user-installed antivirus software program.

A user attempts to install additional software and receives a UAC prompt. Which of the following is the BEST way to resolve this issue?

A.

Add a user account to the local administrator's group.

B.

Configure Windows Defender Firewall to allow access to all networks.

C.

Create a Microsoft account.

D.

Disable the guest account.

A technician received a call from a user who clicked on a web advertisement Now. every time the user moves the mouse, a pop-up display across the monitor. Which of the following procedures should the technician perform?

A.

Boot into safe mode.

B.

Perform a malware scan.

C.

Restart the machine.

D.

Reinstall the browser