Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam

Page: 5 / 16
Total 799 questions

A user's Windows computer seems to work well at the beginning of the day. However, its performance degrades throughout the day, and the system freezes when several applications are open. Which of the following should a technician do to resolve the issue? (Select two).

    Install the latest GPU drivers.

A.

Reinstall the OS.

B.

Increase the RAM.

C.

Increase the hard drive space.

D.

Uninstall unnecessary software.

E.

Disable scheduled tasks.

When a user is in the office, the user's mobile phone loads applications and web browses very slowly on a cellular connection. Which of the following is the best way to fix this issue?

    Connect to the company's Wi-Fi network.

A.

Change the settings on the phone to connect to a different cellular tower.

B.

Install a cellular repeater at the office for this user.

C.

Update all applications on the phone.

A technician is asked to resize a partition on the internal storage drive of a computer running macOS. Which of the followings tools should the technician use to accomplish this task?

A.

Consoltf

B.

Disk Utility

C.

Time Machine

D.

FileVault

A technician wants to install Developer Mode on a Windows laptop but is receiving a "failed to install package" message. Which of the following should the technician do first?

A.

Ensure internet connectivity.

B.

Check for Windows updates.

C.

Enable SSH.

D.

Reboot computer.

A user reports a computer is running slow. Which of the following tools will help a technician identify the issue?

A.

Disk Cleanup

B.

Group Policy Editor

C.

Disk Management

D.

Resource Monitor

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?

A.

Brute force

B.

Zero day

C.

Denial of service

D.

On-path

The Chief Executive Officer at a bark recently saw a news report about a high-profile cybercrime where a remote-access tool that the bank uses for support was also used in this crime. The report stated that attackers were able to brute force passwords to access systems. Which of the following would BEST limit the bark's risk? (Select TWO)

A.

Enable multifactor authentication for each support account

B.

Limit remote access to destinations inside the corporate network

C.

Block all support accounts from logging in from foreign countries

D.

Configure a replacement remote-access tool for support cases.

E.

Purchase a password manager for remote-access tool users

F.

Enforce account lockouts after five bad password attempts

Once weekly a user needs Linux to run a specific open-source application that is not available for the currently installed Windows platform. The user has limited bandwidth throughout the day. Which of the following solutions would be the MOST efficient, allowing for parallel execution of the Linux application and Windows applications?

A.

Install and run Linux and the required application in a PaaS cloud environment

B.

Install and run Linux and the required application as a virtual machine installed under the Windows OS

C.

Use a swappable drive bay for the boot drive and install each OS with applications on its own drive Swap the drives as needed

D.

Set up a dual boot system by selecting the option to install Linux alongside Windows

The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?

A.

Encryption at rest

B.

Account lockout

C.

Automatic screen lock

D.

Antivirus

A customer reported that a home PC with Windows 10 installed in the default configuration is having issues loading applications after a reboot occurred in the middle of the night. Which of the following is the FIRST step in troubleshooting?

A.

Install alternate open-source software in place of the applications with issues

B.

Run both CPU and memory tests to ensure that all hardware functionality is normal

C.

Check for any installed patches and roll them back one at a time until the issue is resolved

D.

Reformat the hard drive, and then reinstall the newest Windows 10 release and all applications.

A call center technician receives a call from a user asking how to update Windows Which of the following describes what the technician should do?

A.

Have the user consider using an iPad if the user is unable to complete updates

B.

Have the user text the user's password to the technician.

C.

Ask the user to click in the Search field, type Check for Updates, and then press the Enter key

D.

Advise the user to wait for an upcoming, automatic patch

A technician is setting up a desktop computer in a small office. The user will need to access files on a drive shared from another desktop on the network. Which of the following configurations should the technician employ to achieve this goal?

A.

Configure the network as private

B.

Enable a proxy server

C.

Grant the network administrator role to the user

D.

Create a shortcut to public documents

A user calls the help desk to report that none of the files on a PC will open. The user also indicates a program on the desktop is requesting payment in exchange for file access A technician verifies the user's PC is infected with ransorrrware. Which of the following should the technician do FIRST?

A.

Scan and remove the malware

B.

Schedule automated malware scans

C.

Quarantine the system

D.

Disable System Restore

A technician is installing new software on a macOS computer. Which of the following file types will the technician MOST likely use?

A.

.deb

B.

.vbs

C.

.exe

D.

.app

A technician needs to transfer a large number of files over an unreliable connection. The technician should be able to resume the process if the connection is interrupted. Which of the following tools can be used?

A.

afc

B.

ehkdsk

C.

git clone

D.

zobocopy