CompTIA 220-1102 - CompTIA A+ Certification Core 2 Exam
A technician needs to track evidence for a forensic investigation on a Windows computer. Which of the following describes this process?
A technician needs administrator access on a Windows workstation to facilitate system changes without elevating permissions. Which of the following would best accomplish this task?
Applications on a computer are not updating, which is preventing the user from opening certain files. Which of the following MMC snap-ins should the technician launch next to continue troubleshooting the issue?
A user is setting up backups on a workstation. The user wants to ensure that the restore process is as simple as possible. Which of the following backup types should the user select?
Maintaining the chain of custody is an important part of the incident response process. Which of the following reasons explains why this is important?
A remote user's smartphone is performing very slowly. The user notices that the performance improves slightly after rebooting but then reverts back to performing slowly. The user also notices that the phone does not get any faster after connecting to the company's corporate guest network. A technician sees that the phone has a large number of applications installed on it. Which of the following is the most likely cause of the issue?
A help desk technician needs to remotely access and control a customer's Windows PC by using a secure session that allows the technician the same control as the customer. Which of the following tools provides this type of access?
Which of the following is also known as something you know, something you have, and something you are?
ACL
A technician has identified malicious traffic originating from a user's computer. Which of the following is the best way to identify the source of the attack?
Which of the following should be documented to ensure that the change management plan is followed?
Which of the following would allow physical access to a restricted area while maintaining a record of events?
Which of the following is command options is used to display hidden files and directories?
A systems administrator is troubleshooting network performance issues in a large corporate office. The end users report that traffic to certain internal environments is not stable and often drops. Which of the following command-line tools can provide the most detailed information for investigating the issue further?
Which of the following are mobile operating systems used on smartphones? (Select two).
Which of the following statements describes the purpose of scripting languages?
To access the hardware of the computer it is running on